The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16, 17 and 18, and Certified Asterisk 16.8. The available releases
are released as versions 13.38.3, 16.19.1, 17.9.4, 18.5.1 and 16.8-cert10.
These releases are available for immediate download at
https://downloads.asterisk.
https://downloads.asterisk.
The following security vulnerabilities were resolved in these versions:
- AST-2021-007: Remote Crash Vulnerability in PJSIP channel driver
When Asterisk receives a re-INVITE without SDP after having sent a BYE request
a crash will occur. This occurs due to the Asterisk channel no longer being
present while code assumes it is.
- AST-2021-008: Remote crash when using IAX2 channel driver
If the IAX2 channel driver receives a packet that contains an
- AST-2021-009: pjproject/pjsip: crash when SSL socket destroyed during
handshake
Depending on the timing, it’s possible for Asterisk to crash when using a
TLS connection if the underlying socket parent/listener gets destroyed during
the handshake.
For a full list of changes in the current releases, please see the ChangeLogs:
ChangeLog-13.38.3
ChangeLog-16.19.1
ChangeLog-17.9.4
ChangeLog-18.5.1
ChangeLog-certified-16.8-
The security advisories are available at:
AST-2021-007.pdf
AST-2021-008.pdf
AST-2021-009.pdf
Thank you for your continued support of Asterisk!