Release Summary asterisk-certified/13.13-cert4 Date: 2017-05-19 ---------------------------------------------------------------------- Table of Contents 1. Summary 2. Contributors 3. Closed Issues 4. Diffstat ---------------------------------------------------------------------- Summary [Back to Top] This release is a point release of an existing major version. The changes included were made to address problems that have been identified in this release series, or are minor, backwards compatible new features or improvements. Users should be able to safely upgrade to this version if this release series is already in use. Users considering upgrading from a previous version are strongly encouraged to review the UPGRADE.txt document as well as the CHANGES document for information about upgrading to this release series. The data in this summary reflects changes that have been made since the previous release, asterisk-certified/13.13-cert3. ---------------------------------------------------------------------- Contributors [Back to Top] This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release. Coders Testers Reporters 2 Mark Michelson 3 Sandro Gauci 1 George Joseph ---------------------------------------------------------------------- Closed Issues [Back to Top] This is a list of all issues from the issue tracker that were closed by changes that went into this release. Bug Category: Channels/chan_skinny ASTERISK-26940: Asterisk Skinny memory exhaustion vulnerability leads to DoS Reported by: Sandro Gauci * [7e8b57db67] gtjoseph -- AST-2017-004: chan_skinny: Add EOF check in skinny_session Category: pjproject/pjsip ASTERISK-26939: Out of bound memory access in PJSIP multipart parser crashes Asterisk Reported by: Sandro Gauci * [d0e628e792] Mark Michelson -- AST-2017-003: Handle zero-length body parts correctly. ASTERISK-26938: Heap overflow in CSEQ header parsing affects Asterisk chan_pjsip and PJSIP Reported by: Sandro Gauci * [14e57ba5b5] Mark Michelson -- AST-2017-002: Ensure transaction key buffer is large enough. ---------------------------------------------------------------------- Diffstat Results [Back to Top] This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility. channels/chan_skinny.c | 122 +++++----- third-party/pjproject/patches/0058-Parse-zero-length-multipart-body-parts-correctly.patch | 41 +++ third-party/pjproject/patches/0059-Ensure-2543-transaction-key-buffer-is-large-enough.patch | 24 + 3 files changed, 131 insertions(+), 56 deletions(-)