asterisk-16.x: fix AST-2020-001 and 002 587/head
authorSebastian Kemper <sebastian_ml@gmx.net>
Fri, 6 Nov 2020 20:18:23 +0000 (21:18 +0100)
committerSebastian Kemper <sebastian_ml@gmx.net>
Fri, 6 Nov 2020 20:20:46 +0000 (21:20 +0100)
commit0394d0cbbdbf029e5b73dbafe688b194212614a2
treea6b901afdbba3295020f04cfa953cabdd274642a
parentc1e923bcc06882d905b0b71642fb3df1077b9faf
asterisk-16.x: fix AST-2020-001 and 002

Patches used:

http://downloads.asterisk.org/pub/security/AST-2020-001-16.diff
http://downloads.asterisk.org/pub/security/AST-2020-002-16.diff

Patch AST-2020-002-16.diff was amended a bit in res/res_pjsip_session.c:

if (++session->authentication_challenge_count > MAX_RX_CHALLENGES) {
ast_debug(3, "%s: Initial INVITE reached maximum number of auth attempts.\n", ast_sip_session_get_name(session));
return PJ_FALSE;
}

The above was not possible, because of missing bits introduced only in a
later version of Asterisk 16 (see upstream commit [1]). So the ast_debug
call was simplified accordingly.

Both patches were refreshed within OpenWrt SDK.

[1] https://github.com/asterisk/asterisk/commit/6abf6f345dbd0510d8a217d16cc1819e4d2bf815

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
net/asterisk-16.x/Makefile
net/asterisk-16.x/patches/190-AST-2020-001-16.diff [new file with mode: 0644]
net/asterisk-16.x/patches/200-AST-2020-002-16.diff [new file with mode: 0644]