* [Buildroot] [PATCH] package/asterisk: security bump to version 16.4.1
@ 2019-07-28 21:28 Peter Korsgaard
2019-07-30 15:50 ` Peter Korsgaard
2019-08-20 13:56 ` Peter Korsgaard
0 siblings, 2 replies; 3+ messages in thread
From: Peter Korsgaard @ 2019-07-28 21:28 UTC (permalink / raw)
To: buildroot
Fixes the following security issues:
CVE-2019-12827: A specially crafted SIP in-dialog MESSAGE message can cause
Asterisk to crash:
https://downloads.asterisk.org/pub/security/AST-2019-002.html
CVE-2019-13161: When T.38 faxing is done in Asterisk a T.38 reinvite may be
sent to an endpoint to switch it to T.38. If the endpoint responds with an
improperly formatted SDP answer including both a T.38 UDPTL stream and an
audio or video stream containing only codecs not allowed on the SIP peer or
user a crash will occur. The code incorrectly assumes that there will be at
least one common codec when T.38 is also in the SDP answer:
https://downloads.asterisk.org/pub/security/AST-2019-003.html
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---
package/asterisk/asterisk.hash | 2 +-
package/asterisk/asterisk.mk | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/package/asterisk/asterisk.hash b/package/asterisk/asterisk.hash
index d8cc56695c..dd1e1db327 100644
--- a/package/asterisk/asterisk.hash
+++ b/package/asterisk/asterisk.hash
@@ -1,5 +1,5 @@
# Locally computed
-sha256 c022e9d5410ed94ab1aa51ba1e2a8b196f0dfa15bcd0bd545d06efee4c786578 asterisk-16.2.1.tar.gz
+sha256 8cabb7a6ad2c35b7fb5c520977f2b2c18b471e5b825b65dc411744c6bed2b9f8 asterisk-16.4.1.tar.gz
# sha1 from: http://downloads.asterisk.org/pub/telephony/sounds/releases
# sha256 locally computed
diff --git a/package/asterisk/asterisk.mk b/package/asterisk/asterisk.mk
index 65f8d3fdf9..53dd593678 100644
--- a/package/asterisk/asterisk.mk
+++ b/package/asterisk/asterisk.mk
@@ -4,7 +4,7 @@
#
################################################################################
-ASTERISK_VERSION = 16.2.1
+ASTERISK_VERSION = 16.4.1
# Use the github mirror: it's an official mirror maintained by Digium, and
# provides tarballs, which the main Asterisk git tree (behind Gerrit) does not.
ASTERISK_SITE = $(call github,asterisk,asterisk,$(ASTERISK_VERSION))
--
2.11.0
^ permalink raw reply related [flat|nested] 3+ messages in thread
* [Buildroot] [PATCH] package/asterisk: security bump to version 16.4.1
2019-07-28 21:28 [Buildroot] [PATCH] package/asterisk: security bump to version 16.4.1 Peter Korsgaard
@ 2019-07-30 15:50 ` Peter Korsgaard
2019-08-20 13:56 ` Peter Korsgaard
1 sibling, 0 replies; 3+ messages in thread
From: Peter Korsgaard @ 2019-07-30 15:50 UTC (permalink / raw)
To: buildroot
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:
> Fixes the following security issues:
> CVE-2019-12827: A specially crafted SIP in-dialog MESSAGE message can cause
> Asterisk to crash:
> https://downloads.asterisk.org/pub/security/AST-2019-002.html
> CVE-2019-13161: When T.38 faxing is done in Asterisk a T.38 reinvite may be
> sent to an endpoint to switch it to T.38. If the endpoint responds with an
> improperly formatted SDP answer including both a T.38 UDPTL stream and an
> audio or video stream containing only codecs not allowed on the SIP peer or
> user a crash will occur. The code incorrectly assumes that there will be at
> least one common codec when T.38 is also in the SDP answer:
> https://downloads.asterisk.org/pub/security/AST-2019-003.html
> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Committed, thanks.
--
Bye, Peter Korsgaard
^ permalink raw reply [flat|nested] 3+ messages in thread
* [Buildroot] [PATCH] package/asterisk: security bump to version 16.4.1
2019-07-28 21:28 [Buildroot] [PATCH] package/asterisk: security bump to version 16.4.1 Peter Korsgaard
2019-07-30 15:50 ` Peter Korsgaard
@ 2019-08-20 13:56 ` Peter Korsgaard
1 sibling, 0 replies; 3+ messages in thread
From: Peter Korsgaard @ 2019-08-20 13:56 UTC (permalink / raw)
To: buildroot
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:
> Fixes the following security issues:
> CVE-2019-12827: A specially crafted SIP in-dialog MESSAGE message can cause
> Asterisk to crash:
> https://downloads.asterisk.org/pub/security/AST-2019-002.html
> CVE-2019-13161: When T.38 faxing is done in Asterisk a T.38 reinvite may be
> sent to an endpoint to switch it to T.38. If the endpoint responds with an
> improperly formatted SDP answer including both a T.38 UDPTL stream and an
> audio or video stream containing only codecs not allowed on the SIP peer or
> user a crash will occur. The code incorrectly assumes that there will be at
> least one common codec when T.38 is also in the SDP answer:
> https://downloads.asterisk.org/pub/security/AST-2019-003.html
> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Committed to 2019.02.x and 2019.05.x, thanks.
--
Bye, Peter Korsgaard
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2019-08-20 13:56 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-07-28 21:28 [Buildroot] [PATCH] package/asterisk: security bump to version 16.4.1 Peter Korsgaard
2019-07-30 15:50 ` Peter Korsgaard
2019-08-20 13:56 ` Peter Korsgaard
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.