-certified/13.13-cert2
\ No newline at end of file
+certified/13.13-cert3
\ No newline at end of file
+2017-04-04 12:37 +0000 Asterisk Development Team <asteriskteam@digium.com>
+
+ * asterisk certified/13.13-cert3 Released.
+
+2017-03-27 09:03 +0000 [d91f264721] Corey Farrell <git@cfware.com>
+
+ * CDR: Protect from data overflow in ast_cdr_setuserfield.
+
+ ast_cdr_setuserfield wrote to a fixed length field using strcpy. This could
+ result in a buffer overrun when called from chan_sip or func_cdr. This patch
+ adds a maximum bytes written to the field by using ast_copy_string instead.
+
+ ASTERISK-26897 #close
+ patches:
+ 0001-CDR-Protect-from-data-overflow-in-ast_cdr_setuserfie.patch submitted
+ by Corey Farrell (license #5909)
+
+ Change-Id: Ib23ca77e9b9e2803a450e1206af45df2d2fdf65c
+
+2017-03-14 09:27 +0000 [563b639e5a] Robert Mordec <r.mordec@slican.pl>
+
+ * app_queue: Member stuck as pending after forwarding previous call from queue
+
+ Queue member will get stuck in pending_members if queue calls a device
+ that is different from the one observed for state changes.
+
+ This patch removes members from pending_members as a result of channel stasis
+ events such as blind or attended transfers and hangup.
+
+ ASTERISK-26862 #close
+
+ Change-Id: I8bf6df487b9bb35726c08049ff25cdad5e357727
+
2017-03-07 18:43 +0000 Asterisk Development Team <asteriskteam@digium.com>
* asterisk certified/13.13-cert2 Released.
+++ /dev/null
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><title>Release Summary - asterisk-certified/13.13-cert2</title><h1 align="center"><a name="top">Release Summary</a></h1><h3 align="center">asterisk-certified/13.13-cert2</h3><h3 align="center">Date: 2017-03-07</h3><h3 align="center"><asteriskteam@digium.com></h3><hr><h2 align="center">Table of Contents</h2><ol>
-<li><a href="#summary">Summary</a></li>
-<li><a href="#contributors">Contributors</a></li>
-<li><a href="#closed_issues">Closed Issues</a></li>
-<li><a href="#diffstat">Diffstat</a></li>
-</ol><hr><a name="summary"><h2 align="center">Summary</h2></a><center><a href="#top">[Back to Top]</a></center><p>This release is a point release of an existing major version. The changes included were made to address problems that have been identified in this release series, or are minor, backwards compatible new features or improvements. Users should be able to safely upgrade to this version if this release series is already in use. Users considering upgrading from a previous version are strongly encouraged to review the UPGRADE.txt document as well as the CHANGES document for information about upgrading to this release series.</p><p>The data in this summary reflects changes that have been made since the previous release, asterisk-certified/13.13-cert1.</p><hr><a name="contributors"><h2 align="center">Contributors</h2></a><center><a href="#top">[Back to Top]</a></center><p>This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.</p><table width="100%" border="0">
-<tr><th width="33%">Coders</th><th width="33%">Testers</th><th width="33%">Reporters</th></tr>
-<tr valign="top"><td width="33%">4 Richard Mudgett <rmudgett@digium.com><br/>1 Alexei Gradinari <alex2grad@gmail.com><br/></td><td width="33%"><td width="33%">4 Nic Colledge <nic@njcolledge.net><br/>4 Michael Maier <m1278468@mailbox.org><br/>1 Alexei Gradinari <alex2grad@gmail.com><br/></td></tr>
-</table><hr><a name="closed_issues"><h2 align="center">Closed Issues</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all issues from the issue tracker that were closed by changes that went into this release.</p><h3>Bug</h3><h4>Category: Channels/chan_pjsip</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-26603">ASTERISK-26603</a>: [patch] chan_pjsip: not switching sending codec to receiving codec when asymmetric_rtp_codec=no<br/>Reported by: Alexei Gradinari<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=44cac456103bad9c428623fc3f9cca1e4f9ddf3f">[44cac45610]</a> Alexei Gradinari -- chan_pjsip: fix switching sending codec when asymmetric_rtp_codec=no</li>
-</ul><br><h4>Category: Resources/res_pjsip</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-26738">ASTERISK-26738</a>: Frequent segfaults since activation of DNS SRV, in pjsip_auth_clt_reinit_req at /pjsip/sip_auth_client.c, and pj_atomic_inc_and_get at pj/os_core_unix.c<br/>Reported by: Michael Maier<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=0d7f99a087fe03b0e04a63f1c3d3ed5fdfc59353">[0d7f99a087]</a> Richard Mudgett -- pjproject: Fixes to resolve DNS SRV crashes.</li>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=35881858db18cb5316ff7c94f4dd10ef8beb2bfe">[35881858db]</a> Richard Mudgett -- pjproject: Increase SENDER_WIDTH column size for 64-bit system logs.</li>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=0d4412f2b367507045d46b12ef56101a2cf0ab40">[0d4412f2b3]</a> Richard Mudgett -- pjsip_distributor.c: Update some debug messages to get transaction name.</li>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=4af241ab607277b3ecb7145f4f9847ac29b64af5">[4af241ab60]</a> Richard Mudgett -- res_pjsip: Record the serializer earlier on the tdata.</li>
-</ul><br><h4>Category: pjproject/pjsip</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-26669">ASTERISK-26669</a>: PJSIP Segfault 13.13.1 (Bundled PJSIP)<br/>Reported by: Nic Colledge<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=0d7f99a087fe03b0e04a63f1c3d3ed5fdfc59353">[0d7f99a087]</a> Richard Mudgett -- pjproject: Fixes to resolve DNS SRV crashes.</li>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=35881858db18cb5316ff7c94f4dd10ef8beb2bfe">[35881858db]</a> Richard Mudgett -- pjproject: Increase SENDER_WIDTH column size for 64-bit system logs.</li>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=0d4412f2b367507045d46b12ef56101a2cf0ab40">[0d4412f2b3]</a> Richard Mudgett -- pjsip_distributor.c: Update some debug messages to get transaction name.</li>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=4af241ab607277b3ecb7145f4f9847ac29b64af5">[4af241ab60]</a> Richard Mudgett -- res_pjsip: Record the serializer earlier on the tdata.</li>
-</ul><br><hr><a name="diffstat"><h2 align="center">Diffstat Results</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.</p><pre>channels/chan_pjsip.c | 9 -
-include/asterisk/channel.h | 15 +
-include/asterisk/res_pjsip.h | 10 +
-main/channel.c | 36 ++++
-res/res_pjsip.c | 2
-res/res_pjsip/pjsip_distributor.c | 39 +----
-res/res_pjsip_outbound_publish.c | 3
-res/res_pjsip_outbound_registration.c | 1
-third-party/pjproject/patches/0011-r5554-svn-backport-Increase-SENDER_WIDTH-column-size.patch | 77 ++++++++++
-third-party/pjproject/patches/0012-Re-1945-misc-Don-t-trigger-SRV-complete-callback-whe.patch | 59 +++++++
-third-party/pjproject/patches/0013-r5559-svn-backport-Fix-to-resolve-DNS-SRV-crashes.patch | 24 +++
-11 files changed, 244 insertions(+), 31 deletions(-)</pre><br></html>
\ No newline at end of file
+++ /dev/null
- Release Summary
-
- asterisk-certified/13.13-cert2
-
- Date: 2017-03-07
-
- <asteriskteam@digium.com>
-
- ----------------------------------------------------------------------
-
- Table of Contents
-
- 1. Summary
- 2. Contributors
- 3. Closed Issues
- 4. Diffstat
-
- ----------------------------------------------------------------------
-
- Summary
-
- [Back to Top]
-
- This release is a point release of an existing major version. The changes
- included were made to address problems that have been identified in this
- release series, or are minor, backwards compatible new features or
- improvements. Users should be able to safely upgrade to this version if
- this release series is already in use. Users considering upgrading from a
- previous version are strongly encouraged to review the UPGRADE.txt
- document as well as the CHANGES document for information about upgrading
- to this release series.
-
- The data in this summary reflects changes that have been made since the
- previous release, asterisk-certified/13.13-cert1.
-
- ----------------------------------------------------------------------
-
- Contributors
-
- [Back to Top]
-
- This table lists the people who have submitted code, those that have
- tested patches, as well as those that reported issues on the issue tracker
- that were resolved in this release. For coders, the number is how many of
- their patches (of any size) were committed into this release. For testers,
- the number is the number of times their name was listed as assisting with
- testing a patch. Finally, for reporters, the number is the number of
- issues that they reported that were affected by commits that went into
- this release.
-
- Coders Testers Reporters
- 4 Richard Mudgett 4 Nic Colledge
- 1 Alexei Gradinari 4 Michael Maier
- 1 Alexei Gradinari
-
- ----------------------------------------------------------------------
-
- Closed Issues
-
- [Back to Top]
-
- This is a list of all issues from the issue tracker that were closed by
- changes that went into this release.
-
- Bug
-
- Category: Channels/chan_pjsip
-
- ASTERISK-26603: [patch] chan_pjsip: not switching sending codec to
- receiving codec when asymmetric_rtp_codec=no
- Reported by: Alexei Gradinari
- * [44cac45610] Alexei Gradinari -- chan_pjsip: fix switching sending
- codec when asymmetric_rtp_codec=no
-
- Category: Resources/res_pjsip
-
- ASTERISK-26738: Frequent segfaults since activation of DNS SRV, in
- pjsip_auth_clt_reinit_req at /pjsip/sip_auth_client.c, and
- pj_atomic_inc_and_get at pj/os_core_unix.c
- Reported by: Michael Maier
- * [0d7f99a087] Richard Mudgett -- pjproject: Fixes to resolve DNS SRV
- crashes.
- * [35881858db] Richard Mudgett -- pjproject: Increase SENDER_WIDTH
- column size for 64-bit system logs.
- * [0d4412f2b3] Richard Mudgett -- pjsip_distributor.c: Update some debug
- messages to get transaction name.
- * [4af241ab60] Richard Mudgett -- res_pjsip: Record the serializer
- earlier on the tdata.
-
- Category: pjproject/pjsip
-
- ASTERISK-26669: PJSIP Segfault 13.13.1 (Bundled PJSIP)
- Reported by: Nic Colledge
- * [0d7f99a087] Richard Mudgett -- pjproject: Fixes to resolve DNS SRV
- crashes.
- * [35881858db] Richard Mudgett -- pjproject: Increase SENDER_WIDTH
- column size for 64-bit system logs.
- * [0d4412f2b3] Richard Mudgett -- pjsip_distributor.c: Update some debug
- messages to get transaction name.
- * [4af241ab60] Richard Mudgett -- res_pjsip: Record the serializer
- earlier on the tdata.
-
- ----------------------------------------------------------------------
-
- Diffstat Results
-
- [Back to Top]
-
- This is a summary of the changes to the source code that went into this
- release that was generated using the diffstat utility.
-
- channels/chan_pjsip.c | 9 -
- include/asterisk/channel.h | 15 +
- include/asterisk/res_pjsip.h | 10 +
- main/channel.c | 36 ++++
- res/res_pjsip.c | 2
- res/res_pjsip/pjsip_distributor.c | 39 +----
- res/res_pjsip_outbound_publish.c | 3
- res/res_pjsip_outbound_registration.c | 1
- third-party/pjproject/patches/0011-r5554-svn-backport-Increase-SENDER_WIDTH-column-size.patch | 77 ++++++++++
- third-party/pjproject/patches/0012-Re-1945-misc-Don-t-trigger-SRV-complete-callback-whe.patch | 59 +++++++
- third-party/pjproject/patches/0013-r5559-svn-backport-Fix-to-resolve-DNS-SRV-crashes.patch | 24 +++
- 11 files changed, 244 insertions(+), 31 deletions(-)
--- /dev/null
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><title>Release Summary - asterisk-certified/13.13-cert3</title><h1 align="center"><a name="top">Release Summary</a></h1><h3 align="center">asterisk-certified/13.13-cert3</h3><h3 align="center">Date: 2017-04-04</h3><h3 align="center"><asteriskteam@digium.com></h3><hr><h2 align="center">Table of Contents</h2><ol>
+<li><a href="#summary">Summary</a></li>
+<li><a href="#contributors">Contributors</a></li>
+<li><a href="#closed_issues">Closed Issues</a></li>
+<li><a href="#diffstat">Diffstat</a></li>
+</ol><hr><a name="summary"><h2 align="center">Summary</h2></a><center><a href="#top">[Back to Top]</a></center><p>This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.</p><p>Security Advisories:</p><ul>
+<li><a href="http://downloads.asterisk.org/pub/security/AST-2017-001.html">AST-2017-001</a></li>
+</ul><p>The data in this summary reflects changes that have been made since the previous release, asterisk-certified/13.13-cert2.</p><hr><a name="contributors"><h2 align="center">Contributors</h2></a><center><a href="#top">[Back to Top]</a></center><p>This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.</p><table width="100%" border="0">
+<tr><th width="33%">Coders</th><th width="33%">Testers</th><th width="33%">Reporters</th></tr>
+<tr valign="top"><td width="33%">1 Corey Farrell <git@cfware.com><br/>1 Robert Mordec <r.mordec@slican.pl><br/></td><td width="33%"><td width="33%">1 Alex Villacís Lasso <a_villacis@palosanto.com><br/>1 Robert Mordec <r.mordec@slican.pl><br/></td></tr>
+</table><hr><a name="closed_issues"><h2 align="center">Closed Issues</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all issues from the issue tracker that were closed by changes that went into this release.</p><h3>Bug</h3><h4>Category: Applications/app_queue</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-26862">ASTERISK-26862</a>: app_queue: Queue stops calling members with local interface after forwarding in previous call<br/>Reported by: Robert Mordec<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=563b639e5ac9eeab1eb64067a6067385b8c719b3">[563b639e5a]</a> Robert Mordec -- app_queue: Member stuck as pending after forwarding previous call from queue</li>
+</ul><br><h4>Category: Channels/chan_sip/General</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-26897">ASTERISK-26897</a>: chan_sip: Security vulnerability with client code header<br/>Reported by: Alex Villacís Lasso<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=d91f264721e111427adfa3fadde7b283dafb20a4">[d91f264721]</a> Corey Farrell -- CDR: Protect from data overflow in ast_cdr_setuserfield.</li>
+</ul><br><hr><a name="diffstat"><h2 align="center">Diffstat Results</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.</p><pre>0 files changed</pre><br></html>
\ No newline at end of file
--- /dev/null
+ Release Summary
+
+ asterisk-certified/13.13-cert3
+
+ Date: 2017-04-04
+
+ <asteriskteam@digium.com>
+
+ ----------------------------------------------------------------------
+
+ Table of Contents
+
+ 1. Summary
+ 2. Contributors
+ 3. Closed Issues
+ 4. Diffstat
+
+ ----------------------------------------------------------------------
+
+ Summary
+
+ [Back to Top]
+
+ This release has been made to address one or more security vulnerabilities
+ that have been identified. A security advisory document has been published
+ for each vulnerability that includes additional information. Users of
+ versions of Asterisk that are affected are strongly encouraged to review
+ the advisories and determine what action they should take to protect their
+ systems from these issues.
+
+ Security Advisories:
+
+ * AST-2017-001
+
+ The data in this summary reflects changes that have been made since the
+ previous release, asterisk-certified/13.13-cert2.
+
+ ----------------------------------------------------------------------
+
+ Contributors
+
+ [Back to Top]
+
+ This table lists the people who have submitted code, those that have
+ tested patches, as well as those that reported issues on the issue tracker
+ that were resolved in this release. For coders, the number is how many of
+ their patches (of any size) were committed into this release. For testers,
+ the number is the number of times their name was listed as assisting with
+ testing a patch. Finally, for reporters, the number is the number of
+ issues that they reported that were affected by commits that went into
+ this release.
+
+ Coders Testers Reporters
+ 1 Corey Farrell 1 Alex VillacAs Lasso
+ 1 Robert Mordec 1 Robert Mordec
+
+ ----------------------------------------------------------------------
+
+ Closed Issues
+
+ [Back to Top]
+
+ This is a list of all issues from the issue tracker that were closed by
+ changes that went into this release.
+
+ Bug
+
+ Category: Applications/app_queue
+
+ ASTERISK-26862: app_queue: Queue stops calling members with local
+ interface after forwarding in previous call
+ Reported by: Robert Mordec
+ * [563b639e5a] Robert Mordec -- app_queue: Member stuck as pending after
+ forwarding previous call from queue
+
+ Category: Channels/chan_sip/General
+
+ ASTERISK-26897: chan_sip: Security vulnerability with client code header
+ Reported by: Alex VillacAs Lasso
+ * [d91f264721] Corey Farrell -- CDR: Protect from data overflow in
+ ast_cdr_setuserfield.
+
+ ----------------------------------------------------------------------
+
+ Diffstat Results
+
+ [Back to Top]
+
+ This is a summary of the changes to the source code that went into this
+ release that was generated using the diffstat utility.
+
+ 0 files changed