]> git.ipfire.org Git - thirdparty/asterisk.git/commitdiff
Update for certified/13.13-cert4 certified/13.13-cert4
authorMatthew Fredrickson <mfredrickson@lunkwill>
Fri, 19 May 2017 20:45:57 +0000 (15:45 -0500)
committerMatthew Fredrickson <mfredrickson@lunkwill>
Fri, 19 May 2017 20:45:57 +0000 (15:45 -0500)
.version
ChangeLog
asterisk-certified-13.13-cert3-summary.html [deleted file]
asterisk-certified-13.13-cert4-summary.html [new file with mode: 0644]
asterisk-certified-13.13-cert4-summary.txt [moved from asterisk-certified-13.13-cert3-summary.txt with 50% similarity]

index bbb64a09124479c69a30e850365edd924010d50e..3d19a9f5af02a14e154c4499dc615bbb8b630f09 100644 (file)
--- a/.version
+++ b/.version
@@ -1 +1 @@
-certified/13.13-cert3
\ No newline at end of file
+certified/13.13-cert4
\ No newline at end of file
index 81e26105e08eda438e5b80c0881f971cfd839d44..119c3ec3fd51263d635a9183f0987f0e065e17e5 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,41 @@
+2017-05-19 20:45 +0000  Asterisk Development Team <asteriskteam@digium.com>
+
+       * asterisk certified/13.13-cert4 Released.
+
+2017-04-13 11:14 +0000 [7e8b57db67]  gtjoseph <gjoseph@digium.com>
+
+       * AST-2017-004: chan_skinny:  Add EOF check in skinny_session
+
+         The while(1) loop in skinny_session wasn't checking for EOF so
+         a packet that was longer than a header but still truncated
+         would spin the while loop infinitely.  Not only does this
+         permanently tie up a thread and drive a core to 100% utilization,
+         the call of ast_log() in such a tight loop eats all available
+         process memory.
+
+         Added poll with timeout to top of read loop
+
+         ASTERISK-26940 #close
+         Reported-by: Sandro Gauci
+
+         Change-Id: I2ce65f3c5cb24b4943a9f75b64d545a1e2cd2898
+
+2017-04-13 17:17 +0000 [d0e628e792]  Mark Michelson <mmichelson@digium.com>
+
+       * AST-2017-003: Handle zero-length body parts correctly.
+
+         ASTERISK-26939 #close
+
+         Change-Id: I7ea235ab39833a187db4e078f0788bd0af0a24fd
+
+2017-04-13 17:16 +0000 [14e57ba5b5]  Mark Michelson <mmichelson@digium.com>
+
+       * AST-2017-002: Ensure transaction key buffer is large enough.
+
+         ASTERISK-26938 #close
+
+         Change-Id: I266490792fd8896a23be7cb92f316b7e69356413
+
 2017-04-04 12:37 +0000  Asterisk Development Team <asteriskteam@digium.com>
 
        * asterisk certified/13.13-cert3 Released.
diff --git a/asterisk-certified-13.13-cert3-summary.html b/asterisk-certified-13.13-cert3-summary.html
deleted file mode 100644 (file)
index 3b94c90..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><title>Release Summary - asterisk-certified/13.13-cert3</title><h1 align="center"><a name="top">Release Summary</a></h1><h3 align="center">asterisk-certified/13.13-cert3</h3><h3 align="center">Date: 2017-04-04</h3><h3 align="center">&lt;asteriskteam@digium.com&gt;</h3><hr><h2 align="center">Table of Contents</h2><ol>
-<li><a href="#summary">Summary</a></li>
-<li><a href="#contributors">Contributors</a></li>
-<li><a href="#closed_issues">Closed Issues</a></li>
-<li><a href="#diffstat">Diffstat</a></li>
-</ol><hr><a name="summary"><h2 align="center">Summary</h2></a><center><a href="#top">[Back to Top]</a></center><p>This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.</p><p>Security Advisories:</p><ul>
-<li><a href="http://downloads.asterisk.org/pub/security/AST-2017-001.html">AST-2017-001</a></li>
-</ul><p>The data in this summary reflects changes that have been made since the previous release, asterisk-certified/13.13-cert2.</p><hr><a name="contributors"><h2 align="center">Contributors</h2></a><center><a href="#top">[Back to Top]</a></center><p>This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.</p><table width="100%" border="0">
-<tr><th width="33%">Coders</th><th width="33%">Testers</th><th width="33%">Reporters</th></tr>
-<tr valign="top"><td width="33%">1 Corey Farrell <git@cfware.com><br/>1 Robert Mordec <r.mordec@slican.pl><br/></td><td width="33%"><td width="33%">1 Alex Villacís Lasso <a_villacis@palosanto.com><br/>1 Robert Mordec <r.mordec@slican.pl><br/></td></tr>
-</table><hr><a name="closed_issues"><h2 align="center">Closed Issues</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all issues from the issue tracker that were closed by changes that went into this release.</p><h3>Bug</h3><h4>Category: Applications/app_queue</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-26862">ASTERISK-26862</a>: app_queue: Queue stops calling members with local interface after forwarding in previous call<br/>Reported by: Robert Mordec<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=563b639e5ac9eeab1eb64067a6067385b8c719b3">[563b639e5a]</a> Robert Mordec -- app_queue: Member stuck as pending after forwarding previous call from queue</li>
-</ul><br><h4>Category: Channels/chan_sip/General</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-26897">ASTERISK-26897</a>: chan_sip: Security vulnerability with client code header<br/>Reported by: Alex Villacís Lasso<ul>
-<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=d91f264721e111427adfa3fadde7b283dafb20a4">[d91f264721]</a> Corey Farrell -- CDR: Protect from data overflow in ast_cdr_setuserfield.</li>
-</ul><br><hr><a name="diffstat"><h2 align="center">Diffstat Results</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.</p><pre>0 files changed</pre><br></html>
\ No newline at end of file
diff --git a/asterisk-certified-13.13-cert4-summary.html b/asterisk-certified-13.13-cert4-summary.html
new file mode 100644 (file)
index 0000000..18774f5
--- /dev/null
@@ -0,0 +1,18 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><title>Release Summary - asterisk-certified/13.13-cert4</title><h1 align="center"><a name="top">Release Summary</a></h1><h3 align="center">asterisk-certified/13.13-cert4</h3><h3 align="center">Date: 2017-05-19</h3><h3 align="center">&lt;asteriskteam@digium.com&gt;</h3><hr><h2 align="center">Table of Contents</h2><ol>
+<li><a href="#summary">Summary</a></li>
+<li><a href="#contributors">Contributors</a></li>
+<li><a href="#closed_issues">Closed Issues</a></li>
+<li><a href="#diffstat">Diffstat</a></li>
+</ol><hr><a name="summary"><h2 align="center">Summary</h2></a><center><a href="#top">[Back to Top]</a></center><p>This release is a point release of an existing major version. The changes included were made to address problems that have been identified in this release series, or are minor, backwards compatible new features or improvements. Users should be able to safely upgrade to this version if this release series is already in use. Users considering upgrading from a previous version are strongly encouraged to review the UPGRADE.txt document as well as the CHANGES document for information about upgrading to this release series.</p><p>The data in this summary reflects changes that have been made since the previous release, asterisk-certified/13.13-cert3.</p><hr><a name="contributors"><h2 align="center">Contributors</h2></a><center><a href="#top">[Back to Top]</a></center><p>This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.</p><table width="100%" border="0">
+<tr><th width="33%">Coders</th><th width="33%">Testers</th><th width="33%">Reporters</th></tr>
+<tr valign="top"><td width="33%">2 Mark Michelson <mmichelson@digium.com><br/>1 George Joseph <gjoseph@digium.com><br/></td><td width="33%"><td width="33%">3 Sandro Gauci <sandro@enablesecurity.com><br/></td></tr>
+</table><hr><a name="closed_issues"><h2 align="center">Closed Issues</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all issues from the issue tracker that were closed by changes that went into this release.</p><h3>Bug</h3><h4>Category: Channels/chan_skinny</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-26940">ASTERISK-26940</a>: Asterisk Skinny memory exhaustion vulnerability leads to DoS<br/>Reported by: Sandro Gauci<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=7e8b57db672b851efe4cef4a75499f21e410f5a2">[7e8b57db67]</a> gtjoseph -- AST-2017-004: chan_skinny:  Add EOF check in skinny_session</li>
+</ul><br><h4>Category: pjproject/pjsip</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-26939">ASTERISK-26939</a>: Out of bound memory access in PJSIP multipart parser crashes Asterisk<br/>Reported by: Sandro Gauci<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=d0e628e792a471986f8fbc0fe258714e386b6a02">[d0e628e792]</a> Mark Michelson -- AST-2017-003: Handle zero-length body parts correctly.</li>
+</ul><a href="https://issues.asterisk.org/jira/browse/ASTERISK-26938">ASTERISK-26938</a>: Heap overflow in CSEQ header parsing affects Asterisk chan_pjsip and PJSIP<br/>Reported by: Sandro Gauci<ul>
+<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=14e57ba5b5d6e821395ccdd1fcc4d363ac92cf33">[14e57ba5b5]</a> Mark Michelson -- AST-2017-002: Ensure transaction key buffer is large enough.</li>
+</ul><br><hr><a name="diffstat"><h2 align="center">Diffstat Results</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.</p><pre>channels/chan_skinny.c                                                                      |  122 +++++-----
+third-party/pjproject/patches/0058-Parse-zero-length-multipart-body-parts-correctly.patch   |   41 +++
+third-party/pjproject/patches/0059-Ensure-2543-transaction-key-buffer-is-large-enough.patch |   24 +
+3 files changed, 131 insertions(+), 56 deletions(-)</pre><br></html>
\ No newline at end of file
similarity index 50%
rename from asterisk-certified-13.13-cert3-summary.txt
rename to asterisk-certified-13.13-cert4-summary.txt
index 793c30d6c668830002b830796577303967d42a7b..a0c29e552fd41b8976904f8ce60525b277f36c4a 100644 (file)
@@ -1,8 +1,8 @@
                                 Release Summary
 
-                         asterisk-certified/13.13-cert3
+                         asterisk-certified/13.13-cert4
 
-                                Date: 2017-04-04
+                                Date: 2017-05-19
 
                            <asteriskteam@digium.com>
 
 
                                  [Back to Top]
 
-   This release has been made to address one or more security vulnerabilities
-   that have been identified. A security advisory document has been published
-   for each vulnerability that includes additional information. Users of
-   versions of Asterisk that are affected are strongly encouraged to review
-   the advisories and determine what action they should take to protect their
-   systems from these issues.
-
-   Security Advisories:
-
-     * AST-2017-001
+   This release is a point release of an existing major version. The changes
+   included were made to address problems that have been identified in this
+   release series, or are minor, backwards compatible new features or
+   improvements. Users should be able to safely upgrade to this version if
+   this release series is already in use. Users considering upgrading from a
+   previous version are strongly encouraged to review the UPGRADE.txt
+   document as well as the CHANGES document for information about upgrading
+   to this release series.
 
    The data in this summary reflects changes that have been made since the
-   previous release, asterisk-certified/13.13-cert2.
+   previous release, asterisk-certified/13.13-cert3.
 
      ----------------------------------------------------------------------
 
@@ -51,8 +49,8 @@
    this release.
 
    Coders                   Testers                  Reporters                
-   1 Corey Farrell                                   1 Alex VillacAs Lasso    
-   1 Robert Mordec                                   1 Robert Mordec          
+   2 Mark Michelson                                  3 Sandro Gauci           
+   1 George Joseph          
 
      ----------------------------------------------------------------------
 
 
   Bug
 
-    Category: Applications/app_queue
+    Category: Channels/chan_skinny
 
-   ASTERISK-26862: app_queue: Queue stops calling members with local
-   interface after forwarding in previous call
-   Reported by: Robert Mordec
-     * [563b639e5a] Robert Mordec -- app_queue: Member stuck as pending after
-       forwarding previous call from queue
+   ASTERISK-26940: Asterisk Skinny memory exhaustion vulnerability leads to
+   DoS
+   Reported by: Sandro Gauci
+     * [7e8b57db67] gtjoseph -- AST-2017-004: chan_skinny: Add EOF check in
+       skinny_session
 
-    Category: Channels/chan_sip/General
+    Category: pjproject/pjsip
 
-   ASTERISK-26897: chan_sip: Security vulnerability with client code header
-   Reported by: Alex VillacAs Lasso
-     * [d91f264721] Corey Farrell -- CDR: Protect from data overflow in
-       ast_cdr_setuserfield.
+   ASTERISK-26939: Out of bound memory access in PJSIP multipart parser
+   crashes Asterisk
+   Reported by: Sandro Gauci
+     * [d0e628e792] Mark Michelson -- AST-2017-003: Handle zero-length body
+       parts correctly.
+   ASTERISK-26938: Heap overflow in CSEQ header parsing affects Asterisk
+   chan_pjsip and PJSIP
+   Reported by: Sandro Gauci
+     * [14e57ba5b5] Mark Michelson -- AST-2017-002: Ensure transaction key
+       buffer is large enough.
 
      ----------------------------------------------------------------------
 
@@ -89,4 +93,7 @@
    This is a summary of the changes to the source code that went into this
    release that was generated using the diffstat utility.
 
- 0 files changed
+ channels/chan_skinny.c                                                                      |  122 +++++-----
+ third-party/pjproject/patches/0058-Parse-zero-length-multipart-body-parts-correctly.patch   |   41 +++
+ third-party/pjproject/patches/0059-Ensure-2543-transaction-key-buffer-is-large-enough.patch |   24 +
+ 3 files changed, 131 insertions(+), 56 deletions(-)