From: Asterisk Development Team Date: Thu, 5 Sep 2019 13:09:20 +0000 (-0500) Subject: Update for 15.7.4 X-Git-Tag: 15.7.4^0 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=refs%2Fheads%2F15.7;p=thirdparty%2Fasterisk.git Update for 15.7.4 --- diff --git a/.version b/.version index 65b190b6ca..1ca44d7bd3 100644 --- a/.version +++ b/.version @@ -1 +1 @@ -15.7.3 \ No newline at end of file +15.7.4 \ No newline at end of file diff --git a/ChangeLog b/ChangeLog index a195d717e9..4cbb1fb89c 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,24 @@ +2019-09-05 13:09 +0000 Asterisk Development Team + + * asterisk 15.7.4 Released. + +2019-08-20 15:05 +0000 [b49f09a292] Alexei Gradinari (license 5691) + + * AST-2019-004 - res_pjsip_t38.c: Add NULL checks before using session media + + After receiving a 200 OK with a declined stream in response to a T.38 + initiated re-invite Asterisk would crash when attempting to dereference + a NULL session media object. + + This patch checks to make sure the session media object is not NULL before + attempting to use it. + + ASTERISK-28495 + patches: + ast-2019-004.patch submitted by Alexei Gradinari (license 5691) + + Change-Id: I168f45f4da29cfe739acf87e597baa2aae7aa572 + 2019-07-11 19:22 +0000 Asterisk Development Team * asterisk 15.7.3 Released. diff --git a/asterisk-15.7.3-summary.html b/asterisk-15.7.4-summary.html similarity index 62% rename from asterisk-15.7.3-summary.html rename to asterisk-15.7.4-summary.html index 8203564b33..2b15a67343 100644 --- a/asterisk-15.7.3-summary.html +++ b/asterisk-15.7.4-summary.html @@ -1,15 +1,14 @@ -Release Summary - asterisk-15.7.3

Release Summary

asterisk-15.7.3

Date: 2019-07-11

<asteriskteam@digium.com>


Table of Contents

    +Release Summary - asterisk-15.7.4

    Release Summary

    asterisk-15.7.4

    Date: 2019-09-05

    <asteriskteam@digium.com>


    Table of Contents

    1. Summary
    2. Contributors
    3. Closed Issues
    4. Diffstat

    Summary

    [Back to Top]

    This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.

    Security Advisories:

    The data in this summary reflects changes that have been made since the previous release, asterisk-15.7.2.


    Contributors

    [Back to Top]

    This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.

    +
  1. AST-2019-004
  2. +

    The data in this summary reflects changes that have been made since the previous release, asterisk-15.7.3.


    Contributors

    [Back to Top]

    This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.

    - -
    CodersTestersReporters
    1 Francesco Castellano
    1 George Joseph
    1 Gil Richard
    1 Gil Richard
    1 Francesco Castellano

    Closed Issues

    [Back to Top]

    This is a list of all issues from the issue tracker that were closed by changes that went into this release.

    Security

    Category: Channels/chan_sip/Interoperability

    ASTERISK-28465: Broken SDP can cause a segfault in a T.38 reINVITE
    Reported by: Francesco Castellano
      -
    • [74835b30c8] Francesco Castellano -- chan_sip: Handle invalid SDP answer to T.38 re-invite
    • -

    Category: Resources/res_pjsip_messaging

    ASTERISK-28447: res_pjsip_messaging: In-dialog MESSAGE with no body causes crash
    Reported by: Gil Richard
      -
    • [08cf3516c4] George Joseph -- res_pjsip_messaging: Check for body in in-dialog message
    • -


    Diffstat Results

    [Back to Top]

    This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.

    0 files changed

    \ No newline at end of file +1 Alexei Gradinari (license 5691)
    1 Alexei Gradinari
    +

    Closed Issues

    [Back to Top]

    This is a list of all issues from the issue tracker that were closed by changes that went into this release.

    Security

    Category: Resources/res_pjsip_t38

    ASTERISK-28495: res_pjsip_t38: 200 OK with SDP answer with declined stream causes crash
    Reported by: Alexei Gradinari
      +
    • [b49f09a292] Alexei Gradinari -- AST-2019-004 - res_pjsip_t38.c: Add NULL checks before using session media
    • +


    Diffstat Results

    [Back to Top]

    This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.

    res_pjsip_t38.c |   46 +++++++++++++++++++++++++---------------------
    +1 file changed, 25 insertions(+), 21 deletions(-)

    \ No newline at end of file diff --git a/asterisk-15.7.3-summary.txt b/asterisk-15.7.4-summary.txt similarity index 69% rename from asterisk-15.7.3-summary.txt rename to asterisk-15.7.4-summary.txt index 5f0e19b940..39bf21dfaf 100644 --- a/asterisk-15.7.3-summary.txt +++ b/asterisk-15.7.4-summary.txt @@ -1,8 +1,8 @@ Release Summary - asterisk-15.7.3 + asterisk-15.7.4 - Date: 2019-07-11 + Date: 2019-09-05 @@ -30,10 +30,10 @@ Security Advisories: - * AST-2019-002,AST-2019-003 + * AST-2019-004 The data in this summary reflects changes that have been made since the - previous release, asterisk-15.7.2. + previous release, asterisk-15.7.3. ---------------------------------------------------------------------- @@ -50,10 +50,8 @@ issues that they reported that were affected by commits that went into this release. - Coders Testers Reporters - 1 Francesco Castellano 1 Gil Richard - 1 George Joseph 1 Gil Richard - 1 Francesco Castellano + Coders Testers Reporters + 1 Alexei Gradinari (license 5691) 1 Alexei Gradinari ---------------------------------------------------------------------- @@ -66,20 +64,13 @@ Security - Category: Channels/chan_sip/Interoperability + Category: Resources/res_pjsip_t38 - ASTERISK-28465: Broken SDP can cause a segfault in a T.38 reINVITE - Reported by: Francesco Castellano - * [74835b30c8] Francesco Castellano -- chan_sip: Handle invalid SDP - answer to T.38 re-invite - - Category: Resources/res_pjsip_messaging - - ASTERISK-28447: res_pjsip_messaging: In-dialog MESSAGE with no body causes - crash - Reported by: Gil Richard - * [08cf3516c4] George Joseph -- res_pjsip_messaging: Check for body in - in-dialog message + ASTERISK-28495: res_pjsip_t38: 200 OK with SDP answer with declined stream + causes crash + Reported by: Alexei Gradinari + * [b49f09a292] Alexei Gradinari -- AST-2019-004 - res_pjsip_t38.c: Add + NULL checks before using session media ---------------------------------------------------------------------- @@ -90,4 +81,5 @@ This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility. - 0 files changed + res_pjsip_t38.c | 46 +++++++++++++++++++++++++--------------------- + 1 file changed, 25 insertions(+), 21 deletions(-)