Release Summary asterisk-17.0.1 Date: 2019-11-21 ---------------------------------------------------------------------- Table of Contents 1. Summary 2. Contributors 3. Closed Issues 4. Other Changes 5. Diffstat ---------------------------------------------------------------------- Summary [Back to Top] This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues. Security Advisories: * AST-2019-006,AST-2019-007 The data in this summary reflects changes that have been made since the previous release, asterisk-17.0.0. ---------------------------------------------------------------------- Contributors [Back to Top] This table lists the people who have submitted code, those that have tested patches, as well as those that reported issues on the issue tracker that were resolved in this release. For coders, the number is how many of their patches (of any size) were committed into this release. For testers, the number is the number of times their name was listed as assisting with testing a patch. Finally, for reporters, the number is the number of issues that they reported that were affected by commits that went into this release. Coders Testers Reporters 1 Asterisk Development Team 1 Eliel Sardañons 1 George Joseph 1 Andrey V. T. 1 Ben Ford 1 Eliel Sardañons ---------------------------------------------------------------------- Closed Issues [Back to Top] This is a list of all issues from the issue tracker that were closed by changes that went into this release. Security Category: Channels/chan_sip/General ASTERISK-28589: chan_sip: Depending on configuration an INVITE can alter Addr of a peer Reported by: Andrey V. T. * [92499125e8] Ben Ford -- chan_sip.c: Prevent address change on unauthenticated SIP request. Category: Core/ManagerInterface ASTERISK-28580: Bypass SYSTEM write permission in manager action allows system commands execution Reported by: Eliel Sardañons * [a6bdc1268a] George Joseph -- manager.c: Prevent the Originate action from running the Originate app ---------------------------------------------------------------------- Commits Not Associated with an Issue [Back to Top] This is a list of all changes that went into this release that did not reference a JIRA issue. +------------------------------------------------------------------------+ | Revision | Author | Summary | |------------+---------------------------+-------------------------------| | 95c35e1765 | Asterisk Development Team | Update CHANGES and | | | | UPGRADE.txt for 17.0.1 | +------------------------------------------------------------------------+ ---------------------------------------------------------------------- Diffstat Results [Back to Top] This is a summary of the changes to the source code that went into this release that was generated using the diffstat utility. 0 files changed