From: Asterisk Development Team Date: Thu, 22 Jul 2021 22:08:46 +0000 (-0500) Subject: Update for 17.9.4 X-Git-Tag: 17.9.4^0 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=3e17d375e4778e8c793bdcbf181e9547968997e2;p=thirdparty%2Fasterisk.git Update for 17.9.4 --- diff --git a/.version b/.version index 1b407b1342..77ef51989c 100644 --- a/.version +++ b/.version @@ -1 +1 @@ -17.9.3 \ No newline at end of file +17.9.4 \ No newline at end of file diff --git a/ChangeLog b/ChangeLog index 9cdb2a383e..3b6e37c360 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,35 @@ +2021-07-22 22:08 +0000 Asterisk Development Team + + * asterisk 17.9.4 Released. + +2021-06-14 13:28 +0000 [093167003a] Kevin Harwell + + * AST-2021-009 - pjproject-bundled: Avoid crash during handshake for TLS + + If an SSL socket parent/listener was destroyed during the handshake, + depending on timing, it was possible for the handling callback to + attempt access of it after the fact thus causing a crash. + + ASTERISK-29415 #close + + Change-Id: I105dacdcd130ea7fdd4cf2010ccf35b5eaf1432d + +2021-05-10 17:59 +0000 [a73db1ec6b] Kevin Harwell + + * AST-2021-008 - chan_iax2: remote crash on unsupported media format + + If chan_iax2 received a packet with an unsupported media format, for + example vp9, then it would set the frame's format to NULL. This could + then result in a crash later when an attempt was made to access the + format. + + This patch makes it so chan_iax2 now ignores/drops frames received + with unsupported media format types. + + ASTERISK-29392 #close + + Change-Id: Ifa869a90dafe33eed8fd9463574fe6f1c0ad3eb1 + 2021-03-04 16:46 +0000 Asterisk Development Team * asterisk 17.9.3 Released. diff --git a/asterisk-17.9.3-summary.html b/asterisk-17.9.4-summary.html similarity index 60% rename from asterisk-17.9.3-summary.html rename to asterisk-17.9.4-summary.html index b1d5498f9e..b5f1fbf1d9 100644 --- a/asterisk-17.9.3-summary.html +++ b/asterisk-17.9.4-summary.html @@ -1,13 +1,18 @@ -Release Summary - asterisk-17.9.3

Release Summary

asterisk-17.9.3

Date: 2021-03-04

<asteriskteam@digium.com>


Table of Contents

    +Release Summary - asterisk-17.9.4

    Release Summary

    asterisk-17.9.4

    Date: 2021-07-22

    <asteriskteam@digium.com>


    Table of Contents

    1. Summary
    2. Contributors
    3. Closed Issues
    4. Diffstat

    Summary

    [Back to Top]

    This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.

    Security Advisories:

    The data in this summary reflects changes that have been made since the previous release, asterisk-17.9.2.


    Contributors

    [Back to Top]

    This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.

    +
  1. AST-2021-008,AST-2021-009
  2. +

    The data in this summary reflects changes that have been made since the previous release, asterisk-17.9.3.


    Contributors

    [Back to Top]

    This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.

    - -
    CodersTestersReporters
    1 Ben Ford
    1 Gregory Massel

    Closed Issues

    [Back to Top]

    This is a list of all issues from the issue tracker that were closed by changes that went into this release.

    Security

    Category: Resources/res_pjsip_t38

    ASTERISK-29305: ASTERISK-29203 / AST-2021-002 -- Another scenario is causing a crash
    Reported by: Gregory Massel
      -
    • [4be5bddafb] Ben Ford -- AST-2021-006 - res_pjsip_t38.c: Check for session_media on reinvite.
    • -


    Diffstat Results

    [Back to Top]

    This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.

    0 files changed

    \ No newline at end of file +2 Kevin Harwell
    1 Michael Welk
    1 Andrew Yager
    +

    Closed Issues

    [Back to Top]

    This is a list of all issues from the issue tracker that were closed by changes that went into this release.

    Security

    Category: Channels/chan_pjsip

    ASTERISK-29415: Crash in PJSIP TLS transport
    Reported by: Andrew Yager
      +
    • [093167003a] Kevin Harwell -- AST-2021-009 - pjproject-bundled: Avoid crash during handshake for TLS
    • +

    Bug

    Category: Channels/chan_iax2

    ASTERISK-29392: chan_iax2: Asterisk crashes when queueing video with format
    Reported by: Michael Welk
      +
    • [a73db1ec6b] Kevin Harwell -- AST-2021-008 - chan_iax2: remote crash on unsupported media format
    • +


    Diffstat Results

    [Back to Top]

    This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.

    channels/chan_iax2.c                                                   |   40 +-
    +third-party/pjproject/patches/0110-tls-parent-listener-destroyed.patch |  166 ++++++++++
    +third-party/pjproject/patches/0111-ssl-premature-destroy.patch         |   36 ++
    +3 files changed, 233 insertions(+), 9 deletions(-)

    \ No newline at end of file diff --git a/asterisk-17.9.3-summary.txt b/asterisk-17.9.4-summary.txt similarity index 68% rename from asterisk-17.9.3-summary.txt rename to asterisk-17.9.4-summary.txt index 5537695520..01d6bf2c4e 100644 --- a/asterisk-17.9.3-summary.txt +++ b/asterisk-17.9.4-summary.txt @@ -1,8 +1,8 @@ Release Summary - asterisk-17.9.3 + asterisk-17.9.4 - Date: 2021-03-04 + Date: 2021-07-22 @@ -30,10 +30,10 @@ Security Advisories: - * AST-2021-006 + * AST-2021-008,AST-2021-009 The data in this summary reflects changes that have been made since the - previous release, asterisk-17.9.2. + previous release, asterisk-17.9.3. ---------------------------------------------------------------------- @@ -51,7 +51,8 @@ this release. Coders Testers Reporters - 1 Ben Ford 1 Gregory Massel + 2 Kevin Harwell 1 Michael Welk + 1 Andrew Yager ---------------------------------------------------------------------- @@ -64,13 +65,22 @@ Security - Category: Resources/res_pjsip_t38 + Category: Channels/chan_pjsip - ASTERISK-29305: ASTERISK-29203 / AST-2021-002 -- Another scenario is - causing a crash - Reported by: Gregory Massel - * [4be5bddafb] Ben Ford -- AST-2021-006 - res_pjsip_t38.c: Check for - session_media on reinvite. + ASTERISK-29415: Crash in PJSIP TLS transport + Reported by: Andrew Yager + * [093167003a] Kevin Harwell -- AST-2021-009 - pjproject-bundled: Avoid + crash during handshake for TLS + + Bug + + Category: Channels/chan_iax2 + + ASTERISK-29392: chan_iax2: Asterisk crashes when queueing video with + format + Reported by: Michael Welk + * [a73db1ec6b] Kevin Harwell -- AST-2021-008 - chan_iax2: remote crash + on unsupported media format ---------------------------------------------------------------------- @@ -81,4 +91,7 @@ This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility. - 0 files changed + channels/chan_iax2.c | 40 +- + third-party/pjproject/patches/0110-tls-parent-listener-destroyed.patch | 166 ++++++++++ + third-party/pjproject/patches/0111-ssl-premature-destroy.patch | 36 ++ + 3 files changed, 233 insertions(+), 9 deletions(-)