Update for certified/11.6-cert18

certified/11.6 certified/11.6-cert18
Joshua Colp 8 years ago
parent 52d06e95b5
commit 13e940b985

@ -1 +1 @@
certified/11.6-cert17
certified/11.6-cert18

@ -1,3 +1,53 @@
2017-09-19 16:08 +0000 Asterisk Development Team <asteriskteam@digium.com>
* asterisk certified/11.6-cert18 Released.
2017-09-13 12:07 +0000 [52d06e95b5] Richard Mudgett <rmudgett@digium.com>
* AST-2017-008: Improve RTP and RTCP packet processing.
Validate RTCP packets before processing them.
* Validate that the received packet is of a minimum length and apply the
RFC3550 RTCP packet validation checks.
* Fixed potentially reading garbage beyond the received RTCP record data.
* Fixed rtp->themssrc only being set once when the remote could change
the SSRC. We would effectively stop handling the RTCP statistic records.
* Fixed rtp->themssrc to not treat a zero value as special by adding
rtp->themssrc_valid to indicate if rtp->themssrc is available.
ASTERISK-27274
Make strict RTP learning more flexible.
Direct media can cause strict RTP to attempt to learn a remote address
again before it has had a chance to learn the remote address the first
time. Because of the rapid relearn requests, strict RTP could latch onto
the first remote address and fail to latch onto the direct media remote
address. As a result, you have one way audio until the call is placed on
and off hold.
The new algorithm learns remote addresses for a set time (1.5 seconds)
before locking the remote address. In addition, we must see a configured
number of remote packets from the same address in a row before switching.
* Fixed strict RTP learning from always accepting the first new address
packet as the new stream.
* Fixed strict RTP to initialize the expected sequence number with the
last received sequence number instead of the last transmitted sequence
number.
* Fixed the predicted next sequence number calculation in
rtp_learning_rtp_seq_update() to handle overflow.
ASTERISK-27252
Change-Id: Ia2d3aa6e0f22906c25971e74f10027d96525f31c
2017-08-31 15:32 +0000 Asterisk Development Team <asteriskteam@digium.com>
* asterisk certified/11.6-cert17 Released.

@ -1,39 +0,0 @@
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><title>Release Summary - asterisk-certified/11.6-cert17</title><h1 align="center"><a name="top">Release Summary</a></h1><h3 align="center">asterisk-certified/11.6-cert17</h3><h3 align="center">Date: 2017-08-31</h3><h3 align="center">&lt;asteriskteam@digium.com&gt;</h3><hr><h2 align="center">Table of Contents</h2><ol>
<li><a href="#summary">Summary</a></li>
<li><a href="#contributors">Contributors</a></li>
<li><a href="#closed_issues">Closed Issues</a></li>
<li><a href="#diffstat">Diffstat</a></li>
</ol><hr><a name="summary"><h2 align="center">Summary</h2></a><center><a href="#top">[Back to Top]</a></center><p>This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.</p><p>Security Advisories:</p><ul>
<li><a href="http://downloads.asterisk.org/pub/security/AST-2017-005,AST-2017-006.html">AST-2017-005,AST-2017-006</a></li>
</ul><p>The data in this summary reflects changes that have been made since the previous release, asterisk-certified/11.6-cert16.</p><hr><a name="contributors"><h2 align="center">Contributors</h2></a><center><a href="#top">[Back to Top]</a></center><p>This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.</p><table width="100%" border="0">
<tr><th width="33%">Coders</th><th width="33%">Testers</th><th width="33%">Reporters</th></tr>
<tr valign="top"><td width="33%">1 Corey Farrell <git@cfware.com><br/>1 Joshua Colp <jcolp@digium.com><br/></td><td width="33%"><td width="33%">1 Joshua Colp <jcolp@digium.com><br/>1 Corey Farrell <git@cfware.com><br/></td></tr>
</table><hr><a name="closed_issues"><h2 align="center">Closed Issues</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all issues from the issue tracker that were closed by changes that went into this release.</p><h3>Bug</h3><h4>Category: Applications/app_minivm</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-27103">ASTERISK-27103</a>: core: ast_safe_system command injection possible.<br/>Reported by: Corey Farrell<ul>
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=4c4e7303a88c199975a14edeb6d4c743ed7084ff">[4c4e7303a8]</a> Corey Farrell -- AST-2017-006: Fix app_minivm application MinivmNotify command injection</li>
</ul><br><h4>Category: Applications/app_mixmonitor</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-27103">ASTERISK-27103</a>: core: ast_safe_system command injection possible.<br/>Reported by: Corey Farrell<ul>
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=4c4e7303a88c199975a14edeb6d4c743ed7084ff">[4c4e7303a8]</a> Corey Farrell -- AST-2017-006: Fix app_minivm application MinivmNotify command injection</li>
</ul><br><h4>Category: Applications/app_system</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-27103">ASTERISK-27103</a>: core: ast_safe_system command injection possible.<br/>Reported by: Corey Farrell<ul>
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=4c4e7303a88c199975a14edeb6d4c743ed7084ff">[4c4e7303a8]</a> Corey Farrell -- AST-2017-006: Fix app_minivm application MinivmNotify command injection</li>
</ul><br><h4>Category: Applications/app_voicemail</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-27103">ASTERISK-27103</a>: core: ast_safe_system command injection possible.<br/>Reported by: Corey Farrell<ul>
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=4c4e7303a88c199975a14edeb6d4c743ed7084ff">[4c4e7303a8]</a> Corey Farrell -- AST-2017-006: Fix app_minivm application MinivmNotify command injection</li>
</ul><br><h4>Category: Channels/chan_dahdi</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-27103">ASTERISK-27103</a>: core: ast_safe_system command injection possible.<br/>Reported by: Corey Farrell<ul>
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=4c4e7303a88c199975a14edeb6d4c743ed7084ff">[4c4e7303a8]</a> Corey Farrell -- AST-2017-006: Fix app_minivm application MinivmNotify command injection</li>
</ul><br><h4>Category: Core/General</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-27103">ASTERISK-27103</a>: core: ast_safe_system command injection possible.<br/>Reported by: Corey Farrell<ul>
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=4c4e7303a88c199975a14edeb6d4c743ed7084ff">[4c4e7303a8]</a> Corey Farrell -- AST-2017-006: Fix app_minivm application MinivmNotify command injection</li>
</ul><br><h4>Category: Functions/func_shell</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-27103">ASTERISK-27103</a>: core: ast_safe_system command injection possible.<br/>Reported by: Corey Farrell<ul>
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=4c4e7303a88c199975a14edeb6d4c743ed7084ff">[4c4e7303a8]</a> Corey Farrell -- AST-2017-006: Fix app_minivm application MinivmNotify command injection</li>
</ul><br><h4>Category: Resources/res_monitor</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-27103">ASTERISK-27103</a>: core: ast_safe_system command injection possible.<br/>Reported by: Corey Farrell<ul>
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=4c4e7303a88c199975a14edeb6d4c743ed7084ff">[4c4e7303a8]</a> Corey Farrell -- AST-2017-006: Fix app_minivm application MinivmNotify command injection</li>
</ul><br><h4>Category: Resources/res_rtp_asterisk</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-27013">ASTERISK-27013</a>: res_rtp_asterisk: Media can be hijacked even with strict RTP enabled<br/>Reported by: Joshua Colp<ul>
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=04c45758ca5dff91f574380ff7d8e884b71076bc">[04c45758ca]</a> Joshua Colp -- res_rtp_asterisk: Only learn a new source in learn state.</li>
</ul><br><hr><a name="diffstat"><h2 align="center">Diffstat Results</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.</p><pre>README-SERIOUSLY.bestpractices.txt | 7 ++
apps/app_minivm.c | 36 +++++++++-----
apps/app_mixmonitor.c | 10 +++
apps/app_system.c | 10 +++
configs/minivm.conf.sample | 2
funcs/func_shell.c | 5 +
include/asterisk/app.h | 31 +++++++++++-
main/asterisk.c | 93 +++++++++++++++++++++++++++++++------
res/res_monitor.c | 13 +++--
res/res_rtp_asterisk.c | 70 +++++++++++++++------------
10 files changed, 213 insertions(+), 64 deletions(-)</pre><br></html>

@ -1,151 +0,0 @@
Release Summary
asterisk-certified/11.6-cert17
Date: 2017-08-31
<asteriskteam@digium.com>
----------------------------------------------------------------------
Table of Contents
1. Summary
2. Contributors
3. Closed Issues
4. Diffstat
----------------------------------------------------------------------
Summary
[Back to Top]
This release has been made to address one or more security vulnerabilities
that have been identified. A security advisory document has been published
for each vulnerability that includes additional information. Users of
versions of Asterisk that are affected are strongly encouraged to review
the advisories and determine what action they should take to protect their
systems from these issues.
Security Advisories:
* AST-2017-005,AST-2017-006
The data in this summary reflects changes that have been made since the
previous release, asterisk-certified/11.6-cert16.
----------------------------------------------------------------------
Contributors
[Back to Top]
This table lists the people who have submitted code, those that have
tested patches, as well as those that reported issues on the issue tracker
that were resolved in this release. For coders, the number is how many of
their patches (of any size) were committed into this release. For testers,
the number is the number of times their name was listed as assisting with
testing a patch. Finally, for reporters, the number is the number of
issues that they reported that were affected by commits that went into
this release.
Coders Testers Reporters
1 Corey Farrell 1 Joshua Colp
1 Joshua Colp 1 Corey Farrell
----------------------------------------------------------------------
Closed Issues
[Back to Top]
This is a list of all issues from the issue tracker that were closed by
changes that went into this release.
Bug
Category: Applications/app_minivm
ASTERISK-27103: core: ast_safe_system command injection possible.
Reported by: Corey Farrell
* [4c4e7303a8] Corey Farrell -- AST-2017-006: Fix app_minivm application
MinivmNotify command injection
Category: Applications/app_mixmonitor
ASTERISK-27103: core: ast_safe_system command injection possible.
Reported by: Corey Farrell
* [4c4e7303a8] Corey Farrell -- AST-2017-006: Fix app_minivm application
MinivmNotify command injection
Category: Applications/app_system
ASTERISK-27103: core: ast_safe_system command injection possible.
Reported by: Corey Farrell
* [4c4e7303a8] Corey Farrell -- AST-2017-006: Fix app_minivm application
MinivmNotify command injection
Category: Applications/app_voicemail
ASTERISK-27103: core: ast_safe_system command injection possible.
Reported by: Corey Farrell
* [4c4e7303a8] Corey Farrell -- AST-2017-006: Fix app_minivm application
MinivmNotify command injection
Category: Channels/chan_dahdi
ASTERISK-27103: core: ast_safe_system command injection possible.
Reported by: Corey Farrell
* [4c4e7303a8] Corey Farrell -- AST-2017-006: Fix app_minivm application
MinivmNotify command injection
Category: Core/General
ASTERISK-27103: core: ast_safe_system command injection possible.
Reported by: Corey Farrell
* [4c4e7303a8] Corey Farrell -- AST-2017-006: Fix app_minivm application
MinivmNotify command injection
Category: Functions/func_shell
ASTERISK-27103: core: ast_safe_system command injection possible.
Reported by: Corey Farrell
* [4c4e7303a8] Corey Farrell -- AST-2017-006: Fix app_minivm application
MinivmNotify command injection
Category: Resources/res_monitor
ASTERISK-27103: core: ast_safe_system command injection possible.
Reported by: Corey Farrell
* [4c4e7303a8] Corey Farrell -- AST-2017-006: Fix app_minivm application
MinivmNotify command injection
Category: Resources/res_rtp_asterisk
ASTERISK-27013: res_rtp_asterisk: Media can be hijacked even with strict
RTP enabled
Reported by: Joshua Colp
* [04c45758ca] Joshua Colp -- res_rtp_asterisk: Only learn a new source
in learn state.
----------------------------------------------------------------------
Diffstat Results
[Back to Top]
This is a summary of the changes to the source code that went into this
release that was generated using the diffstat utility.
README-SERIOUSLY.bestpractices.txt | 7 ++
apps/app_minivm.c | 36 +++++++++-----
apps/app_mixmonitor.c | 10 +++
apps/app_system.c | 10 +++
configs/minivm.conf.sample | 2
funcs/func_shell.c | 5 +
include/asterisk/app.h | 31 +++++++++++-
main/asterisk.c | 93 +++++++++++++++++++++++++++++++------
res/res_monitor.c | 13 +++--
res/res_rtp_asterisk.c | 70 +++++++++++++++------------
10 files changed, 213 insertions(+), 64 deletions(-)

@ -0,0 +1,16 @@
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><title>Release Summary - asterisk-certified/11.6-cert18</title><h1 align="center"><a name="top">Release Summary</a></h1><h3 align="center">asterisk-certified/11.6-cert18</h3><h3 align="center">Date: 2017-09-19</h3><h3 align="center">&lt;asteriskteam@digium.com&gt;</h3><hr><h2 align="center">Table of Contents</h2><ol>
<li><a href="#summary">Summary</a></li>
<li><a href="#contributors">Contributors</a></li>
<li><a href="#closed_issues">Closed Issues</a></li>
<li><a href="#diffstat">Diffstat</a></li>
</ol><hr><a name="summary"><h2 align="center">Summary</h2></a><center><a href="#top">[Back to Top]</a></center><p>This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.</p><p>Security Advisories:</p><ul>
<li><a href="http://downloads.asterisk.org/pub/security/AST-2017-008.html">AST-2017-008</a></li>
</ul><p>The data in this summary reflects changes that have been made since the previous release, asterisk-certified/11.6-cert17.</p><hr><a name="contributors"><h2 align="center">Contributors</h2></a><center><a href="#top">[Back to Top]</a></center><p>This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release.</p><table width="100%" border="0">
<tr><th width="33%">Coders</th><th width="33%">Testers</th><th width="33%">Reporters</th></tr>
<tr valign="top"><td width="33%">1 Richard Mudgett <rmudgett@digium.com><br/></td><td width="33%"><td width="33%">1 Richard Mudgett <rmudgett@digium.com><br/></td></tr>
</table><hr><a name="closed_issues"><h2 align="center">Closed Issues</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a list of all issues from the issue tracker that were closed by changes that went into this release.</p><h3>Bug</h3><h4>Category: Resources/res_rtp_asterisk</h4><a href="https://issues.asterisk.org/jira/browse/ASTERISK-27274">ASTERISK-27274</a>: RTCP needs better packet validation to resist port scans.<br/>Reported by: Richard Mudgett<ul>
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=52d06e95b506af711272dcf2c6de47d82358e024">[52d06e95b5]</a> Richard Mudgett -- AST-2017-008: Improve RTP and RTCP packet processing.</li>
</ul><a href="https://issues.asterisk.org/jira/browse/ASTERISK-27252">ASTERISK-27252</a>: RTP: One way audio with direct media and strictrtp=yes.<br/>Reported by: Richard Mudgett<ul>
<li><a href="https://code.asterisk.org/code/changelog/asterisk?cs=52d06e95b506af711272dcf2c6de47d82358e024">[52d06e95b5]</a> Richard Mudgett -- AST-2017-008: Improve RTP and RTCP packet processing.</li>
</ul><br><hr><a name="diffstat"><h2 align="center">Diffstat Results</h2></a><center><a href="#top">[Back to Top]</a></center><p>This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility.</p><pre>res_rtp_asterisk.c | 481 ++++++++++++++++++++++++++++++++++++++++++++---------
1 file changed, 401 insertions(+), 80 deletions(-)</pre><br></html>

@ -0,0 +1,88 @@
Release Summary
asterisk-certified/11.6-cert18
Date: 2017-09-19
<asteriskteam@digium.com>
----------------------------------------------------------------------
Table of Contents
1. Summary
2. Contributors
3. Closed Issues
4. Diffstat
----------------------------------------------------------------------
Summary
[Back to Top]
This release has been made to address one or more security vulnerabilities
that have been identified. A security advisory document has been published
for each vulnerability that includes additional information. Users of
versions of Asterisk that are affected are strongly encouraged to review
the advisories and determine what action they should take to protect their
systems from these issues.
Security Advisories:
* AST-2017-008
The data in this summary reflects changes that have been made since the
previous release, asterisk-certified/11.6-cert17.
----------------------------------------------------------------------
Contributors
[Back to Top]
This table lists the people who have submitted code, those that have
tested patches, as well as those that reported issues on the issue tracker
that were resolved in this release. For coders, the number is how many of
their patches (of any size) were committed into this release. For testers,
the number is the number of times their name was listed as assisting with
testing a patch. Finally, for reporters, the number is the number of
issues that they reported that were affected by commits that went into
this release.
Coders Testers Reporters
1 Richard Mudgett 1 Richard Mudgett
----------------------------------------------------------------------
Closed Issues
[Back to Top]
This is a list of all issues from the issue tracker that were closed by
changes that went into this release.
Bug
Category: Resources/res_rtp_asterisk
ASTERISK-27274: RTCP needs better packet validation to resist port scans.
Reported by: Richard Mudgett
* [52d06e95b5] Richard Mudgett -- AST-2017-008: Improve RTP and RTCP
packet processing.
ASTERISK-27252: RTP: One way audio with direct media and strictrtp=yes.
Reported by: Richard Mudgett
* [52d06e95b5] Richard Mudgett -- AST-2017-008: Improve RTP and RTCP
packet processing.
----------------------------------------------------------------------
Diffstat Results
[Back to Top]
This is a summary of the changes to the source code that went into this
release that was generated using the diffstat utility.
res_rtp_asterisk.c | 481 ++++++++++++++++++++++++++++++++++++++++++++---------
1 file changed, 401 insertions(+), 80 deletions(-)
Loading…
Cancel
Save