35 lines
6.7 KiB
HTML
35 lines
6.7 KiB
HTML
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><title>Release Summary - asterisk-18.15.1</title><h1 align="center"><a name="top">Release Summary</a></h1><h3 align="center">asterisk-18.15.1</h3><h3 align="center">Date: 2022-12-01</h3><h3 align="center"><asteriskteam@digium.com></h3><hr><h2 align="center">Table of Contents</h2><ol>
|
||
|
<li><a href="#summary">Summary</a></li>
|
||
|
<li><a href="#contributors">Contributors</a></li>
|
||
|
<li><a href="#closed_issues">Closed Issues</a></li>
|
||
|
<li><a href="#commits">Other Changes</a></li>
|
||
|
<li><a href="#diffstat">Diffstat</a></li>
|
||
|
</ol><hr><a name="summary"><h2 align="center">Summary</h2></a><center><a href="#top">[Back to Top]</a></center><p>This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.</p><p>Security Advisories:</p><ul>
|
||
|
<li><a href="http://downloads.asterisk.org/pub/security/AST-2022-007,AST-2022-008,AST-2022-009.html">AST-2022-007,AST-2022-008,AST-2022-009</a></li>
|
||
|
</ul><p>The data in this summary reflects changes that have been made since the previous release, asterisk-18.15.0.</p><hr><a name="contributors"><h2 align="center">Contributors</h2></a><center><a href="#top">[Back to Top]</a></center><p>This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.</p><table width="100%" border="0">
|
||
|
<tr><th width="33%">Coders</th><th width="33%">Testers</th><th width="33%">Reporters</th></tr>
|
||
|
<tr valign="top"><td width="33%">2 Asterisk Development Team <asteriskteam@digium.com><br/>2 Mike Bradeen <mbradeen@sangoma.com><br/>1 George Joseph <gjoseph@digium.com><br/>1 Ben Ford <bford@digium.com><br/></td><td width="33%"><td width="33%">1 shawty <shawty.d.ds@googlemail.com><br/>1 nappsoft <infos@nappsoft.ch><br/>1 Benjamin Keith Ford <bford@digium.com><br/>1 Michael Bradeen <mbradeen@sangoma.com><br/></td></tr>
|
||
|
</table><hr><a name="closed_issues"><h2 align="center">Closed Issues</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all issues from the issue tracker that were closed by changes that went into this release.</p><h3>Security</h3><h4>Category: Addons/chan_ooh323</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-30103">ASTERISK-30103</a>: chan_ooh323 Vulnerability in calling/called party IE<br/>Reported by: Michael Bradeen<ul>
|
||
|
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=47a483dc8cd5262bcaac8741281fdbb4e4c51f4a">[47a483dc8c]</a> Mike Bradeen -- ooh323c: not checking for IE minimum length</li>
|
||
|
</ul><br><h4>Category: Core/ManagerInterface</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-30176">ASTERISK-30176</a>: manager: GetConfig can read files outside of Asterisk<br/>Reported by: shawty<ul>
|
||
|
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=d309e25d612a6d115223671ff7e5b9988e55d59a">[d309e25d61]</a> Mike Bradeen -- manager: prevent file access outside of config dir</li>
|
||
|
</ul><br><h4>Category: pjproject/pjsip</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-30338">ASTERISK-30338</a>: pjproject: Backport security fixes from 2.13<br/>Reported by: Benjamin Keith Ford<ul>
|
||
|
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=9b893ce332b2c1c53d3198957e930128e62ae9ab">[9b893ce332]</a> Ben Ford -- pjproject: 2.13 security fixes</li>
|
||
|
</ul><br><h3>Bug</h3><h4>Category: Resources/res_pjsip_pubsub</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-30244">ASTERISK-30244</a>: res_pjsip_pubsub: Occasional crash when TCP/TLS connection terminated and subscription persistence is removed<br/>Reported by: nappsoft<ul>
|
||
|
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=936d95bfe959941ee0755d4b4d6d215acca5e2ce">[936d95bfe9]</a> George Joseph -- pjsip_transport_events: Fix possible use after free on transport</li>
|
||
|
</ul><br><hr><a name="commits"><h2 align="center">Commits Not Associated with an Issue</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all changes that went into this release that did not reference a JIRA issue.</p><table width="100%" border="1">
|
||
|
<tr><th>Revision</th><th>Author</th><th>Summary</th></tr>
|
||
|
<tr><td><a href="https://code.asterisk.org/code/changelog/asterisk?cs=7c6fe5168b8c6a5bf909778f96360c13961c20f7">7c6fe5168b</a></td><td>Asterisk Development Team</td><td>Update CHANGES and UPGRADE.txt for 18.15.1</td></tr>
|
||
|
<tr><td><a href="https://code.asterisk.org/code/changelog/asterisk?cs=4bc9c23aade245bfcc67690a0a4837c756cc69da">4bc9c23aad</a></td><td>Asterisk Development Team</td><td>Update for 18.15.1</td></tr>
|
||
|
</table><hr><a name="diffstat"><h2 align="center">Diffstat Results</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.</p><pre>UPGRADE.txt | 13
|
||
|
addons/ooh323c/src/ooq931.c | 15
|
||
|
configs/samples/asterisk.conf.sample | 11
|
||
|
include/asterisk/manager.h | 12
|
||
|
include/asterisk/res_pjsip.h | 83 ++
|
||
|
main/manager.c | 42 +
|
||
|
main/options.c | 1
|
||
|
res/res_pjsip/pjsip_transport_events.c | 214 ++++++-
|
||
|
res/res_pjsip_outbound_registration.c | 28
|
||
|
res/res_pjsip_pubsub.c | 25
|
||
|
third-party/pjproject/patches/0200-potential-buffer-overflow-in-pjlib-scanner-and-pjmedia.patch | 289 ++++++++++
|
||
|
11 files changed, 680 insertions(+), 53 deletions(-)</pre><br></html>
|