| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
| |
AST-2018-002: Crash when given an invalid SDP media format description
AST-2018-003: Crash with an invalid SDP fmtp attribute
AST-2018-004 (CVE-2018-7284): Crash when receiving SUBSCRIBE request
AST-2018-005 (CVE-2018-7286): Crash when large numbers of TCP connections are closed suddenly
AST-2018-007: Infinite loop when reading iostreams
AST-2018-008: PJSIP endpoint presence disclosure when using ACL
AST-2018-009 (CVE-2018-17281): Remote crash in HTTP websocket upgrade
|
|
|
|
|
|
|
|
|
|
|
| |
fixes #8354
AST-2017-009 Buffer overflow in pjproject header parsing can cause crash
AST-2017-010 Buffer overflow in CDR's set user
AST-2017-011 Memory leak in pjsip session resource
AST-2017-012 Remote Crash Vulnerability in RTCP Stack
AST-2017-013 DOS Vulnerability in Asterisk chan_skinny
AST-2017-014 Crash in PJSIP resource when missing a contact header
|
|
|
|
| |
AST-2017-008 (CVE-2017-14099): RTP/RTCP information leak
|
|
|
|
|
|
|
|
| |
fixes #7792
AST-2017-005: Media takeover in RTP stack
AST-2017-006: Shell access command injection in app_minivm
AST-2017-007: Remote Crash Vulerability in res_pjsip
|
|
|
|
|
|
| |
fixes #7583
(cherry picked from commit d920dcd3a738d5729e5ae69fbfa104f22ec87010)
|
|
|
|
| |
(cherry picked from commit af7f75ee2464cc1900b6a6721780bef48fa7a150)
|
|
|
|
|
|
| |
rebase iostream patch
(cherry picked from commit d3b69542ac82d1e357a1459849fd3a79f354d1bf)
|
|
|
|
|
|
| |
AST-2017-002: Buffer Overrun in PJSIP transaction layer
AST-2017-003: Crash in PJSIP multi-part body parser
AST-2017-004: Memory exhaustion on short SCCP packets
|
|
|
|
| |
fixes #4840
|
| |
|
| |
|
|
|
|
| |
AST-2017-001 Buffer overflow in CDR's set user
|
| |
|
|
|
|
|
| |
- rebase ASTERISK-24517
- remove upstreamed patch
|
| |
|
|
|
|
| |
ref #6644
|
| |
|
|
|
|
| |
also disable -march=native to use proper alpine default arch target
|
| |
|
|
|
|
|
| |
fixes #3503
fixes #6394
|
| |
|
|
|
|
|
| |
- move libasteriskssl.so symlink back to main package
- fixes #6393
|
|
|
|
| |
fixes commit "main/[various]: dont set arch in split function"
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
AST-2016-006: Crash on ACK from unknown endpoint
AST-2016-007: RTP Resource Exhaustion
Remove our custom patch ASTERISK-19109 as unneeded since the
administrative mute can be used for similar features. And remove
musl-includes.patch as it was merged upstream.
|
| |
|
|
|
|
|
| |
- rebased ASTERISK-19109 patch
- add findutils as "find -printf" is now used in configure
|
| |
|
|
|
|
|
|
|
| |
Now all invocations have following order of arguments (if present):
addgroup -S -g ... GROUP
adduser -S -u ... -D -H -h ... -s ... -G ... -g ... USER
|
|
|
|
|
|
|
|
|
|
|
|
| |
Following rules have been applied:
- script starts with shebang !#/bin/sh followed by blank line,
- script ends with exit 0 prepended by blank line,
- only stderr of adduser, addgroup or passwd is redirected to /dev/null,
- getent passwd/group instances has been removed,
- manual checking of file and group existence has been removed,
- `|| true` instances has been removed.
Comments and line wrapping have been preserved.
|
|
|
|
|
|
| |
This way we can avoid ugly default:
Linux user,,,
|
|
|
|
|
|
|
|
|
|
| |
AST-2016-001 TLS defaults to mitigate BEAST
AST-2016-002 Fix fd leak with non-default timert1
AST-2016-003 Remote crash in UDPTL
This also removes the security patch mechanism, upstream seems
to change the format of these patches on every security release
so just grab the tarball.
|
| |
|
|
|
|
| |
fixes #4840
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
AST-2015-003: TLS Certificate Common name NULL byte exploit
|
|
|
|
|
| |
rebase libcap patch, and add speexdsp-dev dependency due to
recent package split.
|
| |
|
|
|
|
|
| |
AST-2015-001: File descriptor leak when incompatible codecs are offered (chan_pjsip)
AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability
|
| |
|
| |
|
|
|
|
| |
AST-2014-019: Remote Crash Vulnerability in WebSocket Server
|
|
|
|
|
|
|
|
|
|
|
| |
AST-2014-012: Unauthorized access in the presence of ACLs with
mixed IP address families
AST-2014-018: Permission Escalation through DB dialplan function
AST-2014-017: Permission Escalation via ConfBridge dialplan function
and AMI ConfbridgeStartRecord Action
AST-2014-013: Unauthorized access in the presence of ACLs in the PJSIP stack
AST-2014-015: Remote crash vulnerability in PJSIP channel driver
AST-2014-016: Remote crash vulnerability in PJSIP channel driver
|
| |
|