]> git.ipfire.org Git - thirdparty/asterisk.git/commitdiff
Update for certified/16.8-cert7 certified/16.8-cert7
authorAsterisk Development Team <asteriskteam@digium.com>
Thu, 4 Mar 2021 16:49:33 +0000 (11:49 -0500)
committerAsterisk Development Team <asteriskteam@digium.com>
Thu, 4 Mar 2021 16:49:33 +0000 (11:49 -0500)
.version
ChangeLog
asterisk-certified-16.8-cert6-summary.html [deleted file]
asterisk-certified-16.8-cert6-summary.txt [deleted file]
asterisk-certified-16.8-cert7-summary.html [new file with mode: 0644]
asterisk-certified-16.8-cert7-summary.txt [new file with mode: 0644]

index 9f0ec1bb2f2f161c7d3a4d7142a217c2392be53e..9cfcbb348d3f1ef198aa232d4fa14fe6ef688644 100644 (file)
--- a/.version
+++ b/.version
@@ -1 +1 @@
-certified/16.8-cert6
\ No newline at end of file
+certified/16.8-cert7
\ No newline at end of file
index 1c5434b8b91dc4fc3c159894283e6f5f3e5cf59d..26e94d76604f90d8fa6d3446becf1baca7c74db7 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,73 @@
+2021-03-04 16:49 +0000  Asterisk Development Team <asteriskteam@digium.com>
+
+       * asterisk certified/16.8-cert7 Released.
+
+2021-02-25 13:50 +0000 [b9fc07ca53]  Ben Ford <bford@digium.com>
+
+       * AST-2021-006 - res_pjsip_t38.c: Check for session_media on reinvite.
+
+         When Asterisk sends a reinvite negotiating T38 faxing, it's possible a
+         crash can occur if the response contains a m=image and zero port. The
+         reinvite callback code now checks session_media to see if it is null or
+         not before trying to access the udptl variable on it.
+
+         ASTERISK-29305
+
+         Change-Id: I1dfc51c5fa586e38579ede4bc228edee213ccaa9
+
+2021-03-03 07:32 +0000 [54f4be115f]  Joshua C. Colp <jcolp@sangoma.com>
+
+       * channel: Fix memory leak in suppress API.
+
+         A frame suppression API exists as part of channels
+         which allows audio frames to or from a channel to
+         be dropped. The MuteAudio AMI action uses this
+         API to perform its job.
+
+         This API uses a framehook to intercept flowing
+         audio and drop it when appropriate. It is the
+         responsibility of the framehook to free the
+         frame it is given if it changes the frame. The
+         suppression API failed to do this resulting in
+         a leak of audio frames.
+
+         This change adds the freeing of these frames.
+
+         ASTERISK-29071
+
+         Change-Id: Ie50acd454d672d36af914050c327d2e120d8ba7b
+
+2020-05-18 09:05 +0000 [df34b007d9]  Joshua C. Colp <jcolp@sangoma.com>
+
+       * bridge: Don't try to match audio formats.
+
+         When bridging channels we were trying to match the audio
+         formats of both sides in combination with the configured
+         formats. While this is allowed in SDP in practice this
+         causes extra reinvites and problems. This change ensures
+         that audio streams use the formats of the first existing
+         active audio stream. It is only when other stream types
+         (like video) exist that this will result in re-negotiation
+         occurring for those streams only.
+
+         ASTERISK-28871
+
+         Change-Id: I22f5a3e7db29e00c165e74d05d10856f6086fe47
+
+2021-02-15 12:24 +0000 [b12fcaaaf0]  Ben Ford <bford@digium.com>
+
+       * res_pjsip_session.c: Check topology on re-invite.
+
+         Removes an unnecessary check for the conditional that compares the
+         stream topologies to see if they are equal to suppress re-invites. This
+         was a problem when a Digium phone received an INVITE that offered codecs
+         different than what it supported, causing Asterisk to send the
+         re-invite.
+
+         ASTERISK-29303
+
+         Change-Id: I04dc91befb2387904e28a9aaeaa3bcdbcaa7fa63
+
 2021-02-18 16:51 +0000  Asterisk Development Team <asteriskteam@digium.com>
 
        * asterisk certified/16.8-cert6 Released.
diff --git a/asterisk-certified-16.8-cert6-summary.html b/asterisk-certified-16.8-cert6-summary.html
deleted file mode 100644 (file)
index c34c4de..0000000
+++ /dev/null
@@ -1,32 +0,0 @@
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><title>Release Summary - asterisk-certified/16.8-cert6</title><h1 align="center"><a name="top">Release Summary</a></h1><h3 align="center">asterisk-certified/16.8-cert6</h3><h3 align="center">Date: 2021-02-18</h3><h3 align="center">&lt;asteriskteam@digium.com&gt;</h3><hr><h2 align="center">Table of Contents</h2><ol>
-<li><a href="#summary">Summary</a></li>
-<li><a href="#contributors">Contributors</a></li>
-<li><a href="#closed_issues">Closed Issues</a></li>
-<li><a href="#commits">Other Changes</a></li>
-<li><a href="#diffstat">Diffstat</a></li>
-</ol><hr><a name="summary"><h2 align="center">Summary</h2></a><center><a href="#top">[Back to Top]</a></center><p>This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.</p><p>Security Advisories:</p><ul>
-<li><a href="http://downloads.asterisk.org/pub/security/AST-2021-002,AST-2021-003,AST-2021-004,AST-2021-005.html">AST-2021-002,AST-2021-003,AST-2021-004,AST-2021-005</a></li>
-</ul><p>The data in this summary reflects changes that have been made since the previous release, asterisk-certified/16.8-cert5.</p><hr><a name="contributors"><h2 align="center">Contributors</h2></a><center><a href="#top">[Back to Top]</a></center><p>This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.</p><table width="100%" border="0">
-<tr><th width="33%">Coders</th><th width="33%">Testers</th><th width="33%">Reporters</th></tr>
-<tr valign="top"><td width="33%">2 Joshua C. Colp <jcolp@sangoma.com><br/>1 Sean Bright <sean.bright@gmail.com><br/>1 Kevin Harwell <kharwell@sangoma.com><br/>1 Alexander Traud <pabstraud@compuserve.com><br/></td><td width="33%"><td width="33%">1 Mauri de Souza Meneguzzo (3CPlus) <mauri.nunes@fluxoti.com><br/>1 Gregory Massel <greg@csurf.co.za><br/>1 Alexander Traud<br/>1 Edvin Vidmar <edvinvidmar@hotmail.com><br/>1 Alexander Traud <pabstraud@compuserve.com><br/></td></tr>
-</table><hr><a name="closed_issues"><h2 align="center">Closed Issues</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all issues from the issue tracker that were closed by changes that went into this release.</p><h3>Security</h3><h4>Category: Resources/res_srtp</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29260">ASTERISK-29260</a>: sRTP Replay Protection ignored; even tears down long calls<br/>Reported by: Alexander Traud<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=93468c531a20f598874d09c3a23eba8cda30589b">[93468c531a]</a> Alexander Traud -- rtp:  Enable srtp replay protection</li>
-</ul><br><h3>Bug</h3><h4>Category: Resources/res_pjsip</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29196">ASTERISK-29196</a>: res_pjsip: Segmentation fault<br/>Reported by: Mauri de Souza Meneguzzo (3CPlus)<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=23e96e6e1743d9c1e330aaf3ba9c7f76f39efd38">[23e96e6e17]</a> Joshua C. Colp -- pjsip: Make modify_local_offer2 tolerate previous failed SDP.</li>
-</ul><br><h4>Category: Resources/res_pjsip_session</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29203">ASTERISK-29203</a>: res_pjsip_t38: Crash when changing state<br/>Reported by: Gregory Massel<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=bb5b336f78ac6b718f282b60b84dd98585ac230a">[bb5b336f78]</a> Kevin Harwell -- AST-2021-002: Remote crash possible when negotiating T.38</li>
-</ul><br><h4>Category: Resources/res_pjsip_t38</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29203">ASTERISK-29203</a>: res_pjsip_t38: Crash when changing state<br/>Reported by: Gregory Massel<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=bb5b336f78ac6b718f282b60b84dd98585ac230a">[bb5b336f78]</a> Kevin Harwell -- AST-2021-002: Remote crash possible when negotiating T.38</li>
-</ul><br><h4>Category: Resources/res_rtp_asterisk</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29205">ASTERISK-29205</a>: res_rtp_asterisk: Asterisk crashes when making hold/unhold from webrtc client<br/>Reported by: Edvin Vidmar<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=07eddbd56abac891d5b81f0a68ae75d4c36359c7">[07eddbd56a]</a> Sean Bright -- res_rtp_asterisk.c: Fix signed mismatch that leads to overflow</li>
-</ul><br><hr><a name="commits"><h2 align="center">Commits Not Associated with an Issue</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all changes that went into this release that did not reference a JIRA issue.</p><table width="100%" border="1">
-<tr><th>Revision</th><th>Author</th><th>Summary</th></tr>
-<tr><td><a href="https://code.asterisk.org/code/changelog/asterisk?cs=6b5306ecc55c84ca451f191a4ab3fc3c8653e189">6b5306ecc5</a></td><td>Joshua C. Colp</td><td>res_pjsip_pidf_digium_body_supplement: Support Sangoma user agent.</td></tr>
-</table><hr><a name="diffstat"><h2 align="center">Diffstat Results</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.</p><pre>configs/samples/rtp.conf.sample                |   12 ++++++++++++
-doc/CHANGES-staging/srtp_replay_protection.txt |    9 +++++++++
-doc/UPGRADE-staging/srtp_replay_protection.txt |    9 +++++++++
-res/res_pjsip_pidf_digium_body_supplement.c    |    8 +++++---
-res/res_pjsip_session.c                        |    9 ++++++++-
-res/res_pjsip_t38.c                            |    9 +++++++++
-res/res_rtp_asterisk.c                         |   11 +++++++----
-7 files changed, 59 insertions(+), 8 deletions(-)</pre><br></html>
\ No newline at end of file
diff --git a/asterisk-certified-16.8-cert6-summary.txt b/asterisk-certified-16.8-cert6-summary.txt
deleted file mode 100644 (file)
index 040d280..0000000
+++ /dev/null
@@ -1,141 +0,0 @@
-                                Release Summary
-
-                         asterisk-certified/16.8-cert6
-
-                                Date: 2021-02-18
-
-                           <asteriskteam@digium.com>
-
-     ----------------------------------------------------------------------
-
-                               Table of Contents
-
-    1. Summary
-    2. Contributors
-    3. Closed Issues
-    4. Other Changes
-    5. Diffstat
-
-     ----------------------------------------------------------------------
-
-                                    Summary
-
-                                 [Back to Top]
-
-   This release has been made to address one or more security vulnerabilities
-   that have been identified. A security advisory document has been published
-   for each vulnerability that includes additional information. Users of
-   versions of Asterisk that are affected are strongly encouraged to review
-   the advisories and determine what action they should take to protect their
-   systems from these issues.
-
-   Security Advisories:
-
-     * AST-2021-002,AST-2021-003,AST-2021-004,AST-2021-005
-
-   The data in this summary reflects changes that have been made since the
-   previous release, asterisk-certified/16.8-cert5.
-
-     ----------------------------------------------------------------------
-
-                                  Contributors
-
-                                 [Back to Top]
-
-   This table lists the people who have submitted code, those that have
-   tested patches, as well as those that reported issues on the issue tracker
-   that were resolved in this release. For coders, the number is how many of
-   their patches (of any size) were committed into this release. For testers,
-   the number is the number of times their name was listed as assisting with
-   testing a patch. Finally, for reporters, the number is the number of
-   issues that they reported that were affected by commits that went into
-   this release.
-
-   Coders                   Testers       Reporters                           
-   2 Joshua C. Colp                       1 Mauri de Souza Meneguzzo (3CPlus) 
-   1 Sean Bright                          1 Gregory Massel                    
-   1 Kevin Harwell                        1 Alexander Traud                   
-   1 Alexander Traud                      1 Edvin Vidmar                      
-                                          1 Alexander Traud                   
-
-     ----------------------------------------------------------------------
-
-                                 Closed Issues
-
-                                 [Back to Top]
-
-   This is a list of all issues from the issue tracker that were closed by
-   changes that went into this release.
-
-  Security
-
-    Category: Resources/res_srtp
-
-   ASTERISK-29260: sRTP Replay Protection ignored; even tears down long calls
-   Reported by: Alexander Traud
-     * [93468c531a] Alexander Traud -- rtp: Enable srtp replay protection
-
-  Bug
-
-    Category: Resources/res_pjsip
-
-   ASTERISK-29196: res_pjsip: Segmentation fault
-   Reported by: Mauri de Souza Meneguzzo (3CPlus)
-     * [23e96e6e17] Joshua C. Colp -- pjsip: Make modify_local_offer2
-       tolerate previous failed SDP.
-
-    Category: Resources/res_pjsip_session
-
-   ASTERISK-29203: res_pjsip_t38: Crash when changing state
-   Reported by: Gregory Massel
-     * [bb5b336f78] Kevin Harwell -- AST-2021-002: Remote crash possible when
-       negotiating T.38
-
-    Category: Resources/res_pjsip_t38
-
-   ASTERISK-29203: res_pjsip_t38: Crash when changing state
-   Reported by: Gregory Massel
-     * [bb5b336f78] Kevin Harwell -- AST-2021-002: Remote crash possible when
-       negotiating T.38
-
-    Category: Resources/res_rtp_asterisk
-
-   ASTERISK-29205: res_rtp_asterisk: Asterisk crashes when making hold/unhold
-   from webrtc client
-   Reported by: Edvin Vidmar
-     * [07eddbd56a] Sean Bright -- res_rtp_asterisk.c: Fix signed mismatch
-       that leads to overflow
-
-     ----------------------------------------------------------------------
-
-                      Commits Not Associated with an Issue
-
-                                 [Back to Top]
-
-   This is a list of all changes that went into this release that did not
-   reference a JIRA issue.
-
-   +------------------------------------------------------------------------+
-   | Revision   | Author    | Summary                                       |
-   |------------+-----------+-----------------------------------------------|
-   | 6b5306ecc5 | Joshua C. | res_pjsip_pidf_digium_body_supplement:        |
-   |            | Colp      | Support Sangoma user agent.                   |
-   +------------------------------------------------------------------------+
-
-     ----------------------------------------------------------------------
-
-                                Diffstat Results
-
-                                 [Back to Top]
-
-   This is a summary of the changes to the source code that went into this
-   release that was generated using the diffstat utility.
-
- configs/samples/rtp.conf.sample                |   12 ++++++++++++
- doc/CHANGES-staging/srtp_replay_protection.txt |    9 +++++++++
- doc/UPGRADE-staging/srtp_replay_protection.txt |    9 +++++++++
- res/res_pjsip_pidf_digium_body_supplement.c    |    8 +++++---
- res/res_pjsip_session.c                        |    9 ++++++++-
- res/res_pjsip_t38.c                            |    9 +++++++++
- res/res_rtp_asterisk.c                         |   11 +++++++----
- 7 files changed, 59 insertions(+), 8 deletions(-)
diff --git a/asterisk-certified-16.8-cert7-summary.html b/asterisk-certified-16.8-cert7-summary.html
new file mode 100644 (file)
index 0000000..d67f312
--- /dev/null
@@ -0,0 +1,25 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><title>Release Summary - asterisk-certified/16.8-cert7</title><h1 align="center"><a name="top">Release Summary</a></h1><h3 align="center">asterisk-certified/16.8-cert7</h3><h3 align="center">Date: 2021-03-04</h3><h3 align="center">&lt;asteriskteam@digium.com&gt;</h3><hr><h2 align="center">Table of Contents</h2><ol>
+<li><a href="#summary">Summary</a></li>
+<li><a href="#contributors">Contributors</a></li>
+<li><a href="#closed_issues">Closed Issues</a></li>
+<li><a href="#diffstat">Diffstat</a></li>
+</ol><hr><a name="summary"><h2 align="center">Summary</h2></a><center><a href="#top">[Back to Top]</a></center><p>This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.</p><p>Security Advisories:</p><ul>
+<li><a href="http://downloads.asterisk.org/pub/security/AST-2021-006.html">AST-2021-006</a></li>
+</ul><p>The data in this summary reflects changes that have been made since the previous release, asterisk-certified/16.8-cert6.</p><hr><a name="contributors"><h2 align="center">Contributors</h2></a><center><a href="#top">[Back to Top]</a></center><p>This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.</p><table width="100%" border="0">
+<tr><th width="33%">Coders</th><th width="33%">Testers</th><th width="33%">Reporters</th></tr>
+<tr valign="top"><td width="33%">2 Joshua C. Colp <jcolp@sangoma.com><br/>2 Ben Ford <bford@digium.com><br/></td><td width="33%"><td width="33%">1 Benjamin Keith Ford <bford@digium.com><br/>1 Gregory Massel <greg@csurf.co.za><br/>1 Alexei Gradinari <alex2grad@gmail.com><br/>1 Stefan Ruf <ruf.stefan@swm.de><br/></td></tr>
+</table><hr><a name="closed_issues"><h2 align="center">Closed Issues</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all issues from the issue tracker that were closed by changes that went into this release.</p><h3>Security</h3><h4>Category: Resources/res_pjsip_t38</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29305">ASTERISK-29305</a>: ASTERISK-29203 / AST-2021-002 -- Another scenario is causing a crash<br/>Reported by: Gregory Massel<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=b9fc07ca530a548080f637d335a68c9bc6ee8790">[b9fc07ca53]</a> Ben Ford -- AST-2021-006 - res_pjsip_t38.c: Check for session_media on reinvite.</li>
+</ul><br><h3>Bug</h3><h4>Category: Applications/app_confbridge</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29071">ASTERISK-29071</a>: app_confbridge: Memory rises when jitterbuffer enabled and muting over AMI occurs<br/>Reported by: Stefan Ruf<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=54f4be115f64892583e6d47d9ac8488e10d17228">[54f4be115f]</a> Joshua C. Colp -- channel: Fix memory leak in suppress API.</li>
+</ul><br><h4>Category: Core/Bridging</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29071">ASTERISK-29071</a>: app_confbridge: Memory rises when jitterbuffer enabled and muting over AMI occurs<br/>Reported by: Stefan Ruf<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=54f4be115f64892583e6d47d9ac8488e10d17228">[54f4be115f]</a> Joshua C. Colp -- channel: Fix memory leak in suppress API.</li>
+</ul><br><h4>Category: Resources/res_pjsip_session</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-28871">ASTERISK-28871</a>: res_pjsip_session: Unnecessary re-Invite on call answer<br/>Reported by: Alexei Gradinari<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=df34b007d90424b8b83b3754839150a1002a3d70">[df34b007d9]</a> Joshua C. Colp -- bridge: Don't try to match audio formats.</li>
+</ul><a href="https://issues.asterisk.org/jira/browse/ASTERISK-29303">ASTERISK-29303</a>: pjsip: Re-invite occurs when it shouldn't<br/>Reported by: Benjamin Keith Ford<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=b12fcaaaf045c227679f18ee9b7c9b843eb72bc6">[b12fcaaaf0]</a> Ben Ford -- res_pjsip_session.c: Check topology on re-invite.</li>
+</ul><br><hr><a name="diffstat"><h2 align="center">Diffstat Results</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.</p><pre>bridges/bridge_native_rtp.c |    4 ++--
+bridges/bridge_simple.c     |    4 ++--
+main/channel.c              |    1 +
+res/res_pjsip_session.c     |   16 +++-------------
+4 files changed, 8 insertions(+), 17 deletions(-)</pre><br></html>
\ No newline at end of file
diff --git a/asterisk-certified-16.8-cert7-summary.txt b/asterisk-certified-16.8-cert7-summary.txt
new file mode 100644 (file)
index 0000000..afcd0a2
--- /dev/null
@@ -0,0 +1,120 @@
+                                Release Summary
+
+                         asterisk-certified/16.8-cert7
+
+                                Date: 2021-03-04
+
+                           <asteriskteam@digium.com>
+
+     ----------------------------------------------------------------------
+
+                               Table of Contents
+
+    1. Summary
+    2. Contributors
+    3. Closed Issues
+    4. Diffstat
+
+     ----------------------------------------------------------------------
+
+                                    Summary
+
+                                 [Back to Top]
+
+   This release has been made to address one or more security vulnerabilities
+   that have been identified. A security advisory document has been published
+   for each vulnerability that includes additional information. Users of
+   versions of Asterisk that are affected are strongly encouraged to review
+   the advisories and determine what action they should take to protect their
+   systems from these issues.
+
+   Security Advisories:
+
+     * AST-2021-006
+
+   The data in this summary reflects changes that have been made since the
+   previous release, asterisk-certified/16.8-cert6.
+
+     ----------------------------------------------------------------------
+
+                                  Contributors
+
+                                 [Back to Top]
+
+   This table lists the people who have submitted code, those that have
+   tested patches, as well as those that reported issues on the issue tracker
+   that were resolved in this release. For coders, the number is how many of
+   their patches (of any size) were committed into this release. For testers,
+   the number is the number of times their name was listed as assisting with
+   testing a patch. Finally, for reporters, the number is the number of
+   issues that they reported that were affected by commits that went into
+   this release.
+
+   Coders                   Testers                  Reporters                
+   2 Joshua C. Colp                                  1 Benjamin Keith Ford    
+   2 Ben Ford                                        1 Gregory Massel         
+                                                     1 Alexei Gradinari       
+                                                     1 Stefan Ruf             
+
+     ----------------------------------------------------------------------
+
+                                 Closed Issues
+
+                                 [Back to Top]
+
+   This is a list of all issues from the issue tracker that were closed by
+   changes that went into this release.
+
+  Security
+
+    Category: Resources/res_pjsip_t38
+
+   ASTERISK-29305: ASTERISK-29203 / AST-2021-002 -- Another scenario is
+   causing a crash
+   Reported by: Gregory Massel
+     * [b9fc07ca53] Ben Ford -- AST-2021-006 - res_pjsip_t38.c: Check for
+       session_media on reinvite.
+
+  Bug
+
+    Category: Applications/app_confbridge
+
+   ASTERISK-29071: app_confbridge: Memory rises when jitterbuffer enabled and
+   muting over AMI occurs
+   Reported by: Stefan Ruf
+     * [54f4be115f] Joshua C. Colp -- channel: Fix memory leak in suppress
+       API.
+
+    Category: Core/Bridging
+
+   ASTERISK-29071: app_confbridge: Memory rises when jitterbuffer enabled and
+   muting over AMI occurs
+   Reported by: Stefan Ruf
+     * [54f4be115f] Joshua C. Colp -- channel: Fix memory leak in suppress
+       API.
+
+    Category: Resources/res_pjsip_session
+
+   ASTERISK-28871: res_pjsip_session: Unnecessary re-Invite on call answer
+   Reported by: Alexei Gradinari
+     * [df34b007d9] Joshua C. Colp -- bridge: Don't try to match audio
+       formats.
+   ASTERISK-29303: pjsip: Re-invite occurs when it shouldn't
+   Reported by: Benjamin Keith Ford
+     * [b12fcaaaf0] Ben Ford -- res_pjsip_session.c: Check topology on
+       re-invite.
+
+     ----------------------------------------------------------------------
+
+                                Diffstat Results
+
+                                 [Back to Top]
+
+   This is a summary of the changes to the source code that went into this
+   release that was generated using the diffstat utility.
+
+ bridges/bridge_native_rtp.c |    4 ++--
+ bridges/bridge_simple.c     |    4 ++--
+ main/channel.c              |    1 +
+ res/res_pjsip_session.c     |   16 +++-------------
+ 4 files changed, 8 insertions(+), 17 deletions(-)