| Issue ID | Sev | Problem Description | Resolution |
---|
1 | SBX-92479 | 2 | In the I-SBC, PKT Port redundancy support is not present in 7.2.2 release. Impact: The SBC Release 7.2.2 is missing the PKT Port redundancy support, when it is listed as available. Root Cause: In the I-SBC, the PKT Port redundancy support is added in the 8.x releases, but not present in the 7.2.2 release. Steps to Replicate: Configure the pkt port redundancy, port the switchover to see the service continuity on PKT ports with redundancy enabled. Platform/Feature: SBC | Back ported support is added in the 8.x to 7.2.2. releases. |
2 | SBX-91723 | 1 | Observing the CLI port SWO in the s causing the MGMT Impact: On the CLI port, a switchover on packet interface has random connectivity loss for few seconds on other interfaces. Root Cause: A bug in SWe_NP code was picking the incorrect NIF control blocks for standby ports causing intermittent signalling packet loss and a loss of ICMP packets resulting in connectivity failures. This happens specifically when are at 80% capacity. Steps to Replicate: - Bring up setup with port redundancy and perform multiple CLI switch over.
- Observe the link status of various ports.
Platform/Feature: SBC | The code is modified to correct NIF control blocks are chosen for standby ports. |
3 | SBX-88061 / SBX-87404 | 3 | Portfix SBX-87404: A reInvite is triggered before is verified. (Originated in release 6.2.4) Impact: When the online validation (sessId and verId) is set to zero in 200OK, the SIPS fails to save the peer SDP. Root Cause: When the validation (sessId and verId) is set to zero in 200OK, the SIPS fails to save the peer SDP. This could trigger an unnecessary reInvite. Steps to Replicate: Configure the SDP version only. The SDP received in 200 Ok (multi codecs) for egress has a sessId and verId of zero. The SBC could send an unnecessary reInvite to the peer. Platform/Feature: SBC | The code is modified so the peer SDP is properly. |
4 | SBX-92037 | 2 | Optional fax parameters are being parsed by the SBC and, as a result, the 200 Ok is being discarded. Impact: The SBC returns a parser error (4xx) for unsupported t38 attributes. Root Cause: When the unsupported t38 attributes are received, the SBC shows it as an error. Steps to Replicate: When the Incoming call has unsupported t38 attributes, the SBC shows a reply 4xx (parsed error). Platform/Feature: SBC | The code is modified so the SBC ignores the attributes and does not display an error message. |
5 | SBX-91273 | 1 | The EMA receives a Proxy error whenever an operation takes a long time to complete. Impact: When the user navigates to a SIP trunk group or DM PM rule creation screen, there is no response from the UI and after approximately a 2 minute interval, "Proxy error" is shown to the user. Root Cause: The EMA reads the DM PM Rule, DM PM Sub Rule and DM PM Criteria data from the CDB through the Netconf interface. With a large amount of data, there is a significant delay in rendering the UI. The request from the browser times out, resulting in a Proxy Error to the user. Steps to Replicate: 1. Configure more than 25,000 DM PM Criterias and more than 25,000 DM PM Rules. 2. Navigate to a SiP Trunk Group Creation Screen or DM PM Rule creation screen. 3. The create screen does not load and after some time results in Proxy error. Platform/Feature: SBC | Instead of a CDB, the EMA reads the data for DM PM Rule, DM PM Sub Rule and DM PM Criteria directly from the Oracle Database, reducing the delay to a larger extent in rendering the UI. When the Copy Trunk Group operation is performed, it can take up to 3 minutes to complete the copy operations. The 3 minute delay is due to the EMA performing some additional operation compared to new TG creation. |
6 | SBX-91682 | 3 | The MS Teams scenario with ICE causes the RTCP port value discrepancy with X when the RTP is Y and when MUX is supported. Impact: When the SBC sends out re-INVITE messages on a call leg supporting ICE, it can still include a=rtcp:<rtp port + 1> value in the SDP that is different to the previously agreed RTP/RTCP MUX setup with the remote end. Root Cause: The SBC was not considering the SDP answer from the peer when setting the RTCP port value. Steps to Replicate: 1. Send INVITE to SBX ingress with valid audio stream in SDP. 2. From the egress endpoint, respond to the INVITE with a 180 ringing and a 200 OK, and in both cases include valid SDP that has an RTP ICE candidate (no RTCP). a=rtcp-mux 3. At the ingress endpoint, respond to a 200 OK with valid ACK. 4. From ingress endpoint, send a re-Invite that includes an existing audio stream and add a new video stream in SDP. 5. Complete the call signaling and then clear the call. Platform/Feature: SBC: MS Teams | The code is modified to send a=rtcp:<rtp port> when sending re-INVITE messages for streams previously agreed to support muxed behaviour. |
7 | SBX-89807 / SBX-86495 | 3 | Portfix SBX-86495: Add a lightweight MPSTAT analysis as a warning to the user. (Originated in release 8.1.0) Impact: The SBC had random timeouts/healthchecks due to the high %steal (in mpstat output). Root Cause: There is no warning given when the %steal value is high. Steps to Replicate: On a VM or cloud machine, manually add a value in the mpstat.log and then run the script. Plaform/Feature: SBC | The code is modified to check if the system is running with high steal% value and showing a warning to the user. |
8 | SBX-90758 | 3 | The SIP level4 call trace filter must not be restricted by the maxTriggerCount. Impact: Level 4 call traces are incorrectly restricted by the maxTriggerCount value. Root Cause: The intention is that the level 4 traces runs all messages and not be restricted by the system wide trigger count. The count must only apply to per call level 1-3 traces. Steps to Replicate: - Configure a level 4 call trace.
- Configure the maxTriggerCount to a non-zero value.
- Change calls that are traced as well as subsequent calls – once maxTriggerCount calls have been made, not be traced.
Platform/Feature: SBC | The code is modified to ensure level 4 traces are unrestricted. |
9 | SBX-92266 / SBX-88122 | 2 | Portfix SBX-88122: The SBC failed to re-establish media session between the SBC and MS Teams Client after a call transfer initiated by Teams client has failed. (Originated in release 7.2.1) Impact: In scenarios where MS Teams referred the call to another, the SBC started to play a RBT (ring back tone) and if the REFER failed due to the C-party not answering, the media is not established again between the A and B party. Root Cause: The media resource used to play the RBT did not get freed up correctly when the REFER failed and this blocked the media flow from A to B being re-established. Steps to Replicate: Make a call from PSTN to MS Teams, have MS Teams REFER the call to another user. Let the phone ring as C-party but do not answer it. Platform/Feature: SBC | The code is modified to correctly free up the RBT resources so the A- to-B call can re-establish. |
10 | SBX-90867 | 2 | The Ssreq coredumped on the SYD SBC. Impact: The ssreq server has a memory leak that may eat up virtual memory, when there is call load through the ssreq client. Root Cause: The memory allocated for call data and call trace is not being deleted properly, leaving those memory blocks idle forever. Steps to Replicate: - Set up the SBC system with a light or heavy call load.
- Add a call load through ssreq client to the system, light traffic is enough.
- Use the top command to watch the memory growth.
Platform/Feature: SBC | The code is modified to remove the memory blocks promptly. |
11 | SBX-91744 / SBX-91481 | 1 | Portfix SBX-91481: The SamP cored. (Originated in release 6.2.4) Impact: Under certain conditions, the SBC sends out a duplicate OPEN_ACK, causing the receiving GW to crash. Root Cause: A bug in the GW Signaling code can cause a duplicate OPEN_ACKS to send when GW Signaling Links are bouncing. Steps to Replicate: This problem is not reproducible. Platform/Feature: SBC | The code is modified to only send out one OPEN_ACK per tcp/ip connection. |
12 | SBX-91726 / SBX-87861 | 1 | Portfix SBX-87861: While performing a port switchover, the SBC active performed a reboot and the Standby did not takeover the calls. (Originated in release 8.1.0) Impact: An SWe_NP thread hang was observed on a packet port pull out. Root Cause: A cable pull was calling a reset on an interface that may take more than 5s on a thread health check threshold, causing the thread to lock on reset. Steps to Replicate: - Bring up setup in port redundancy setup.
- Cable pull packet interface to trigger port switchover.
Platform/Feature: SBC | The code is modified to adjust the thread health check mechanism on a port reset. |
13 | SBX-91585 / SBX-91510 | 2 | Portfix SBX-91510: An ASAN global-buffer-overflow for the IPUtilGetIpAddressForPrefix. (Originated in release 8.1.0) Impact: In the SBC, while validating whether the peer RTP address is trusted or not, the IP address is validated. While validating the IP Address, the prefix is passed along with the IP Address. The prefix length is passed as 128, irrespective of the IP Address version. Root Cause: This issue was reported as part of the ASAN Testing on a PCR 8709 regression suite in the SBC lab. Steps to Replicate: This issue was found while running a PCR 8709 regression test suite. Platform/Feature: SBC | The code is modified by passing the correct prefix length and by checking the IP Address version (i.e. If IPV4, pass prefix length as 32. If IPV6, pass prefix length as 128). |
14 | SBX-92137 | 2 | The RTP is sent to RTCP after a monitor success indication. Impact: The SBC learns the RTCP port number and uses that to send RTP packets to the end point when RTP monitoring is enabled. Root Cause: When the RTP montoring is enabled for a call and the media stream sends RTCP packet within the number of packets for authorization, an Network Processor (NP) learns the RTCP packet and notifies the application about the sourceIP and sourcePort. Steps to Replicate: - Enable the RTP monitoring for a call.
- Send RTCP packet first and then RTP packets.
- The SBC may send to the learned RTP source port.
Platform/Feature: SBC | The SBC does not learn the RTCP packet when the RTP monitoring/x_cnt feature is enabled. |
15 | SBX-91724 / SBX-91090 | 2 | Portfix SBX-91090: PrsNP process core dump on standby of KVM-ISBC HA while doing an sbxrestart. (Originated in release 8.1.0) Impact: There is rare potential of race in healthcheck implementation of SWe_NP. It can cause a false healthcheck failure of the SWe thread and a result in SWe_NP thread crash. Root Cause: Read and write a healthcheck global variable occurred in non-atomic manner from two different cores. Steps to Replicate: This is a rare occurrence that happens randomly on idle systems. The steps cannot be consistently reproduced. Platform/Feature: SBC | The code is modified to make the healthcheck variable update as atomic. |
16 | SBX-90946 | 3 | Replace the cdb_get when processing status commands. Impact: Multiple issues were reported where the process cored from healthcheck timeout. The application must not call out to the CONFD when processing the CLI status requests. Root Cause: Application must not call out to CONFD when processing the CLI status request. Steps to Replicate: 1. Configure IPSEC testbed. 2. Start to run some calls. 3. From CLI, issue the following commands: "show table addressContext <address context> ipsec ikeSaStatus" "show table addressContext <address context> ipsec ikeSaStatistics" "show table addressContext <address context> ipsec ipsecSaStatus" "show table addressContext <address context> ipsec ipsecSaStatistics" "show table addressContext <address context> ipsec systemStatistics" Platform/Feature: SBC | The code IKE process code is modified to avoid calling out to CONFD when processing CLI status requests. |
17 | SBX-92002 | 2 | The DALSBX71A core dumped. Impact: The SBC core dumped while processing a call with the call stack in 5.0.5R000 software. Root Cause: NRMA has resources getting cleaned up in response to the ingress hanging up. At the same time, in response to egress received 183 Session Progress and 180 Ringing, the activate starts. In this race condition, the ipCktInfo is NULL and code illegally tries to access it and causes a core dump. Steps to Replicate: No steps to replicate, only a code inspection was done to test the issue. Platform/Feature: SBC | A null pointer check is put in place. |
18 | SBX-90877 | 1 | Failover from Node-A to Node-B. Impact: Healthcheck failure while switching from nodeA to nodeB. Root Cause: Functions that configure the DRBD subsystem are taking longer and causing a health check timeout. Steps to Replicate: Switchover from Active to standby. Platform/Feature: SBC | The code is modified to run DRBD setup commands in the background and unblock the caller immediately. |
19 | SBX-92402 / SBX-91257 | 2 | Portfix SBX-91257: No Ring back is heard during a blind transfer. (Originated in release 7.2.1) Impact: The SBC was playing a ring back tone while processing REFER and transferring the call. However, the tone was not heard on the original call leg because MS Teams had put the original call on hold. Root Cause: The code was intentionally not sending re-INVITE messages in this scenario. Steps to Replicate: Run any MS Teams transfer call scenario. Platform/Feature: SBC | The code is modified to send out a re-INVITE message to take the original call off hold so that it can hear the ring back tone being played. |
20 | SBX-92091 | 2 | Call Graphs are showing more calls after upgrade. Impact: Stale calls may be found on a newly upgraded SBC if upgrading from a version older then 6.1.0 to a version higher. Root Cause: As a result of changes that were made to the call ID in 6.1 code, any calls during the LSWU that existed prior to the upgrade and then were modified or terminated after the upgrade started will be left in a hung state. The only way to clean up these calls is to use the following commands: unhide debug
request sbx rtm debug command “cleanup <gcid> Steps to Replicate: 1. Create an audit key greater than 31 by multiple switch over system or by using instrumented code. 2. The audit key will create GCID values using the high bits ( bit 30-31) of GCID value. 3. Setup SIP calls on the system. 4. Initiate the LSWU on standby and after standby is upgraded to newer version, all the established calls on active will be synced. 5. Start the LSWU on active. 6. At this point, standby will become Active. 7. Hang up calls that were established before standby became Active. 8. Issue "show table global callSummaryStatus" CLI command and for all those calls data will be Unavailable. 9. These calls will consume resources. To verify the issue, perform the same steps mentioned above. After upgrading to version with fix, after calls are hung, resources must be released and show table global callSummaryStatus command will not show any orphaned calls. Platform/Feature: SBC | The code is modified to prevent calls from being hung during an upgrade from versions older than 6.1. |
21 | SBX-92274 / SBX-91332 | 1 | The ipPeerCurrentStatistics and ipPeerIntervalStatistics are not working. Impact: Getting the IP peer current statistics for individual IP peers was not working. The issue is reproduced when multiple IP peers are configured under the same zone. Root Cause: Multiple IP Peers must be configured under same zone to reproduce this issue. When obtaining specific peer statistics, the peer name comparison within the same zone was missing. Steps to Replicate: Configure multiple IP Peers under the same zone and then execute the command to obtain IP Peer Current/Interval statistics for a specific peer. Platform/Feature: SBC | The code is modified by adding the comparison for IP peer specified in the CLI against the IP peer statistics list with other existing validations. |
22 | SBX-91725 / SBX-90947 | 1 | Portfix SBX-90947: The NP process core dumped while running a load on the HA setup. Impact: A random SWe_NP crash occurs on a standby node while running a transcoded load. Root Cause: RTCP resources are not managed properly by application layer on standby node. This causes a restart of already running timers on the SWe that causes a race and random crash. Steps to Replicate: - Run a large number of transcoded calls, on HA pair.
- Perform multiple swtichovers of observed on standby node.
Platform/Feature: SBC | Maintain the state in the SWe_NP of running RTCP timers in the context block and guard the double start of timers. |
23 | SBX-91738 | 3 | When using the metaVariableDynamic, LinkDetection is not activated in the SBC. Impact: If the LinkDetection interfaces are configured to use addresses specified in the systemMetaVariable dynamic table, those addresses are not properly read and the LinkDetection is not activated. Root Cause: The addresses were not properly read from the metaVariableDynamic table. Steps to Replicate: 1. Add new entries to the metavariableDynamic table. 2. Create an ipInterface with meta keys added to metaVariableDynamic table. 3. Configure the Link Detection on the ipInterface. 4. Check the Link Detection status. Platform/Feature: SBC | The code is modified to properly read the addresses from the metaVariableDynamic table. |
24 | SBX-92001 | 3 | Memory leaks in the SIPSG. Impact: While debugging a bug in a previous release (SCM crashed from segmentation fault fired from malloc()), memory leaks were found in the SIPSG related to subscription. Root Cause: Observed through a source code inspection. Steps to Replicate: Perform SIP regression tests. Platform/Feature: SBC | The code is modified to free memory blocks properly. |
25 | SBX-92430 / SBX-90654 | 2 | Portfix SBX-90654: Unable to retrieve the parked call on MS Teams. (Originated in release 7.2.1) Impact: The SBC was unable to retrieve a parked call. The call was not working correctly because the NRMA process had incorrectly swapped PSP information on the call legs. Root Cause: This is a new call scenario being implemented for the MS Teams interop. Steps to Replicate: Run a test call in the MS teams for call park and retrieve. Platform/Feature: SBC: MS Teams | The code is modified to correctly process PSP information on the different call legs during parking and retrieving a call. |
26 | SBX-92160 / SBX-91907 | 2 | Portfix SBX-91907: The SBC fails to mount a cinder volume on first boot. (Originated in release 8.1.0) Impact: The SBC fails to mount a cinder volume on first boot. Root Cause: The bootcmd instruction to mount the volume was executed before the cinder volume was attached as part of instance creation. The cinder volume was not mounted on first boot and as a result, the SBC results in a failure. Steps to Replicate: Launch the SBC instance with a cinder volume attached and ensure volume is mounted properly. Platform/Feature: SBC | The code is modified to wait until the cinder volume is detected and then proceed with the mount. |
27 | SBX-92414 / SBX-91820 | 2 | Portfix SBX-91820: In crank back scenarios, the SBC is taring down the SRS call even before the CS call is torn down.(Originated in release 7.2.1) Impact: The SBC was immediately disconnecting the SRS call after establishing the SIP Rec session with the next available SRS. The initial SRS responds with a failure 4xx response. Root Cause: The SBC, after finding the next reachable SRS when the initial one has failed with 4xx response, creates a new SIP Rec Call Block data matching to new SRS. In the older version of the SIP Rec Call Block, the state machine was invoked with a incorrect event. The incorrect event in the state machine was causing the deletion of old SIP Rec Call Block along with deleting the new SIP Rec Call Block. Steps to Replicate: 1. Create a SRS Group with three SRS Servers. 2. Configure the num streams to 2. 3. The SBC tries to send SRS Invite to first 2 SRS. 4. Send the 4xx response from the first SRS and 2xx response from the 2nd SRS. 6. After receiving the 4xx response, the SBC tries to send new INVITE to 3rd SRS. 7. Send a 2xx response from 3rd SRS. 8. At this step, after ACK towards 3rd SRS, SBC immediately sends BYE to 3rd SRS. Platform/Feature: SBC | The code is modified to invoke the State machine with a proper event so that only the old SIP Rec Call Block data is removed and the new SIP Rec Call Block data is retained. This avoids immediate disconnection of new SIPREC Call that is established with the second SRS. |
28 | SBX-91036 | 2 | A DTMF transcoding caused the call to disconnect. Impact: A certain percentage of the traffic (5%of the calls) are failing due to an incorrect DTMF payload being sent by BROADSOFT. Root Cause: The SBC was expecting that for a single HD CODEC entry in the 200 ANSWER, the Peer/Endpoint must send a matching 16K DTMF payload as per the RFC standard. But the BROADSOFT server at the Egress side is non compliant and sending a 8K DTMF, which is causing the call disconnection. Steps to Replicate: 1. Enable the DTMF either on both the legs and Different Transcode Flag. 2. Send the PCMU with DTMF 8K from Ingress leg. 3. From Egress side, send the PCMU without any DTMF. 4. Ensure that the call is transcoded. Platform/Feature: SBC | The code is modified so the strict check is now relaxed and for single codec entry, the SBC does not match the DTMF clock with the codec clock frequency. |
29 | SBX-91985 | 1 | The SIP calls drop with vertical service code *65 after a minute. Impact: The SBC is not able to send ACK to the Egress for call to connect. Root Cause: A logical error when combined with multi features (e2eAck, e2eReInvite, and DLRBT). Steps to Replicate: - Configure the e2e Ack, e2e reInvite, and
- Egress response 183(sendrecv), 183(onhold), 180(no SDP), 200OK(sendrecv).
- Peer change the SDP in 18x/2xx response causing internal offer/answer.
- Ingress peer sends the reInvite right after ACK, causing internal state not able to send ACK out.
Platform/Feature: SBC | Correct logical errors when multi features e2e ack, e2e reIvnite, and DLRBT |
30 | SBX-91552 | 2 | Q.850 reason header has a grammar issue. Impact: Invalid format in the reason header in 500 message. Root Cause: When the reason header transparency is enabled, a bug appears in the code. Steps to Replicate: Enable the Reason header transparency along with ANM to CPG feature. Platform/Feature: SBC | The code is modified so that even when transparency is enabled, the Reason header is sent out in the correct format. |
31 | SBX-92658 / SBX-91599 | 3 | Portfix SBX-91599: There was a ASAN stack-buffer-overflow on the address in the StrNCpyZ. Impact: There is an array, which is being used with string specifier and is not null terminated, which causes the overflow problem. Root Cause: A buffer overflow. Steps to Replicate: The steps are not reproducible. Platform/Feature: SBC | The log is removed to stop the buffer overflow. |
32 | SBX-92660 | 1 | The SBC failed over DEADLOCK detected and a ScmP core was generated as a result. Impact: Access the NULL pointer in NRMA when deleting a tone profile. Root Cause: The given targets name does not exist. Steps to Replicate: Use CLI command to delete the non-existing announcement tone profile. Platform/Feature: SBC | The code is modified to validate the return value from lookup function before accessing the value. |
33 | SBX-92115 | 1 | Impact: The SCM process may core dump when the SIP signaling port is out of service, and if calls are in progress and a SIP transaction timeout occurs. Root Cause: If the SIP signaling port is out of service, and if calls are in progress and a SIP transaction timeout occurs. Steps to Replicate: The steps cannot be replicated. Platform/Feature: SBC | The code is modified to check that the SIP signaling port is in service when handling SIP transaction timeout events. |
34 | SBX-92621 | 2 | *BrmRedBresAlloc messages are overloading DBG logs. Impact: BRM redundancy messages were filling up DBG logs. Root Cause: Those were debug messages to help debug resource leaking issue. Steps to Replicate: Use regression test only. Platform/Feature: SBC | Downgraded the related BRM redundancy messages to INFO/Minor level to avoid overloading the DBG logs. |
35 | SBX-91952 | 2 | Oracle Java JDK vulnerabilities were observed for Nessus scans. Impact: The Nessus Scan was reporting that embedded java in Oracle database has security vulnerabilities. Root Cause: Oracle 12c has Java 1.6.0_75 embedded. Steps to Replicate: Run a Nessus scan and the earlier vulnerability will go away. Platform/Feature: SBC | Upgraded the Oracle 12c 12.1.0.2 embedded java to 1.7.0_221 using the patch provided by Oracle. |
36 | SBX-91570 | 2 | Calls from MS Teams may have an audio loss for 30 seconds and then switch-over. Impact: If there is an SBC switch-over after the call is established, there can be a delay (for example, 30 seconds) when re-establishing the media from the PSTN to MS Teams. Root Cause: The stored SSN value does not get updated before the SBC switch-over occurs, and it causes the SSN to jump backwards after a switch-over, which causes the one way audio issue until the SSN value increments past the previously set value. Steps to Replicate: Perform a switch-over after the LRBT is played and check that there is no one way audio issue. Platform/Feature: SBC: MS Teams | After the LRBT is played, the latest SSN value is sent to the standby SBC so it can correctly jump the SSN forward on a switch-over and the media flow continues without delay post switch-over. |
37 | SBX-90875 | 2 | The LSASBX71 switched over and causes both sides to core. Impact: A bug in GW Signaling code can cause a core when GW Signaling Links are bouncing. Root Cause: A bug in GW Signaling code can cause a core when GW Signaling Links are bouncing. Steps to Replicate: The steps are not reproducible. Platform/Feature: SBC | The GW Signaling code is modified to prevent a core. |
38 | SBX-91750 | 1 | Observed "SamProcess" core dump on an active box while running SIP-GW (cyclic) calls. Impact: The SBC may core if the GW Signaling Port configuration is disabled while GW Signaling Link is up. Root Cause: The core is caused by an attempted NULL pointer access. Steps to Replicate: Disable the GW Sig Port while GW Sig Link is up. Platform/Feature: SBC | The code is modified to check for NULL pointer to GW Signaling Port before attempting to access this pointer. |
39 | SBX-91772 | 2 | The application is generating "User Error: monitoring/0/101 PAM authentication succeeded" in .SEC file. Impact: The SEC log records all successful PAM authentication, which is causing the disc to fill. Root Cause: Due to constant value re-organization, successful PAM authentication has been mistakenly logged in to SEC log. Steps to Replicate: - Ensure that logs are configured at MAJOR level.
- Put a TLS load on the SBC.
Many of the similar lines in the SEC log, as shown in the example below: 154 07092019 155039.345656:1.01.00.56147.MAJOR .CHM: *User Error: monitoring/0/101 pam authentication succeeded via rest
- Apply the same procedure in a fix version SBC and those lines will not be seen.
Platform/Feature: SBC | The code is modified to exclude a successful case when logging in PAM authentication failures. |
40 | SBX-92386 | 1 | When running the 7.2.1R2 release, the SBC is responding with 'a=inactive' instead of 'a=sendrecv' in a 200OK SDP to late media re-invite, causing no audio. Impact: It was not RFC compliant to send a=inactive to the late media re-INVITE after peer put the SBC on hold. Root Cause: A missing requirement. Steps to Replicate: Step 1: Generate SIP scripts for a call flow. Step 2: Setup 7.2.1 system without a fix. Step 3: Run the call flow to see that the problem is observed. Platform/Feature: SBC | The code is modified to send a=sendrecv to make it RFC compliant. |
41 | SBX-93389 | 2 | The MS Teams call flow when using hold/resume then transfer causes SCM crash. Impact: When music on hold is used in the deployment and a call is put on hold/resumed and then transferred, the call is causing the SBC to coredump in the SCM process. Root Cause: The SCM process was de-referencing a null pointer. Steps to Replicate: Music on hold is used in the deployment and a call is put on hold/ and then transferred. Platform/Feature: SBC: MS Teams | The code is modified to validate the pointer as not null before trying to use it. |
42 | SBX-92980 / SBX-92484 | 2 | Portfix SBX-92484: The SBC is dropping the 2nd codec for a text stream when the sendOnlyPreferredCodec flag is enabled. (Originated in release 8.1.0). Impact: The SBC was dropping the second payload for a text stream if the "Send Only Preferred Codec flag" was enabled and the offer answer contains both t140 and red as payloads for this stream. Root Cause: The "Send Only Preferred Codec" flag's logic was applied even to a text stream that resulted in the SBC picking the first codec and dropping the other. Steps to Replicate: 1. Bring up the setup for an A-B call. 2. Enable the flag t140 on both PSPs. 3. Enable the flag sendOnlyPreferredCodec on both IPSPs. 4. Send INVITE from A with both Audio and text media stream with 2 codecs for text(t140 & red). 5. Send 200 OK from B with both Audio and text media stream with 2 codecs for text(t140 & red). Both of the payload is received through the t140 and red is received and no payload is dropping. Platform/Feature: SBC | The code is modified to exclude text stream from "Send Only Preferred Codec" logic. |
43 | SBX-92580 | 2 | The SIP Domain is missing in the FROM header after an upgrade. Impact: The DM rule for the FROM Uri is not working. Root Cause: Introduced in a previous release to treat the FROM Uri for theRewriteIdentity only. Steps to Replicate: Configure the PSX for FROM Uri, and a SIP-SIP call. Verify the FROM header is picking up the DM rule of FROM Uri. Platform/Feature: SBC | The code is modified to support the old behavior for allowing the FROM URI taking effect, even when RewriteIdentity is disabled |
44 | SBX-92918 | 3 | Inconsistent handling of the SDP in 200 OK on an egress SIP leg. Impact: "Send Updated SDP in 200OK" was enabled and GW-GW call will fail when the 2xx response SDP is different from the previous 18x response. Root Cause: The feature flag "Send Updated SDP in 200OK" is applicable for SIP-SIP call only. Steps to Replicate: Turn on the flag, make a GW-GW call where the 200OK SDP is different from the previous 18x response. Platform/Feature: SBC | Added logic to disable the feature even if configuration is enabled |
45 | SBX-92470 |
| The SamP has a memory leak. Impact: There is possible slow memory leak in the SAM process when running GW-GW calls. Root Cause: GWFE is leaking a copy of the incoming PDU that was queued internally. Steps to Replicate: The steps are not reproducible. Platform/Feature: SBC | The code is modified to free the memory that was being leaked. |
46 | SBX-92252 | 2 | The SBC was sending an INVITE out for the first user only. Impact: The Native Forking fails to send out on 2nd route. Root Cause: If an incoming call that has capital "CALL-ID", the SBC fails to find the parent incoming call. Steps to Replicate: Configure the native forking feature, and incoming call has capital "CALL-ID". Platform/Feature: SBC | The code is modified so the "CALL-ID" is case insensitive. |
47 | SBX-92585 | 2 | The SBC SWe is dropping packets on the pkt0. Impact: The pkt0 interface stops pinging after a long time. Root Cause: The SWe_NP code has a slow leak when it is in standby mode, causing the pkt0 to get exhausted after sufficiently long time. Steps to Replicate: On a standby node, run a program/utility to send packet out of the interface. Platform/Feature: SBC | Ensure all packets are freed that are read from the KNI devices in SWE_NP code. |
48 | SBX-93056 | 2 | The SBC failed to generate Enum lookup after updating the dynamic metaVariable. Impact: The SBC failed to generate Enum lookup after updating the dynamic metaVariable Root Cause: When the dynamic metaVariable updated for the sipSigPort, the trigger was missing for lwresdProfile and update of sipSigPort IP was not happening that causes the issue. Steps to Replicate: 1.Configure the SBC for A-B call. 2.Create a dynamic metaVariable to add to sipSig port. Example: admin@vsbc1% show addressContext default zone ZONE_ING_V6 sipSigPort
sipSigPort 3 {
ipInterfaceGroupName LIG_ING_V6;
portNumber 5060;
mode inService;
state enabled;
transportProtocolsAllowed sip-udp,sip-tcp;
ipVarV6 lpl_ing;
}
[ok][2018-10-16 15:40:32]
[edit]
admin@vsbc1% q
[ok][2018-10-16 15:40:34]
admin@vsbc1> show table system metaVariableDynamic
CE NAME NAME VALUE
-----------------------------------------------------
vsbc1-10.34.195.109 lpl_egg fd00:10:6b50:5d20::c9
vsbc1-10.34.195.109 lpl_ing fd00:10:6b50:5d20::c7 3. Configure for an Enum call and run an Enum call make sure Enum over sipSigPort and observe an Enum call is successful over sipSigPort. 4. Update the dynanamic metaVaribale lpl_ing to fd00:10:6b50:5d20::ec and restart the SBC and try the call. 5. After updating the metaVaribale lpl_ing to fd00:10:6b50:5d20::ec, the Enum call must be successful.
Platform/Feature: SBC | The dynamic metaVariable trigger is added for lwresdProfile to update sipSigPort IP to fix the issue. |
49 | SBX-93307 | 2 | Configuring the multiple NNI profiles in a single commit does not work. Impact: The following tables are not read correctly by the SIP application, if multiple rows are changed in the same commit in the CLI: E164 Profile SIP Filter Profile NNI Profile Privacy Profile PSX Script Profile SIP Security Profile SIP Param Filter Profile SRVCC STI Profile Root Cause: There was a coding error. Steps to Replicate: - Configure two or more NNI profiles.
- Configure SIP trunk groups using each of the NNI profiles.
- When making SIP calls, the controls on only one of the NNI profiles (the one which is displayed first when running show command) are effective.
Platform/Feature: SBC | The code is modified to process multiple rows in a commit. |
50 | SBX-92092 | 1 | A possible memory leak in the Sam process. Impact: The SAM process will leak memory in the case where a De-REGISTER is received and then within less than 30 seconds, another REGISTER in the same AOR is received. This will only happen if multiple contacts in the AOR flag is disabled. Root Cause: The code does not free certain memory blocks. Steps to Replicate: - Multiple contacts per AOR flag will be disabled
- Do a Register for particular AOR and do a de-register.
- Within less than 30 secs, re-send the registration for same AOR so that SIPFE selects the same preferred slot which was used for registering the same AOR earlier. By registering multiple users with same time period, leak will be reproduced.
Platform/Feature: SBC | The code is modified to free the memory blocks. |
51 | SBX-92387 | 3 | The service instance messages for "Call_Hold" and "Call_Retrieve" are not generated in some GW-GW scenarios. Impact: When a SIP-SBX-GW-GW-GSX-ISUP call is intercepted, if hold/retrieve is received from either side, the SBC does not send service instance messages to the LI server. Root Cause: The SBC is not sending the service instance messages to the LI server. Steps to Replicate: 1. Start the LI server. 2. Initiate the SIP-ISUP call with HOLD from egress. 3. Check LI server logs for service instance msg for hold and retrieve. Platform/Feature: SBC | The code is modified to pass the Hold/Retrieve indications from one GW to other GW. |
52 | SBX-93089 | 2 | Admin credentials are visible to non-root users during PM login. Impact: The credentials for admin were visible to linuxadmin. Root Cause: Previously a shell was invoked by PHP and inside it pamValidator was called with credentials as arguments. Steps to Replicate: Run the following in a session as linuxadmin while - Apply pgrep -a pam; done.
- Log into PM now credentials should not be present in the output of the command.
30131 /usr/local/bin/pamValidator 30131 /usr/local/bin/pamValidator 30131
/usr/local/bin/pamValidator 30131 /usr/local/bin/pamValidator 30131
/usr/local/bin/pamValidator 30131 /usr/local/bin/pamValidator Platform/Feature: SBC | The code is modified so pamValidator takes input from the ENV instead of cmdline . |
53 | SBX-91211 | 3 | "X509_STORE_add_cert failed 0" when multiple certificates are created using the same certificate file. Impact: "X509_STORE_add_cert failed 0" error log is continually logged onto .DBG from the standby (HW only) when a remote certificate is added that does not have a 'success' status. Root Cause: The certificate does not properly exist in CLI, therefore the certificate cannot be properly read from CDB. Steps to Replicate: Create multiple certificates using the same remote. Platform/Feature: SBC | The timer used to import the certificate on the standby now checks the certificate status and successfully exits in cases where the certificate status is not a 'success'. |
54 | SBX-93285 | 1 | Observing a box reboot while the application is coming up as standby after a port-failure. Impact: After a node switchover, the standby node may reboot while the application is coming up. Root Cause: During a node switchover, when application comes up on standby node, the health monitoring for worker thread fails because of an incorrect evaluation of CPU cycles spent by the thread. A failure to health monitoring causes the standby node to reboot. Steps to Replicate: Execute node switchover with the following steps: 1) Bringing down all active ports. 2) Applying the appropriate CLI command. 3) Fail the application on the active node. Platform/Feature: SBC | The code is modified so the health check monitoring for the worker thread is correct. |
55 | SBX-93326 | 2 | Receiving text populated as null in mediaStream2Codec and in callMediaStatus. Impact: When audio and text media call is made, the mediaStream2Codec of text is being populated as null. Root Cause: removed from a fix in a previous release, which has made "mediaStream2Codec" field not to populate for text media. Steps to Replicate: - Bring up the box with the latest SBC build that supports T.140 session.
Enable the following CLI and attach to Ingress and Egress TG's. -set profiles media packetServiceProfile DEFAULT flags t140Call enable
- Send INVITE with Audio+T.140 sessions from UAC.
- Send 200 OK with Audio+T.140 sessions from UAS.
- Send BYE.
Platform/Feature: SBC | The code is modified to include the text stream to populate "mediaStream2Codec". |
56 | SBX-93124 | 3 | The SBC changes the format of P-Access-Network-Info header on the 18x and 200OK. Impact: When transparency is enabled in the P-Access-Network-Info Egress and received by P-Access-Network-Info in the 18x, the message forwarded to the ingress has an incorrect syntax. Root Cause: A logical error related to double quote string parameter was causing a syntax error to be sent out. Steps to Replicate: - On SIP-SIP call, enable the header P-Access-Network-Info transparency.
- Egress receives P-Access-Network-Info in 18x and forwards to the ingress with an incorrect syntax.
Platform/Feature: SBC | The code is modified to correct the logical error. |
57 | SBX-93553 / SBX-93469 | 1 | Portfix SBX-93469: The DFW1-CASBC-02 Box A had a SCMP coredump. (Originated in release 7.2.3) Impact: The SBC cored when accessing Box A, switching over to Box B instead. Root Cause: Enabling the SDP transparency and the directMediaAllow to show a simple 18x response from the peer may cause a core dump due to access from an invalid address. Steps to Replicate: Disable either the SDP transparency or the directMediaAllow. Platform/Feature: SBC | The code is modified to ensure it does not have access with an invalid address. |
58 | SBX-92155 | 1 | The SBC is releasing the call with 504 when the DLRB and Downstream Forking are enabled. Impact: The SBC releasing the call with 504 when the DLRB and Downstream Forking are enabled. Root Cause: The race condition is not handled properly. When first 180 message without SDP is received, the forking list and stored the message were updated. The second time the 180 message with SDP was received, the forking list and stored the 180 message were updated, but since RTP learning was applied earlier, it was not replicated again. Steps to Replicate: Send the RTP before sending the 180 Ringing (CSeq: 961529 INVITE RSeq: 629928). Platform/Feature: SBC | If RTP learning happens before the corresponding 18x message with SDP is received, save the SDP into a queue of possible SDPs to cut-thru for use while 200 OK is received. |
59 | SBX-93476 | 2 | Fix the double free scenario in NAT and in a multicast scenario. Impact: There will be a random SWe_NP core dump when either NAT is enabled or the LI is enabled at peak loads. Root Cause: There was double free of mbuf pointer, which can cause corruption. Steps to Replicate: Run calls with the LI or NAT enabled at a peak load. Platform/Feature: SBC | The code is modified to fix the double free of mbuf pointer. |
60 | SBX-93566 | 1 | The WALL Signaling PSBC10A01 cored. Impact: When the MRF Modify is received, the MRFRM fsm state must be OA_ACTIVE. But in this issue, the state is leading to incorrect typecasting. Root Cause: The defensive was checked. Steps to Replicate: Run the MRF load. Platform/Feature: SBC | When the MRFRM is in OA-NULL state, the call must not be in connected state. |
61 | SBX-93325 / SBX-93175 | 2 | Portfix SBX-93175: Receiving a null in the mediaStream2Codec and in the callMediaStatus. (Originated in release 8.1.0) Impact: When a audio+ text media call is made, the mediaStream2Codec is being populated as null. Root Cause: Text has been removed through a fix in a previous release, which has made "mediaStream2Codec" field to not populate for text media. Steps to Replicate: - Bring up the box with the latest SBC build that supports T.140 session.
Enable the following CLI and attach to the Ingress and Egress TGs. -set profiles media packetServiceProfile DEFAULT flags t140Call enable
Send INVITE with Audio+T.140 sessions from UAC. Send 200 OK with Audio+T.140 sessions from UAS. Send BYE.
Platform/Feature: SBC | The code is modified to include the text stream to populate "mediaStream2Codec". |
62 | SBX-93551 / SBX-69412 | 3 | Portfix SBX-69412: o= version was not incrementing. (Originated in release 6.0.0) Impact: The SBC responds to an Update without an incremental SDP session version. Root Cause: Enable the "Only Selected Codec in Session Refresh", peer answer the SDP in 18x, and send an Update with a different SDP. However, the SDP version did not increment. Steps to Replicate: Enable the "Only Selected Codec in Session Refresh", peer answer the SDP in 18x, and send an Update with a different SDP. Platform/Feature: SBC | The SBC responds to an UPDATE with a different SDP in a previous Invite. The SBC correctly increments the SDP version. |
63 | SBX-93492 / SBX-90711 | 2 | Portfix SBX-90711: ELT: Observed Negative accepted packets at the "request sbx xrm debug command \ -stat". Impact: Observed a negative packet count for the ACL and aggregate ACL while running CLI commands. Root Cause: We were using an incorrect format specifier. We were using %d to print an unsigned long instead of %u. Steps to Replicate: Tested with pumping packets to specific ACL. The counters are working as expected. Platform/Feature: SBC | Corrected the format specified usage. |
64 | SBX-93714 | 2 | Unable to configure more than 2 IPIFs into 1 IPIG. Impact: Cannot create 4 IP Interfaces under a single IPIG in Yellowfin. As Yellowfin has a single NP, a port map needs to be created for all ports on the NP0. Root Cause: During the Yellowfin development, creating 4 IP Interfaces in the same Interface groups was not evaluated correctly. Steps to Replicate: 1. Attempt to create 4 interface groups under the same Interface group. 2. Associate it to other signalling elements such as sipSigPort to validate NP friendly checks. Platform/Feature: SBC | Create a port map for ports pkt2 and pkt3 using the NP0. |
65 | SBX-92780 | 3 | 'request SBC arm debug command' commands stop working after a switchover. Impact: Request the SBC arm debug command help is not working when a switchover was made from active box to standby one. Root Cause: Inside the ArmCsv.c, the CsvMgObjRegisterObject() was not enabled when "request sbx arm debug command help" is configured in Debug Mode. Steps to Replicate: 1. Setup HA. 2. Start both the boxes. 3. Run "request system admin <SBC_NAME> switchover" to do a switchover. 4. Wait for full sync let standby box come as active. 5. Run "request SBX arm debug command help" on the new active SBC (former standby SBC). Platform/Feature: SBC: CLI, confd | Enable the CsvMgObjRegisterObject(&armCsv->csvCb, "/sbx/arm/debug") function. |
66 | SBX-93255 | 2 | Unable to change the Source Port to any port on the EMA. Impact: Unable to change the Source Port to any port on the EMA. Root Cause: The source port attribute is validated as an integer instead of a Alpha Numeric. Steps to Replicate: - Successfully verified the loading of the EMA Application.
- Successfully changed the SourcePort number from 'any' to 'int' and 'int' to 'any'
Platform/Feature: SBC | The code is modified to validate source port as type Alpha Numeric instead of an integer. |
67 | SBX-93287 | 2 | The SBC was not responding to 483 for PRACK with the Max-Forwards=0 and rfc7332ValidateMaxForwards enabled. Impact: If the SBC received a PRACK request with the Max-Forwards header value as zero, the SBC was not rejecting the request with 483 error response. Root Cause: The part of code was missed from the code merge from 7.2 to main branch. Steps to Replicate: Test steps: 1. Send PRACK with Max-Forwards 0. 2. SBC is rejecting it with 483 Error response. Platform/Feature: SBC | The code is modified to handle Max-Forward with 0. |
68 | SBX-91154 | 2 | There is a call failure due to a FQDN in the request URI. Impact: When the SBC sends a query for SRV record to the external server and the Peer Domain in the reqURI is disabled, the SBC intermittently sends a FQDN in the request URI of egress INVITE. The correct behavior is to send an IP and address in reqURI of egress INVITE. Without a fix, the SBC will send a FQDN in reqURI even when Peer Domain in reqURI is disabled. Root Cause: The SBC does not use a formatted SIP message when the external query is made for finding the SRV record and a record is found in the cache. As a result, the SBC cannot apply the "Peer Domain in ReqURI" flag in the egress SIP message. Steps to Replicate: - Use the following configurations on the PSX:
- Set the IP PEER as FQDN abc.com instead of IP address.
- Enable "noPortNumber5060" on the IPSP (This is for done for NAPTR, SRV query)
- Disable "Peer Domain in the reqURI " on IPSP (This is done to ensure FQDN is not sent in egress INVITE's reqURI)
- Use External DNS server.
- Configure SRV record and A record on the external DNS server with different Time To Live values.
- Run high number of calls.
- With fix, the SBC is sending IP and Port for all the calls since Peer Domain in ReqURI is disabled.
Platform/Feature: SBC | The code is modified to have the SBC use the saved formatted SIP message when the external DNS query is made for SRV record and a record is fetched from the cache. This allows the SBC to apply the "Peer Domain in ReqURI" flag in the egress SIP message. |
69 | SBX-93312 | 1 | The SBC Memory has High alerts. Impact: When the Local Ring back tone is configured on the SBC and egress endpoint sends a 183 Session Progress with SDP followed by a 180 Ringing, the ScmProcess does not free up memory allocated even after call is completed. Without a fix, the ScmProcess will leak memory. Root Cause: When the Local Ring back tone is configured on the SBC and egress endpoint sends a 183 Session Progress with SDP followed by a 180 Ringing, the ScmProcess does not free up memory allocated even after call is completed. Steps to Replicate: Run a call load with the Local Ring back tone configured and monitor the virtual memory usage of the ScmProcess. With a fix, the virtual memory of ScmProcess must not be high after all calls have been disconnected. Platform/Feature: SBC | The code is modified to ensure the memory allocated for packet service profile structure is freed when no longer required. |
70 | SBX-91899 | 1 | SBCv6 Unexpected 183 (CPG) sending - out of PER6608 spec. Impact: Early cut through may not work for trusted configured RTP Servers on system restart. Root Cause: The system restores the SIP service group data before the RTP Server data which is incorrect. Steps to Replicate: Provisioned the rtpServerTable (OLIVER_RTP_SRV_TBL), and associated it which the egress sipTrunkGroup SBXSUS9_LABSIP2 (as shown below): admin@sbxsus9> show configuration details addressContext default rtpServerTable OLIVER_RTP_SRV_TBL rtpServer 10.8.20.75 32; admin@sbxsus9> show configuration details addressContext default zone ZONE4 sipTrunkGroup SBXSUS9_LABSIP2 media earlyMedia method rtpServerTable; rtpServerTableName OLIVER_RTP_SRV_TBL; forkingBehaviour lastReceivedSdp; Platform/Feature: SBC | Fixed the ordering of the initialization procedure to restore the RTP server profile configuration data before restoring the SIP service group data. |
71 | SBX-93562 / SBX-93355 | 2 | Portfix SBX-93355: P-Charge-Info header not relayed by the SBC in out-of-dialog MESSAGE request even though the transparency setting is enabled. Impact: P-Charge-Info Header is not relayed transparently for OOD Message even though Transparency profile is enabled for P-Charge-Info. Root Cause: P-Charge-Info Header is dropped in case of relay framework. Steps to Replicate: Run the message OOD which has P-Charge-Info Header in the incoming Message and Transparency is enabled for that header. Platform/Feature: SBC | P-Charge-Info Header is copied in case of relay framework. |
72 | SBX-92611 | 1 | Outbound call Failing with 488. Impact: Transcode call, after 40 onhold/offhold, call fail. Root Cause: Internal process Nrma TransactionId did not reset properly after wraparound (12 bits limit). As resulted, it is sending the same transactionId for allocating DRM resources for both Ingress and Egress legs. DRM reject due to duplicated transactionId. Steps to Replicate: sip-sip call with transcoding. Call fail after 40 onhold/offhold. Platform/Feature: SBC | Properly reset the TransactionId when it reach 12 bit limit. |
73 | SBX-94141 | 2 | Call Transfer call to PSTN gets failed second time ,when MOH is played in the initial call. Impact: After multiple holds and resumes, if the first call transfer fails due to reject by transfer target then the transferee and transferer are reconnected successfully. For any subsequent call transfer, the SBC is rejecting the call transfer request. Root Cause: Since, the first call transfer failed, the SBC tries to reconnect the original call. As part of this, the original call is not moving to the stable state. So, any call transfer request in such state is getting rejected by the SBC. Steps to Replicate: 1.TEAMS to PSTN1 call 2.TEAMS hold and resume the call 3.TEAMS transfer call to PSTN2 4.PSTN2 rejects the call 5.TEAMS resume the call and transfer again to PSTN2 Platform/Feature: SBC | Added missing code to move the original call state to the stable state during re-connection. |
74 | SBX-93475 | 2 | IngressIpPrefix data deleted when removing SMM from TG. Impact: IngressIpPrefix data deleted when removing SMM from TG Root Cause: When deleting SMM Profile, code is there to delete ipPrefix data as well Steps to Replicate: Remove a SMM rule from the TG in the EMA it also deletes the ingressIpPrefix metadata causing ingress calls to fail. Platform/Feature: SBC | Added checks not to delete ipPrefix data when we delete the SMM Profile. |
75 | SBX-93394 / SBX-92554 | 3 | Portfix SBX-92554: TTY is not enabled for EVRC and EVRCB in the H/W SBC. Impact: TTY was not enabled for transcoded calls of EVRC and EVRCB codec in the SBC 52x0 and SBC7000 and SBC54xx. Root Cause: TTY was disabled for unknown reasons. Steps to Replicate: - Setup EVRC/EVRCB<=>g711 call.
- Send media with TTY characters from G711 side.
- Observe the PCAP of EVRC/B. TTY has special code points in the EVRC/B. Before the fix, TTY signals were encoded as EVRC codec media. With the fix, you will observe TTY special code points in PCAP.
Platform/Feature: SBC | Enable the TTY. There is no API/CLI to enable TTY. |
76 | SBX-93601 | 3 | MS Teams Call Park has an intermittent failure. Impact: In a Microsoft Teams environment, Microsoft has a bug in the client code that can randomly cause messages to be sent out of sequence. For example, when trying to transfer calls, Microsoft can send REFER and then INVITE with a=inactive afterwards. The out of sequence message processing was causing processing issues on the SBC and the call did not complete. Root Cause: Microsoft agrees that their message sending is broken and are working on a fix. Steps to Replicate: Repeatedly run Microsoft Teams Call Park scenarios. The problem is not always reproducible and is possibly dependent on the Microsoft server and location of the associated client. Platform/Feature: SBC: MS Teams | The code is modified to be more defensive against the out of sequence messaging, such as: 1) Reject the INVITE with 491 if REFER is being processed on a call leg. 2) Reject the REFER if the SBC has an outstanding INVITE waiting to be sent. |
77 | SBX-93532 / SBX-93473 | 2 | Portfix SBX-93473: The SBC is core dumping when the diversionHistoryInfoInterworking flag is enabled in the egress IPSP. Impact: When the interworking diverts Diversion Headers to History Info for Japan NNI, on a call where ingress SIP performs an INVITE/UPDATE due to preconditions, the SBC core dumps. Root Cause: The cause is from a code bug. Steps to Replicate: Make an SIP-SIP call where ingress side has preconditions, such that INVITE/UPDATE sequence is needed. The received INVITE will contain Diversion headers. Egress side is configured with an NNI profile attached to the trunk group with historyInfoInterworking enabled. Platform/Feature: SBC | The code is modified to no longer core dump. |
78 | SBX-93608 / SBX-91787 | 2 | Portfix SBX-91787: Debian vulnerabilities are observed for Nessus scans. (Originated in release 7.2.2) Impact: Nessus scan display vulnerabilities. Root Cause: Many packages are out of date, which can cause vulnerability. Steps to Replicate: Run Nessus scan. Platform/Feature: SBC | Packages and kernels are updated to fix this issue. |
79 | SBX-94062 | 2 | Unexpected INFO was received. Impact: DTMF inter-working from RFC 2833 to SIP INFO was not generating signal event packets and only signal-update are coming on the SWe. Root Cause: On the SWe, due to endian mismatch from low level platforms to SIP applications, the signal event was not raised. Steps to Replicate: Enable the DTMF inter-working and send the 2833 media from one-leg, observe the SIP signal, signal-update events on the other leg. Platform/Feature: SBC | The code is modified so that the signal event is generated correctly. |
80 | SBX-90831 / SBX-89860 | 2 | Portfix SBX-89860: There is no bit-exactness across warp for Mode 8. (Originated in release 8.1.0). Impact: In the case of GPU AMRWB 23.85kbps, there is no bit-exactness in the output across warps even though the same input is fed to all the warps. Root Cause: The size of one of the scratch buffers was incorrectly used in a macro. The macro eventually led to memory corruption. Steps to Replicate: The issue was found in the standalone test and cannot be executed outside development. Platform/Feature: SBC | The code is modified by rectifying the size in the macro. |
81 | SBX-90816 / SBX-90312 | 2 | Portfix SBX-90312: ASAN: Heap-buffer-overflow on the address in SipFeGetCseqType. (Originated in release 8.1.0). Impact: This issue was found during ASAN regression testing. While processing the CSEQ header, the code was reading off the end of allocated memory block. Root Cause: The code was expecting the CSEQ string to be null terminated and it was not. Steps to Replicate: This issue is only seen with the engineering ASAN build. Platform/Feature: SBC | The code is updated to correctly handle the case where the CSEQ is not null terminated. |
82 | SBX-94053 | 1 | The P-SBC Openstack installation fails with an OAM node and core dumps. Impact: Upgrade fails if any of the SNMP trap targets are 32 characters in length. Root Cause: Right sized buffer was allocated to fetch data from the database but passed incorrect length field to database API. In the case where the field being fetched has max allowed length, the API fails because the API verifies that there is not enough room to terminate the field with NULL. Steps to Replicate: - Create SNMP trap target of 32 character long.
- Attempt to upgrade.
- The upgrade will fail.
- Perform upgrade with the fix, and the upgrade will succeed.
Platform/Feature: SBC | The code is modified to add the correct buffer length to configuration database APIs. |
83 | SBX-93903 | 3 | Large SIP messages in TRC are divided into several syslog messages to the rsyslog server. Impact: TRC PDU's are broken into multiple syslog messages. Root Cause: There was a limit to the message size of ~1.8K and TRC messages beyond that would be split into multiple syslog messages. Steps to Replicate: - Reproduce the issue.
- Generate TRC files (size>1800) and transfer to remote syslog server.
- Single TRC is broken into multiple syslog messages.
Platform/Feature: SBC | The code is modified to transfer a complete TRC PDU as one syslog message. |
84 | SBX-93548 | 2 | When the transfer call is not answered from PSTN, MS TEAMS client is unable to resume the existing call. Impact: In a Microsoft Teams call flow where the call gets transferred and the C-party has back a 180 without the SDP, which triggers the SBC to play RBT and then C-party sends 183 with SDP and finally rejects with a 6xx, it can result in the SBC internally getting into a bad state. This results in the SBC not being able to resume the call and the call getting released. Root Cause: The resource management in the SBC was getting confused on the packet service profile for the various call legs that lead to the call being released. Steps to Replicate: 1.TEAMS to PSTN1 call. 2.TEAMS transfer call to PSTN2. 3.PSTN2 does not answer the call. 4.TEAMS resume the call and transfer again to PSTN2. Platform/Feature: SBC | The code is modified to correctly manage the packet service profile and other call leg information so it can correctly handle the transfer rejection from C-party. |
85 | SBX-93993 | 2 | The Quality of Announcement tone played by the SBC is bad. Impact: Bad Announcement quality. Root Cause: A software bug in DSP was resetting the first sample of every announcement frame to zero. Steps to Replicate: 1. The set-up requires the SBC and the PSX. A PSX script is implemented, which has information about what announcement to play and DTMF digits that need to be entered to switch to the second stage of the call. 2. Client makes a call to the SBC. In the first dip, the SBC plays the announcement configured in the script and waits for DTMF digits to be entered. 3. A route is present in the PSX for DTMF digits entered. 4. After entering digits, the PSX now goes for second dip for the new digits entered and returns a route to the SBC. 5. With this route, the SBC calls Egress end point 6. Monitor the announcement quality played at step #2. Platform/Feature: SBC | The code is modified to not remove the first sample. |
86 | SBX-90752 | 2 | The ASAN creates a global-buffer-overflow on the address in s_finish. Impact: This issue was found during ASAN regression testing. The coding was reading from invalid memory block during the process of a CDB transaction completion event. Root Cause: The code was looking for CDB worker socket that matched with the CDB transaction completion event and in a case where the worker socket did not exist,the code was reading off the end of an array. Steps to Replicate: Run the SVT test suite using a ASAN specific build. Platform/Feature: SBC | The code is modified to ensure it does not read off the end of the worker socket array to prevent the problem. |
87 | SBX-92283 | 2 | Transport the attribute populated twice in the RURI of INVITE request towards the peer, when the To header transparency is enabled. Impact: A call directed to the registered endpoint has duplicated the URI parameters in the RURI. Root Cause: Introduced in a previous release. Steps to Replicate: Configure the TO header transparency. Endpoint registered with contact has multiple RUI parameters. Server makes a call to the endpoint. The SBC sends out an Invite with a duplicated URI parameters. Platform/Feature: SBC | The code is modified to avoid duplicated RUL parameters in the RURI. |
88 | SBX-93262 | 2 | The SBC generates a RTCP goodbye to ingress after the 200 OK. Impact: When Downstream forking is enabled and the Early Media Response is set to "last received SDP", when the call gets answered the resource chain will be re-built and the RTCP BYE will be generated. Root Cause: Root cause lies in feature completed in a previous release. The feature required that if the ingress peer does not have 100 rel support, and egress gets multiple 18xs, then the transcode is forced even though pass through is possible to support codec change. Steps to Replicate: Enable Downstream Forking and forking response as anything except the first prov response. PSPs are setup to perform a transcode only. Platform/Feature: SBC | The code is modified according to the following: 1. Downstream forking is enabled. 2. Early media behavior - non FIRST PROV RESP. 3. One forking dialogue. 4. No SDP is sent in 2xx if the 18x reliable. |
89 | SBX-93103 | 2 | There is no relay of an UPDATE with the SDP when the media mode has changed and when the DRBT is configured. Impact: When the Downstream Forking and DLRBT is enabled, an UPDATE received from the ingress are not going out to egress (UPDATE received after the media cut-thru has happened because of receipt of RTP from egress). Root Cause: If it is marked as OA_COMPLETE, the updates received are sent to the other leg if that other leg is 100rel/PRACK supported. This issue was caused due to some legs not being marked as OA_COMPLETE due to an incomplete implementation. Steps to Replicate: Set Downstream Forking and DLRBT as enabled. Platform/Feature: SBC | The code is modified to mark OA_COMPLETE in all instances where the parallelRingPsp is being appended with the new SDP's received in 18x's. |
90 | SBX-93765 | 1 | CS04A01 lost communication with the CM04A04. Post-recovery, other M-SBCs cannot talk to the CM04A04. Impact: The IPv6 address becomes unreachable in standby port cable pull scenarios. Root Cause: The SWe code was not handling saving the multicast mac address list and re-applying it on the hardware port during a link up/down event for standby ports. Steps to Replicate: - Bring down any standby port by cable pull on host.
- Configure a new IPv6 address on that PKT port.
- Re-insert the cable for same standby port.
- Do a port switchover by plugging out active physical port's cable so that the standby becomes active for same port.
- Ping the new configured IP from in step 2 from outside. The ping will result in a failure.
Platform/Feature: SBC | The code is modified to handle the programming of multicast MAC list for standby ports properly. |
91 | SBX-92342 | 2 | Call diagnostics were not working through EMA. Impact: Call diagnostics fails due to errors in EMA. Root Cause: Call diagnostics fails due to the STDERR for CP commands in dumpCommonFunction. Steps to Replicate: - Open EMA-> Troubleshooting and run call diagnostics.
- Save the call diagnostics.
- Call diagnostics are saved successfully.
Platform/Feature: SBC | The code is modified by redirecting stderr to /dev/null. |
92 | SBX-91196 / SBX-85938 | 2 | Portfix SBX-85938: The SMM tears down the Operation on Early dialog, and the SBC sends CANCEL before completing the 18x transaction. (Originated in release 8.1.0) Impact: The SMM tears down the Operation on Early dialog, and the SBC sends CANCEL before completing the 18x transaction. Root Cause: In case of End2End, PRACK is enabled and SMMTearDownFunctionality was not working as expected. Steps to Replicate: 1.Tested the call by triggering an SMM teardown functionality in Invite, the SBC tear downs the call as per the call flow. 2. Tested the call by triggering an SMM teardown in 180 response where PRACK is mandatory, the SBC tear downs the call by initiating a SMM Teardown as per the call flow (after PRACK-200ok is complete). 3.Tested the call by triggering a SMM Teardown in 200 OK of PRACK. 4.Tested the call by triggering a SMM Teardown in 200 OK of Invite. Platform/Feature: SBC | The code is modified to make the SMM Teardown functionality to initiate and not to take any action if the 18x/PRACK transaction is pending and enedtoendprack is enabled. Once the response of PRACK is received/sent based on the call flow, the teardown is initiated based on the SMMTearDown action state. |
93 | SBX-92778 | 2 | The Edit route action taking a long time to complete. Impact: The Edit Route action was taking long time and failing. Root Cause: Use of special characters, such as # in destination National field, can cause the failure of the Edit route action. Steps to Replicate: - Create Route with special character in Destination National.
- Select the Route that is created in Special Character.
- Edit Form must be load.
Platform/Feature: SBC | A few more special characters to support Destination National field in the Edit route are allowed. |
94 | SBX-93959 / SBX-93366 | 2 | Portfix SBX-93366: The SBC is not able to update a transcode from a pass thru call. Impact: The SBC is not able to update a transcodec call after a pass thru call. Root Cause: In this issue, it is changing from the pass thru to transcode because the sendOnlyPreferredCodec was enabled in the IPSP and in ModifyReq(Ans Side new PSP), it is taking RxPT of old PSP. Steps to Replicate: Tested the call by sending PCMU/G729/PCMA in the 183 call is working as expected. Platform/Feature: SBC | In the NrmaSelectCodecEntryFromPspForXcode() function, adding a condition to overwrite the PT only if it is a valid RxPT(old psp). |
95 | SBX-94171 / SBX-94115 | 1 | Portfix SBX-94115: The I/O scheduler was incorrectly configured after upgrade. Impact: Kernel scheduling issues are causing intermittent issues, including lost pings across the HA interface. The lost pings induce a split brain and subsequent split brain recovery. Transient calls are lost during the split brain and recovery, and depending on call flow, stable calls may be lost as well. Root Cause: The I/O scheduler is being reverted from 'deadline' to 'noop' due the upgrade due to a bug in the upgrade script. Steps to Replicate: After upgrade to 6.2.x or 7.x, verify the scheduler with the following command: cat /sys/block/sda/queue/scheduler The output must show brackets around deadline to indicate it is in use, for example: [root@SBX24-154a log]# cat /sys/block/sda/queue/scheduler
noop [deadline] cfq Platform/Feature: SBC | The code is modified to properly specify the I/O scheduler. |
96 | SBX-94313 | 1 | There is a core dump during an A to B tandem call in (GSX)SIP-gw-gw-SIP(SBX) when the egress IP Signaling Profile is not configured. Impact: The GSX-SIP-Gw-Gw-SIP-SBX has a core dump in the SBC if the egress Signaling Profile is not attached. Root Cause: The issue was found by providing a fix to another issue, not through attempting a call with no egress signaling profile attached. Steps to Replicate: Make an A to B call using the GSX-SIP-Gw-Gw-SIP-SBX and on the egress TG in the PSX. Do not attach the egress Signaling Profile. These steps will result in a core dump. Platform/Feature: SBC | The code is modified to create a zeroed out IPSP and pass it for the system to act on instead of NULL the PTR. When the code looks for specific IPSP flags, none of the flags are enabled, but there is active memory. |
97 | SBX-94118 | 3 | EMA CLI script import stays "In Progress" if the script contains a special character. Impact: EMA CLI script import stays "In Progress" if the script contains a special character. Root Cause: Non printable characters are present in the error message. Steps to Replicate: - Log into EMA Application.
- Click on Administration->System Administration->File upload->Add the files to queue.
- the CLI file that you want import.
- Click on "Upload All files".
Platform/Feature: SBC | Remove Non printable characters from the error message. |
98 | SBX-94089 | 2 | SAM crash on standby SBC (SIPFE stby). Impact: The standby SBC may core when IpPeer Root Cause: When using the IpPeer delete, the function will fail to remove the internal data structure from the hashtable. Later on, the IpPeer will create a new structure again in a different zone, it fails to insert a new data structure into the hashtable and deletes the new data structure. There was a logical error that still has access to the new data structure after free. Steps to Replicate: Create an IpPr from one zone. Delete it and create the same IpPeer in a different zone. Platform/Feature: SBC | The code is modified to fix the initial IpPeer delete issue and ensure not the new data structure is not accessed if it is already freed. |
99 | SBX-94667 / SBX-94580 | 2 | Portfix SBX-94580: The GWSG is missing a svcGrp entry for the TG while a few duplicate entries in the srvcGrpTbl. (Originated in release 6.2.2). Impact: Duplicate entries in the GWSG service group table. Root Cause: The root problem is that the create GWSG does not validate the TG name. Currently, the GWSG only goes through the srvcGrpTbl[] and finds the first empty slot’s index. If the new index != original entry’s index, the NamedInsert() will insert SUCCESS and set duplicate entry at the new location in the table, otherwise the NamedInsert() will return FAILURE and the duplicated entry will be freed. On the standby node, when it is coming up, the GWSG restores all GWSG_SRVC_GRP_STR from the CDB. Once configuration restore is done, the active node will start to sync over all the GWSG_SRVC_GRP_STR, which caused the standby node to have duplicate entries. Steps to Replicate: Refer to /sonus/sw/Specs/TSBX-94580.txt. Platform/Feature: SBC: GW-GW | The code is modified to validate if the specified name is already in the table before creating a new one. |
100 | SBX-93562 / SBX-93355 | 2 | Portfix SBX-93355: P-Charge-Info header was not relayed by the SBC in a out-of-dialog MESSAGE request, even though the transparency setting is enabled. Impact: The P-Charge-Info Header is not relayed transparently for the OOD Message, even though the Transparency profile is enabled for P-Charge-Info. Root Cause: The P-Charge-Info Header is dropped, in case of the relay framework. Steps to Replicate: Run the message OOD that has the P-Charge-Info Header in the incoming Message and Transparency is enabled for that header. Platform/Feature: SBC | The P-Charge-Info Header is copied in case of a relay framework. |
101 | SBX-94320 | 3 | The SBC application is resulting in a failure after switchover. Impact: The SBC results in a failure due to being unable to mount the DRBD post switchover. Root Cause: Post switchover, the DRBD mount failed as one of the DRBD setup command was being run in the background, but this command needs to complete execution before mounting the DRBD. Steps to Replicate: Bring up the SBC and perform a switchover. Verify that the switchover is successful and the SBC application comes up fine on both nodes. Platform/Feature: SBC | The code is modified to run the DRBD command in foreground and then mount the DRBD. |
102 | SBX-94552 / SBX-76669 | 3 | Portfix SBX-76669: With the sipOod set to unlimited, MAJOR errors are displayed in DBG log. Impact: With the sipOod set to unlimited, MAJOR errors are displayed in DBG log. Root Cause: If the sipOod licensedMaxRateLimit is set to UNLIMITED, it was generating a TRAP and MAJOR level logging that is incorrect. Steps to Replicate: Make a OOD call and no MAJOR logs be visible, as presented in the example below: 152 12242018 083916.769675:1.01.00.00493.MAJOR .SIPFE: threshold reached notification for OOD message Rate. Active OOD rate 1 and OOD Rate Limit is 0 152 12242018 083916.769675:1.01.00.00493.MAJOR .SIPFE: threshold reached notification for OOD message Rate. Active OOD rate 1 and OOD Rate Limit is 0 Platform/Feature: SBC: Application, FM/Traps and Alarms | Instead of assigning a value 0 to the variable, the value is assigned to a INTMAX. |
103 | SBX-93931 / SBX-93799 | 1 | Portfix SBX-93799: A SCM process coredump was observed when the sipParamFilterProfile is configured. Impact: This issue is a result of a bug in a previous release (Configuring multiple JJ9030 profiles in a single commit does not work) fix. Root Cause: Reading the Profile XML tag from the confd when the confd iterator is not pointed to a profile. Steps to Replicate: Configure the sipParamFilterProfile as shown below: 1. Set the profiles services sipParamFilterProfile as a Test sipHeader to require action passthru all. 2. The SBC will generate SYS_ERROR when the confd iterator is not pointed to the profile. Platform/Feature: SBC | The code is modified to read XML tag from the confd when the confd iterator is pointed to the profile. |
104 | SBX-87119 | 2 | The SAM Process may core. Impact: The SAM Process cored due to a deadlock occurring in the SIPCM. Root Cause: In o thread, the SSL_CTX_add_session() was trying to do cache cleanup and in another thread the SipCmOpenSSLSSessinCacheCleanup() was trying to do cache cleanup at the same time. If the cache entries exceed 20480, then the SSL_CTX_add_session() will start clearing old cache entries. At the same time, the SipCmOpenSSLSSessinCacheCleanup() is also removing entries from entries from cache. This resulted in deadlock. Steps to Replicate: The steps cannot be replicated. Platform/Feature: SBC | The code is modified to invoke SipCmOpenSSLSSessinCacheCleanup() only in standby mode. |
105 | SBX-94146 / SBX-93092 | 3 | Portfix SBX-93092: The npLogRotate (np log rotation) must occur on the basis of a log file size. Impact: A New SWe_NP log used to be created everyday and used to get rotated after 10 log files. The rotation allowed very limited timeframe for SWe_NP debug log capturing. Root Cause: The setting in npLogRotate was causing the issue. Steps to Replicate: Analyse the SWe_NP debug logs. Platform/Feature: SBC | Create a new SWe_NP log file when a previous file has exceeded certain size (i.e 50M) and not on a daily basis. |
106 | SBX-91727 / SBX-91425 | 2 | Portfix SBX-91425: Low MOS score on the ingress leg when both legs are recorded with LI. Impact: Random bserved, when the called and calling number are set as LI during transcoded calls. Root Cause: An uninitialized field of structure that is used to hold the incoming packet from DSP in SWe_NP was causing this behavior of a random packet drop. Steps to Replicate: - Setup was called and calling number as LI.
- Run the transcoded call.
Platform/Feature: SBC | Initialize the field correctly. |
107 | SBX-94255 | 2 | Updated the kernel configuration file that was not installed after the LSWU. Impact: After the LSWU, the kernel configuration and grub menu is not updated properly as mentioned Root Cause: Missing the kernel configuration and an invalid grub menu. Steps to Replicate: Perform the LSWU and verify the grub menu and kernel configuration file in /boot. Platform/Feature: SBC | Updated the grub menu and copied the kernel configuration after the LSWU. |
108 | SBX-92346 / SBX-90722 | 2 | Portfix SBX-90722: There was an inconsistency in generating the sonusSbxTrunkGroupOutOfResourcesNotification2 trap. Impact: There was an inconsistency in the sonusSbxTrunkGroupOutOfResourcesNotification2 trap generation the MTRG CAC. Root Cause: Once the CAC resource usage reaches 100%, the SBC internally marks the congested flag and generates sonusSbxTrunkGroupOutOfResourcesNotification2 trap. During a call release, if the available/free CAC resource reaches above 15%, the SBC must disable the congestion flag. However, the SBC failed to disable/reset internal the congestion flag once the free resource reaches above 15% due to the failed generated trap. (This issue occurs only when the TG's cac callLimit is set to unlimited). Steps to Replicate: Procedure: 1. Run 10 calls. 2. Disconnect 2 calls. 3. Run another 2 calls. 4. Disconnect 2 calls. 5. Run another 2 calls. Expected Result: 1. Trap must be generated when receiving the 10th call. 2. A disconnected call must be successful. 3. When receiving the 2nd call, trap must be generated. 4. Call disconnec 5. When receiving the 2nd call, trap must be generated. Platform/Feature: SBC | The code is modified to ternal congestion flag when the CAC free resource reaches above 15%. |
109 | SBX-92243 | 3 | Upgrade failed from 7.1R0 to 8.1R0. Impact: An upgrade failed between 7.1R0 to 8.1R0. Root Cause: A mandatory node /eventLog{memusage}/servers{server1} is not created with an upgrade code. Steps to Replicate: The steps cannot be replicated. Platform/Feature: SBC | The code is modified to create a /eventLog{memusage}/servers{server1}. |
110 | SBX-91729 / SBX-91467 | 2 | Portfix SBX-91467: The SBC fails to populate statistics in the callCurrentStatistics under zone for the trunkgroup towards MRF. (Originated in release 8.1.0) Impact: The SBC fails to populate statistics in the callCurrentStatistics under zone for the trunkgroup towards MRF. Root Cause: There was code missing to populate statistics in the callCurrentStatistics under zone for the trunkgroup towards MRF Steps to Replicate: 1) UAC sends an Invite with the PCMU. 2) UAS sends 180 Ringing without the SDP. 3) UAS sends 200 OK with the PCMA. 4) SBC sends an Invite with the m1=PCMU m2=PCMA towards the MRF. 5) MRF responds with 200 OK with m1=PCMU and m2=PCMA. 6) A PCMU-PCMA transcoded call is established. 7) Check the trunkgroupStatus for the TG towards MRF. 8) Check the callCurrentStatistics for the TG towards MRF. Platform/Feature: SBC | The code is modified to increment the callCurrentStatistics on the MRF legs. |
111 | SBX-92473 / SBX-91508 | 2 | Portfix SBX-91508: The ASAN frees SipSgClearOtherForkedCalls. (Originated in release 8.1.0) Impact: As part of the Call Forking testing, the SBC sends multiple requests as part of forking. When one of the forked leg answers the call, the SBC tries to clear the other forked calls. While clearing/releasing the call, some of the elements in the CCB forked structure are accessed/set even after the structure is freed. Root Cause: This issue was reported as a part of the ASAN Testing on Call Forking regression suite in the SBC lab. Steps to Replicate: This issue was reported as part of Call Forking feature with regression testing. Platform/Feature: SBC | The code is modified to release the CCB forked structure at the end (after all the elements in the structure are accessed/set with the correct values). |
112 | SBX-91893 | 2 | The NOA fields for the redirecting number and the original called number are not supported in the SBC. Impact: The NOA fields for redirecting number and original called number are not supported in X2 interception in the Service Instance messages and the Signaling Start messages. Root Cause: The following message types were never supported for NOA on the SBC: Service Instance messages: Calling Party Number Called Party Number Redirected From Party Number Redirected To Party Number Signaling Start messages: Calling Party Number Called Party Number Last Redirecting Party Original Called Party Steps to Replicate: The steps cannot be reproduced. Platform/Feature: SBC | A new CLI is added to support this feature. set addressContext default intercept callDataChannel <cdc_name> noaParamSupport enabled/disabled
|
113 | SBX-93767 / SBX-93490 | 3 | Portfix SBX-93490: The SBC duplicates the supported header in the outgoing OPTIONS. Impact: The SBC duplicates the supported header in the outgoing OPTIONS. Example: Supported: timer,100rel,199,precondition,replaces,gruu Supported: timer,100rel,199,precondition,replaces,gruu Root Cause: When the gruu parameter was present, there was a logical issue in software that adds one additional Supported Header. Steps to Replicate: For the Registered Endpoint, an OPTIONS message coming with supported Header having gruu parameter will cause this issue. Platform/Feature: SBC | The code is modified so a duplicate entry is created for the supported Header. |
114 | SBX-93687 / SBX-93572 | 2 | Portfix SBX-93572: There was a LeakSanitizer in the NrmaSessDescClone. Impact: There was a memory Leak while running the NrmaSessDescClone. Fax transmissions cannot be performed with T.38 relay mode, when the trunk group is configured as T.38FallbackToG711 and uses voice codec in the G.711-REGR. Root Cause: As part of Additional offer creation, memory is getting added for session attributes and is not getting freed. Steps to Replicate: Fax transmissions cannot be performed with T.38 relay mode, when the trunk group is configured as T.38FallbackToG711 and use a voice codec in the G.711-REGR. Platform/Feature: SBC | Allocated memory is freed. |
115 | SBX-93536 / SBX-93411 | 2 | Portfix SBX-93411: The ASAN global-buffer-overflow on the address in __interceptor_vsnprintf. Impact: This is an ASAN issue regarding the buffer overflow. Root Cause: Boundary conditions are missing, leading to a buffer overflow. Steps to Replicate: The steps cannot be reproduced. Platform/Feature: SBC | The code is modified to add additional boundary conditions. |
116 | SBX-92794 / SBX-92268 | 2 | Portfix SBX-92268: The SBC fails to tear down a call towards the UAS until the 200 OK Invite timeout occurs when the MRF responds with a 3xx message. Impact: The SBC fails to tear down a call towards the UAS until the 200 OK Invite timeout occurs when the MRF responds with a 3xx message. Root Cause: The handling missing when the SBC receives a 3xx from the MRF server. Steps to Replicate: 1) SBC must tear down a call towards the UAS upon receiving a 3xx from the MRF. 2) SBC must not wait for a 200 OK Invite timeout.Platform/Feature: SBC | Disconnect the call immediately when the SBC receives a 3xx message from the MRF server. |
117 | SBX-92336 / SBX-91446 | 2 | Portfix SBX-91446: Observing a MAJOR logs flood related to SipSgRedundDeleteMrfCbData during the SSBC SWO. (Originated in release 8.1.0) Impact: Changing to INFO from MAJOR. Root Cause: Logs listed as INFO were kept as MAJOR. Steps to Replicate: - Initiate 1000 cps of load with 60 CHT.
- Once the calls are stable, initiate the SSBC SWO.
Platform/Feature: SBC | The code is modified to change unwanted MAJOR logs as INFO. |
118 | SBX-91172 / SBX-90844 | 2 | Portfix SBX-90844: The SBC must not add the 100 rel for the 180 Ringing without the SDP. (Originated in release 8.1.0) Impact: The SBC must not add Require:100 rel for 180 Ringing when the other leg does not receive the provided E2E PRACK and the Dialog-Transparency are enabled. Root Cause: The design was changed in between to handle 18x and PRACK leg specific. Steps to Replicate: - Enable the dialogTransparency on both egress and ingress leg.
- Enable the transcoderFreeTransparency flag on PSP.
- Enable the 'downstreamForkingSupport' flag on the egress leg.
- Keep the value of 'forkingBehavior' as 'lastProvResponse' in early media on Egress leg.
- Enable the preconditions flag on both TG. 6) Enable sdpAttributesSelectiveRelay on both TG.
Replication procedure - - From the UAC, send an initial INVITE with Require header Require: 100rel
- From the UAS, send forked 18x with dialog d1.
- From the UAS, send 2nd forked 18x with dialog d2 and UPDATE from UAC for dialog d1 at the same time.
- Send the 3rd dialog 18x from UAS and 2nd dialog update from UAC at the same time.
- Send a 180 Ringing from UAS without sdp for dialog D1.
Platform/Feature: SBC | The code is modified so that the SBTM needs to relay behaviour for non-reliable 18x when the E2E PRACK and Dialog-Transparency are enabled. |
119 | SBX-92881 / SBX-87607 | 2 | Portfix SBX-87607: The SBC is unable to tear down the leg towards the MRF when the Malformed packet in a 200 OK is received with a 1 m line in the SDP from the MRF. Impact: The SBC is unable to tear down the leg towards the MRF when the Malformed packet in a 200 OK is received with a 1 m line in the SDP from the MRF. Root Cause: The handling is missing when the Malformed packet in a 200 OK is received with a 1 m line in the SDP from the MRF. Steps to Replicate: - USER A sends an INVITE with AMR.
- The SBC sends an INVITE to USER B.
- USER B responds with a 200 OK with EVRC codec in the SDP.
- The SBC sends an INVITE towards an MRF.
- MRF responds with a 200 OK with a 1 m line in the SDP.
- The SBC sends a BYE towards USER B and a 488 towards USER A.
- The SBC tear down the legs towards USER A and USER B, but unable to tear down the leg towards MRF.
Platform/Feature: SBC | Tear down the call when the Malformed packet in a 200 OK is received with the 1 m line in a SDP from the MRF. |
120 | SBX-91987 | 3 | Multiple 'CONFD_NOTIF_USER_SESSION' logs were in the app.latest. Impact: Notification messages are printed in the logs. Root Cause: Session logs are logged as MAJOR. Steps to Replicate: - Set the logs to Major.
- Log into the CLI.
- Check the logs and ensure session logs are not printed.
Platform/Feature: SBC | The code is modified to change session logs to DEBUG logs. |