Asterisk Security Release 16.30.1 Now Available

The Asterisk Development Team would like to announce security release
Asterisk 16.30.1.

The release artifacts are available for immediate download at
https://github.com/asterisk/asterisk/releases/tag/16.30.1
and
https://downloads.asterisk.org/pub/telephony/asterisk

The following security advisories were resolved in this release:
https://github.com/asterisk/asterisk/security/advisories/GHSA-4xjp-22g4-9fxm

Change Log for Release 16.30.1
========================================

Links:
—————————————-

– [Full ChangeLog](https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-16.30.1.md)
– [GitHub Diff](https://github.com/asterisk/asterisk/compare/16.30.0…16.30.1)
– [Tarball](https://downloads.asterisk.org/pub/telephony/asterisk/asterisk-16.30.1.tar.gz)
– [Downloads](https://downloads.asterisk.org/pub/telephony/asterisk)

Summary:
—————————————-

– apply_patches: Use globbing instead of file/sort.
– bundled_pjproject: Backport 2 SSL patches from upstream
– bundled_pjproject: Backport security fixes from pjproject 2.13.1
– apply_patches: Sort patch list before applying

User Notes:
—————————————-

Upgrade Notes:
—————————————-

Closed Issues:
—————————————-

– #188: [improvement]: pjsip: Upgrade bundled version to pjproject 2.13.1 #187
– #193: [bug]: third-party/apply-patches doesn’t sort the patch file list before applying
– #194: [bug]: Segfault/double-free in bundled pjproject using TLS transport

What can we help you find?