Table of Contents

About SBC Release Notes

This document describes new features, the latest hardware and software requirements, known limitations and other pertinent release information for the latest release of SBC Core.

Please note that all Ribbon bugs reported by customers on a given software release will be fixed in the latest release on that software release branch.

To view and download the latest End of Product Sale (EoPS) and other End Of Life (EOL) notices, navigate to the Resource Library on the corporate website (https://ribboncommunications.com/company/get-help/resource-library).

Click here to download a PDF copy of these Release Notes.

Related Documentation

The SBC Core 07.02.xx documentation is located at the following Wiki space: SBC Core 7.2.x Documentation.

Release Notes Use and Distribution

Ribbon Release Notes are protected under the copyright laws of the United States of America. This work contains proprietary information of Ribbon Communications, Westford, MA-01886, USA. Use, disclosure, or reproduction in any form is strictly prohibited without prior authorization from Ribbon Communications.

Associated Ribbon Bulletins

The following Ribbon Bulletins apply to this release:

  • Warning-14-00020748: Verify system and databases are fully in sync prior to Live Software Upgrade (LSWU)
  • Bulletin-18-00028529: The System Security Intrusion Detection AIDE Reports False Positive Alarms

  • Warning-19-00028636: SBC SWe Gateway-to-Gateway signaling is disabled in certain SBC SWe versions 
  • Warning-19-00029555: CDR Viewer and Live Monitoring cannot be enabled/disabled
  • Bulletin-21-00029819: Deletion of admin User Prevents Application from Starting 

To view/download Ribbon bulletins, do the following:

  1. Log on to the Support Portal (https://ribboncommunications.com/services/ribbon-support-portal-login)
  2. Click Announcements link from the menu bar. 
  3. Enter the bulletin number (last eight numbers) in the search field and press Return.
Note

The WBA section may not include all Warnings, Bulletins and Alerts associated with this release. Before attempting to upgrade to any release, it is recommended to check the Customer Portal in Salesforce for any newly published WBAs that may include this release in the "affected versions" section.

Problems or Questions

For problems or questions, contact the Global Support Assistance Center:

Ribbon Support Portal: https://ribboncommunications.com/services/ribbon-support-portal

Voice: +1-833-RIBBON1 (1-833-742-2661)

About SBC Core

The SBC Core platforms address the next-generation needs of SIP communications by delivering media transcoding, robust security and advanced call routing in a high-performance, 2RU, and 5RU form-factor devices enabling service providers and enterprises to quickly and securely enhance their network by implementing services like SIP trunking, secure Unified Communications and Voice over IP (VoIP).

For more product information, refer to the section About SBC Core in the main documentation space.

Interoperability

The SBC Core software interoperates with the following:

  • SIP/H.323 compliant IADs and IP-PBXs
  • PSX Policy Server Softswitch via SIP redirects and/or Diameter+ protocol
  • SBC 9000 through SIP call signaling and Networks MCS protocol

H.323-SIP and SIP-H323 Calls

When using H.323-SIP and SIP-H.323 call flows, an additional Re-invite/Update may get generated towards the SIP side. To suppress this, enable the IP Signaling Profile (IPSP) flag Minimize Relaying Of Media Changes From Other Call Leg at the SIP side.

Note

H.323 is not supported on SBC SWe cloud deployments.

Compatibility with Ribbon Products

Tip

When upgrading your network, ensure to upgrade each product to the most current release to take advantage of the latest features, enhancements, and fixes.

Info

For complete interoperability details between various Ribbon products, including backwards compatibility, refer to Ribbon Product Interoperability.



Refer to SBC Core Portfolio Interoperability Matrix for the latest and minimum compatible product versions supporting all releases. For specific interoperability information for the 07.02.05R009 release, refer to the following table:

07.02.05R009 SBC Core Compatibility Matrix

Compatible Ribbon Products by VersionEMSPSXGSX 9000DSISBC 1K/2K/SWe Lite
Latest11.02.04R00011.02.04R00211.00.03R00109.03.00P608.00.01
Minimum11.00.00R00009.03.06R00009.02.07R00009.03.00R00007.00.00

New Features

New Features in 07.02.05R009 Release

There are no new features in this release.

New Features in Previous Releases


To view features in previous releases, refer to the following release notes:



Sample Heat Templates Included in This Release

You can use the following sample templates to instantiate SBC instances:

SBC Heat Templates

 Template NameDescription
heatRgNoDhcp.yamlM-SBC/S-SBC Heat template for No DHCP IPv4 or IPv6. This template include instructions to enable port redundancy.

Note:

Example template files are packaged together in .tar.gz and .md5 files separate from the SBC Core application installation and upgrade files:

  • cloudTemplates.tar.gz
  • cloudTemplates.tar.gz.md5

SBC SWe Cloud Requirements for OpenStack

The system hosting the SBC SWe Cloud must meet the below requirements for OpenStack:

Server Hardware Requirements

 

ConfigurationRequirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper threading).

Note

Ribbon recommends Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware. 

 RAMMinimum 24 GiB
 Hard DiskMinimum 100 GB
Network Interface Cards (NICs)

Minimum 4 NICs.

Note

Make sure NIC has multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.

Note

The PKT ports must be 10 Gbps SR-IOV enabled port.

Note

6 NICs are required for supporting PKT port redundancy.

The system hosting the SBC SWe must meet the following requirements to achieve the performance targets listed: 

S-SBC SWe Requirement

S-SBC SWe Requirements
for 1000 CPS/120K Signaling Sessions 
Notes

32 vCPUs

Due to the workload characteristics, allocate 20 physical cores with two hyper-threaded CPUs from each core to the SBC.

128 GiB RAM

Must be Huge Page memory. The minimum page size is 2048 KiB, but 1048576 is recommended.

100 GB Disk

None

4 vNICs/6 vNICs

Attach MGT0 port to the Management VirtIO Tenant network.

HA port has to be on IPv4 VirtIO Tenant network.

Attach PKT0 and PKT1 ports to SR-IOV and Provider network.

M-SBC SWe Requirement

M-SBC SWe Requirements
for 30K Media Sessions
Notes

20 vCPUs

Due to the workload characteristics, allocate 10 physical cores with two hyper-threaded CPUs from each core and from single NUMA node to the SBC.

32 GiB RAM

Must be Huge Page memory. The minimum page size is 2048 KiB, but 1048576 is recommended.

100 GB Disk

None

4 vNICs/ 6 vNICs

Attach MGT0 port to the Management VirtIO Tenant network.

HA port has to be on IPv4 VirtIO Tenant network.

OpenStack Requirements

The SBC SWe supports the following OpenStack environments:

  • Newton with RHOSP 10 and RHEL 7.4
  • Queens with RHOSP 13 and RHEL 7.5
Note

The SBC SWe Cloud was tested on OpenStack Queens with RHOSP 13 and RHEL 7.5.

SBC SWe Requirements for KVM

The following table lists the server hardware requirements.

KVM Hypervisor Server Hardware Requirements

 
Configuration Requirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper threading).

Note

Ribbon recommends using Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware.

Note

The supported CPU Family Number is 6 and CPU Model Number must be newer than 26. Refer to Intel Architecture and Processor Identification document for more information.


 RAMMinimum 24 GB
Hard DiskMinimum 500 GB
Network Interface Cards (NICs)
Minimum 4 NICs.
Note

Make sure NIC has multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.

Note

The Intel I350, x540, and 82599 Ethernet adapters are supported for configuring as SR-IOV and DirectPath I/O pass-through devices.


Ports

Number of ports allowed:

  • 1 Management port
  • 1 HA port
  • 2 Media ports

SBC SWe Requirements for VMWare

The following table lists the server hardware requirements:

Server Hardware Requirements

 
 ConfigurationRequirement
Processor

Intel Xeon processors (Nehalem micro-architecture or above) with 6 cores and above (processors should support hyper threading).

Note

Ribbon recommends using Westmere (or newer) processors for better SRTP performance. These processors have the AES-NI instruction set for performing cryptographic operations in hardware.

Note

The supported CPU Family Number is 6 and CPU Model Number must be newer than 26. Refer to Intel Architecture and Processor Identification document for more information.

Note

ESXi 6.5 and later releases require approximately two physical cores to be set aside for hypervisor functionality. Number of VMs which can be hosted on a server needs to be planned accordingly.

 RAMMinimum 24 GB
Hard DiskMinimum 500 GB
Network Interface Cards (NICs)
Minimum 4 NICs, if physical NIC redundancy is not required.

Otherwise, 8 NICs (preferably with SR-IOV capability to support SWe optimizations).

Notes
  • Make sure NIC has multi-queue support which enhances network performance by allowing RX and TX queues to scale with the number of CPUs on multi-processor systems.
  • The Intel I350, x540, and 82599 Ethernet adapters are supported for configuring as SR-IOV and DirectPath I/O pass-through devices. The SR-IOV is supported only with 10 Gbps interfaces (x540/82599).
  • The Enterprise Plus license is required for SR-IOV.
Note

 Intel x710 NICs are also supported on VMware (ESXi versions 6.5 and above) with SR-IOV enabled. x710 NICs are not supported on Direct I/O or KVM. 

Ports

Number of ports allowed:

  • 1 Management port
  • 1 HA port
  • 2 Media ports

 

 

Warning

The SBC SWe software only runs on platforms using Intel processors. Platforms using AMD processors are not supported.

Required Software and Firmware Versions

The following SBC 5000 series (51x0/52x0), SBC 5400 and SBC 7000 software and firmware versions are required for this release. For 5xx0 the BIOS can be installed during app install, whereas for 5400 and 7000 the BIOS is included in the firmware package and is installed during the firmware upgrade. 

Required Software and Firmware Versions

Components

Software/Firmware

Version

SBC Platform

  

SBC 51x0/52x0 BMC

V03.22.00-R000

SBC 51x0/52x0 BIOSV02.06.00
SBC 5400 Firmware

BMC: V03.22.00-R000

BIOS: V1.18.0

SBC 7000 Firmware

BMC: V03.22.00-R000

BIOS: V2.14.0

SBC Application

 


Operating System (OS) Version

V06.02.05-R009
SonusDB

V07.02.05-R009

EMAV07.02.05-R009

SBC Application

V07.02.05-R009

Note

The firmware package of SBC 5400 and 7000 series includes BMC, BIOS, and other binaries. The firmware is upgraded from the BMC.

How to Verify Currently Installed Software/Firmware Versions

Use the EMA to verify the currently installed software and firmware versions.

Log on to the EMA, and from the main screen navigate to Monitoring > Dashboard >  System and Software Info.

Software Bundles

The following software release bundles are available for download from the Customer Portal:

  • SBCSWe_7.2
  • SBC5x7x_7.2

Download the appropriate software packages for your desired configuration from the Customer Portal (https://ribboncommunications.com/services/ribbon-support-portal-login) to your PC:

SBC 5000 Series (51x0/52x0) Firmware

  • firmware-5XX0-V03.22.00-R000.img

  • firmware-5XX0-V03.22.00-R000.img.md5

  • bmc5X00_v3.22.0-R0.rom.md5sum

  • bmc5X00_v3.22.0-R0.rom

SBC 5400 Firmware

  • firmware-5400-V03.22.00-R000.img
  • firmware-5400-V03.22.00-R000.img.md5

SBC 7000 Series Firmware

  • firmware-7X00-V03.22.00-R000.img
  • firmware-7X00-V03.22.00-R000.img.md5

Note

Execute the Method Of Procedure (MOP) only for upgrading the FPGA image of an SBC 7000 DSP-LC card when the SBC 7000 DSP-LC FPGA version is 0x14. The MOP can be applied at any version time, with the only restriction being that the BMC firmware version is at least 3.2.1R0. However, if the SBC application is running version V05.01.00R000 or higher, then the DSPs will be set to disabled and transcoding and transrating calls will fail if the SBC 7000 DSP-LC FPGA version is 0x14. Therefore, it is necessary to upgrade the SBC 7000 DSP-LC FPGA if the version is 0x14, before upgrading the SBC to 5.1.0. However, the MOP can be applied if the application version is higher than 5.1.0. Click Here to view the 550-06210_DSP-LC_FPGA_Upgrade_MOP.

SBC Core Operating System Installation Package

The ConnexIP Operating System installation package for SBC Core:

  • sbc-V07.02.05R009-connexip-os_06.02.05-R009_6_amd64.iso
  • sbc-V07.02.05R009-connexip-os_06.02.05-R009_6_amd64.iso.md5


Note

 Once the ConnexIP ISO procedure is completed, the SBC application package is automatically uploaded to SBC platforms.

SBC Core Application Package

The SBC Application installation and upgrade package for SBC Core:

  • sbc-V07.02.05R009-connexip-os_06.02.05-R009_6_amd64.qcow2
  • sbc-V07.02.05R009-connexip-os_06.02.05-R009_6_amd64.qcow2.md5
  • sbc-V07.02.05-R009.x86_64.tar.gz
  • sbc-V07.02.05-R009.x86_64.md5
  • sbc-V07.02.05-R009.x86_64.signature

For detailed information on installation and upgrade procedures, refer to SBC Core Software Installation and Upgrade Guide.

Cloud Service Archive (CSAR) Packages for VNFM Deployment on OpenStack

Use the following files for SBC SWe deployments in the OpenStack cloud using VNFM.

For VNFM deployment, the VNF Descriptor (VNFD) file is provided in a Cloud Service Archive (CSAR) package for the type of SBC cluster being deploying. VNFs are independent and CSAR definitions are imported into the VNFM via an Onboarding mechanism. The SBC has several different CSAR variants, for different personalities (S-SBC, M-SBC) and interface types (virtio, sriov). The supported CSAR packages for the SBC are:

  • ssbc_virtio_7.2.csar
  • ssbc_sriov_7.2.csar
  • msbc_virtio_7.2.csar
  • msbc_sriov_7.2.csar

Files required for CSAR creation: 

  • createVnfmCsar.py
  • vnfmSol001VnfdTemplate.yaml
  • sbc-V07.02.05R009-connexip-os_06.02.05-R009_6_amd64.qcow2

For detailed information on installation and upgrade procedures, refer to SBC Core Software Installation and Upgrade Guide.

Upgrade Notes

Warning

Only perform a LSWU on an SBC 70000 when the total number of active calls on the system is below 18,000. If the criteria is not met, a double failure during the upgrade may occur, thereby losing all active calls. If such a failure occurs, both active and standby SBC services will go down.  Contact Ribbon Support immediately.

Note

Release 7.2 requires additional user account security practices for SBC SWe deployments in OpenStack cloud environments. During upgrade of SBC SWe cloud instances deployed using Heat templates, you must use a template that includes SSH keys or passwords for the admin and linuxadmin accounts. The example Heat templates have been updated to include information on how to specify this type of data in the userdata section of a template.

Note

Once the installation or upgrade completes on the SBC 51x0 and SBC SWe platforms, the copy of the installation package (SBC Core Installation and Upgrade Package) is automatically removed from the system.

Note

As an SBC Core password security enhancement, user passwords automatically expire after upgrading to 7.2.x. As a result, users are required to change their passwords upon initial login immediately following the upgrade.

Note

Customers using the Network licensing mode will stay on the Network licensing mode after upgrade to the SBC 7.2.5 Release.

Customers using Legacy mode will stay on the Legacy mode after upgrade to SBC 7.2.5 Release. Once upgraded to SBC 7.2.5 Release, the customer will not be able to set Network License mode.

Note

The SBC 7.2 5xx0 and 7000 platforms may exhibit a 7% degradation of CPU performance relative to earlier releases. This is attributable to the Spectre/Meltdown security patches.

Note

For the procedure specific to SBC SWe upgrades on KVM Hypervisor or VMware to take advantage of performance improvements due to hyper-threading, refer to MOP to increase vCPUs Prior to Upgrading SBC SWe on VMware or KVM Hypervisor.

Note

In NFV environments, the method used for upgrades involves rebuilding the instance, which requires additional disk space on the host. The minimum disk space needed for this operation is listed in the table below.

Disk Space Requirements

Flavor
Minimum Disk Space Required (GB)
S-SBC80
M-SBC80
PSX-M360
PSX-S360
PSX-Test360
EMS_SA150

Note

The SBC 51xx and 52xx systems require 24 GB of RAM to run 6.x code or higher.

07.02.05R009 Upgrade Information

Warning

Prior to performing an upgrade to release 07.02.05R009, remove usernames that do not conform to the new SBC user-naming rules to prevent an upgrade failure. The following user-naming rules apply:

  • Usernames can begin with A-Z a-z _ only.
  • Usernames cannot start with a period, dash, or digit.
  • Usernames can contain a period(.), dash(-), alphabetic characters, digits, or underscore(_).
  • Usernames cannot consist of digits only.
  • Usernames can contain a maximum of 23 characters.

The following names are not allowed:

tty disk kmem dialout fax voice cdrom floppy tape sudo audio dip src utmp video sasl plugdev staff users nogroup i2c dba operator

Note: Any CLI usernames consisting of digits only or not conforming to new user naming rules will be removed after performing a restore config in release 7.2.5R009. 

Warning

Prior to performing an upgrade to the 7.2 release, the dnsGroups with type mgmt must be specified/updated with the "interface" field. The steps are included in WBA "W-17-00022847". To view the WBA, log on to the Support Portal and click the Announcement link from the menu bar. Enter the bulletin number (last eight numbers) in the search field and press Return.

Warning

Prior to performing an upgrade to 7.2 release, the duplicate trunk groups or zones must be removed. The steps are included in WBA "W-17-00022689". To view the WBA, log on to the Support Portal and click the Announcement link from the menu bar. Enter the bulletin number (last eight numbers) in the search field and press Return.

If the above MOP is not run, the LSWU process may fail because of duplicate trunk group or zone names.

If you are upgrading from any SBC version with ePSX configuration to the 07.02.05R009 release, first execute the Method of Procedure, MOP to Reconfigure SBC (with ePSX) to External PSX Prior to an Upgrade to 06.00.00R000 Release, prior to performing an upgrade. For a list of supported LSWU paths, refer to Supported Upgrade Paths.

SBC SWe Pre-Upgrade Requirements

VM CPU resource allocation requirements

CPU resource allocation requirements for SBC SWe VM are strictly enforced.. You must review and verify these VM settings (including co-hosted VMs) against the documented "VM Configuration Recommendations" on the For VMware page in the Hardware and Software Requirements section before upgrading. If you encounter a problem, correct the CPU reservation settings as specified in step 6 of the "Adjust Resource Allocations" procedure on Creating a New SBC SWe VM Instance with VMXNET3. CPU reservation should be set as “number of vCPUs assigned to VM * physical processor CPU frequency". If VM uses the same number of vCPUs as the number of physical processors on the server, this reservation may not be possible. In this case, reduce the number of vCPUs assigned to VM by one and set the CPU reservation to the appropriate value.

When using the show table system serverSoftwareUpgradeStatus command during the upgrade, the Standby server's LSWU status will always display "Upgrading" even though the upgrade may have failed due to host checker validation. To check if host validation failed for the Standby, check for HostCheck Validation Failed message in the upgrade.out log.

Disable Call Trace feature prior to LSWU/upgrade

As a prerequisite for SWe LSWU/upgrade, disable the Call Trace feature prior to performing the LSWU/upgrade and re-enable it once the LSWU/upgrade is completed.

Manually check for Hostcheck Validation Failed message

Perform the following procedure on the Standby to check for the Hostcheck Validation Failed message in the upgrade.out log.

  1. Log on to ESXi of the Standby SBC SWe.

  2. Check in/opt/sonus/staging/upgrade.out (this log shows the Hostcheck Validation Failed error).

  3. Power off the VM.

  4. Reduce the number of vCPUs assigned to VM by one and set the CPU reservation to the appropriate value.

  5. Power on the VM. The SBC SWe successfully upgrades to the latest version 6.2.0. 

  6. Run the command show table system serverSoftwareUpgradeStatus to confirm the successful upgrade.

  7. Perform similar procedure for LSWU on Active.

Preparing for Upgrade (All Platforms)

Warning

Prior to performing a Live Software Upgrade (LSWU), verify if the system and the databases are in sync. The steps are included in WBA "Warning-14-00020748". To view the WBA, log on to the Support Portal and click the Announcements link from the menu bar. Enter the bulletin number (last eight numbers) in the search field and press Return.

Note

The SBC 7.2 release skips the SRV query if the flag in a DNS NAPTR response from the DNS server indicates to proceed with "A" record query as per RFC 2915/3403. This is a change in behavior from previous releases, where the SBC performed SRV queries irrespective of the "flag" setting returned by DNS Server.  If you use DNS NAPTR/SRV/A record query from SBC to determine peer transport address, ensure the DNS Server is configured to return ‘S’ flag to invoke an SRV query.

Please read the following information and take necessary actions before starting your upgrade to this release.

Customer running 7.1 or 7.2 releases must check the eventLog configuration to confirm that the memusage log type has a server1 syslog configuration and if it is not present, they need to manually create before attempting to upgrade to the latest code.

The following command example output shows how to confirm with the server1 config is present for the memusage log type:

show configuration oam eventLog typeAdmin
typeAdmin packet {
 
state      enabled;   
fileCount   64;   
fileSize    10240;
filterLevel info; 
servers server1;
 }

 typeAdmin memusage {
 state enabled;
 }

Update the configuration with the following commands -
configure
 set oam eventLog typeAdmin memusage servers server1

Supported Live Software Upgrade (LSWU) Paths


The SBC Core supports Live Software Upgrade from releases listed in the table below:


Supported Upgrade Paths

V05.00.xxV05.01.xxV06.xxV07.xx
V05.00.00R000V05.01.00R000V06.00.00R000V07.00.00R000
V05.00.00R001V05.01.00F001V06.00.00R001V07.00.00F001
V05.00.00S102V05.01.00F002V06.00.00F001V07.00.00F002
V05.00.00S104V05.01.00F003V06.00.00F002V07.00.00F003
V05.00.00S200V05.01.00F004V06.00.00F003V07.00.00F004
V05.00.00S201V05.01.00F005V06.00.00F004V07.00.00F005
V05.00.00S202V05.01.00F006V06.00.00F005V07.00.00F006
V05.00.00S203

V05.01.00F007

V06.00.00F006V07.01.00R000
V05.00.00S204V05.01.00F008V06.00.00F007V07.01.00R001
V05.00.00F001V05.01.01F001V06.00.00F008V07.01.00R002
V05.00.00F002V05.01.01F002V06.00.00F009V07.01.00R003 
V05.00.00F003V05.01.01F003V06.00.00F010V07.01.00R004
V05.00.00F004V05.01.01F004V06.00.00F011V07.01.00F001
V05.00.01R000V05.01.01F005V06.00.00F012

V07.01.00F003

V05.00.01R001V05.01.01F006V06.00.00F013

V07.02.00R000

V05.00.01R002V05.01.00S608V06.00.00F014V07.02.00R002
V05.00.01S001V05.01.00S610V06.01.00F001V07.02.01R000
V05.00.01F001V05.01.00S611V06.01.00F002V07.02.01R001
V05.00.01F002V05.01.00S612V06.01.00F003V07.02.01R002
V05.00.01F003V05.01.00S613V06.01.00R000

V07.02.01R003

V05.00.02R000V05.01.00S614V06.01.00R001

V07.02.01R004

V05.00.02R001V05.01.00S617V06.01.00R002V07.02.01R005
V05.00.02A059V05.01.00S619V06.01.00R003V07.02.01R006
V05.00.02A061V05.01.00S620V06.01.00R004

V07.02.01R007

V05.00.02F001V05.01.00S621V06.01.00R005 

V07.02.01R008

V05.00.02F002V05.01.00S622V06.01.00R006V07.02.01R009
V05.00.02F003V05.01.01R000

V06.01.00R007

V07.02.01F001
V05.00.02F004V05.01.01R001V06.01.00R008V07.02.01F002
V05.00.02F005V05.01.02F001V06.01.00R009V07.02.01F003
V05.00.03R000V05.01.02F002V06.02.00R000V07.02.01F004
V05.00.03R001V05.01.02F003V06.02.01R000V07.02.01F005
V05.00.03R002V05.01.02F004V06.02.01R001V07.02.02R000
V05.00.03R003V05.01.02F005V06.02.01R002V07.02.02R001
V05.00.03F001V05.01.02F006V06.02.01F001V07.02.02R002
V05.00.03F002V05.01.02F007V06.02.01F002V07.02.02R003
V05.00.03F003

V05.01.02F008

V06.02.01F003V07.02.02R004
V05.00.03F004V05.01.02F009V06.02.01F004V07.02.02R005
V05.00.03F005V05.01.02S001V06.02.01F005V07.02.02F001
V05.00.03F006V05.01.02R000V06.02.01F006V07.02.03R000
V05.00.03F007V05.01.02R001

V06.02.01F007

V07.02.03R001
V05.00.03F008V05.01.02R002

V06.02.01F008

V07.02.03R002
V05.00.04F001V05.01.02R003

V06.02.01F009

V07.02.03R003
V05.00.04R000V05.01.02R004

V06.02.01F010

V07.02.03R004
V05.00.04R001V05.01.03R000

V06.02.01F012

V07.02.04R000
V05.00.05F001V05.01.03F001

V06.02.02R000

V07.02.04R001
V05.00.05F002V05.01.03F002

V06.02.02R001

V07.02.04R002
V05.00.05F003V05.01.03F003

V06.02.02F001

V07.02.04R003
V05.00.05F004V05.01.03F004

V06.02.02F002

V07.02.04R004
V05.00.05F005V05.01.03F005

V06.02.02F003

V07.02.05R000
V05.00.05F006V05.01.03F006

V06.02.02F004

V07.02.05R001
V05.00.05F007V05.01.03F007

V06.02.02F005

V07.02.05R002
V05.00.05F008V05.01.03F008

V06.02.02F006

V07.02.05R003
V05.00.05R000V05.01.03F009

V06.02.02F007

V07.02.05R004
V05.00.06R000 V05.01.03F010

V06.02.02F008

V07.02.05R005
V05.00.06F001V05.01.04R000

V06.02.02F009

V07.02.05R006
V05.00.06F002V05.01.04F001

V06.02.02F010

V07.02.05R007
V05.00.06F003V05.01.04F002

V06.02.02F014

V07.02.05R008
V05.00.06F004V05.01.04F003

V06.02.03R000 


V05.00.06F005V05.01.04F004V06.02.03F001

V05.01.05R000V06.02.03F002

V05.01.05F001V06.02.03F003

V05.01.05F002V06.02.03F004

V05.01.05F003V06.02.03F005

V05.01.05F004V06.02.03F006

V05.01.05F005 V06.02.04R000

V05.01.05F008V06.02.04F001

V05.01.06R000V06.02.04F002

V05.01.06F001

SBC v07.02.00F001 does not have an available LSWU path.

Note

Prior to upgrading to 7.x, run the following command to verify availability of at least 40 MB free disk space in the /boot partition.

df -kh



Security Vulnerabilities

The following table displays the security vulnerabilities that were resolved in this release.

CVERiskDescription
CVE-2016-7949CriticalMultiple buffer overflows in the (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXrender before 0.9.10 allow remote X servers to trigger out-of-bounds write operations via vectors involving length fields.
CVE-2017-10102CriticalVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
CVE-2017-10285CriticalVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2017-10101CriticalVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2017-12562CriticalHeap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
CVE-2021-25216CriticalIn BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.
CVE-2021-26691CriticalIn Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
CVE-2020-28017CriticalExim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.
CVE-2017-10107CriticalVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2020-12403CriticalA flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
CVE-2017-10089CriticalVulnerability in the Java SE component of Oracle Java SE (subcomponent: ImageIO). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2017-10096CriticalVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2017-10111CriticalVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2021-31535CriticalLookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (and also longer than the maximum packet size for normal-sized packets). The user-controlled data exceeding the maximum size is then interpreted by the server as additional X protocol requests and executed, e.g., to disable X server authorization completely. For example, if the victim encounters malicious terminal control sequences for color codes, then the attacker may be able to take full control of the running graphical session.
CVE-2016-7950CriticalThe XRenderQueryFilters function in X.org libXrender before 0.9.10 allows remote X servers to trigger out-of-bounds write operations via vectors involving filter name lengths.
CVE-2020-28022CriticalExim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.
CVE-2017-10346CriticalVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2020-28024CriticalExim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.
CVE-2017-10110CriticalVulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2017-10090CriticalVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2019-20367Criticalnlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).
CVE-2017-8872CriticalThe htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure.
CVE-2020-28020CriticalExim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.
CVE-2017-10087CriticalVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2018-3183CriticalVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
CVE-2021-26937Criticalencoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.
CVE-2021-3246HighA heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted WAV file.
CVE-2018-19543HighAn issue was discovered in JasPer 2.0.14. There is a heap-based buffer over-read of size 8 in the function jp2_decode in libjasper/jp2/jp2_dec.c.
CVE-2021-3410HighA flaw was found in libcaca v0.99.beta19. A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context.
CVE-2021-25217HighIn ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.
CVE-2020-8231HighDue to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
CVE-2020-14363HighAn integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
CVE-2020-36224HighA flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
CVE-2017-10078HighVulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). The supported version that is affected is Java SE: 8u131. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
CVE-2020-27153HighIn BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker could potentially cause a denial of service or code execution, during service discovery, due to a redundant disconnect MGMT event.
CVE-2013-1753HighThe gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.
CVE-2020-2604HighVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
CVE-2017-6892HighIn libsndfile version 1.0.28, an error in the "aiff_read_chanmap()" function (aiff.c) can be exploited to cause an out-of-bounds read memory access via a specially crafted AIFF file.
CVE-2020-12723Highregcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
CVE-2020-10878HighPerl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
CVE-2021-26926HighA flaw was found in jasper before 2.0.25. An out of bounds read issue was found in jp2_decode function whic may lead to disclosure of information or program crash.
CVE-2021-3517HighThere is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
CVE-2021-27212HighIn OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.
CVE-2020-8285Highcurl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
CVE-2017-3511HighVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2020-35524HighA heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2020-28021HighExim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.
CVE-2021-28831Highdecompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.
CVE-2021-3580HighA flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.
CVE-2019-2698HighVulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
CVE-2020-28013HighExim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles "-F '.('" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.
CVE-2017-10067HighVulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
CVE-2021-33560HighLibgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.
CVE-2020-8177Highcurl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
CVE-2019-20388HighxmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.
CVE-2018-2633HighVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2020-28008HighExim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
CVE-2020-35492HighA flaw was found in cairo's image-compositor.c in all versions prior to 1.17.4. This flaw allows an attacker who can provide a crafted input file to cairo's image-compositor (for example, by convincing a user to open a file in an application using cairo, or if an application uses cairo on untrusted input) to cause a stack buffer overflow -> out-of-bounds WRITE. The highest impact from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-3518HighThere's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
CVE-2020-36225HighA flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
CVE-2020-14152HighIn IJG JPEG (aka libjpeg) before 9d, jpeg_mem_available() in jmemnobs.c in djpeg does not honor the max_memory_to_use setting, possibly causing excessive memory consumption.
CVE-2021-20305HighA flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2017-10176HighVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2020-15861HighNet-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following.
CVE-2020-28015HighExim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.
CVE-2018-2637HighVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
CVE-2020-13790Highlibjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
CVE-2018-2814HighVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2021-3682HighA flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.
CVE-2020-25710HighA flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
CVE-2020-26116Highhttp.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
CVE-2020-28007HighExim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
CVE-2017-10118HighVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2020-7595HighxmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
CVE-2020-36223HighA flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).
CVE-2020-28025HighExim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.
CVE-2021-21702HighIn PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
CVE-2020-36226HighA flaw was discovered in OpenLDAP before 2.4.57 leading to a memch->bv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.
CVE-2020-27828HighThere's a flaw in jasper's jpc encoder in versions prior to 2.0.23. Crafted input provided to jasper by an attacker could cause an arbitrary out-of-bounds write. This could potentially affect data confidentiality, integrity, or application availability.
CVE-2020-28196HighMIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.
CVE-2021-2388HighVulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
CVE-2020-10543HighPerl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
CVE-2018-3169HighVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2020-15862HighNet-SNMP through 5.7.3 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.
CVE-2020-35512HighA use-after-free flaw was found in D-Bus Development branch <= 1.13.16, dbus-1.12.x stable branch <= 1.12.18, and dbus-1.10.x and older branches <= 1.10.30 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors
CVE-2019-2602HighVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2020-36221HighAn integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).
CVE-2020-8625HighBIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch
CVE-2017-10115HighVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2020-35452HighApache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
CVE-2020-36222HighA flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.
CVE-2017-10074HighVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2019-9675High** DISPUTED ** An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical compromise of security, but a practical attack is usually impossible."
CVE-2020-28009HighExim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).
CVE-2019-20907HighIn Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
CVE-2021-25215HighIn BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
CVE-2020-2803HighVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2020-36228HighAn integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.
CVE-2017-10388HighVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
CVE-2020-36230HighA flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.
CVE-2020-35523HighAn integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2018-3149HighVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2020-28011HighExim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.
CVE-2020-25709HighA flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
CVE-2020-36229HighA flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.
CVE-2021-3156HighSudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
CVE-2018-2794HighVulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2021-20181HighA race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.
CVE-2020-25692HighA NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
CVE-2017-10116HighVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2020-28012HighExim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.
CVE-2021-26690HighApache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
CVE-2020-36227HighA flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.
CVE-2021-3713HighAn out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.
CVE-2020-2805HighVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2021-2369MediumVulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
CVE-2020-14792MediumVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
CVE-2019-2762MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2017-10198MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
CVE-2020-6829MediumWhen performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
CVE-2018-2629MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
CVE-2020-1934MediumIn Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.
CVE-2017-10295MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).
CVE-2017-10350MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2018-2678MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
CVE-2021-23336MediumThe package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
CVE-2020-14364MediumAn out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
CVE-2021-25214MediumIn BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.
CVE-2018-2641MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).
CVE-2017-10281MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2021-2161MediumVulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
CVE-2020-25085MediumQEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.
CVE-2020-27350MediumAPT had several integer overflows and underflows while parsing .deb packages, aka GHSL-2020-168 GHSL-2020-169, in files apt-pkg/contrib/extracttar.cc, apt-pkg/deb/debfile.cc, and apt-pkg/contrib/arfile.cc. This issue affects: apt 1.2.32ubuntu0 versions prior to 1.2.32ubuntu0.2; 1.6.12ubuntu0 versions prior to 1.6.12ubuntu0.2; 2.0.2ubuntu0 versions prior to 2.0.2ubuntu0.2; 2.1.10ubuntu0 versions prior to 2.1.10ubuntu0.1;
CVE-2021-3527MediumA flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.
CVE-2021-27845MediumA Divide-by-zero vulnerability exists in JasPer Image Coding Toolkit 2.0 in jasper/src/libjasper/jpc/jpc_enc.c
CVE-2020-10753MediumA flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.
CVE-2018-2599MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
CVE-2020-0499MediumIn FLAC__bitreader_read_rice_signed_block of bitreader.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156076070
CVE-2018-2602MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).
CVE-2017-10349MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-25624Mediumhw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
CVE-2019-2684MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
CVE-2021-3416MediumA potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.
CVE-2017-16942MediumIn libsndfile 1.0.25 (fixed in 1.0.26), a divide-by-zero error exists in the function wav_w64_read_fmt_chunk() in wav_w64.c, which may lead to DoS when playing a crafted audio file.
CVE-2017-10053MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2017-10109MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2018-2796MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-12401MediumDuring ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
CVE-2018-3180MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
CVE-2021-3541MediumA flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.
CVE-2021-26927MediumA flaw was found in jasper before 2.0.25. A null pointer dereference in jp2_decode in jp2_dec.c may lead to program crash and denial of service.
CVE-2021-22876Mediumcurl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
CVE-2020-28014MediumExim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.
CVE-2021-21705MediumIn PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
CVE-2021-2163MediumVulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
CVE-2019-2745MediumVulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2018-2588MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
CVE-2020-7071MediumIn PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.
CVE-2017-10243MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).
CVE-2017-10347MediumVulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2019-2769MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2018-2799MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2019-2975MediumVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
CVE-2020-14344MediumAn integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
CVE-2020-2781MediumVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2017-10135MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2017-10348MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-11985MediumIP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.
CVE-2018-2815MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-29130Mediumslirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
CVE-2018-2795MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-25625Mediumhw/usb/hcd-ohci.c in QEMU 5.0.0 has an infinite loop when a TD list has a loop.
CVE-2019-2989MediumVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).
CVE-2018-19139MediumAn issue has been found in JasPer 2.0.14. There is a memory leak in jas_malloc.c when called from jpc_unk_getparms in jpc_cs.c.
CVE-2017-9782MediumJasPer 2.0.12 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jp2_decode function in libjasper/jp2/jp2_dec.c.
CVE-2018-2800MediumVulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
CVE-2020-14803MediumVulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
CVE-2017-10274MediumVulnerability in the Java SE component of Oracle Java SE (subcomponent: Smart Card IO). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
CVE-2021-3537MediumA vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
CVE-2018-3214MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2021-20255MediumA stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
CVE-2020-13253Mediumsd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
CVE-2020-2593MediumVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
CVE-2019-2999MediumVulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
CVE-2018-2798MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2018-2677MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
CVE-2018-2603MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2017-10355MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2017-3526MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2021-3467MediumA NULL pointer dereference flaw was found in the way Jasper versions before 2.0.26 handled component references in CDEF box in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened.
CVE-2018-2663MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
CVE-2020-2830MediumVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2021-3443MediumA NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened.
CVE-2017-10108MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2021-3524MediumA flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created.
CVE-2020-13754Mediumhw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation.
CVE-2018-2618MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2020-17380MediumA heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.
CVE-2020-12400MediumWhen converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
CVE-2018-2582MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).
CVE-2020-15709MediumVersions of add-apt-repository before 0.98.9.2, 0.96.24.32.14, 0.96.20.10, and 0.92.37.8ubuntu0.1~esm1, printed a PPA (personal package archive) description to the terminal as-is, which allowed PPA owners to provide ANSI terminal escapes to modify terminal contents in unexpected ways.
CVE-2017-7741MediumIn libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with write memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
CVE-2021-3272Mediumjp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.
CVE-2020-14422MediumLib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
CVE-2020-24977MediumGNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.
CVE-2017-3509MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
CVE-2020-27617Mediumeth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.
CVE-2019-2816MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
CVE-2021-20221MediumAn out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
CVE-2021-21704MediumIn PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.
CVE-2020-1927MediumIn Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
CVE-2017-7586MediumIn libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
CVE-2017-7585MediumIn libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
CVE-2020-8622MediumIn BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
CVE-2017-10356MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2017-10081MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
CVE-2020-15999MediumHeap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2020-2601MediumVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
CVE-2021-3409MediumThe patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
CVE-2021-30641MediumApache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'
CVE-2018-2634MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
CVE-2019-2949MediumVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
CVE-2017-10357MediumVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-15863Mediumhw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.
CVE-2017-7742MediumIn libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with read memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
CVE-2020-7070MediumIn PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
CVE-2018-2797MediumVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-2800MediumVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
CVE-2020-16092LowIn QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
CVE-2020-2654LowVulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-14798LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
CVE-2021-22898Lowcurl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
CVE-2019-2988LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-13659Lowaddress_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.
CVE-2018-3136LowVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).
CVE-2020-29443Lowide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
CVE-2020-25723LowA reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
CVE-2019-2786LowVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).
CVE-2019-2964LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2017-3544LowVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2019-2894LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
CVE-2020-2755LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2021-20203LowAn integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
CVE-2020-14797LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2017-3539LowVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
CVE-2019-2962LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-2754LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-7068LowIn PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, while processing PHAR files using phar extension, phar_parse_zipfile could be tricked into accessing freed memory, which could lead to a crash or information disclosure.
CVE-2018-2579LowVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
CVE-2019-2987LowVulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2019-2422LowVulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
CVE-2019-2981LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-14782LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2020-27351LowVarious memory and file descriptor leaks were found in apt-python files python/arfile.cc, python/tag.cc, python/tarfile.cc, aka GHSL-2020-170. This issue affects: python-apt 1.1.0~beta1 versions prior to 1.1.0~beta1ubuntu0.16.04.10; 1.6.5ubuntu0 versions prior to 1.6.5ubuntu0.4; 2.0.0ubuntu0 versions prior to 2.0.0ubuntu0.20.04.2; 2.1.3ubuntu1 versions prior to 2.1.3ubuntu1.1;
CVE-2018-2952LowVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2019-2992LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2019-2983LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-14779LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2019-2842LowVulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-2583LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-14781LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
CVE-2019-2945LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
CVE-2020-15469LowIn QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.
CVE-2019-20382LowQEMU 4.1.0 has a memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a VNC disconnect operation because libz is misused, resulting in a situation where memory allocated in deflateInit2 is not freed in deflateEnd.
CVE-2020-11947Lowiscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.
CVE-2018-2790LowVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
CVE-2019-2973LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-8284LowA malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
CVE-2017-10345LowVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
CVE-2020-2590LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2020-2659LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2017-3533LowVulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2021-2341LowVulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
CVE-2020-25084LowQEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_packet_map return value is not checked.
CVE-2020-14796LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
CVE-2019-2978LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2017-10193LowVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
CVE-2021-3592LowAn invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
CVE-2021-3594LowAn invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
CVE-2020-15859LowQEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.
CVE-2018-3139LowVulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
CVE-2020-2756LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-2773LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-2757LowVulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).

Resolved Issues

Resolved Issues in 07.02.05R009 Release 

The following Severity 1 issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-1111891

The NTP SBC SWe key index 5 was out of sync.

Impact: The SBC goes out of sync with the NTP server when a key index selected.

Root Cause: The trusted key value does not get copied correctly in the NTP data causing it to go out of sync with the SBC.

Steps to Replicate: Not reproducible in the lab.

The code is modified to build the correct NTP config with trusted key value.

Workaround: N/A

SBX-1123491

Calls are being released with the SBC 132 Release code (MODULE FAILURE).

Impact: An Async CMD Error was reported by the XRM that triggered a call being torn down with release code 132 during a call audit run.

Root Cause: With the high level of error messages, we can only determine that there is some kind of race conditions for certain call flow(s) when a RID modify command was received for a disabled RID. (RID = receive ID in NP).

Unfortunately, Design did not receive requested call details from the customer. So we could not conclude the root cause.

Steps to Replicate: Issue is not easily reproducible in the Lab.

The code is modified to address the issue. The changes are based on source code inspection.

Workaround: None.

The following Severity 2-4 issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-1112772

The reason parameter was in the wrong History Info Index.

Impact: Egress History-Info header's index is incorrect in a SIP to SIP Call, when an ingress call with Diversion mapping to egress leg with History Info. In the egress IPSP the flag diversionHistoryInfoInterworking = disable by default, and flag includeReasonHeader = enabled. Other flags as below:
dataMapping diversion;
historyInformation {
includeHistoryInformation enable;
causeParameterInRFC4458 disable;
reasonWithCauseValueAsPerRFC4244 enable;
}

Root Cause: When the index of egress History-info header is generated in above condition, it's generated in a wrong way.

Steps to Replicate: 

  1. Set up a SIP to SIP call.
    In the egress IPSP of the egress TG, set
    diversionHistoryInfoInterworking = disable
    includeReasonHeader = enabled.
    Other flags:
    dataMapping diversion;
    historyInformation {
    includeHistoryInformation enable;
    causeParameterInRFC4458 disable;
    reasonWithCauseValueAsPerRFC4244 enable;
    }
  2. Make a SIP call. The Ingress INVITE contains a Diversion header.
  3. Check the egress INVITE.
  4. Enable the diversionHistoryInfoInterworking flag to compare the egress INVITE with the same ingress INVITE.

The code is modified to address the issue.

Workaround: None, unless set diversionHistoryInfoInterworking = enable.

SBX-1093113

The Policy Data syncInProgress on Node A after an upgrade revert.

Impact: Active/Standby brought up 7.2.x
Upgrade the standby node to 9.2.x
Active remains in old version.
Standby Node reverted back to 7.2.x
After the revert, an active policy data shows syncInProgress.

Root Cause: The root cause is the SBC dbrep trigger did not get re-enabled on the active that was disabled as part of preInstallCheck script on both active/standby.

Steps to Replicate: 

  1. Bring up the Active and Standby on 7.2.5.
  2. Upgrade the Standby node to any postgres version i.e. 9.2.x
  3. Then, revert the standby node back to 7.2.5 version.

Expected result: The policy server DB should be in sync.

Also, the trigger should be in enabled mode on active.

The code is modified to re-enable the trigger on the active node though there is no upgrade triggered on the active.

Workaround

Note: Prior to 7.2.5R9 releases still have the issue.
Follow the below given workaround:
After the revert is done for standby.

  1. Login to active node as Oracle user.
  2. Connect to sqlplus CLI as sysdba user using command
    sqlplus / as sysdba.
  3. Then run the following command to enable the trigger.
    alter trigger platform.sbx_dbrep_status_change enable;
  4. Then exit from the SQLPLUS CLI using the exit command.
SBX-113433 | SBX-1048563

PortFix SBX-104856 to 7.2.5 - Logical Management IP gets deleted on SBC SWe on LM failure.

Impact: Logical MGMT IP gets deleted when links on all mgmt port fails but it is not added when link is back up

Root Cause: While handling Link down notification on a mgmt interface, logical mgmt IP is either relocated (if there are other mgmgt interfaces in the mgmtInterfaceGroup) or deleted. However while handling link up notification, it is not being added.

Steps to Replicate: 

  1. Configure the logical mgmt IP.
  2. Configure the link detection on mgmt interface with threshold set to ZERO (to avoid CE switchover).
  3. Bring down the links by configuring IP ACL to drop ICMP/v6 ping responses. This will result in link detection, generating link down events on the mgmt interfaces. This should result in deleting the logical mgmt IP on mgmt interface.
  4. Disable the IP ACL so that ping responses are allowed. When the link is recovered, link detection will generate a link up notification.

Without a fix, the logical mgmt will not be added. With a fix, it will be added.

The code is modified so logical mgmt IP is added when getting a link up notifcation.

Workaround: Disable and enable the logical mgmt IP.

Resolved Issues in 07.02.05R008 Release 

The following issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-1111751

Module failure in the SBC 13.2 Release code.

Impact: Calls were being cleared with 'CC 132 - Module Failure' intermediately due to Unsolicited Call Cleanup.

Root Cause: Same root problem as a previous fix where the call failed intermediately due to Unsolicited Call Cleanup. But when porting the previous fix to the 7.2.0x branch, there are 2 different routines needing to be corrected. All later versions of code use a common procedure, whereas 7.x has a separate routine to handle flows involving RTCP termination. (DSP2LE_RTCPTERM type).

Steps to Replicate: Due to the nature of the race condition, the problem is not reproducable. To attempt replication, run the NAPT(with RTP and RTCP) tests on SWe.

The code is modified to use same NP user handle when sending the RID enable and modify commands for DSP2LE_RTCPTERM.

Workaround: None.

SBX-1098112

The SBC uses the port number RTP+1 for the RTCP instead of the learned RTCP port number, if the RTCP NAT learning completes before RTP NAT learning.

Impact: The SBC sends RTCP packets to a destination port number RTP+1 for RTCP instead of the learned RTCP port number if the RTCP NAT learning completes before RTP NAT learning.

Root Cause: The SBC overwrites the learned RTCP port number with the RTP+1 port number if the RTCP is learned before RTP.

Steps to Replicate: Send an RTP and RTCP packets immediately to the SBC after the call is connected and verify the RTCP port number, if the RTCP is learned before RTP.

The code is modified to use the correct RTCP learned port when the RTCP learning happens before the RTP, instead of comparing RTP and RTCP addresses from callLeg structure.

Workaround: None.

SBX-1111622

The SBC fails to defragment/assemble fragmented IPSEC ESP packets received from the customer.

Impact: The SBC drops an in-coming 1500B IP fragments sent through an IPsec tunnel, where the ESP packet is also fragmented into approximately equal-sized IP fragment packets. This complex IP frag-IPsec-IP frag problem primarily affects large SIP INVITE packets in certain network designs.

Root Cause: This problem affects large packets sent through IPsec gateways that (1) do no reassemble received IP fragmented packets before sending them through the IPsec tunnel (IP fragments themselves are sent through the tunnel), and (2) fragment resulting ESP packets into approximately equal-sized packets instead of a 1500B and 72B fragments.

Steps to Replicate: Test should send SIP packets  1500B to SBC over an IPsec tunnel through a device/devices that:

  1. Fragments the SIP packet into 1500B + small IP fragments.
  2. Sends the IP fragments through the IPsec tunnel.
  3. Fragments (again) the larger ESP packet into approximately equal-sized IP fragment packets.

The code is modified to reassemble IP fragments up to 1580B divided any way into a single internal packet buffer, which the IPsec decryption code and subsequent IP frag reassembly code can handle.

Workaround: Two workarounds are possible:

  1. Terminate the IPsec tunnel on a router in front of the SBC instead of directly on the SBC.
  2. Do not send the IP fragments through an IPsec tunnel terminated on the SBC. Instead, reassemble IP packets before sending them through the tunnel towards the SBC, so that there is only one level of IP fragmentation (of the ESP packet itself).

Resolved Issues in 07.02.05R007 Release 

Resolved Issues

The following issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-962471

An SCM Process core occurs in the standby SBC after switchover while testing SIPREC with ARS

Impact: A newly-active system may core upon the transition to the active SBC in either of these two circumstances:

1) ARS profile is configured on the active, but not the standby, SBC.
2) PATHCHECK is in use when ARS is not configured

This core will rarely happen - even under these circumstances - because an internal race condition is also necessary for it to occur.

Root Cause: The code that handles blacklisted endpoints when a system is transitioning to active frees a chunk of memory and then continues to attempt to access this memory.
If the memory is re-allocated and re-used in the between the MemFree and the next reference to this memory, we will encounter unexpected results.

Steps to Replicate: A non-reproducible race condition is required in order to replicate this condition.

The code is modified so that the SBC no longer accesses the memory after it has been freed.

Workaround: N/A

SBX-1048662

EnmP is leaking memory.

Impact: The memory usage for the EnmProcess increases when CDR file transfer failures are present.

Root Cause: Under certain file transfer scenarios, the third party library libssh2 used by the ENM process leaks memory.

Steps to Replicate: This problem was reproduced by creating a custom version of libssh2 that randomly dropped packets received from the remote sftp server.

The EnmProcess is modified to keep track of the memory allocated by libssh2, and to free up any memory still in use after the file transfer session is closed.

Workaround: N/A

SBX-104342 3

The SBC silently dropped the second Notify within Subscribe if the notifications were received simultaneously.

Impact: Dropped second Notify.

Root Cause: The SBC did not support multiple Notify when it required off board query for a dialogEvent of Notify.

Steps to Replicate: After Subscribe, the Peer server sends multiple Notify (almost at the same time) with dialogEvent for offboard query.

The code is modified to address the issue.

Workaround: N/A

Resolved Issues in 07.02.05R006 Release 

Resolved Issues

The following issue is resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-1046192

The FM process cored.

Impact: The FM Process crashed and wrote a coredump.

Root Cause: The FM Process tried to read the /proc/meminfo file, which should always exist, but it made a file and did not find an error.

Steps to Replicate: It is not known how to reproduce this, as it should never happen. The defensive code added to prevent NULL read/write.

The code is modified so when we cannot read the /proc/meminfo file, we return the last good value read instead of a NULL to prevent the crash.

Workaround: None.

SBX-1093592

The PRS Process cored.

Impact: A core occurred when executing the command "show table system ethernetPort mgmtPortStatus" while the mgt0 was bouncing.

Root Cause: The root cause is that there is a coding error, in which there was an attempt to divide by 0.

From the logs, we can see that mgt0 was bouncing constantly. The combination of requesting the status of the port while the link was bouncing is most likely what triggered this core.

Steps to Replicate: This was triggered by a race condition that happened when the status of the port was requested while the link was bouncing.

Because it's a race condition - it is not easily reproducible.

The code is modified to ensure that the value is non-zero before using it as a divisor.

Workaround: The only workaround is to avoid issuing the following command while the link is bouncing: "show table system ethernetPort mgmtPortStatus"

SBX-1019341

The call is failing intermittently due to the Unsolicited Call Cleanup.

Impact: The call is failing intermittently due to the Unsolicited Call Cleanup

Root Cause: The affected call failed due to the XRM having received an error response from the NP for modify RID command, which was most likely the race condition in the NP. This issue occurred because the RID enable and modify commands were issued within the same seconds but from two different NP users.

Steps to Replicate: Due to the nature of race condition, it is not guaranteed to reproduce the problem.

The code is fixed based on a code review.

The code is modified to use the same NP interface user handle when sending the RID enable and modify commands to the NP for that special case.

Workaround: N/A

Resolved Issues in 07.02.05R005 Release 

Resolved Issues

The following issue is resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-104126 | SBX-1071633

Portfix SBX-104126: The re-INVITE when 200 OK with crypto line other than 1.

Impact: When the SBC offers multiple crypto suites in the INVITE (offer), and the egress sends an answer with the crypto suite which is other than the top priority crypto offered by the SBC, the SBC sends an unnecessary re-INVITE to egress when minimizeRelayingOfMediaChangesFromOtherCallLegAll flag is enabled.

Root Cause: The SBC does not update media subsystem structures correctly.

Steps to ReplicateConfiguration:

  1. minimizeRelayingOfMediaChangesFromOtherCallLegAll flag is enabled on ingress and egress TG.
  2. Multiple crypto suite configured on PSP.
  3. The SBC sends INVITE to egress with multiple crypto and egress endpoint answers with crypto, which is other than the top priority crypto that the SBC sent.

Without a fix, the SBC sends re-INVITE to egress.
With a fix, the SBC suppresses re-INVITE to egress.

The code is modified to ensure the SBC suppresses the re-INVITE when egress answer has crypto that is not the top priority crypto as per the Packet Service Profile configuration.

Workaround: N/A

SBX-1075831

A one-way audio issue occurred on hairpinned calls.

Impact: A one-way audio problem is seen in a AMR-AMR transcoded call with DTMF interworking when "Different2833PTType" is enabled. This problem is visible for all HD codecs (AMR,AMR-WB, EVS, SILK)which uses dynamic payload in SDP offer.

Root Cause: A one-way audio problem is seen in a AMR-AMR transcoded call with DTMF interworking when "Different2833PTType" is enabled. This occurs because the SBC incorrectly configures the DSP channel with an incorrect payload type, not the payload type which was negotiated during the Offer Answer exchange on the Egress leg.

Steps to Replicate: Enable

  1. "Different2833PTType" and TransCode conditional in PSP and set Prefered DTMF payload to 102 on both the PSP.
  2. Send AMR payload 96,AMR-WB with DTMF 110 (8k) from Ingress.
  3. Ensure Egress answer sends AMR 96 and DTMF 102 in answer.
  4. Ensure that the call is transcoded and there is one-way audio problem.

The SBC is enhanced to configure the DSP with a pass-through payload type in the following scenario:

  • The SBC completes the Offer/Answer cycle on the Egress leg
    If the Egress Peer selects the pass-through dynamic payload in its Answer SDP.
  • The call is transcoded due to "Different2833PT" (or any other flag) under "condition in addition to No common codec".

Workaround: N/A

SBX-1078463

The SBC Radius changes for the 07.02.05 release.

Impact: The radius password sent to the server has no zero characters at the end following the password and a NULL. The retryTimer for radius authentication requests can only be set for values between 500 and 3000 milliseconds.

Root Cause: The radius passwords are padded to 16 characters. The existing implementation did not set those padded characters to 0.

Steps to Replicate:

  1. Configure a radius authentication server.
  2. Use a password that is less than 15 characters long for the external radius user.
  3. Set externalAuthententication to true.
  4. Run a tshark session.
  5. Login to the CLI.
  6. Stop the Tshark.
  7. View the radius password element in wireshark after configuring the shared secret in wireshark under protocol preferences.

The code is modified for the following sections:

  • The padded characters are now set to 0.
  • The range for the retryTimer is now 500-45000 milliseconds.

Workaround: N/A

Resolved Issues in 07.02.05R004 Release 

Resolved Issues

The following issue is resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-1075121

OpenSSL RSA decrypt errors logged due to padding check failures after increased handshake load during a mass registration event – sometimes the errors become persistent and the SBC may not recover on its own – switchover required.

Impact: Registration and Call failures occur and a switchover may be required to clear condition.

Root Cause: There is a known memory corruption issue known to cause RSA decrypt errors that can lead to the state of inability to perform new TLS handshakes.

Steps to Replicate: Various TLS handshake simulators can generate enough HPS to cause the issue.

The code is modified from the openssl1.0 (1.0.2l) to openssl1.0 (1.0.2u)

Workaround: N/A

Resolved Issues in 07.02.05R003 Release 

Severity 1 Resolved Issues

The following severity 1 issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-105961 | SBX-1063351

Portfix SBX-105961: The SBC reinvite with sendonly causing one-way audio.

Impact: The SBC unexpectedly send out reInvite sendonly when relay DPM is disabled.

Root Cause: There was an internal logical error to queue the sdp on ingress when egress send 18x (sendonly)

Steps to Replicate: 

  1. Enable minimize and disable relay DPM on ingress.
  2. A call B, B answer 183 (sendrecv), 183 (sendonly), 183 (sendrecv)...200 (sendrecv).

The code is modified so when subsequent 183 (sendonly) received on egress, the SBC updates the queue sdp (recvonly). Since the relay DPM is disable, the SBC should not change the direction of datapath on ingress.

Workaround: n/a. This is application bug per rfc, and the SDP should not change in subsequent 18x.

SBX-1043341

The call drops when being placed on hold - IPV6.

Impact: The "anonymous.invalid" in IPV6 media is not considered as hold and rejected.

Root Cause: There is no handling for "anonymous.invalid" while handling hold.

Steps to Replicate: 

  1. Establish a normal IPV6 media call.
  2. Send a reInvite with "anonymous.invalid" in the c line of the media.
  3. Check that the reInvite is not rejected and handled as call hold.

Check for "anonymous.invalid" and if the phrase is present, consider it as call hold and avoid going for DNS resolution to address the issue.

Workaround: Use the SMM to modify "anonymous.invalid" to "::" on the incoming side.

SBX-1052411

The SCM process core dumped on the SIGABRT.

Impact: The SCM has cored due to a memory corruption issue.

Root Cause: The SCM core is the result of a memory corruption caused by a function that is overwriting the end of the buffer that it allocated.
The root cause is that a bad pointer is being passed into this function. This pointer points to memory that had been previously freed without clearing the field that points to it.

Steps to Replicate: This issue is not reproducible because there is a race condition that contributes to it.

In order for this issue to cause a core, the memory that had been freed would also have to have been immediately re-allocated by the function that is copying past the end of it's buffer. We cannot predict when this memory will be re-allocated and therefore this issue is not reproducible.

The code is modified so there is no memory freed and then leaves around a pointer to this free memory.

This prevents us from passing a bad pointer into a function that would have attempted to copy from this invalid address.

Workaround: This issue will only happen when the customer is running calls that require registration. The registration must have at least one uri parameter (ex: transport) in both to and from header.
But, even in this scenario, most customer will probably not hit this core.

Severity 2-4 Resolved Issues

The following severity 2-4 issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-102115 | SBX-1062662

Portfix SBX-102115: The SBC modifies the Replaces parameter with wrong Call-ID and tags if the Replaced call was looped back to SBC through a SIP Proxy that does not modify SIP Call-ID and tags.

Impact: Relay refer with replaces for loopback call, the SBC picks up the wrong call leg.

Root Cause: The SBC query for the replaces callId, and found matching both legs (loopback).

The SBC pick up the wrong leg.

Steps to Replicate: 

  1. A to B call
  2. B to C call
  3. B attempted to bridge A and C together, the SBC is configured to relay the REFER with Replaces. The SBC modified the Replaces with the correct Call-ID and tags
  4. The proxy looped the REFER back to the SBC and the SBC relayed it. This time, the SBC modified the Replaces parameter with a wrong dialog ID.

If loopback is detect, only pick the one with to-tag match local-tag. This is per RFC-3891, section 3.

Workaround: None.

SBX-100122 3

There were various display issues related to media port range modifications.

Impact: Issue 1,2,3: The CLI display of mediaPortRangeUnassigned to TGs was not regulated by the system media port range setting, causing the mediaPortRangeUnassigned CLI command displaying the wrong ports.

Issue 4: If the basePorts for different TGs are the same in a same zone, their maxPorts will be added up in CLI display of mediaPortRangeAssigned. tcpPortRangeAssigned has the same problem.

Root Cause: Issue 1,2,3: The root cause was that the SBC had not considered the system media port range setting as restriction when calculating unassigned ports.

Issue 4: The root cause was that assigned media port range map had not been indexed by TG, but by basePort had been a mistake.

Steps to Replicate: While working on the SBC CLI

  1. Show configuration details system media mediaPortRange
  2. Show table addressContext addressContextName ipInterfaceGroup IG_name mediaPortRangeUnassigned
  3. Modify configuration details system media mediaPortRange to much smaller range.
  4. Repeat step 2, to make sure that mediaPortRangeUnassigned gives ports always within the range of "show configuration details system media mediaPortRange"
  5. Create multiple TGs in each zone. Assign mediaPortRanges to these TGs. Some range with the same basePort in the same zone. Some with different basePorts in the same zone.
  6. Repeat step 2 to make sure that mediaPortRangeUnassigned gives ports always within the range of "show configuration details system media mediaPortRange"
  7. Show table addressContext addressContextName ipInterfaceGroup IG_name mediaPortRangeByTGNameAssigned / mediaPortRangeUnassigned. Ensure that the outputs are correct.
  8. Repeat steps 2-7 with tcpPortRangeByTGNameAssigned / tcpPortRangeUnassigned
  9. Repeat the display steps above in EMA.

The code is modified for the following issues:

  1. Added system wide media port range into SBC SIPSG cache, so that the restriction will be checked before display of mediaPortRangeUnassigned.
  2. Changed the map of the assigned mediaPortRange to indexed by TG name, not basePort any more.
    Therefore, the CLI/EMA syntax becomes mediaPortRangeByTGNameAssigned/ tcpPortRangeByTGNameAssigned, instead of mediaPortRangeAssigned / tcpPortRangeAssigned.

WorkaroundIt is a display issue, does not impact call.

SBX-1060212

The MCF was sent back to the ingress as MPS.

Impact: Some fax T.38 endpoints send entire DCS V.21 signal in one packet as opposed to 1 octet per packet. This can cause the fax failures.

Root Cause: A burst of octets in a single packet is essentially a burst, and causes potential problems as these packets get queued for modulation and cause delay and later TCF (high speed) signal some packets get dropped.

Steps to Replicate: This can only be reproduced with a customer data.

The code is modified to accommodate such larger bursts.

Workaround: None.

SBX-104851 | SBX-1051412

Portfix SBX-104851: The SBC is down and the standby registration with active failed, error 160004.

Impact: Standby is not allowed to join cluster and fails to start

Root Cause: The safplus checkpoint file is corrupt and the section needing to be overwritten is not found.

Steps to Replicate: The root cause of the checkpoint corruption is unknown/checkpoint corruption cannot be forced and therefore directly testing this fix is not possible.

The code is modified to re-add the missing section if it is not found.

Workaround: A complete outage is required in order to restart the active server.

Resolved Issues in 07.02.05R002 Release 

Severity 1 Resolved Issues

The following severity 1 issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-98177 | SBX-1045561

Portfix SBX-98177: Issue with the SBC 7000 TCP window size. 

Impact: Add the CLI support to set kernel parameter net.ipv4.tcp_window_scaling.

Root Cause: In certain SBC deployment scenarios (a large number of devices running SIP-TLS), tcp_window_scaling caused small TCP window size.

In such cases, the operator had to use a command to disable tcp_window_scaling on each SBC node.

Steps to Replicate: 

(1). Show initial setting for tcp_window_scaling on both active and standby 
# cat /proc/sys/net/ipv4/tcp_window_scaling
1
# cat /proc/sys/net/ipv4/tcp_window_scaling
1

(2). Use CLI to change the kernel param value and display the changed value on both active and standby.
set system admin SBCSWE01 kernelParams tcpWindowScaling disable commit
Commit complete.

# cat /proc/sys/net/ipv4/tcp_window_scaling
0

# cat /proc/sys/net/ipv4/tcp_window_scaling
0

The code is modified to fix the issue and the Linux command is no longer needed with the modified code.

WorkaroundUse the Linux command to set the kernel parameter on both active and standby.

# sysctl net.ipv4.tcp_window_scaling
1
# sysctl -w net.ipv4.tcp_window_scaling=0
# sysctl net.ipv4.tcp_window_scaling
1
# sysctl -w net.ipv4.tcp_window_scaling=0

To be persistent across the SBC restart and system reboot, use the Linux the following shell command on both active and standby.
# echo "net.ipv4.tcp_window_scaling=0" >> /etc/sysctl.conf
# echo "net.ipv4.tcp_window_scaling=0" >> /etc/sysctl.conf

SBX-1032541

The Call Setup Delay with the Option Ping 40+ endpoints SBCSWe.

Impact: The configuration support disables the Path MTU Discovery by setting kernel parameter net.ipv4.ip_no_pmtu_disc (ipNoPmtuDisc). When the ipNoPmtuDisc is set to 2, the DF bit in IP packet header will be set 0.

Root Cause: The secure network does not support Path MTU Discovery per RFC-1191.

Steps to Replicate:

Testing the Standalone SBC SWe: 

The code is modified to disable the Path MTU Discovery by setting kernel parameter net.ipv4.ip_no_pmtu_disc to 2. When set to 2, the DF bit is set to 0 for the transmitted packets on every created socket. The configuration parameter is "systerm admin <name of system> kernelParams ipNoPmtuDisc".

Workaround: The workaround is a hack. It can be used as a one time test only. The hack will not survive Linux reboots.
1. Make changes on the current Standby (assuming SBC1 is currently active, and SBC2 is currently standby)
[root@SBC2 ~]# date; cat /proc/sys/net/ipv4/ip_no_pmtu_disc
[root@SBC2 ~]# date; echo “2” > cat /proc/sys/net/ipv4/ip_no_pmtu_disc
[root@SBC2 ~]# date; sbxrestart
2. Wait until the SBC is up and synched. Ensure the p_no_pmtu_disc is set to 2.
[root@SBC2 ~]# date; sbxstatus | tail -4
[root@SBC2 ~]# cat /proc/sys/net/ipv4/ip_no_pmtu_disc
2
[root@SBC2 ~]#
3. Make changes on the current Active.
[root@SBC1 ~]# date; cat /proc/sys/net/ipv4/ip_no_pmtu_disc
[root@SBC1 ~]# date; echo “2” > cat /proc/sys/net/ipv4/ip_no_pmtu_disc
[root@SBC1 ~]# date; sbxrestart
4. Wait until the SBC is up and synched. Ensure the p_no_pmtu_disc is set to 2.
[root@SBC1 ~]# date; sbxstatus | tail -4
[root@SBC1 ~]# cat /proc/sys/net/ipv4/ip_no_pmtu_disc
2
[root@SBC1 ~]#
5. May perform a switchover to make the SBC to be active.
6. Run customer tests.

SBX-102837 | SBX-1041531

Portfix SBX-102837: The SipSignalingPorts was listed as OutOfService after a switchover.

Impact: The SIP sigPorts were stuck in OOS after a switchover.

Root Cause: The operator had a network/pkt port issue, on one of their HA nodes, that caused pkt port(s) to bounce randomly, that is, the pkt port went DOWN and came back UP within 2 to 3 seconds. The operator has been keeping that node as a standby node. They also have link detection enabled for pkt port(s) and have around 100 LIFs per pkt port, one per SIP SIGPORT. When the pkt port went down, the NRS delays the port down event processing for 2 seconds to allow link failure detection to be ready and also to avoid the race condition between NRS and LVM. When the 2 second delay timer is up, the NRS starts to take down affected LIFs and notifies local SIPCM and SIPFE so the operator can take down affected SIP SIGPORTs.

In SIPCM, all the sockets on the affected sigPort are put in a delete pending table and starts a 1 tick timer. Then the socket(s) is being deleted after 1 tick timer is up.

When pkt port came back up, NRS processes the event with no delay and notifies SIPCM and SIPFE as well. Since there are around 100 LIFs, there were many messages exchanges between NRS/XRM/SIPCM/SIPFE. NRS LIF FSM has the mechanism in place to handle the timing issue and LIFs were all back in service. But SIPCM failed to activate some SIP SIGPORT(s) while binding the socket(s). These error messages indicated that SIPCM tried to activate the SIGPORT while it was still pending delete. Therefore SIGPORT got stuck in OOS(broken state) in both SIPCM and SIPFE on standby node. If there was a switchover happened later, user would then noticed one or more SIGPORTs were OOS. They have to manually bounce those SIGPORTs to bring them back in service.

Steps to Replicate: The nature of the problem was the timing caused race condition. There is no proper way to re-create/verify the fixes. 

The code is modified:

  1. To introduce a new 1 tick timer in SIPCM_DATA_STR, activateRetryTimerId.
  2. So if sigPort is found in the table, then start the 1 tick timer. When the timer is up, SipCmActivateCallSigPort() is invoked again. Once the sigPort is activated successfully, the SIPCM notifies the SIPFE as usual.

Workaround: N/A

SBX-1014511

The DSP Threshold setting is not generating a trap on SBC5400.

Impact: The g711PacketThreshold, g729Threshold, and g726Threshold onset and abate traps are not sent.

Root Cause: The NRM did not receive CLI updates to the g711PacketThreshold, g729Threshold, and g726Threshold, and the trap generation code used wrong trap names.

Steps to Replicate: 

  1. Provision the threshold levels:
    set oam traps dspAdmin dspAvailabilityTrap g729Threshold 40
    set oam traps dspAdmin dspAvailabilityTrap g726Threshold 60
    set oam traps dspAdmin dspAvailabilityTrap g711PacketThreshold 80
    commit set oam traps admin sonusSbxDspAvailG729OnSetCrossThresholdNotification state enabled
    commit
    set oam traps admin sonusSbxDspAvailG729AbateCrossThresholdNotification state enabled
    commit
    set oam traps admin sonusSbxDspAvailG726AbateCrossThresholdNotification state enabled
    commit
    set oam traps admin sonusSbxDspAvailG726OnSetCrossThresholdNotification state enabled
    commit
    set oam traps admin sonusSbxDspAvailG711OnSetCrossThresholdNotification state enabled
    commit
    set oam traps admin sonusSbxDspAvailG711PacketAbateCrossThresholdNotification state enabled
    commit
  2. Configure the trap target: set oam snmp trapTarget EMS160 ipAddress 10.xxx.xx.xxx port 162 trapType v2 state enabled commit
  3. Limit the compression resources to make the issue readily occur: set system mediaProfile tone 98 compression 2 commit
  4. Perform transcoded (e.g. G711 to G729) calls that exceed threshold limits, and verify that onset traps are sent to the trap target.
  5. Clear the transcoded calls, and see abate traps are sent to the trap target.

The code is modified to support g711PacketThreshold, g729Threshold, and g726Threshold values.

Deprecated the support for allThreshold, as it was never implemented in the SBC.

Workaround: N/A

SBX-1040151

The RE-REGISTAR was shorter than 3600 secs due to a child AoR. 

Impact: When the 200 OK response to REGISTER request contains a P-Associated-URI
header, the SBC creates a child AOR and forwards all REGISTER refresh requests to the registrar (effectively disabling the SBC fast refresh response).

Root Cause: The creation of child AORs cause all REGISTER refresh requests to be sent to the registrar (effectively disabling the SBC fast refresh response).

Steps to Replicate: 

  1. Configure the SBC to perform registration.
  2. The 200 OK response to REGISTER request contains a P-ASSOCIATED-URI header.
  3. In the error case, the refresh REGISTER requests are all forwarded to the registrar.

Removed the child AOR check from SipRaRegisterRequestCompletedAorNfy(), permitting the SBC to send fast refresh responses.

Workaround: N/A

SBX-1047611

SM Process core on the Server.

Impact: The SM Process crashed while executing the "show table system syncStatus" command.

Root Cause: The shell script used to get the Oracle sync status - PolicyDBSyncStatus.sh - did not return within 10 seconds, causing a healthcheck timeout that caused the coredump.

Steps to Replicate: This problem is not reproducible.

Disable heathchecks while fetching the syncStatus to address the issue.

Workaround: None.

Severity 2-4 Resolved Issues

The following severity 2-4 issues are resolved in this release:

Resolved Issues - Severity 2-4

Issue IDSev

Problem Description

Resolution
SBX-103273 | SBX-1038022

Portfix SBX-103273: Dual NUMA support in the SWe SBC.

Impact: Multiple NUMA were not allowed in general (except few cases).

Root Cause: A restriction was imposed not to allow multiple NUMA in HostCheck.

Steps to Replicate: 

  1. Configure a KVM instance with dual NUMA and install in Non-Gold/Non-GPU setup.
  2. Let it come in default traffic profile.
  3. Verify that the SBC would come up fine without any HostCheck errors.

The code is modified to allow multiple NUMA in general, irrespective of personality and profile.

Workaround: No workaround. Need to use correct build.

SBX-96649 | SBX-1045742

Portfix SBX-96649: Failover due to a SAM Process core.

Impact: There were reports of a SAM Process crash stack indicating a Cave Creek QAT driver API may have caused memory segmentation, causing a switchover on the SBC7000 while verifying a TLS client's certificates during a TLS handshake.

Root Cause: Incompatible third-party QAT crypto driver with the current OpenSSL version, Linux kernel, and cipher suites was used in the current certificates.

Steps to Replicate: After an App installation or an Upgrade, ensure that the QAT engine is no longer used by the SIMCM (SAM Process) by checking DBG log.

Example: The following DBG message should be seen:
087 06232020 062948.762154:1.01.00.00609.MAJOR .SIPCM: *Dynamic engine not supported

Due to Cave Creek QAT and its driver being End-of-Life and improved OpenSSL performance in RSA key operations, use the OpenSSL optimization in the RSA key operations to support TLS handshake. The QAT crypto engine is no longer used by the SAM Process and IkeProcess on the SBC7000 and SBC5400.

Workaround: None.

SBX-103763 | SBX-1046873

Portfix SBX-103763: The upgradeSBX.properties causes the EMA to report a presistent upgrade in progress.

Impact: The upgrade is completed but the Platform Manager Install/Upgrade screen gets stuck on the previous upgrade and cannot perform the new upgrade operation.

Root Cause: The issue is being faced due to the SBC upgrade steps as part of SBX-56893 Jira in 6.1.0. Whenever the SBC is upgraded from 6.0.x to 8.2.x, Design will see the issue because there are different steps in 6.0.x and 8.2.x that is causing the issue. When upgading the SBC using 6.0.x code that has the old upgrade steps, once the pre install check step is executed, the PM API updates the upgradeSBX.properties file with next step(INSTALL_DB), the SBC goes for reboot and platform manager code gets replaced with upgraded version, which is 8.2.x.

Currently, the PM API reads upgradeSBX.properties file to read the steps value that is in INSTALL_DB and match the check but in 8.2.x PM code. There is no INSTALL_DB check in the PM code and because of that, we are unable to update the upgradeSBX.properties file with next steps. Once the upgrade gets complete and PM code updates upgradeSBX.properties file with finished as steps, we move the upgradeSBX.properties file into upgradeSBX.properties.1, which is not occurring, and the Platform Manager UI is unable to mark as complete, getting stuck on install/upgrade screen with the previous upgrade.

Steps to Replicate

  1. The ISO/app installs the SBC 6.0.0F6 on a HW box. It was installed as a standby SBC on a SBC5110.
  2. Go to EMA Administration > System Administration > Software Install/Upgrade and start an offline upgrade. Leave the browser alone, do not click anywhere in the EMA GUI once the upgrade has started.

The code is modified to handle the INSTALL_DB step check to mark the upgrade as complete from the Platform Manager UI.

Workaround: To perform the upgrade operation again, Ribbon must delete the upgradeSBX.properties file from the SBC.

Resolved Issues in 07.02.05R001 Release 

Severity 1 Resolved Issues

The following severity 1 issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-1035781

The SBC SWe 8.2.0F1 duplicates audio from call B to call A.

Impact: If the CN is not negotiated for G711 codec and remote peer still sends the CN packets that match default CN payload type (13), then the user on other end may hear cross talk audio of completely unrelated channel or may hear their own audio.

Root Cause: When a g711 side does not negotiate CN in signaling, the DSP does not initialize Comfort Noise Generation object. However, if a remote peer still sends CN packet that matches the g711 SID payload type configured in PSP (default 13), DSP accepts the packet. It processes that CN packet incorrectly and as a result uses stale voice buffer which happens to be of another channel. This continues until the next voice packet for that channel arrives. As a result, cross talk audio is observed from other calls during a silence period. In some cases, the user may hear their own audio also and that is different manifestation of the same problem. This issue is specific to the SWe.

Steps to Replicate: 

  1. Run a CN that is not negotiated for G711 codec.
  2. Send a default remote peer CN packets that matches the default CN payload type (13).
  3. The user on other end may hear cross talk audio of completely unrelated channel and hear the user's own audio.

The code is modified to initialize the comfort noise object even though the CN is not negotiated and processes the CN packets correctly.

Workaround

1.Change the default payload type of comfort noise from 13 to something else (say 15) in PSP of peer that is sending CN packets. This will make DSP drop CN packets because payload type will not match.

PSP configuration:
show configuration profiles media packetServiceProfile G711_NONE_NONE_NONE
..
silenceInsertionDescriptor {
g711SidRtpPayloadType 13;
heartbeat enable;
}

2. Enable silence suppression on PSP of peer that is sending CN packets and keep CN payload type that matches with CN payload type.

Severity 2-4 Resolved Issues

The following severity 2-4 issues are resolved in this release:

Resolved Issues - Severity 2-4

Issue IDSev

Problem Description

Resolution
SBX-1036432

The DBG logs in the 7.2.4R0 SBCs filling up with the T38 logs.

Impact: When the call trace is enabled, the T38 messages are logged in a .DBG file. However, even after a call trace is disabled, T38 log messages continue to appear in .DBG file.

Root Cause: A gevelobal variable to set t38 log messages was set for call traces but never reset.

Steps to Replicate: 

  1. Enable call tracing and make a T38 fax call.
    See that .DBG file has T38 log messages.
  2. Disable call tracing and make a T38 fax call.
    T38 log messages do not appear in .DBG file.

The code is modified so after the call tracing is disabled, T38 log messages will not appear in .DBG file.

Workaround: Use 'unhide debug' command to disable T38 log message after call tracing is no longer needed.
> request sbx drm debug command "dspdebugt38 state disable"

SBX-103561 | SBX-1037922

Portfix SBX-103561 (Originated in Release 8.2.4) The tgrp parameter was not passing transparently when the SIP in the core is enabled.

Impact: SipCore calls are passing the wrong tgrp parameter value.

Root Cause: There was missing logic to support SipCore.

Steps to Replicate: 

  1. Configure the SipCore feature. Both IPSP core and egress leg have "originating Trunk Group Options" set to "Include tgrp with IP address"
  2. Make an SipCore call.

The code is modified to support the SipCore feature.

Workaround: N/A

SBX-1034582

The content type pattern match failure was seen in the INVITE sent to the second SBC in a GW-GW call.

Impact: The message body is not sent transparently for Resource/Lists, QSIG Content-Type: multipart/mixed when the HTP is enabled for all.

Root Cause: The fix to SBX-100989 Jira has broke the existing functionality.

Steps to Replicate: Prerequisite:

============

  1. Create the Gw-Gw setup (SBC-SBC).

Test Specific Configuration:
=========================

  1. Create a header transparency profile on the SBC2 and attach to the egress TG.
    set profiles services transparencyProfile HTP1 sipMessageBody all
    set addressContext default zone ZONE2_TRANSGW sipTrunkGroup PERTRANSGW_SBX_EXT services transparencyProfile HTP1

Test Steps:
==========

  1. Run a basic call over the SBC-SBC (GW-GW) and check if the resource/lists, QSIG content type header is transparently passed in the outgoing INVITE towards egress side.

Expected Results:

  1. The SBC-SBC (GW-GW) call should be successful.
  2. Check if the transparency is successful over the GW-GW.

The code is modified for the Allow message body QSIG Content-Type: multipart/mixed, Resource/Lists across GW-GW to address the issue.

Workaround: N/A

SBX-102470 | SBX-1040922

Portfix SBX-102470 (Originated in Release 9.1.0) Observed a SAM Process memory leak while running the TLS/SRTP load on an OpenStack SBC.

Impact: The SIP-TLS with an Client Authentication (authClient=true in tlsProfle) causes about 1.2 KB of memory leak per TLS handshake on the SBC.

Root Cause: After verifying the peer certificate, the SBC SAM process did not free memory allocated for accessing the public key.

Steps to Replicate: 

  1. Run 50,000 SIP-TLS sessions with Client Authentication, and observe the memory used by a SAM Process.
  2. Run another 100,000 SIP-TLS sessions with Client Authentication, and observe the memory used by a SAM Process.
  3. Compute the extra memory used for additional 100,000 SIP-TLS sessions.

The code is modified to free the memory allocated for accessing public key after its use.

Workaround: N/A

SBX-103939 | SBX-1039443

Portfix SBX-103939 (Originated in Release 9.2.0) The NAPT timer was not armed properly in MoH.

Impact: The NAPT timer did not start as NRMA requested.

Root Cause: The RTP flow mode was xmt-only. Then NRMA requested flow change to enable NAPT timer expiry because we have already learned source address. But the XRM did not start NAPT timer because it was a learning next request.

Steps to Replicate: The steps cannot be reproduced.

The code is modified to start NAPT timer for learning next if NRMA has set XRM_NAPT_MEDIA_NAPT_TIMER_ACT_ENAB.

Workaround: N/A

SBX-940933

There was an incorrect license usage count for Encrypt license.

Impact: An incorrect Encrypt license was consuming for IPSEC/TLS calls.

Root Cause: For IPSEC, the SPD is configured with an IP prefix for localIpAddr and remoteIpAddr. But while comparing an IP address, the prefix length/subnet mask was not taken in to account. As a result, the IP comparison was failing, and in turn the license was not consuming for IPSEC calls.

For the TLS, the issue is observed in TEAMS calls only, When calls come, a specific internal flag was not setting, which the license was consuming.

Steps to Replicate: 

  1. Run a PSTN to TEAMS call.
  2. PSTN disconnects the call while TEAMS ringing.
    >>Encrypt counter got incremented as below each time when call is disconnected.

The code is modified to check the IP address prefix validation so that the IP address within the prefix is considered as an IPsec call and updates the internal flag, so that the request method is updated properly.

Workaround: N/A

SBX-102795 | SBX-1034172

Portfix SBX-102795 (Originated in Release 9.1.0) In the Asymmetric PRACK interworking, the configuration flag "Sdp100relIwkForPrack" behavior is not proper.

Impact: In a latemedia passthrough call, the SBC is not sending ACK for 200 OK when the Asymmetric PRACK Interworking features is used.

Root Cause: The SBC fails to relay 200 OK for an UPDATE in late media passthrough and reverse offer scenario. This issue is fixed but the given fix breaks the Asymmetric PRACK feature functionality.

Steps to Replicate: 

Configuration:
Set the flag lateMediaSupport to passthru on the ingress TG.
Enable 100rel Support on the ingress TG.
Enable the flag Sdp100relIwkForPrack on the egress TG.

set addressContext default zone <ZoneName> sipTrunkGroup <ING_TG_Name> media lateMediaSupport passthru
set addressContext default zone <ZoneName> sipTrunkGroup <ING_TG_Name> signaling rel100Support enabled.
set addressContext default zone <ZONEName> sipTrunkGroup <EGR_TG_Name> signaling Sdp100relIwkForPrack enabled.

Procedure:

  1. UAC sends the Initial INTIVE request to the SBC without SDP and has 100rel in Require header.
  2. UAS sends the 180 towards the SBC with no SDP after receiving offer less Invite.
  3. UAC sends PRACK with SDP answer after receiving 180 with SDP offer.
  4. UAS sends the 200 OK towards the SBC with the SDP offer.
  5. UAC sends ACK after receiving 200 OK.

Expected Result:
The SBC should send ACK with SDP answer on the egress side.
After a re-negotiation, the media communication should be done as per final offer answer communication.

The code is modified to cover both scenarios. 

Workaround: N/A

SBX-103493 | SBX-1032373

Portfix SBX-103237 (Originated in Release 7.2.5) The peer is failing to choose proper leader/leadership algorithm while recovering from a splitbrain.

Impact: A restart of the primary node during a split-brain can cause the nodes to choose different leaders when the split-brain is resolved.

Root Cause: A restart during the split-brain may cause the node to revert to the default algorithm rather than using the enhanced leadership algorithm when coming out of split-brain.

Steps to Replicate: Execute the following scenario:
AA-SS >> AA and SA >> cause split-brain >> restarting AA >> recover split-brain >> AS-SA

The code is modified to properly maintain the agreed upon leadership algorithm so that the correct algorithm is utilized, even after a restart.

Workaround: N/A

SBX-98336 | SBX-987243

Portfix SBX-98336 (Originated in Release 9.0.0) Memory changes for the PAI header userinfo modification for a transparency case.

Impact: When the PAI header userinfo is modified using DM/PM rule and also when transparency is enabled, the SBC is copying the userinfo from DM/PM rules into out-of-memory, if the DM/PM userinfo is longer than the ingress INVITE PAI userinfo.

Root Cause: The transparency buffer for PAI header is only allocated for the size of the ingress PAI userinfo. When the PSX returns DM/PM rule with larger number of characters in the userinfo, the SBC while copying it to the egress PAI transparency buffer, scribbles over the memory.

Steps to Replicate: 

  1. Configure STI profile on the SBX and PSX.
  2. Send an INVITE with PAI header and perform the STIR/SHAKEN signing/tagging.
  3. Enable Privacy->Transparency configuration.
  4. Configure DM/PM rule to change the PAI userinfo with a longer number of characters.

The code is modified by allocating a new memory block for the PAI userinfo and updating the PAI header pointer.

Workaround: N/A

SBX-1019182

The Out of Memory caused an SBC switchover.

Impact: Memory leaks when 3xx relay and reject 3xx on egress IPSP

Root Cause: Contact Headers in 3xx memory did not free properly.

Steps to Replicate: 

  1. Enable 3xx relay and reject 3xx, trigger the SBC sends 503 to ingress.
  2. A call B, B response 3xx with contact headers.
  3. Or Enable 3xx relay and configure ingress "do not send 3xx", trigger SBC sends 503.

Ensure the memory of contact headers in 3xx are properly free when config to reject 3xx.

Workaround: Customer may using SMM to change the status 3xx to 503 instead.

SBX-103175 | SBX-1037622

Portfix SBX-103175 (Originated in Release 8.2.4) A large microflow profile was not getting enabled in the Custom Traffic Profile.

Impact: 

  1. For a default profile, the max subs was always set to 256K.
  2. For custom and standard traffic profiles, the micro flow count in NP resource was not proper.
  3. There is limited support of 2M micro flows for standard profiles

Root Cause: 

  1. The large micro flow support was not there for custom traffic profiles.
  2. For standard and default traffic profiles, there was restricted/incomplete support of large micro flow that is made generic as part of this JIRA.

Steps to Replicate: 

  1. Create a instance with 10GB memory and 16vpcu with default traffic profile. Check microflow limits using "/opt/sonus/bin/cpsi -d summary" command.
  2. Increase the memory to 50GB memory and check microflow limits using "/opt/sonus/bin/cpsi -d summary" command.
  3. Create a instance with 20GB memory and 16vpcu. Create and activate a custom traffic profile with access enabled in call mix. Check microflow limits using "/opt/sonus/bin/cpsi -d summary" command.

The code is modified to:

  1. Introduce a new estimation parameter maxSubs where the micro flow count is decided and the NP hugepages is reserved.
  2. Enable a large micro flow support for all standard/default profiles where mem > 48GB and vcpu_count >10.

Workaround: N/A

SBX-938982

The "request sbx xrm debug command sec -stat gcid <gcid>" was not showing the enc and dec details on the SBC SWe.

Impact: This debug command in unhide section is not showing all the required fields populated in the SBC SWe.

Root Cause: The NP response is not framed in expected order to application layer.

Steps to Replicate: Run a SRTP call and the issue this debug command. The debug command does not show all the populated fields.

The code is modified so the NP Response is correctly framed in expected order to application layer.

Workaround: This debug command is to see SSN field value with RoC, all other details can be seen from show call mediastatus.

SBX-1042162

The SBC relays STUN packets in RTP streams on pass-thru calls (no transcoding); on RTP to SRTP calls, the relayed STUN packet causes the ROC to reset back to 0 and the remote peer discards the encrypted media packets.

Impact: When Non_RTP packets mixed/relayed in SRTP stream are sent out from the SBC, it was resulting in one way audio at the endpoints in longer duration calls.

Root Cause: These non-RTP packets relayed eg. STUN packet causes resetting of encryption ROC back to 0 on the SRTP stream sent out. This issue results in the remote peer discarding the encrypted media packet in long duration calls from the SBC, where ROC is expected to be non-zero.

Steps to Replicate: Run a SRTP passthrough call with media for more than 15 mins, with 10 uptime audio. Then send a non-RTP packet (STUN, UDP TL t.38) in that stream for pass-thru relay, and observe the media in that call.

The code is modified for Non-RTP packets to not mix with SRTP encryption/decryption processing, SRTP media stream ROC does not reset with these packets mixed, and endpoint will not have media issues in longer duration calls.

Workaround: If longer duration calls are expected to relay STUN messages as well, disabling the SRTP will solve media issue. But for secure reasons, if SRTP has to be enabled, there is no workaround for this.

SBX-85808 | SBX-1038532

Portfix SBX-85808 (Originated in Release 8.0.0) The SBC is not sending a DTMF telephonic event to SIPREC server when the CS is negotiated on a telephonic event.

Impact: The DTMF tones are not being sent to the SIPREC server.

Root Cause: The SBC was sending only one preferred codec and not the telephone event towards the SIPREC server. As a result, the telephone event are not being negotiated and not being sent to SIPREC server.

Steps to Replicate: Enable the SIPREC on the SBC, make a CS call with a telephone event and send the DTMF tones.

The code is modified to send all the negotiated codec towards the SRS server that also includes the DTMF.

Workaround: N/A

Resolved Issues in 07.02.05R000 Release 

Severity 1 Resolved Issues

The following severity 1 issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-97867 | SBX-959191

Portfix SBX-95919 (originated in Release 7.2): The Max Forward Header Support feature is not working for requests from terminating side.

Impact: The Max Forward Header Support feature is not working for requests from the terminating side. The SBC does not subtract 1 in the Max-Forwards header despite the rfc7332ValidateMaxForwards is set to enable.

Root Cause: This issue is caused when a BYE request that comes from the terminating side. Any other requests from the originating side are decreased correctly including the BYE request.
Handling the BYE from terminating side was not taken care of.

Steps to Replicate: Enable fc7332ValidateMaxForwards on both TG.

  1. Initiate a call from A to B, B sends a 200 OK to connect the call.
  2. B sends the Bye request. The SBC sends the Bye request to A.
    The Max forward header in the Bye is set to 70.
  3. Check the Max forward SBC sends to A. The Max forward header should be decremented by one.

The code is modified so when BYE is received from the terminating side, decrease the max forward header by one.

Workaround: N/A

SBX-99045 | SBX-947621

Portfix SBX-94762 (originated in Release 8.2.0): The basic Relay-Relay of RTCP for T140 is not working in the latest build.

Impact: The RTCP NAPT PORT learning alone is not working in the SWe.

Root Cause: RTCP NAPT PORT learning flags ports definitions endian mismatch in the SWeNP was not triggering the learning and causing drops.

Steps to Replicate: Run calls with RTCP NAPT port learning alone call flows and ensure the RTCP packets are learnt and relayed accordingly.

The code is modified in the SWeNP media flow processing to fix the issue.

Workaround: N/A

SBX-96520 | SBX-964841

Portfix SBX-96484 (originated in Release 8.1.0): The MRFRM SIPSG standby CCB hash had multiple insert failures.

Impact: When there is hash insert failure, the case is not being handled properly.

Root Cause: There are a few major logs that came as part of load run that relates to the gcid hash insert failures in the MRFRM.

Steps to Replicate: Run a SBC call flow with 12 codecs with the GW signaling and configure the system in Sensitive mode.

The code is modified to perform a hash swap when there is hash collision.

Workaround: Run an MRF load and issue may be reproduced.

SBX-1022901

The DBG file was filling up with messages "SIPCM: *ThreadPool: messageSequence "

Impact: The DBG logs can be overrun with "SIPCM: *ThreadPool: messageSequence" messages.

Root Cause: The DBG logs can be overrun with "SIPCM: *ThreadPool: messageSequence" messages, when the double CRLF "pings" are received by the SBC over a UDP transport.

Steps to Replicate: Send double CRLF "pings" over UDP to the SBC.

The code is modified to properly dispose of double CRLF "pings" received by the SBC over the UDP.

Workaround: Inhibit the transmission (or reception) of Double CRLF "pings" over the UDP.

SBX-96704 | SBX-963231

Portfix SBX-96323 (originated in Release 8.1.0): The version header is removed on the SBC even though the transparency was enabled.

Impact: When running an OOD message call flow with MIME Header and Transparency is enabled for MIME Header, the MIME Header is not going in the egress message.

Root Cause: The MIME header is ignored by the SIP Parser.

Steps to Replicate: Run an OOD Message call-flow with Mime header.

The code is modified to add MIME header as a Transparent header.

Workaround: Use the SMM Message Scope Variables to store and add it in the outgoing message.

SBX-99732 | SBX-983671

Portfix SBX-98367 (originated in Release 8.1.0): The SBC lost connections to other SBCs.

Impact: The X710 SR-IOV PKT0 interface on the M-SBC stops receiving packets, resulting in connectivity loss with the SBC and other M-SBCs.

Root Cause: The default TX Free threshold setting for the DPDK X710 PMD holds up a larger number of packet buffers leading to buffer starvation and thereby stopping of packet rx on pkt0 port. The issue is particularly aggravated when the majority of calls have both legs on PKT0 and few calls have one leg on PKT1 and another on PKT0.

Steps to Replicate: 

  1. Run calls with both media legs on the pkt0.
  2. Run 100-200 calls with one media leg on pkt0 and another on pkt1.
  3. Re-run calls with both legs on the pkt0.

The code is modified to prevent retaining a large number of packet buffers in the TX done queues.

Workaround: There is no guaranteed workaround, but enabling the LDG may help in reducing the chances of the reoccurrence of this issue.

SBX-100447 | SBX-1003311

Portfix SBX-100331 (originated in Release 8.2.1): After adding the second mgmt port in the 23vcpu I-SBC (in RHEV platform 8.2.1 build), pkt and the mgmt port messes up.

Impact: On adding extra management port in large instance without redundant PKT ports, the SWe_NP process crashes.

Root Cause: There was a bug in the code that pulled non-existent port id on adding extra management port resulting in crash.

Steps to Replicate:

  1. Make a large instance >15vCPU(default profile) without redundant packet ports.
  2. Add extra management port and reboot.

The code is modified so the polling of extra management interface properly manages large instances in the SWe_NP code.

Workaround: N/A

SBX-1000631

The From header wrongly impacted by the SMM.

Impact: The SMM adding duplicated generic parameters in the header with tel scheme.

Root Cause: After the first rule, the treat header as URI, the second rule treat as generic, the SMM format the 2nd rule actions with duplicated generic parameters.

Steps to Replicate: The first rule testing with the URI parameter type. The second rule store the header value into local var and create a new header based on local var.

There were logical error on the 2nd rule when try to reconstruct the uri header into generic header that adding duplicated generic parameters.

Workaround: Avoid using the URI parameter from the first rule. One may want to use regex instead.

SBX-100112 | SBX-993211

Portfix SBX-99321 (originated in Release 7.2.0S400): There is node resource congestion alarms after upgrading to 7.2S400.

Impact: Performing a time zone change from CLI can cause node resource congestion alarms in 7.2S400.

Root Cause: The problem was found to be caused due to a system daemon(cron) running in signaling group and exhausting signaling resources.

Details:
Whenever there is a timezone change, cron is restarted and when it is restarted from a process running in the SIG core(SM), cron gets scheduled in the SIG core. SIG cores are monitored for resource usage periodically and due to cron taking more resources while running cron jobs, the resource congestion alarms were getting raised by the SBC.

Steps to Replicate: 

  1. Perform a timezone change from the CLI on SWE.
  2. Note the pid of cron and check which cgroup it is apart of by running the following scripts:
    cat /cpusets/sig/tasks | grep `pidof cron`
    cat /cpusets/system/tasks | grep `pidof cron`

The code is modified so the scripts responsible for the timeZone change and cron restart are moved to the system cgroup.

Workaround:

  1. Reboot the SBC after a timezone change, (or) 
  2. Run below command to move cron to system cgroup:
    /usr/bin/cset proc -m -p `pidof cron` -t system --thread
SBX-1002491

A PRS process core occurred on the Standby Server.

Impact: The PRS process cored due to the XRM accessing a NULL pointer inside of the XRES data structure.

Root Cause: The root problem was that the pkt2 on standby node was stuck in DOWN state due to possible network switch issue, while the pkt2 on active node was functioning as normal. All the activated XRESs selected on LIFs of the pkt2 were mirrored to standby and got inserted in the deferredXresList waiting for the standby pkt2 to be UP.

Then when one of those XRESs is reused for a different call and mirror to the standby node, that XRES may be stuck in the deferred XRESList because the deallocate request may have not been processed yet on the standby node. As a result, the PRS hit coredump was caused by the XRM accessing the NULL pointer inside of the XRES data structure.

Steps to Replicate: The SBC HA pair, active node has pkt ports all UP, and standby node has at least one of the pkt port DOWN.

Start with a fairly high call load, and ensure calls are picking LIFs of pkt1 on the active node. Also ensure XRES on pkt1 are being re-used.

Note: The standby pkt1 should stay DOWN all the time during the test.

The code is modified to correctly free the XRES in deferred XresList so that it can be re-used for the new call.

Workaround: Manually keep the pkt ports sync between the active and standby nodes.

SBX-1007791

The SBC was adding an extra application/ISUP ACM content.

Impact: The 200 OK Bye has duplicated the ISUP body.

Root Cause: When the e2e Bye is enabled, 200 OK has duplicated the ISUP body.

Steps to Replicate:

  1. Configure the isupMimeBodyRelay and e2e bye.
  2. Run a sipi-sipi call, and the SBC sends 200 OK bye has duplicated isup body.

The code is modified so the SBC does not create an isup body internally for the e2e Bye and isupMimeBodyRelay.

Workaround: Disable the e2e Bye.

SBX-1010571

Both applications (iceSupport and SMM storeIPTG) coredumped.

Impact: The SMM drops an incoming call.

Root Cause: After a response failure to an invalid call, the SBC still tries to initiate a setup call. As a result, it accesses an invalid address.

Steps to Replicate: Configure the iceSupport, SMM storeIPTG, and an incoming call with the invalid candidate (no UDP).

The code is modified to add a address validation and not try to initiate a setup call if the call fails.

Workaround: N/A

SBx-101013 | SBX-998741

Portfix SBX-99874 (originated in Release 7.2.2): A second INVITE with a REPLACES collects the wrong PSX route.

Impact: A second INVITE with REPLACES collects the wrong PSX route.

Root Cause: There was a design gap, in case of multilevel INVITE with REPLACES, that the SBC was sending a light weight PSX look up with the incorrect source and destination trunk group. As a result, the SBC is receiving the incorrect TG configuration from PSX.

Steps to Replicate: 

  1. A and B are connected.
  2. C sends INVITE with REPLACES to replace A.
  3. D sends INVITE with REPLACES to replace C.
  4. D sends Re-INVITE with a=inactive.

The code is modified so the SBC sends light weight PSX lookup with the correct source and destination trunks to get the corresponding TG level configuration.

Workaround: N/A

SBX-1001641

There was a back-to-back coredump on the Server.

Impact: The SCM process cored due to memory corruption while parsing an INVITE with a very long and invalid CallId field, while the parseError trace logging was enabled.

Root Cause: The SCM process coredump is caused by memory corruption that is the result of the Trace Logging code overwriting a buffer.

This can happen when the SIP parser encounters an invalid CallId that is also very long.
It is also possible that other parsing errors can trigger this core, especially if the parse error was encountered for a particular header that is very long.

Steps to Replicate: This can be reproduced by enabling the parseError trace logging and then sending a INVITE that includes a badly formatted CallId, which is the maximum allowed size for a CallId:
"set global callTrace errorFilter errorType parseError"

The code is modified to not overwrite the end of the buffer when it is attempting to write a very long error message string.

Workaround: Disable the parseError tracing.

SBX-101458 | SBX-960011

Portfix SBX-96001 (originated in Release 6.2.1): The SBC 7000 has the wrong value for call duration.

Impact: The call service duration (CDR field numbers 10 and 14) has wrong values causing a billing issue.

Root Cause: This issue is seen when there is mid-call message in this case session refresh. Due to this session refresh, there are mid-call messages(INV/200OK/ACK) happens end to end. This makes the "callServiceEstTime" in the function CcRelayInfoMsg() overwritten every time causing the CDR fields 10 and 14 wrong values.

Steps to Replicate: 

  1. Enable IPSP flag "End to End ACK" on both TGs.
  2. Disable the flag "No CDR Change in End to End Ack".
  3. Make a call from A to B and let the call be connected with session refresh enabled.
  4. Once the session refresh happens, disconnect the call and check the CDR.

The code is modified such that the "callServiceEstTime" does not get overwritten once its recorded initially during the initial offer-answer.

Workaround: Enable the flag "No CDR Change in End to End Ack"

SBX-977911

There was a switchover with the PRS process coredumping.

Impact: The PRS process coredumped due to memory corruption.

Root Cause: Customer encountered a PRS process core due to the memory corruption that happened earlier in processing. The core is the after effect of earlier corruption.

Steps to Replicate: None.

The code is modified to avoid the core, and to collect more diagnostic data if a core happens again.

Workaround: N/A

SBX-1012941

Intermittently, the SBC SWe accesses the sipSigPort for sending the SIP messages to the core side.

Impact: The relay options with registration may route to the wrong Sip Signaling Port and causing call fails from AS to IAD.

Root Cause: When the IAD sends a registration arrive from the SSP1 and relay options from an other SSP2. Since the options from the SSP2 do not match with RCB from SSP1, the SBC treat the options from the AS and triggering invalid routing to the wrong destination.

Steps to Replicate: Configure the SSP1 and SSP2, and enable maskRcbPort. The registration from SSP1 succeeds. Options from the SSP2 will trigger a relay back to the IAD (not AS). Subsequent calls from AS may fail or refresh registration.

The code is modified to detect the relay messages from the IAD or AS based on RCB looks up (not just based on SSP).

Workaround: Disable the maskRCBPort. Or use the SMM to make the SBC response to Options (not relay).

SBX-1016631

The dual system SCM process cores and causes a complete outage.

Impact: The SCM process may coredump during two stag SRTP calls.

Root Cause: The NULL pointer access caused the SCM process to coredump.

Steps to Replicate: The steps cannot be reproduced.

The code is modified to include additional NULL pointer protection to the SRTP licensing code.

Workaround: Disable the SRTP.

SBX-958731

The eSBC  crashed.

Impact: The root cause has an incorrect initialization in the third party T.38 stack.

Root Cause: The issue occurs when Version 3 T.38 fax is enabled. In such a case, in case a CED 2100 Hz is sent by the SBC to G711 leg while it gets T.38 ANSAM packets from T.38 side, the DSP hardware stack can crash.

Steps to Replicate: The test setup to recreate this problem involves special SIPP scenarios and the SBC configuration.

The SBC is configured for the ingress as G711 and egress G711 with T.38 for Version 3.
Also configure the ingress PSP as transcode only and ensure that the codecs allowed for transcoding for ingress has G711 and egress has both G711 and T.38.

The code is modified by getting a third-party stack that has proper initializations and protection code to avoid a crash.

Workaround: N/A

SBX-939791

An SCM process coredump occurred on the SBC in sensitive mode, while running a call flow with 12 codecs over a GW signaling call flow.

Impact:The SCM process experienced a coredump.

Root Cause: In the SgCondenseAudioWildcard, scenarios may occur where the audioEnd and audio1 have the same IP address.

Steps to Replicate: Run an SBC call flow with 12 codecs with the GW signaling and configure the system in sensitive mode.

The code is modified to remove the equal condition between audioEnd and audio1.

Workaround: Configure the SBC in normal mode.

SBX-1018161

Observed DSP coredumps and MAJOR logs on 7000 Platform while running ICM Scaling suite.

Impact: The DSP coredumps were observed during the switchover tests.

Root Cause: Certain variables used in the interrupt context were not protected while being modified outside the interrupt. This impacted the inter-core health-check logic at DSP and incorrectly led to error being reported, eventually leading to core-dump.

Steps to Replicate: HA Pair of fully loaded SBC-5100/5200/5110/5210/5400/7000

1. Run a transcode load.
2. Initiate a switchover.

The code is modified so the variables are protected from interruption.

Workaround: N/A

SBX-99967 | SBX-990201

Portfix SBX-99020 (originated in Release 9.0.0): Observed Major logs with the error prints of 488 on the SBC 5210 platform while running direct media.

Impact: Calls stop working as the LIF bandwidth is not freed.

Root Cause: In case of a multi-stream direct media call with the last media stream as non-RTP stream, the SBC does not release the session bandwidth even when the call is released. This leads to a leakage in the interface bandwidth resulting in call failures after some time.

Steps to Replicate: Run direct media calls with multiple streams with last media stream as a non-RTP stream (BFCP, MSRP).

The code is modified to release the session bandwidth even when the last media stream is non RTP stream in a direct media call.

Workaround: N/A

SBX-998501

A BYE message was sent to the wrong port.

Impact: The SBC does not update remote connection address when refresh INVITE is received from different port.

Root Cause: When the endpoint is registered over TLS initiating a call and after the call is established, the endpoint sends a refresh register from a modified port. When a refresh INVITE is sent with no SDP change, the SBC does not send BYE to a modified port when the call disconnects.

Steps to Replicate: 

  1. Register endpoint over TLS.
  2. Endpoint initiates a call, call gets connected.
  3. Endpoint sends refresh register from modified port.
  4. Endpoint sends refresh re-INVITE from modified port.
  5. Called party disconnects the call.
  6. Verify that the SBC sends BYE to modified port towards caller.

The code is modified to ensure the SBC updates the remote address when a refresh INVITE is received from a modified port.

Workaround: N/A

SBX-99804 | SBX-997911

Portfix SBX-99791 (originated in Release 9.0.0): The AddressSanitizer detected a heap-use-after-free on the address 0x62a000396280 at pc 0x563d8352c45c bp 0x7f03c92740b0 sp 0x7f03c92740a8.

Impact: On the D-SBC setup, when disabling the signaling port used for the SBC to the M-SBC communication and then making further configuration changes it was resulting in an invalid memory read.

Root Cause: When the signaling port was disabled, the code was freeing up a list of sockets that were using the port. However, it did not set the primary socket pointer to be NULL when the associated socket memory was freed up. This resulted in an invalid read when trying to re-enable the signaling port.

Steps to Replicate: This issue is only highlighted in the lab when using ASAN enabled images and then disabling the signaling port and making further configuration changes.

The code is modified to ensure that the internal pointer to the primary socket used for the connection is set to NULL when the socket memory is released.

Workaround: Do not disable the signaling ports.

SBX-100945 | SBX-1006501

Portfix SBX-100650 (originated in Release 8.2.2): The INVITE with replaces failure for the G722 only call.

Impact: Originally, the SBC/GSX only supported a small subset of codecs, such as G711, G711_SILENCE_SUPPRESS, G723, G729A, G729AB, FAX_RELAY, G723A, G726. Then, additional codecs including ILBC/G722 were added in. When these new codecs were added, the SBC/GSX started to pass a flag to the PSX that is supporting the new codecs. This indicator bit is only being passed up when processing an INVITE and not when processing a REFER message. This can result in call failures when processing REFER messages if the Packet service profiles used for the new egress call leg only support codecs that are not in the list above because the PSX drops any other codecs since the REFER does not indicate the newer codecs are supported.

Root Cause: The REFER call handling fails when only G722 codec is selected in the packet service profile for all the required routes.

Steps to Replicate: Configure a call flow where the ingress and egress trunk groups only support G722 set up the A to B call and then try to do a REFER to C that should exist on either the ingress or egress trunk group.

The code is modified to pass the indicator to the PSX when processing the REFER that the SBC supports in newer codecs.

Workaround: N/A

SBX-99855 | SBX-997731

Portfix SBX-99773 (originated in Release 9.0.0): The ASAN detected a heap-buffer-overflow in the Ss7LibGenerateCarrierCode while running a SIP to SIP-I call with PCV header.

Impact: For the Customer ISUP when the code was generating the carrier information transfer (CIT) parameter, it was reading off the end of an allocated memory buffer.

Root Cause: If the PSX does not provide the carrier code information to include in the CIT parameter, the SBC was not allocating a large enough memory block. The memory block was used to hold the potential CIT parameter being generated. The SBC was reading of the end of the memory block at the position where the CIT parameter would have been, to decide if a carrier code had been generated.

Steps to Replicate: This issue is only reproduced when running call flows with ASAN images in the engineering lab, it was observed when running regression for ttc-charging parameter in the P-charging-vector header.

The code is modified to avoid reading off the end of the memory buffer.

Workaround: N/A

SBX-99571 | SBX-994571

Portfix SBX-99457 (originated in Release 9.0.0): The AddressSanitizer detected a heap-use-after-free on address 0x6070001153f0 at pc 0x5588611ec65d bp 0x7fbd2d86daa0 sp 0x7fbd2d86da98.

Impact: In an M-SBC deployment when making the M-SBC out of service (such as 'set global system action force mode outOfService'), the code was accessing free memory.

Root Cause: As part of the deactivation process, the M-SBC memory block was getting freed up in a child function. The parent function still had access to the pointer, and was reading from it on returning back up the stack.

Steps to Replicate: This issue is only highlighted in engineering lab when using ASAN images and taking the M-SBC out of service.

The code is modified to avoid reading from the memory block after it is free.

Workaround: Do not take M-SBC out of service.

SBX-100837 | SBX-1006241

Portfix SBX-100624 (originated in Release 8.2.0): The trunk group routing was not working when a SIP-I call is received.

Impact: The tgrp/trunk-context information in the R-URI and contact headers of an INVITE are not passed to the PSX/ERE as the originating and destination trunk group parameters if the INVITE contains ISUP MIME content.

Root Cause: The parameter were only being processed when there was no ISUP MIME content. There was not prior requirement for them to be used with ISUP MIME content.

Steps to Replicate: Send an INVITE message to the SBC that contains ISUP MIME contact as well as tgrp/trunk-context parameters in the R-URI | contact header and ensure they appear in the INPUT DATA section of the policy request.

The code is modified to process the tgrp/trunk-context information in the R-URI and contact headers and pass up in the policy request to PSX/ERE.

Workaround: The SMM can be used to convert the tgrp parameters to DTG/OTG parameters that are supported with SIP-I content.

SBX-101674 | SBX-1015471

Portfix SBX-101547 (originated in Release 8.2.2): On a switchover, a coredump occurred after a call was placed on hold.

Impact: The code was dereferencing a NULL pointer and causing the SCM process to crash.

Root Cause: The customer had the passThruPrivacyInfo control enabled on both the ingress and egress privacy profiles. But the ingress side of the call did not pass through some expected information related to the INVITE message and it caused the code to dereference a NULL pointer.

Steps to Replicate: Unable to reproduce this issue, the code has been fixed based on code review and coredump analysis.

The code is modified to validate the pointer is not NULL before trying to use it.

Workaround: Disable the passThruPrivacyInfo controls.

SBX-99389 | SBX-989911

Portfix SBX-98991 (originated in Release 9.0.0): The AddressSanitizer detected a global-buffer-overflow on the address 0x55c93b015fa4.

Impact: While checking for two IPs in the same direct media NAT table, the code was reading off the end of an internal buffer.

Root Cause: While trying to process the net mask for the IP addresses, the code was using an index of 33 and reading of the end of the internal table with 32 entries.

Steps to Replicate: This issue is only highlighted in the development lab when testing direct media NAT call flows with an ASAN enabled build. 

The code is modified to no longer read of the end of the table.

Workaround: N/A

SBX-1020061

The SBC failed to send ACK to the right IP.

Impact: After a call was connected with egress received RR in 2xx, the SBC sends a reInvite, and received the rexmit of 2xx. Later on, the SBC sends ACK to the wrong destination.

Root Cause: A rexmit of 200OK, accidentally deletes the previous RR.

Steps to Replicate:

  1. A calls B.
  2. B responds with a 200OK with RR.
  3. A reInvite triggers the SBC reInvite to B.
  4. B responds with 2xx and rexmit 2xx.
  5. The SBC sends ACK to the wrong destination (based on contact not from previous RR received).

The code is modified so the SBC ignores updating the data of the dialog.

Workaround: N/A

SBX-1016521

The SIPFE lookup returned the rcb pointing to wrong SCM post-upgrade.

Impact: After an upgrade, registrations mirroring on SIPFE is corrupted. As a result, incoming traffic for the AOR that may route to the wrong SCM and rejected by the SBC.

Root Cause: The packing redundancy data structure that was sent to the standby were incorrect due to word alignment issue (using sizeof() to pack the data).

Steps to Replicate: Multiple of the same AOR registers from a different source. After an upgrade, call for register end point may route to the wrong SCM.

The code is modified to re-implement the packing logic and avoid using sizeof() to calc the size of data structure.

Workaround: N/A

SBX-101932 | SBX-1002231

Portfix SBX-100223 (originated in Release 7.2.2, 7.2.4): The SMM for changing the ISUP message inside a SIP-I does not work properly.

Impact: When a message is received with the mime content having single msgbody. After the SMM application on the message body, the SBC reformats it as a normal msgbody instead on mime content.

Root Cause: When a message is received with the mime content having single msgbody. After the SMM application on the message body, the SBC reformats it as a normal msgbody instead on mime content. The reformatting is not handled properly.

Steps to Replicate: Add the SMM rules that applies to the message body. Send a message with mime content having single msgbody in it.

The code is modified so that the SBC reformats mime body after the SMM application is formatted correctly.

Workaround: N/A

SBX-1019491

The P-Early-Media header with sendrecv was sent back to the ingress before the SDP was established.

Impact: When the makeInBandToneAvailable is disabled, on Tone And Announcement profile, the SBC sends the 180 Ringing with the PEM header as sendRecv even when the egress 180 has no SDP. This causes ring back issues on the ingress endpoints.

Root Cause: When the makeInBandToneAvailable is disabled, the SBC does not include SDP in the 180 message sent to the ingress but still sends a PEM header as sendRecv.

Steps to Replicate: With a fix, the SBC is sending PEM header as inactive when the makeInBandToneAvailable is disabled and the egress 180 Ringing has no SDP.

The code is modified to ensure the SBC sends PEM header as inactive when the makeInBandToneAvailable is disabled and egress 180 Ringing has no SDP.

Workaround: Enable the makeInBandToneAvailable on Tone And Announcement Profile.

SBX-101928 | SBX-1011451

Portfix SBX-101145 (originated in Release 8.2.1): The SBC is not sending the 183 (Dialog-2) to the ingress when the Downstream Forking and Loopback TG is configured.

Impact: The SBC is not sending the 183 (Dialog-2) to the ingress when preconditions and  Downstream Forking and Loopback TG is configured.

Root Cause: The preconditions are not handled in the ccE8S4 state when cc receives proc_msg.

Steps to Replicate: Configure preconditions, downstream forking and loopback TG. The egress leg receives a 183 for second dialog from UAS.

The code is modified to send the 18x message towards the ingress.

Workaround: N/A

SBX-958731

The eSBC crashed.

Impact: The issue occurred when the version 3 T.38 fax is enabled. In such a case, if a CED 2100 Hz is sent to the SBC to G711 leg while it gets T.38 ANSAM packets from T.38 side, the DSP hardware stack can crash.

Root Cause: The root cause came from an incorrect initialization in a third party T.38 stack.

Steps to Replicate: Please use the following section to replicate the issue:

The test setup to recreate this problem involves special SIPP scenarios and SBX configuration.
The SBC is configured for ingress as G711 and egress G711 with T.38 for Version 3.
Also, configure ingress PSP as transcode only and make sure that codecs allowed for transcoding for ingress has G711 and egress has both G711 and T.38.

Make a SIPP call using above scenario.
Before the fix, the DSP cores and reloads. Observe coredump directory.
After a fix, there is no core and dspchanstat shows 16 T38 packets from egress and 400 from ingress (for 10ms packet size).

The code is modified by getting a 3rd party stack that has the proper initialization and protection code to avoid a crash.

Workaround: N/A

SBX-101001 | SBX-999821

Portfix SBX-99982 (originated in Release 9.0): Observed the SCM process core on OpenStack T-SBC while running load.

Impact: Observed the SCM process core on OpenStack T-SBC while running load.

Root Cause: Missing the NULL check for the epRes before invoking IS_RES_AUDIOLESS,

Steps to Replicate: The steps cannot be reproduced.

The code is modified to add the missing NULL checks in all the places in NRMA for epRes before invoking the IS_RES_AUDIOLESS.

Workaround: N/A

SBX-96794 | SBX-936971

Portfix SBX-93697 (originated in Release 8.2.0): The PRS process cored on the M-SBC

Impact: The SCM coredump occurred when running the following test suite SBX-56559/Interwork P-Early-Media with a network that does not support the P-Early-Media and Relay.

Root Cause: The length of the string is not enough for logging and is causing the issue.

Steps to Replicate: Configure the system in sensitive mode and run the following test suite 56559/Interwork P-Early-Media with network that does not support P-Early-Media and Relay.

The code is modified to fit the required size and fix the issue.

Workaround: Configure the system in normal mode.

Severity 2 Resolved Issues

The following severity 2 issues are resolved in this release:

Resolved Issues - Severity 2

Issue IDSev

Problem Description

Resolution
SBX-990982

The SBC does not relay the 200 OK for UPDATE in the late media passthrough and reverse offer scenario.

Impact: In the latemedia relay call, the SBC may not be able to respond to an UPDATE if the previous 18x received is not PRACK.

Root Cause: A logical error due to the previous 18x did not have PRACK support, causing the SBC to be unable to send out the 200OK for an UPDATE.

Steps to Replicate: Latemedia relay, Egress offer SDP in 18x with PRACK, egress received subsequent 18x without PRACK, egress received an UPDATE with SDP. The SBC is unable to answer the UPDATE.

The code is modified so during a latemedia call if the SDP offer/answer is completed, the SBC is able to answer the UPDATE.

Workaround: Use the SMM to drop the 18x without PRACK if the SDP is not available.

SBX-99726 | SBX-970062

Portfix SBX-97006: The rows are not being deleted from the sipRegCountDomainCurStats on the timer registration's timer expiration.

Impact: The RCB count was being decremented without considering the associated URIs for a registered address-of-record (P-Associated-URI header), and as a result, the rows were not getting deleted from sipRegCountDomainCurStats (and also from sipRegCountDomainStats) on registration timer expiry.

Root Cause: This issue is present since the 'sipRegCountDomainStats' CLI was introduced in version 7.1.

Steps to Replicate: 

  1. Run a registration call.
  2. Wait till the timer expires and the row is deleted from sipActiveGroupRegStatus table.
  3. The same rows are still present in sipRegCountDomainCurStats table.
  4. All row(s) were deleted. 

The code is modified so the RCB decrements where all other statistics' counters are decremented, by considering the associated URIs.

Workaround: N/A

SBX-99175 | SBX-936892

Portfix SBX-93689: The SBC is not considering a silence period during monitoring the RTP restart.

Impact: Silent period configuration is not working as the NRMA is not sending the silent period value to the XRM. This is because the SIPSG is not passing NRMA_FLAG_APPLY_SILENT_PERIOD to NRMA.

Root Cause: This was implemented as part of SBX-70226 but it was not a customer requirement.

Steps to Replicate: 

  1. Run a 180 with SDP and no PEM is received, play the delayed RBT on failure and monitor the RTP.
  2. Subsequently, run a 183 without SDP and no PEM is received, continue monitoring and feed tone.
  3. Authorized RTP is received and then stop tone and cut-thru.
  4. Subsequently, run a 180 without the SDP and restart monitoring due to delayed RBT.

The code is modified so using the NRMA_FLAG_USE_MONITOR_PROFILE_PARAMS in NRMA for applies a silent period.

Workaround: N/A

SBX-943752

The IpPeer authPeer fails to delete.

Impact: When the IPPeer modified either zone/port/ip, the old authPeer data structure is not delete.

Root Cause: There was a memory leak.

Steps to Replicate: 

  1. Create an IPPeer with port aaaa.
  2. Change the IPPeer with different port bbbb.
  3. Change the IPPeer back to port aaaa.
  4. The call may fail.

The code is modified to delete the old data structure.

Workaround: Delete the ipPeer and create a new one (not modify).

SBX-99582 | SBX-995152

Portfix SBX-99515: Default LI: The X2 message does not have the timestamp set correctly.

Impact: In the default LI, the X2 message does not have milliseconds in the time stamp captured as part of the BCID avp.

Without this fix, the milliseconds in the time stamp field will be 000 and time stamp field will look like "Event Time: 20200429190440.000".

Root Cause: The Milliseconds data was never captured in time stamp field for the Default LI.

Steps to Replicate: Run a default LI call.

The code is modified to incorporate milliseconds. With this fix, the time stamp field looks like "Event Time: 20200429190440.541"

Workaround: N/A

SBX-91451 | SBX-880882

Portfix SBX-88088: The SBC is not intercepting any media packets of C leg(post REFER) when PCSI LI is received in 18x.

Impact: The SBC is not intercepting any media packets of C leg(post REFER) when the PCSI LI is received in the 18x.

Root Cause: The SS8 LI information was not exported from new call Leg to the master call post refer. Hence interception of the new party coming into call does not get intercepted even though it contains P.Com.Session-Info header and is a valid target.

Steps to Replicate: The REFER call flow with new party coming into call has P.Com.Session-info Header and is a valid target.

The code is modified so the SS8 LI information gets exported from new call Leg to the master call post refer. The interception starts on new party and continues on old party if it was getting intercepted before REFER.

Workaround: N/A

SBX-974152

The SIP FROM header constructed in SIP stack does not conform with the RFC.

Impact: The FROM header in the ACK is not the same as in the previous INVITE.

Root Cause: The issue, due to SMM, modified the FROM header in the INVITE and the SBC generate ACK based on the response.

Steps to Replicate: 

  1. Using SMM to modify FROM header in Invite Request
  2. Peer answer 200OK, with modified FROM header.
  3. The SBC generate ACK based on the From Header received in response.

The code is modified to send the FROM header in the ACK based on from original request.

Workaround: Use the SMM to restore the FROM header in 200OK.

SBX-99008 | SBX-945062

Portfix SBX-94506: Data Path mode is always 'a = sendonly'.

Impact: Whenever the SRS put the SIPREC call on hold with an a=inactive, the SBC always acknowledged SIP 200 OK with a=sendonly.

Root Cause: The SIPREC call hold was done by the SRS was not identified in terms of Signaling properly at the SBC.

Steps to Replicate: 

  1. The main call is stable.
  2. The SRS put the call on hold by generating SIPREC REINVITE with a=inactive.
    Expected and Observed Behaviour:-
    The SBC to respond 200 OK towards SRS with a=inactive.

The code is modified so the generation of RE-INVITE with a=inactive through appropriate CALL Hold Flag value for SIPREC.

Workaround: N/A

SBX-99424 | SBX-949482

Portfix SBX-94948: The SBC uses the incorrect DNS group to resolve the FQDN associated with diameter peer.

Impact: The SBC was using the incorrect DNS group to resolve the FQDN associated with diameter peer.

Root Cause: On attaching the dnsGroup to the zone, the SBC failed link dnsGroup Id with all the TGs of corresponding zone.

Steps to Replicate: Test case specific configuration:

1. Create two DNS Groups D1 and D2.

2. Create two ZONE's ZONE_ACCESS1 and ZONE_ACCESS2 and associate D1 and D2 DNS groups on respective ZONEs.
ZONE_ACCESS1 => D1
ZONE_ACCESS2 => D2

3. Create two TG's TG_ACCESS1 and TG_ACCESS2 under respective Zones.
ZONE_ACCESS1 => D1 and TG_ACCESS1
ZONE_ACCESS2 => D2 and TG_ACCESS2

4. On TG_ACCESS2, Enable rx.
* sipTrunkGroup -> media -> pcrf -> pcrfRealm = realm.nnnn.com
* sipTrunkGroup -> media -> pcrf -> pcrfCommitment = required

Procedure:
1. Enable diameter Peer state.
set addressContext default diamNode <Node_Name> peer pcrf1 state enabled

The code is modified to update/link dnsGRoup Id in all the TGs of zone whenever new dnsGroup attached to the zone.

Workaround

  1. After the dnsGroup configuration, perform a manual switchover (so during application restart and all configuration restored properly).
  2. The dnsGroup has to be attached to zone before creating TGs under this zone. When a new TG created under zone, it will read configured dnsGroup id.
SBX-99978 | SBX-999042

Portfix SBX-99904: ASAN stack-buffer-overflow in CommandLineParser::isBindProcess.

Impact: Stack_Buffer_Overflow in CommandLineParser::isBindProcess which cause PIPE Process get killed

Root Cause: We are creating a commandLineParser on the stack, and given the address of it to PIPE_PROCESS.
When the function then exits, at which point the stack variable goes out of scope.
but PIPE_PROCESS has a pointer to it and it uses it, although the variable doesn't exist anymore.

Steps to Replicate:

To Fix this , now used global object which has created in heap, so that variable will not go out of scope.

Workaround: N/A

SBX-99046 | SBX-939162

Portfix SBX-93916: The RC zero handling case applied for both SR/RR packets to fix garbage values reported in relay monitoring.

Impact: Remote RTCP packets had metrics corrupted when the received RR has no reception reports.

Root Cause: The reception report count zero case is handled for the SR, but not for RR packets, resulting in parsing the subsequent unrelated RTCP packet fields as reception report fields.

Steps to Replicate: Run calls with RTCP relay monitoring features, Test with RTCP Reception report present and absent SR, RR packets, verify the Remote RTCP monitored values.

The code is modified to fix the garbage values reported in the relay monitoring.

Workaround: N/A

SBX-998822

The SBC coredumped due to a pathcheck issue.

Impact: The pathcheck process may coredump when the pathcheck is state disabled on a FQDN based ipPeer.

Root Cause: The pathcheck process hit a race condition that can occur when the
DNS query completes after the pathCheck (on the FQDN based ipPeer) was state disabled, which can cause a NULL pointer access to coredump.

Steps to Replicate: This is a timing dependent issue, that is very difficult to reproduce.

Attempt to reproduce by defining the FQDN based ipPeer(s) with the pathcheck profiles state enabled.

Randomly state disable and state enable on the ipPeer(s) pathCheck profiles.

The code is modified to protect against the NULL pointer access.

Workaround: N/A

SBX-982002

The SCM Process has a memory leak (SIPSG) that was not freeing pSbyRcb→pcrfInfo.

Impact: Leaking the PCRF related structures on the standby when processing the registrations if the PCRF is configured on Trunk Group.

Root Cause: Memory that was allocated for the PCRF related structures is not being freed as part of de-registration processing.

Steps to Replicate: 

  1. Configure pcrfCommitment to something other than none.
  2. Set pcrf_signallingPath to enabled.
  3. Set pcrf_provSignalingFlow to enabled.

The code is modified to free the memory that is allocated for PCRF related structures as part of the de-registration processing.

Workaround: Workaround is to set pcrfCommitment to none.

SBX-98007 | SBX-945882

Portfix SBX-94588: The LSWU will fail/stall due to the upgrade.out permissions.

Impact: The LSWU would fail if the upgrade.out file permissions are incorrect.

Root Cause: Permission of staging files were not being properly updated during pre-upgrade checks, thereby failing to execute upgrade script if the permissions are incorrect.

Steps to Replicate: Perform the LSWU to the fix build and verify that upgrade is successful.

The code is modified to correctly update permissions of staging files during the pre-upgrade checks so that upgrade script executes successfully even if initial permissions are incorrect.

Workaround: N/A

SBX-99792 | SBX-980912

Portfix SBX-98091: The pattern 'rtpmap\:8\ PCMA\/8000' was not found in the 3 -> 183 SESSION PROGRESS.

Impact: In the forked call when the SBC receives multiple 18x from the Egress with a different To Tag, the SBC is not sending SDP in 18x toward the Ingress.

Root Cause: The SBC is not sending SDP toward ingress in 18x toward UAC when downstream forking is enabled.

Due to a bug in the matching, the common codec logic NRMA was unable find the common codec between previous 18x codec list and the current 18x codec. As a result, the SIPSG was not sending the SDP toward ingress due to common codec failure.

Steps to Replicate: 

  1. The 100rel is enabled on the Ingress side.
  2. Downstream Forking is enabled on the Egress side(lastProvResponse).
  3. Dialog ID Transparency is enabled on both the Ingress and Egress side set addressContext <addressContext Name> zone <zone Name> dialogTransparency <enabled>
  4. A sends the INVITE to B with 8.
  5. The SBC receives the following 18x on egress side:
    1. 18x:: codec: 0, TO tag: A
    2. 18x::codec: 8, TO tag: B
    3. 18x:: codec: 18, TO tag: C

Previously, the SBC was not sending SDP in 3rd 18x,with the fix SBC should be able to send in 3rd 18x toward ingress

The code is modified to select the common codec when the call scenario is specific to the updated answer feature.

Workaround: N/A

SBX-974612

Both the SBC CLI and EMA allows an invalid regex under the sipAdaptorProfile (SMM) to be configured that causes a SCM Process coredump once the SBC performs the regex operation (regstore).

Impact: The SBC may core when configuring the SMM with an invalid regex action.

Root Cause: The invalid action did not delete from rule when detect invalid.

Steps to Replicate: Configure the regex for invalid action, run an incoming call with valid criteria and the action taken may cause core.

Delete the invalid action from the rule to address the issue.

Workaround: Avoid configuring the regex with invalid action.

SBX-975132

The active calls count was much larger than the stable calls count.

Impact: The active calls count is much larger than the stable calls count under "show table global callCountStatus" after the memory is upgraded from 12 GB to 24 GB.

Root Cause: The SBC 51xx with the memory upgrade caused an incorrect GCID mask resulting in a incorrect active call count.

Steps to Replicate: The issue was not reproducible in the lab. The code has been fixed on the basis of coredump and code review.

The code is modified to set the correct GCID mask after a memory upgrade for SBC 51xx.

Workaround: N/A

SBX-99709 | SBX-990132

Portfix SBX-99013: A different JIP parameter is being sent by the SBC in 3xx scenarios.

Impact: The JIP parameter sent by the SBC in the P-DCS-Billing-Info in the redirected INVITE is not same as the JIP parameter present in 302 received.

Root Cause: The SBC was not saving the JIP Parameter present in the redirected INVITE properly into the message Info, and as a result, the information was lost and the wrong JIP parameter was sent in the redirected INVITE.

Steps to Replicate: 

PSX setup
==========

  1. Enable the 'Determine JIP' in feature control profile on ingress trunk group.
  2. 'Send' flag for JIP in Signaling Profile on egress trunk group.
  3. Configure 'Include Privacy' for P-DCS-Billing-Info header.
  4. Use JIP from 3xx in IP Signaling Profile.
  5. Configure globalized flag for JIP.
  6. Enable transparency for PDCS header on the first IP TG.
  7. Configure a standard route entry for the redirection number sent in contact in 302, so that the call is routed to a different IP trunk group. Configure this IP trunk group same as the first IP trunk group.

Test Procedure
===============

  1. Make a SIP-SIP call with JIP in the JIP parameter in P-DCS-Billing-Info header.
  2. Egress sends a 302 Moved Temporarily with a different JIP value and contact points to the SBC ip.

The code is modified so the SBC saves the JIP parameter in the message info so that while forming a redirected INVITE, the SBC picks the correct JIP parameter.

Workaround: N/A

SBX-99484 | SBX-956012

Portfix SBX-95601: The SIP-T IAM does not contain a generic number although the JJ9030 trunk contains a generic number in the initial INVITE.

Impact: On call from SIP to SIP-T, if the egress isup signaling profile has a Japan revision, if the Calling Party Number parameter in ISUP begins with digit '0', the Generic Number parameter of type Additional Calling Party Number is never included.

Root Cause: An error in porting GSX code to the SBC.

Steps to Replicate: Make a call from SIP to SIP-T, with egress isup signaling profile has a Japan revision. In the inbound INVITE, include P-Asserted-ID such that tel URI begins with '0' and tel DISPLAYNAME contains a different number. In such cases, Generic Number is expected in the IAM containing the tel DISPLAYNAME, but it is missing.

The code is modified so that the Generic Number parameter type Additional Calling Party Number may be included even when the Calling Party Number parameter begins with digit '0'.

Workaround: N/A

SBX-755632

There was an issue on the port number in the DBG log.

Impact: For the non-UDP calls, the peer IPs of all status messages sent from the SBC to the UAC in TRACE log will be displayed as through the header's IP. The messages are sent to the right IP, which sent the request message to the SBC.

Root Cause: The original code would overwrite the SipMsg's peerIp with the header. The PeerIp will be used to print in trace log.

Steps to Replicate: 

  1. Set up TCP calls, and TLS calls.
  2. Make the header's IP different from UAC IP.
  3. Make the call, collect the TRC log. DBG log could be also collected as debug tool.
  4. Ensure that all out going messages are sent to right IP:Port in displayed in TRC log.

The code is modified so the SipMsg's peerIp is set to source the IP.

Workaround: No workaround needed. This is a display problem. It does not affect the SBC functionality.

SBX-99903 | SBX-950832

Portfix SBX-95083: The SBC was terminating all the (Transfer Target and Transferee) call legs after call transfer in OpenStack | AWS.

Impact: The SBC was terminating all the (Transfer Target and Transferee) call legs after call transfer in OpenStack | AWS.

Root Cause: The SBC signaling plane was quickly reusing the same RTCP gen media resource with this call transfer modification scenarios, and the media plane rejecting the reuse of this resource, resulting in call failures. The media plane disables the original resource only after sending last RTCP packet from media plane, then only it allows the reuse.

Steps to Replicate: Enable the NoBye RTCP Gen options, and test the call transfer, modify scenarios as follows:

  1. Make call from PSTN endpoint to Teams endpoint (simulated in SIPp).
  2. Answer the call as Teams client.
  3. Initiate blind transfer from Teams client to another Teams client.
  4. Disconnect the call at PSTN endpoint.

The code is modified to allow this reuse with NoBye RTCP Gen option. Allowing the signaling plane to reuse the same media resource for these call transfer, modifications to work.

Workaround: Disabling the RTCP Gen/term from the SBC, and using RTCP relay will not have such issues.

SBX-95864 | SBX-951262

Portfix SBX-95126: The SCM Process had a coredump after PRACK.

Impact: The SCM Process coredumps because when memory is double freeing the Dialog Scope Variable Data.

Root Cause: Double free of Dialog scope variable data is occurring when both the SipAdapter profile and the Flexible Adapter profile is configured on the same TG.

Steps to Replicate: The  SMM Rule to store a dialog scope variable for all message, flexible Adapter Profile with advanced SMM enabled and dialog scope variable rules for messages. Attach to the ingress TG both of them.

And run 18x/Prack call flow. A coredump will occur.

The code is modified to not to perform a dialog scope variable data.

Workaround: Disable the Advanced SMM in the FlexiblePolicyProfile.

SBX-99768 | SBX-946592

Portfix SBX-94659: The EMA is disabled on Ingress. The SBC fails to send an UPDATE immediately towards Ingress when the SBC is feeding tone and 183 is received with an different SDP with PEM:sendrecv.

Impact: The EMA is disabled on Ingress. The SBC fails to send an UPDATE immediately towards Ingress when the SBC is feeding tone and 183 is received with an different SDP with PEM:sendrecv.

Root Cause: When the SBC was playing the tone and the PEM sendrcev is received, the SBC was not stopping tone and the update was not sent as a result.

Steps to Replicate: 

  1. The TMO sends an INVITE with SDP pcmu, PCMA with PEM:supported.
  2. The VoLTE sends 180 without SDP without PEM.
  3. PRACK /200 Ok is done.
  4. The VoLTE sends 183 with SDP PCMA with PEM:sendrecv.
  5. PRACK/200 OK is done.
  6. The VoLTE feeds the RTP.
  7. The VoLTE sends 200 OK INVITE.
  8. The TMO sends BYE.

When the condition is satisfied EMA is disabled and the SBC is playing tone, the PEM rcvd with the Sendrcev SBC stops the tone.

Workaround: N/A

SBX-973152

The show table address Context default command output is failing. As a result, the following error is seen Error: addressContext default ipsec ipsecSaStatistics: Get Request Timeout.

Impact: The CLI show command timed out when retrieving the IPSEC stats.

Root Cause: The problem was that default address context was only being added into IKE icb's acList, if the user has configured at least LIF group for the default address context.

Steps to Replicate: 

1. Ensure no LIF group for default address context.
2. Issue the CLI command "show status addressContext default".

The code is modified to add the default address context into the acList at initialization.

Workaround: Configure a LIF group on the default address context.

SBX-993612

There was a customer SBC memory leak.

Impact: There is a bug in the “clearTcpConnectionsforRegistration" functionality that causes a memory leak.

Root Cause: This code that handles the clearTcpConnectionsforRegistration flag is allocating memory to store Hostname and Username, but it never freeing this memory.

Steps to Replicate: Design set up the customer's configuration with the “clearTcpConnectionsforRegistration” flag set.
Design was able to reproduce the leak by running load with Registrations and de-Registrations.

The code is modified to free the memory that is allocated to store the Hostname and Username.

Workaround: The workaround is to set clearTcpConnectionsforRegistration to Disabled on the TG.

SBX-967112

Some calls on hold are followed by REFER fails.

Impact: Calls on hold before the blind transfer may cause a call teardown.

Root Cause: There is a race conditions in state machine during call transfer between transfer legs might cause offer answer timeout that tear down the call.

Case 1: After A or B transfer to C, if B or A sends Bye immediately (after received Notify(connect), and the SBC received reInvite from C (after received ACK). The internal resources bridging logic might not complete yet and caused the internal state error that trigger offer answer timeout.

Case 2: Similar to case 1, A or B put onhold before transferring to C. After received 200OK from C, there is an internal offer/answer off hold, and received BYE immediately will cause an offer/answer timeout.

In other words, during bridging connection, if there is additional offer/answer, the SBC might hit the race condition.

Steps to Replicate: 

  1. The A call B, B put on hold, B refer to C.
  2. C answers the fast connection. B received Notify connect, B send bye immediately.
  3. Small load may caused call tear down due of offer answer timeout or C sends reInvite immediately to the SBC after received Ack.

The code is modified to wait for the internal resources bridging to be done before sending the Notify(connect) to A or B. So that the race condition offer/answer avoids when receiving Bye from A or B.

Workaround: Have A or B delay (200ms) before sending BYE.

SBX-96699 | SBX-915702

Portfix SBX-91570: A call from MS Teams had an audio loss for 30 seconds and switchover.

Impact: The MS Teams to PSTN call flow with the DLRBT enabled on a software SBC. If there is an SBC switchover after the call is established, there can be a delay (e.g. 30 seconds) in the re-established the media from PSTN to MS Teams direction.

Root Cause: The stored SSN value does not get updated before the SBC switch-over occurs, and it causes the SSN jump backwards after switchover, which causes the one way audio issue for sometime until the SSN value increments past the previously sent value.

Steps to Replicate: Run theMS Teams to PSTN call flow with DLRBT enabled on a software SBC. Perform a switch-over after the LRBT is played and check there is no one way audio issue.

The code is modified so after the LRBT is played the latest SSN value is sent to the standby SBC so it can correct jump, the SSN forward on a switchover and media flow continues without delay post switch-over.

Workaround: N/A

SBX-99711 | SBX-962552

Portfix SBX-96255: The LeakSanitizer detected memory leaks at SipDialogResizeRouteSetCmd.

Impact: Detected a memory leak in the SipDialogResizeRouteSetCmd when running a Subscribe Notify Call flow.

Root Cause: The SipDialogResizeRouteSetCmd will cause a memory leak in case of error scenario.

Steps to Replicate: This issue is only reproducible when using ASAN images in engineering lab.

The code is modified to fix the memory leak in this function.

Workaround: N/A

SBX-1004142

The Q.850 reason causes a mapping issue.

Impact: When an invalid cause=parameter is received in the Reason: Q.850 header, the SBC accepts invalid cause value and converts into valid value.

This would result in an incorrect CPC to the SIP cause mapping and impact SIP messaging on other leg. Reason: Q.850;cause=600;text="Busy Everywhere"

Root Cause: The SBC incorrectly validates the cause= parameter in Q.850 reason header.

Steps to Replicate: 

  1. Send 600 Busy Everywhere from egress endpoint with cause = 600: Reason: Q.850;cause=600;text="Busy Everywhere"
  2. Verify the issue.

Due to a bug, the SBC maps invalid cause value 600 to 88 (0x58) and when the mapping CPC to SIP, theSBC sends 503 to Ingress side.

Perform the same scenario.

The SBC sends 486 Busy Here to ingress as invalid Q.850 cause code is ignored.

The code is modified to ensure the SBC correctly validates the cause= parameter in Reason header.

Workaround: Use SMM to filter our Reason header with invalid Q.850 cause parameter.

SBX-100168 | SBX-996592

Portfix SBX-99659: The call route was received by route and egress is TLS, the RURI port is not incrementing by 1.

Impact: The call route was received by route and egress is the TLS, the RURI port is not incrementing by 1.

Root Cause: There was missing logic to increment port by 1.

Steps to Replicate: Configure the call received route, the incoming call has route IP but no transport parameter. The SBC sends out an INVITE without an increment port in the RURI.

The code is modified to increment the port by 1.

Workaround: Use the SMM to increment port.

SBX-99984 | SBX-975752

Portfix SBX-97575: The stack-buffer-overflow on address 0x7f06eb2d3028 at the pc 0x55f5f05c7d56 bp 0x7f06eb2d2a80 sp 0x7f06eb2d2230.

Impact: The stack-buffer-overflow on address 0x7f06eb2d3028 at the pc 0x55f5f05c7d56 bp 0x7f06eb2d2a80 sp 0x7f06eb2d2230

Root Cause: String was getting copied using the strcpy where source size was bigger than destination size. So it was causing stack buffer overflow issue.

Steps to Replicate: Rerun the testcase/scenario to verify.

The code is modified to run the StrNCpyZ and passed the destination size as third argument to resolve this buffer overflow issue.

Workaround: N/A

SBX-100246 | SBX-999512

Portfix SBX-99951: On sending message to egress side, the SBC is sending MIME-Version twice.

Impact: When the MIME Header is received along with multipart method, the MIME header is going twice in the outgoing Message Method when transparency is enabled.

Root Cause: The two Headers are going one because of transparency and another one added by the SBC.

Steps to Replicate: 

  1. Configure SBC for Basic 3xx SIP to SIP call.
  2. Register the User and send MESSAGE from the Registered user.
  3. Send Content-Type: multipart/mixed in MESSAGE.
  4. Check for Content-Type: multipart/mixed transparency in MESSAGE after 3xx redirect.

The code is modified so when the multipart body is present do not add header by transparency.

Workaround: N/A

SBX-100040 | SBX-975762

Portfix SBX-97576: The LeakSanitizer detected memory leaks at the SipDialogEnablePDUTrace.

Impact: This issue is only reproducible when using the ASAN images in engineering lab. There is a leak detected when running Video Regression.

Root Cause: Memory is being allocated without checking whether it is been allocated before or not

Steps to Replicate: This issue is only observed when running call flows with ASAN images in the engineering lab.

The code is modified to free memory before allocating the new memory.

Workaround: N/A

SBX-99683 | SBX-983192

Portfix SBX-98319: The AddressSanitizer detects a heap-use-after-free in MrfRmCallControlBlock.

Impact: The heap after free memory use is deleted when running the MRF Call flow, where the call is connected on the MRF side and receive a error response from MRF.

Root Cause: We are freeing mrfrmCcb in OANULL::ntwkDiscHndl, but we still access the mrfrmccb in the caller function that leads to access of heap after free memory.

Steps to Replicate: This issue is only reproducible when using ASAN images in engineering lab.

The code is modified to not to free MrfRmCcb in OANULL::ntwkDiscHndl, but setting a Destoy_ccb bit and it will be freed in the caller function

Workaround: N/A

SBX-100243 | SBX-1000752

Portfix SBX-100075: The AddressSanitizer detected the heap-use-after-free on address 0x6230000e31dc at pc 0x560c37742937 bp 0x7f62795d68d0 sp 0x7f62795d68c8.

Impact: In case of a scenario where the INVITE is rejected because it received more than 10 Route Headers, then the pstCall is getting freed, but application is still using that pointer.

Root Cause: The pstCall is getting freed, but the pointer is not setting NULL.

Steps to Replicate: 

  1. Register an end user with a registrar through the SBC.
  2. Run a call by sending an INVITE with 21 Record-Route headers.
  3. An RCB must be created for the end user.
  4. The SBC should reject the INVITE with a 500 response. 

The code is modified so the pstcall is set to NULL after freeing that.

Workaround: N/A

SBX-100004 | SBX-1000022

Portfix SBX-100002: The JIP parameter is not being sent in the PAI header.

Impact: The JIP parameter received in 3xx was not sent in PAI header.

Root Cause: This is because of the Enhanced Local Redirection changes done in 7.2.3 R1.

Steps to Replicate: 

  1. Make a SIP-SIP call with JIP in the JIP parameter in PAI header.
  2. Egress send 302 Moved Temporarily with different JIP value.

The code is modified to fix this issue.

Workaround: N/A

SBX-906752

The SBC inserts the port number 5060 in the Record-Route headers.

Impact: The SBC adds a default port as 5060 for transport TLS in Record Route header of 18x.

Root Cause: When the flag noPortNumber5060 in IPSP is disabled, the SBC adds the default port in the Record Route header of 18x if the INVITE does not contain a port in RR.

Steps to Replicate: 

Include Record Route header in an INVITE as mentioned below.


Record-Route:<sip:10.xx.xx.xxx:4589;transport=tcp;lr>,
<sip:10.xx.xx.xxx;transport=tcp;lr>,
sip:HHSIP@10.xx.xx.xxx;av-asset-uid=rw-75a842d6;lr;transport=tls>

Make the call and answer the call.
The SBC sends 18x towards ingress side.

Verify the Record Route in 18x.
Record-Route: <sip:10.xx.xx.xxx:4589;transport=tcp;lr>
Record-Route: <sip:10.xx.xx.xxx:5060;transport=tcp;lr>
Record-Route: <sip:HHSIP@10.xx.xx.xxx:5061;av-asset-uid=rw-75a842d6;lr;transport=tls>

The code is modified so when the flag noPortNumber5060 in IPSP is disabled, the SBC adds the default port 5061 for TLS transport and 5060 for other transports in the record route headers, if the corresponding request/response does not contain port in record route header.

Workaround: The flag noPortNumber5060 in the IPSP is enabled. Then the SBC does not add default port.

SBX-99717 | SBX-961472

Portfix SBX-96147: The AddressSanitizer detected a heap-use-after-free on the address 0x60400047f020 at pc 0x561f45771c9f bp 0x7f4227923c60 sp 0x7f4227923c58.

Impact: The Heap-After Free memory is getting used in an scenario where the INVITE is getting rejected in the UasReceiveCallCmd().

Root Cause: In case of the failure in uacReceiveCallCmd, there is a chance in sending an error response, and when an error response is sent, a To Tag needs to be sent that is allocated in pstCall, so the pstCall must not be freed before sending that response.

Steps to Replicate: This issue is only reproducible when using ASAN images in engineering lab.

The code is modified to not free the pstCall in this case until an error response is sent.

Workaround: N/A

SBX-992812

The Customer AWS SBC A-side inaccessible and the B-side did not take over.

Impact: Interface connectivity loss can occur(on mgt0, pkt0,pkt1) when the MTU set on the interface is more than 1500 and jumbo frames are transmitted out of interface.

Root Cause: In the DPDK kni module, jumbo frames are not handled properly resulting in slow leak of buffers.

Steps to Replicate: Set the MTU on an interface as 9000. Ping the large packets from the SBC to gateway.

The code is modified to prevent setting the MTU more than 1500 on interface.

Workaround: Set the MTU on interface as 1500 or less.

SBX-992992

The SBC was routing calls to the wrong port number when targets were defined by the SRV records, and one or more targets get blacklisted.

Impact: When the IP peer is configured as FQDN and the FQDN resolves into two IP address, port combinations, and when one of the peer is blacklisted, the SBC may start sending a call to an invalid IP address, port combination.

Root Cause: When one of the peer is blacklisted, the SBC uses a port from the blacklisted peer.

Steps to Replicate: 

  1. Configure the FQDN as IP PEER.
  2. Configure the DNS server to respond with 2 records.
  3. One of the peer is down or unresponsive.
  4. After a certain number of calls, the SBC starts sending a call to the invalid IP and port combination.

Verify the fix:
Ensure the SBC sends all calls to correct IP and port combination.

The code is modified to ensure the SBC uses correct port when the IP Peer is configured as FQDN and one of the peers is blacklisted.

Workaround: N/A

SBX-100106 | SBX-981472

Portfix SBX-98147: The SBC is not forwarding a 200 OK response of the OOD INFO to INGRESS SLB.

Impact: The INFO message response was not being sent to correct SCM and as a result, the SCM was not getting the related TCB and dropping the message there.

Root Cause: The INFO message in the "From" header Tag was not including SCM information and as a result, the SIPFE was unable to get the correct SCM to process this response.

Steps to Replicate: 

  1. Enable the non-invite relay configuration in TG.
  2. The UE Client Send INFO message to the SBC.
  3. The SBC will add the "From" header tag and forward it to UE server.
  4. The UE server will send 200 OK towards the SBC.

Platform/Feature: SBC

The code is modified to include the SCM information in the "From" header tag.

Workaround: This issue will not be seen in the SBC with single SCM process.

SBX-99715 | SBX-948382

Portfix SBX-94838: From the EMA PM, once the GateKeeper Access is enabled, it is getting updated as 'disabled' instead of 'enabled'.

Impact: From the EMA PM, once the GateKeeper Access is enabled, it is getting updated as 'disabled' instead of 'enabled'.

Root Cause: This issue was due to missing ACLs on the third and fourth management ports.

Steps to Replicate: 

  1. Login to securelink.sonusnet.com.
  2. Generate the registration codes for Active 5400 SBC and Standby 5400 SBC.
  3. Login to respective SBC EMA PM.
  4. Navigate to Secure Link ( Administration -> System Administration -> Secure Link).
  5. Provide DNS IP address and Registration code(generated in step 2).
  6. Click on 'Enable GateKeeper Access'.

Note: Enabling the Gatekeeper access is done with different registration codes in Active and standby setup. From the EMA PM, once the GateKeeper Access is enabled, the status should show as 'enabled'.

The code is modified to support the ACLs for the third and fourth management ports..

Workaround: N/A

SBX-100623 | SBX-1005572

Portfix SBX-100557: The SBC fails to send a NOTIFY with 200 OK in the message body in the Attended Call Transfer.

Impact: The SBC fails to send the final SIP NOTIFY message to the transferor in an Attended call transfer scenario.

Root Cause: The SBC fails to communicate the call transfer complete notification across its two call processing modules, which led to this issue. The communication was broken due to recent fix for SBX-96711.

Steps to Replicate: 

  1. Make a basic call configuration.
  2. User A Calls User B through the SBC.
  3. User B puts User A on hold.
  4. User B calls User C through the SBC.
  5. User B puts User C on hold.
  6. User B sends REFER with the replaced information of User A dialog details to replace A - B call with A - C.
  7. The SBC transfers the A - B call to A - C.
  8. Sends BYE towards User B for A - B Call.
  9. Send final NOTIFY to user B to communicate transfer is successful.
  10. User B sends BYE for the B - C Call.
  11. The A - C call continues.

The code is modified to correctly use both the SBX-96711 fix and to rebuild the broken communication across call processing modules.

Workaround: N/A

SBX-99198 | SBX-978042

Portfix SBX-97804: There was incorrect FQDN routing.

Impact: There was incorrect FDQN routing occurring that causes calls to route to the wrong destination.

Root Cause: This is occurring in some cases where the retransmitted DNS transaction ID of the earlier transaction matches with the existing transaction. This causes the records to save for the incorrect FQDN.

Steps to Replicate: No known steps to reproduce the problem.

The code is modified so whenever the DNS reply is processed that the FQDN matches what is received in DNS reply and stored in the transaction.

Workaround: N/A

SBX-1003732

The Standby SBC memory at 94% seems the SCM Process was leaking.

Impact: The SCM process on standby is running out of memory when the path headers are included in the Registration messages.

Root Cause: The SCM process on standby is leaking a SIP structure related to the path headers that are included in the Registration messages.

Steps to Replicate: Design should reproduce this issue by running Registration load which includes path headers in egress Registration messages.

The code is modified to free the structure that had been leaking.

Workaround: N/A

SBX-979472

Pathcheck issue when TLS is in use - SRV DNS lookup returns port 5061 and SBC increments it by 1 when initiating the TLS connection.

Impact: 

When pathCheck is enabled on a FQDN based ipPeer, and TLS transport is specified, the port number returned by the DNS SRV query for TLS (_sips._tcp) is incremented by 1 causing the wrong port number to be used.

This problem only effects the transmission of PATHCHECK OPTIONS pings when the TLS transport is specified, and the port number is obtain by DNS SRV query for TLS. There is no direct effect on SIP calls.

Root Cause: The SCM process incremented the port number passed to it by PATHCHECK
when it should not have, in the case where the port number was obtained by a DNS SRV query for "_sips._tcp" (TLS).

Steps to Replicate: Click this link to jump to expanded steps.


Updated the PATHCHECK and SCM processes so that port numbers obtained by a DNS SRV query for "_sips._tcp" (TLS) are not incremented.

Workaround: Configure the FQDN based ipPeer's pathCheck hostPort to the appropriate port number.

SBX-100248 | SBX-997482

Portfix SBX-99748: The AddressSanitizer detected a heap-buffer-overflow on the address 0x6060007e96d0 at pc 0x55c8b4f2b47b bp 0x7efe153ce020 sp 0x7efe153cd7d0 READ of size 1 at 0x6060007e96d0 thread T9.

Impact: The issue occurs on a SIP-I call when accessing the 18x msgHandle after freeing the memory.

Root Cause: The MsgHandle being used is already freed and does not need to be freed, which caused the issue.

Steps to Replicate: Run a SIP-I call in an ASAN Build.

The code is modified to address the issue.

Workaround: N/A

SBX-884642

The RCB state is not changed to challenged when the REGISTER refresh has multiple contacts.

Impact: The SCM process fails to properly handle RCB state transition to SIPRA_RCB_STATE_UPDATING, when a 401/407 challenged REGISTER refresh occurs. The RCB state shows completed verses challenged.

The SipRaRegisterProgressFailureNfy() fails to handle the REGISTER refresh (containing multiple contacts) in SIPRA_RCB_STATE_UPDATING.

Root Cause: A call to SipRaAnyNewBindings() always returns TRUE, when REGISTER contains multiple contacts, which results in transition to SIPRA_RCB_STATE_UPDATING (verses SIPRA_RCB_STATE_REFRESHING).

Steps to Replicate: 

Provision the SBC to handle 401/407 challenged REGISTER refresh scenario.

REGISTER -->
<-- 401/407 { Verify register state challenged }
REGISTER -->
<-- 200 { Verify register state completed }

REGISTER --> { Register Refresh }
<-- 401/407 { Verify register state challenged }
REGISTER -->
<-- 200 { Verify register state completed }

The code is modified to handle the REGISTER refresh (containing multiple contacts) in the SIPRA_RCB_STATE_UPDATING.

Workaround: N/A

SBX-100262 | SBX-1000592

Portfix SBX-100059: After observing an overnight call load run, ping with size more than 1453 is not reaching to the SBC.

Impact: The SBC SWe can get into a state where it cannot receive and reassemble fragmented packets.

Root Cause: For the fragmented packets that take close to 1 second to send the complete context, the network processor could decrement the incorrect interface "current number of fragments context in use" counter.

The network processor has a maximum fragment context in use limit and once it hits that limit, it will not accept new fragmented packets.

Steps to Replicate: Send fragmented packets that take 1 second to complete to pkt0, pkt1 or mgt1 port.

This may take some time but eventually the interface stops accepting fragmented packets without the fix.

The code is modified to decrement the correct interfaces "current number of fragment context" counter.

Workaround: No workaround available. Try not to send a very large fragmented packet to the SBC.

SBX-1000852

The SCM process coredumps SipSgHashLookup on the OOD OPTIONS/Subscribe.

Impact: The SCM process may coredump while doing a SipSgHashLookup on a OOD OPTIONS/Subscribe message.

Root Cause: The sipsgRelayCbHashTbl was corrupted where a list head is corrupted and there is not additional information to state what caused the corruption. The issue may have been caused by an entry added to the hash table twice (maybe with different keys).

Steps to Replicate: Not reproducible in the lab. Ran an OOD Subscribe and Options load and found no crash.

The code is modified to ensure the hash table entry is explicitly removed from the hash table, even if the hashlookup fails and also avoids adding a duplicate entry.

Workaround: N/A

SBX-100513 | SBX-1004812

Portfix SBX-100481: Observed the jitter more than 5ms in the passthrough call load.

Impact: More than 5ms jitter and relatively high packet loss was observed in the passthrough calls observed in some cases.

Root Cause: Segregation of media and non-media processes at initialization time may fail occasionally, leading to the non-media processes landing on vcpus meant for media processing.

This leads to a higher jitter and possibly higher packet loss.

Steps to Replicate: Issuing the following command shows only the  yield kernel threads and SWe_NP processes:

cset proc -l root

The code is modified to handle the function reliably.

Workaround: Reboot the instance.

SBX-925842

The flag 'statusUpdateSupport' is not working.

Impact: The SBC includes the Accept and Allow headers while generating OPTIONS ping requests towards the peer even when the statusUpdateSupport flag is disabled.

Root Cause: The code was not setting the flag correctly and passed the "Accept" and "Allow" headers irrespective of the statusUpdateSupport flag.

Steps to Replicate: To replicate/verify the issue configure the path check profile and set the stausUpdateSupport flag disabled. The SBC does not send the Accept and Allow header in the OPTIONS ping towards the peer.

The code is modified to handle the statusUpdateSupport flag correctly.

Workaround: The customer can use the SMM rule to remove the Allow and Accept headers from the OPTIONS ping.

SBX-1000592

Observed an after overnight call load run, ping with the size more than 1453 is not reaching to the SBC.

Impact: The SBC SWe can get into a state where it cannot receive and reassemble fragmented packets.

Root Cause: For the fragmented packets that take close to 1 second to send the complete context, the network processor could decrement the incorrect interface "current number of fragments context in use" counter.

The network processor has a maximum fragment context in a use limit and once it hits that limit, it will not accept new fragmented packets.

Steps to Replicate: Send the fragmented packets that take 1 second to complete to pkt0, pkt1 or mgt1 port.

This may take some time but eventually the interface stops accepting fragmented packets without the fix.

The code is modified to correct the interfaces "current number of fragment context" counter.

Workaround: No workaround available. Try not to send a very large fragmented packet to the SBC.

SBX-101424 | SBX-1011562

Portfix SBX-101156: When a video call is on hold, the SRTP context for video is omitted.

Impact: The SBC offers the RTP context for video stream instead of the SRTP during the RESUME re-Invite after a HOLD is performed with the video mediaPort being zero.

Root Cause: Certain code was copying the SRTP info from a previous active SDP in order to retain the same SRTP key in subsequent call modifications. However, it does not handle the case if that particular stream is removed in between and then added back.

Steps to Replicate: Click this link to jump to expanded steps.


The code is modified to copy the SRTP info from previous active SDP only if the stream is valid in that SDP.

Workaround: None.

SBX-1007992

The SYS is filling up the "mcsEncodeCPC_MSG_INFO_STR: CPC_OP_STR parameter length mismatch".

Impact: The following log message is filling up the SYS log when the STIR/SHAKEN feature is in use:

MAJOR .GWCM: mcsEncodeCPC_MSG_INFO_STR: CPC_OP_STR parameter length mismatch: sizeof length 152: parameter length 216, parameter:397

Root Cause: There is code in the SAM that is checking for an internal inconsistency and logging this message when it detects an internal inconsistency.

In this specific case, the message is being logged unnecessarily and it does not indicate any impact on customer functionality.

Steps to Replicate: Setup the SBC and PSX for STIR/SHAKEN call flows and run a GW-GW call.

The code is modified to ensure that this message is no longer logged for in this very specific scenario.

Note: This specific message (for parameter:397) does not indicate any impact on customer functionality.

Workaround: There is no workaround. 

SBX-1013052

There was an issue in the call load during switchovers and when provisioning coredumps.

Impact: The Ipsec data is stored for all signaling ports. The Ipsec state array size was different from the signaling ports array. As a result, the ipsec state array was being overwritten.

Root Cause: Overwriting the array beyond its size led to memory corruption.

Steps to Replicate: While configuring the SBC, add the sigPort with index 4096.

Load testing at 500 cps for 15 hrs.
Switchover testing.
Physical port redundancy testing during load.
Customer configuration testing during load.

The crash should not occur.

The code is modified to increase the Ipsec size state so that it can hold same number of entries as the signaling ports array.

Workaround: While adding the sigPorts, do not add sigPort index 4096.

SBX-100033 | SBX-993582

Portfix SBX-99358: The basic C2C-Call is not getting cleared in the Call DetailedStatus and MediaStatus after terminating through the CallTermination Feature(OOD REFER).

Impact: Upon getting the DISC_CFM in VIRT_ESCR_DREQ, the CC informs ASG by calling the CcReportEventToMultipartyScript.

Then on the CC_EV_ASG_SCRIPT_COMPLETE_NFY, the event CC terminates the CCB.

But since the CC_VIRT_ESCR_NULL was not changed, the CC_EV_ASG_SCRIPT_COMPLETE_NFY event was ignored and the CC was stuck in VIRT_ESCR_DREQ state.

Root Cause: The CC was stuck in the VIRT_ESCR_DREQ state.

Steps to Replicate: 

  1. Make A to B call.
  2. Transfer A to C.
  3. Terminate the call using CLI:  Request global terminateCall GCID.
  4. Both legs should get cleared.

The coso that on event CC_EV_ASG_SCRIPT_COMPLETE_NFY, CC clear the CCB.

Workaround: N/A

SBX-101312 | SBX-905052

Portfix SBX-90505: The ACK is not sent from the SBC after a call transfer when the Announcement Based Tone is configured.

Impact: The A call B, B refer to C, and then play the Tone with announcement. The SBC fails to send abort tone and send the ACK to C.

Root Cause: When the cutthru occurs, the SBC fails to abort tone due to media in use.

Steps to Replicate: Enable the tone as announcement, A call B, B refer to C. C responds with 180(play tone announcement), and then responds with 200OK.

The SBC fails to abort tone and send the ACK to C.

Reset the media in used, and abort tone when the cutthru occur.

Workaround: Switch to the tone using the DSP.

SBX-100270 | SBX-986782

Portfix SBX-98678: The CUCM initiated a Call Transfer: the Re-INVITE for 200 OK from the SBC is having two different m-lines with the sendonly for audio and sendrecv for video during a DM call.

Impact: The Re-INVITE for 200 OK from the SBC is having two different m-lines with sendonly for audio and sendrecv for video during a DM call.

Root Cause: Because of some code in SIPSG which blindly overwrites video dpm to SEND RECV.

Steps to Replicate: 

  1. The initial call flow is pass thru A<->B.
  2. A transfers to C (Direct Media call from here).
  3. B sends hold to C by sending a=inactive and c=0.
  4. B sends late media re-invite without SDP to C.
    -> While responding locally to a late media re-Invite, the SBC blindly copies DPM=SEND_RECV for video, which creates this inconsistency as audio is sent out by the SBC as per last SDP negotiated on that leg (which is inactive) but video=sendRecv always.

The code is modified for condition only if the coreaudio Dpm also SEND_RECV.

Workaround: N/A

SBX-101240 | SBX-1009802

Portfix SBX-100980: Unable to create a SIP SIG port on the SBC5400 after an upgrade to 8.2.1R0.

Impact: After an upgrade, an additional sipSigPort cannot be created on the SBC5400 in certain ipInterfaceGroup configuration. These SBC5400 configuration has an ipInterfaceGroup with ipInterfaces on packet ports on {pkt0,pkt2}, {pkt0,pkt3}, {pkt0,pkt2,pkt3}, {pkt1,pkt2}, {pkt1,pkt3}, or {pkt1,pkt2,pkt3} sets.

Root Cause: During an upgrade, the SBC5400 did not consider the fact that packet ports pkt0,pkt1,pkt2,pkt3 were all handled by the same Network Processor (NP). Instead, the SBC5400 behaved like the SBC5200. The pkt0,pkt1 were handled by NP#0 while pkt2,pkt3 were handled by NP#1.

Steps to Replicate: 

  1. Configure an ipInterfaceGroup, LIG1, with ipInterfaces on pkt0 and pkt2 on SBC5400. Configure sipSigPort 1 with ipInterfaceGroup LIG1.
  2. Configure another ipInterfaceGroup, LIG2, with ipInterfaces on pkt1 and pkt3 on
    SBC5400. Configure sipSigPort 2 with ipInterfaceGroup LIG2.
  3. After an upgrade to 7.2.5, add a new sipSigPort with ipInterfaceGroup LIG1.
  4. (Optional) After Upgrade to 7.2.5, add a new sipSigPort with ipInterfaceGroup LIG2.

After another upgrade, the SBC5400 correctly sets the packet port to the NP mapping table entries.

Workaround: N/A

SBX-98300 | SBX-937472

Portfix SBX-93747: When the transfer call to PSTN is rejected around 9-10 times, the initial call with TEAMS gets disconnected.

Impact: The call segment created after REFER-INVITE is not cleared, even on the non-2xx response. Instead, move to the segment to the deleted state.

Root Cause: The call segment created after REFER-INVITE is not cleared, even on the non-2xx response. Instead, move to the segment to the deleted state, but do not clear it by design (Below is the reason mentioned)

Note: The associated leg cannot be deleted, because some event originated from this legId  may be dispatched and if the associated leg is removed now, there is no way of finding the "scrLegId" (which is required to report to ASG) for the associated leg. 

Steps to Replicate: 

  1. Make call from A to B.
  2. Transfer from B to C.
  3. Reject the transferred call at C.
  4. Repeat that for 10 times.
  5. The initial call should not fail.

The code is modified to check for available segments to CcProcessSipReferRequest (when processing the defer). If the associated segments array is exhausted, the CcCgMake is not called. Instead, fail to transfer with the NOTIFY (503 service unavailable).

Workaround: N/A

SBX-96675 | SBX-951492

Portfix SBX-95149: During a direct dial to call queue, the transfer to agent gets disconnected automatically after 20 seconds as TEAMS releases the call.

Impact: These are the steps to replicate the issue as a result of which call gets disconnected.

  1. PSTN dials CallQ number. TEAMS1 is configured in call queue.
  2. TEAMS1 transfers call to TEAMS2.
    The call disconnects because the SBC does not acknowledge a message on the egress side.

Root Cause: This is due to some stuck states in the SBC call control.

Steps to Replicate: 

1. The PSTN dials CallQ number. TEAMS1 is configured in call queue.
2. TEAMS1 transfers call to TEAMS2.

The code is modified so the state transition occurs correctly in the SBC and the message is acknowledged.

Workaround: N/A

SBX-1009892

The SCM process coredumped.

Impact: The SCM process may coredump during the gateway to gateway calls using SDP transparency.

Root Cause: The software packed and unpacked unsupported content header types causing NULL pointer access.

Steps to Replicate: 

  1. Configure the SBC for gateway to gateway calls using an external PSX.
  2. Configure the transparencyProfile on both ingress and egress trunk groups enabling sipMessageBody all.
  3. Configure the direct media and SDP transparency on both ingress and egress trunk groups.
  4. Preform SIP gateway to gateway call flow: INVITE, 183 with SDP, PRACK, 200 (prack), 180 with SDP, PRACK, 200 (prack), 200 with SDP, ACK, BYE, 200.

The code is modified to prevent the unsupported content header types from being packed and unpacked.

Workaround: The sdpTransparency is not supported over the gateway to gateway, disable the signaling sdpTransparency sdpTransparencyState.

SBX-101641 | SBX-1015712

Portfix SBX-101571: The AddressSanitizer detects a heap-use-after-free on the address 0x6110000a302c at pc 0x55bcb2c39996 bp 0x7fbf04828250 sp 0x7fbf04828248 READ of size 2 at 0x6110000a302c thread T9.

Impact: The "heap use after free" occurs when an IP Peer is created.

Root Cause: This issue occurs when accessing memory that is already freed.

Steps to Replicate: Re-Create an IP Peer with same name, IP Address and IP Port to reproduce this issue.

The code is modified to fix this issue.

Workaround: Do not create same IP Peer with same name, IP Address and IP Port. If required, delete the old Ip Peer and re-create the same.

SBX-101860 | SBX-1012292

Portfix SBX-101229: The AddressSanitizer detects the stack-buffer-overflow in SipsGetSmmProfileForDlgScopehashUpdate.

Impact: The stack buffer overflow when the 487 response is triggered toward ingress leg.

Root Cause: The stack buffer overflow occurs because of accessing the freed memory in the stack for hSipMsgHandle->pstlocalTsap.

Steps to Replicate: Repeat the CANCEL call scenario to reproduce the issue.

The code is modified to populate the right memory in the hSipMsgHandle→pstlocalTsap.

Workaround: N/A

SBX-97865 | SBX-963912

Portfix SBX-96391: The session refresh UPDATE should terminate with an "E2E UPDATE" flag enabled.

Impact: Run a call flow where the Session Refresh Update is received from the Ingress side, and the E2E UPDATE flag is enabled. This update is locally answered and not being relayed.

Root Cause: The SIP_SERVICE_TYPE_RELAY_UPDATE_WO_SDP bit is not being set on the ingress when the E2E UPDATE flag is enabled.

Steps to Replicate: Run a call flow where the Session Refresh Update is received from the Ingress side, and the E2E UPDATE flag is enabled.

The code is modified to set the SIP_SERVICE_TYPE_RELAY_UPDATE_WO_SDP bit when the E2E UPDATE flag is enabled.

Workaround: N/A

SBX-102042 | SBX-1014012

Portfix SBX-101401: The call disconnected when 10 PSX routes returned.

Impact: Run an INVITE Call Flow with the customer configuration where the PSX returns 10 Routes in the call, the SBC is disconnecting the call.

Root Cause: The IcmParamInsert is failing for one of the paramtype in NrmaCcSelectEgressSgCmd as the size is exceeding max size ( ICM_REQUEST_MAX_12).

Steps to Replicate: Run a call flow with a customer config where the PSX returns 10 Routes per call.

The code is modified so the maximum size increased to ICM_REQUEST_MAX_14.

Workaround: N/A

SBX-101839 | SBX-101830 2

Portfix SBX-101830: The SBC services are going down while running the CLI to create the toneCodecEntry.

Impact: The stack buffer overflowed while executing the toneCodecEntry for the AMR files.

Root Cause: This day-1 issue was caused by the SBC using the USHORT data type instead of ULONG for the coding rate variable.

Steps to Replicate: Execute the toneCodecEntry CLI for AMR codec.

The code is modified the usCodingRate(USHORT) to ulCodingRate(ULONG).

Workaround: N/A

SBX-96194 | SBX-952802

Portfix SBX-95280: The LeakSanitizer detected memory leaks.

Impact: The antiTromboneData is getting allocated memory without freeing the already allocated memory.

Root Cause: There was a memory leak in cases of Direct Media Antitrombone scenarios.

Steps to Replicate: This issue is only reproducible when using ASAN images in engineering lab.

The code is modified to use the existing memory rather then re-allocating again.

Workaround: N/A

SBX-96144 | SBX-955252

Portfix SBX-95525: The AddressSanitizer detected a heap-buffer-overflow on address 0x60400067d4b4 at

pc 0x55a19896b50c bp 0x7fb148263c10 sp 0x7fb1482633c0.

Impact: The Heap Buffer overflow is occurring on the Register Relay call flow where the username is not received in the called party.

Root Cause: The SBC is creating a string copy on username, even though that string is NULL.

Steps to Replicate: This issue is only reproducible when using ASAN images in engineering lab.

The code is modified to fix the issue.

Workaround: N/A

SBX-1009542

The ASAN detects a heap-use-after-free in the CcProcCallFsmMsg. There was an SBC ASAN build failure when testing epcac DBL with SLB.

Impact: The SBC was accessing the call control memory block after the memory block had been freed.

Root Cause: The call control logic maintained a queue of call control blocks with outstanding events to process. However, in some places, the code processed the outstanding events and did not remove the call control block from the queue. While processing call cleanup events (i.e. bulk call releases due to a failure), it was possible that the same call control block got added to the queue twice. Then, when the call control instance was released, it removed one instance from the queue, but subsequent processing code identified a remaining call control block in the queue, and attempted to read the memory to process it after it had been freed.

Steps to Replicate: This issue is only highlighted in engineering lab while running with ASAN enabled images. Run call load and trigger bulk call failure.

The code is modified to ensure that the call control blocks are removed from the pending queue when all outstanding events are processing to avoid accessing memory after it frees memory.

Workaround: N/A

SBX-99693 | SBX-987962

Portfix SBX-98796: The AddressSanitizer detected a heap-buffer-overflow on address 0x6150043d0258 at pc 0x55c7b4ebab3c bp 0x7f6f282a51a0 sp 0x7f6f282a4950 READ of size 432 at 0x6150043d0258 thread T8.

Impact: The HPC/GETS-related call flows are resulting in the code reading off the end of an internal memory block.

Root Cause: While processing the HPC/GETS-related calls, the code was allocating an ICM message based on the size of three structures and then trying to copy it based on the size of four structures, resulting in reading off the end of the memory block.

Steps to Replicate: The problem is only highlighted when running the HPC/GETS-related call flows in the engineering lab with ASAN images.

The code is modified to allocate the correct amount of memory to avoid the issue.

Workaround: N/A

SBX-99223 | SBX-983572

Portfix SBX-98357: The LeakSanitizer detected memory leaks at the PathchkPingSessionAddEntry.

Impact: When making configuration changes to an existing path check object, a small memory leak occurred.

Root Cause: As part of the modify logic, the code was reallocating a memory block and it was not freeing up the memory block that was allocated when the configuration was originally created.

Steps to Replicate: This problem was highlighted in engineering lab while running with ASAN images to highlight memory leaks and then making path check configuration changes.

The code is modified to correctly free the memory block.

Workaround: Delete and recreate the path check configuration rather than modifying it.

SBX-99969 | SBX-999642

Portfix SBX-99964: The AddressSanitizer detected a heap-use-after-free on nrmaMsgProc.c when running the D-SBC REFER.

Impact: While the SBC was processing resource allocation messages associated with DTMF relay handling, it was allocating memory after the memory was freed up.

Root Cause: This is a day 1 issue and not known to cause any problems in the field. While generating a DBG log message, the code was trying to print the contents of a message block immediately after the block had been freed.

Steps to Replicate: This issue can only been reproduced in the lab while running with ASAN images.

The code is modified to no longer access the message content after processing the message to avoid accessing the memory after it is free.

Workaround: N/A

SBX-99935 | SBX-996472

Portfix SBX-99647: The XRM SBX_GoalwoPolicy has coverity issues.

Impact: While processing the signaling port configuration, the lifGroupId value was being read as a 32-bit value into a 16-bit storage location causing memory to be overwritten.

Root Cause: The code was using the wrong API to read the configuration resulting in potential memory corruption.

Steps to Replicate: This issue can only be reproduced using ASAN images in the engineering lab.

The code is modified to only read the lifGroupId as an 16-bit value.

Workaround: N/A

SBX-100083 | SBX-1000682

Portfix SBX-100068: The SLB was going down after triggering the DBL entry for the event epCacAggrReject.

Impact: The SLB was reading invalid memory.

Root Cause: When the SLB was printing SIP PDU content to the DBG log, it was reading past the end of the PDU memory buffer.

Steps to Replicate: This problem is only observable when using ASAN images in the development lab.

The code is modified to avoid reading past the end of the SIP PDU to avoid accessing invalid memory.

Workaround: N/A

SBX-99426 | SBX-955842

Portfix SBX-95584: The LeakSanitizer detected memory leaks at the packet handler.

Impact: While reading the configuration data, the SBC was overwriting the stack memory and also leaking small amounts of memory.

Root Cause: A number of fields in the SBC configuration where defined as boolean. However, the confd had implemented these as integers. When reading the contents from CDB, the local variable store defined as boolean was not large enough to hold the configuration value and resulted in memory being overwritten.

While the SBC was processing configuration data for users and groups, it was not freeing up all the memory that was allocated, which resulting in a leak.

Steps to Replicate: These problems can only be reproduced in the development lab while testing with ASAN image.

The code is modified to use the correct size of local variable to avoid memory being overwritten and to correctly free memory to avoid leaks.

Workaround: N/A

SBX-101778 | SBX-986462

Portfix SBX-98646: The AddressSanitizer detected an heap-buffer-overflow on the address 0x607000326fe4 at pc 0x563429a99aac bp 0x7f371d414210 sp 0x7f371d4139c0.

Impact: When the END2END ACK control is enabled and making calls between the SBC and GSX, the GSX sends a bad parameter to the SBC and it causes the SBC to read invalid memory and occasionally coredump.

Root Cause: The problem is due to the GSX using the wrong enumeration range for an internal CPC parameter type. The associated parameter it creates does not contain any data. As a result, the SBC interprets this as a completely different parameter, and expects it to contain mandatory parameter data.. It reads the data which results in it reading off the end of the message block. This is more of an impact statement. Please append it to the other text under "Impact".

Steps to Replicate: This issue is highlighted when using ASAN enabled images in the engineering lab, but it has been known to cause occassional coredumps in production.

The code is modified to ignore the bad parameter information coming from the GSX to avoid reading invalid memory. The GSX code is being updated under GSX-61505 to stop sending bad parameter information.

Workaround: Disable the END to END ACK control, if possible.

SBX-99729 | SBX-653932

Portfix SBX-65393: The calls fail after deleting the unrelated ingress IP prefix within a zone.

Impact: If the SBC is provisioned as follows, the TGs within a zone are provisioned with duplicate ingressIpPrefix and one of the ingressIpPrefix has an invalid format. When the duplicate ingressIpPrefix is deleted, the calls to TGs that should have matched the ingressIPPefix fail.

Root Cause: The CLI was not rejecting an invalid ingressIpPrefix from being provisioned by the user.

Steps to Replicate: 

  1. Create a TG with ingressIpPrefix 0.0.0.0/0 (Named EXT).
  2. Verify the ingress calls are selecting the correct ingress TG (EXT).
  3. Create second TG with ingressIpPrefix 10.1.1.1/0 (Named TEST_TG).
  4. Calls will still find the correct TG.
  5. Delete second TG’s ingressIpPrefix of 10.1.1.1/0.
  6. Calls fail to find correct TG (EXT) now, the only TG with 0.0.0.0/0 ingressIpPrefix because the backend code does not have the 0.0.0.0/0 prefix to EXT mapping.

The code is modified to reject the invalid ingressIPPefix formats.

Workaround: Do not add or delete invalid ingressIpPrefixs. Industry acceptable format of ingressIpPrefix needs to be entered in the CLI. 

SBX-99899 | SBX-974482

Portfix SBX-97448: The DBG flooded with the line *XrmMediaStatsGet: resId 13750 has never been activated, and cannot retrieve statistics.

Impact: Receiving the MAJOR logs for the XrmMediaStatsGet failure during a mixed load scenario.

Root Cause: During a mixed load, the perflogger constantly pulls the XrmMediaStats. Some resources might not be activated at a given time when the CLI command was executed.

This results in the XrmMediaStatsGet failure.

Recreate the issue with tiny pause between 100 Trying and 18x.
Also, confirmed from SVT that there is no other issue observed apart from these logs.

Also, confirmed there is no binding error, resulting in this error.

Steps to Replicate: The steps cannot be reproduced.

The code is modified to change the logging from ERROR to INFO, as it is only a stats get failure.

Workaround: N/A

SBX-1020692

There was a SCM Process memory leak.

Impact: The standby SBC is leaking a per call structure that is used for Relay calls.
This leak can carry over to active when there is a switchover.

Root Cause: The leak is occurring because the code is overwriting the pointer to the structure, thereby preventing this structure from being freed when the call is completed.

Steps to Replicate: There is no exact call flow that would trigger this leak.

The code is modified to free the structure before the field that stores a pointer to it is overwritten.

Workaround: N/A

SBX-97139 | SBX-967862

Portfix SBX-96786: The SBC is queuing a 200 OK of UPDATE with the downstreamForkingSupport enabled and UPDATE received on egress.

Impact: The SBC is queuing a 200 OK of UPDATE with the downstreamForkingSupport enabled and  UPDATE received on egress.

Root Cause: In case of the downstream forking queuing mechanism, there could be chance that the TYPE_STATUS can fall-through to the CASE_OTHER. So when calling the generic CMD callDirection ,msgtype and msgStatus are not being sent.

Steps to Replicate: 

  1. Configure the SBC for A to B call.
  2. Enable the flag downstreamForkingSupport on Egress TG.
  3. Make an A to B call.
  4. Once the call is stable, send UPDATE from B.
  5. Send a 200 OK of UPDATE from A.

The code is modified to send callDirection,msgtype and msgStatus in this case.

Workaround: Disable the DownStream Forking.

SBX-99064 | SBX-99063 | SBX-100121 | SBX-1001242

The LRBT had an unexpected UPDATE with the AMR-WB codec sent.

Impact: The SBC is not playing the tone using the same codec as negotiated, when the 183 with SDP is received and the same is indicated to ingress with UPDATE.

Root Cause:  It is a race condition exposed under the following conditions:

1. A calls B and B sends a 180 without SDP causing the tone to be played to A.
2. Subsequently B sends 183 with SDP so that the SBC needs to send UPDATE out to A for changing the codec.
3. Soon after the 183 with SDP from ingress is received, a 180 without SDP causes the tone play to start.
4. The race condition can be visualized as the UPDATE's 200 OK with SDP trying to modify the system for CUT-THRU, but instead interferes with resource management subsystem's attempt to play tone.
5. As a result, the resource management subsystem picks the incorrect PSP's to play tone.

Steps to Replicate: This steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to enforce selecting the latest PSP while choosing PSPs to modify when TONE is on.

Workaround: Configure transcoding for WB-NB calls.

SBX-96824 | SBX-942862

Portfix SBX-94286: The SBC must relay the error response of Prack to the endpoint when End-End Prack is enabled, and the call must not be torn down.

Impact: The call is terminated when an error response is received for the Prack and End-to-End Prack is enabled.

Root Cause: The SBC terminates the call whenever an error response is received for Prack.

Steps to Replicate: 

  1. Enable End-End Prack is enabled.
  2. The Prack is responded with error response

The code is modified so the SBC does not terminate the call when an error response is received for the Prack and End-End Prack.

Workaround: N/A

SBX-99721 | SBX-991152

Portfix SBX-99115: Observed the MAJOR log "XrmMflowCmdSnoopBld: the log cannot find the Snoop Id 0" while running the SIPREC with 4 recorders on a KVM-20vcpu setup.

Impact: Observed the MAJOR log "XrmMflowCmdSnoopBld: the log cannot find the Snoop Id 0" while running the SIPREC with 4 recorders on a KVM-20vcpu setup.

Root Cause: When running the Modify, the snoopId is not checked if enabled before invoking results in the ERROR log.

When running the Activate, the snoopId is checked if it is enabled.

Steps to Replicate: The issue was observed with load testing with the SIPREC enabled.

The code is modified to check if the snoopId is enabled for Modify flows.

Workaround: N/A

SBX-102157 | SBX-1020812

Portfix SBX-102081: During the RTP-VTP 10 CPS, the 100 CHT G729 Passthrough load found the CPU Congestion and CPU Spike multiple times.

Impact: Intermittent CPU congestion reported for two vcpu overnight run.

Root Cause: In case there are two vcpu, there is no dedicated SIG core, both the mgmt core and signaling cores are shared, and the spikes in mgmt threads are causing the SIG congestion.

Steps to Replicate: Two vcpu pass over night in the passthrough load.

The code is modified to disable the CPU congestion monitoring for < 3 vcpu, as it does not have any detrimental effect.

Workaround: N/A

SBX-96140 | SBX-957112

Portfix SBX-95711: The SBC failed to apply the SMM rule on the outgoing 200 OK of the ingress leg.

Impact: When the 18x and 200 OK is received simultaneously from the egress, the 200 OK is queued on the ingress side until the 18x Prack Transaction completes. So in this scenario, the 200 OK message Scope variable is being lost.

Root Cause: The Message Scope Variable Header is lost when the 200 OK is queued on the ingress Side

Steps to Replicate: 

  1. Set the ingress call leg to support 100rel, and the egress call leg to not support it.
  2. The terminating party returns a 180, and then a 200 OK response, after it receives an INVITE.
  3. After the ingress call leg completes the 100rel procedure (receives PRACK and returns a 200 OK for the PRACK), it fails to apply the SMM rule to the outbound 200 OK for the INVITE.

The code is modified so the Message Scope Variable Header is stored in the Prack Entry and retrieved when de-queueing again.

Workaround: N/A

SBX-1018182

An SBC Memory Leak occurred.

Impact: When the inbound calls to the SBC are released early, the SCM Process leaks memory.

Root Cause: When the inbound calls are released early, the SCM Process does not release the memory allocated to store the SIP PDU.

Steps to Replicate: 

  1. Change the mode of the ingress TG to out-of-service.


  2. Send a high number of calls (10000+) to the ingress TG with 1 cps.
    All calls are rejected.


  3. Verify the issue: Check the memory of ScmP. Memory has leaked.

The code is modified to ensure the SCM Process releases memory after early attempt call fails.

Workaround: Run the fix configuration which is causing early attempt failure.

SBX-1018142

The SBC does not generate the sonusSbxNodeResEmerCallNoRouteNotification.

Impact: The SBC does not generate the sonusSbxNodeResEmerCallNoRouteNotification alarm when the PSX returns no route for 911 based call (sip code 404, cause code 150).

Root Cause: The code to generate the sonusSbxNodeResEmerCallNoRouteNotification was not present in the scenario where the PSX returns no routes for the 911 based call.

Steps to Replicate: 

  1. Make a basic SIP call using the PSX with no routes set for number starting with '911' on the PSX.
  2. Configure the SBC:

    set profiles services emergencyCallProfile EmergencyCalls prefix 911

    set addressContext ADDR_CONTEXT_1 zone ZONE2 sipTrunkGroup SBXSUS12_LABSIP1 services emergencyCallProfile EmergencyCalls

The SBC does not generate the sonusSbxNodeResEmerCallNoRouteNotification alarm.

The code is modified to generate a sonusSbxNodeResEmerCallNoRouteNotification alarm when the PSX returns a "Not Route" for emergency based call on matching URI prefix.

Workaround: N/A

SBX-1009902

The SM process cored on the SBC.

Impact: The SM process crashed while executing the show table system syncStatus command.

Root Cause: The shell script used to get the oracle sync status did not return within 10 seconds, causing a healthcheck timeout that caused the coredump.

Steps to Replicate: The steps are not reproducible in the lab.

The code is modified so the shell script used to get the oracle sync status now times out after 5 seconds.

Workaround: N/A

SBX-100457 | SBX-999962

Portfix SBX-99996: Major Logs existed in the DBG logs while running SIPREC on the SBC Core 5400 and 7000 systems

Impact: Observing the MAJOR logs listed below when running the SIPREC load on the HA setup.

100 00000000 152048.782437:1.01.00.09099.MAJOR .XRM:

*NpMediaPnpsNpCmdSend: Cmd 0x29 failed, error code 0xffffffff

100 00000000 152048.782532:1.01.00.09100.MAJOR .XRM:

*NpMediaFlowModify: Failed status 0xffffffff

Root Cause: To handle scenarios where the mirrored snoopId context is transitioning from disabled to enabled, modify the snoopId even though the snoopId is disabled.

By directly setting the NP_MEDIA_FLOW_MOD_RTP_SNOOP_FLAG | NP_MEDIA_FLOW_MOD_RTCP_SNOOP_FLAG when invoking Modify for snoop flows.

Even though there is a check to modify snoop only when snoopId is no disabled, the modflags are still sent as it is to PNPS, resulting in PNPS errors for modifying the invalid snoopId.

Steps to Replicate: Issue was found during load testing with SIPREC enabled.

  1. Do not set snoop modFlags if snoopId is disabled.
  2. Reset the NP Snoop modFlags it snoopId is disabled.

Workaround: N/A

SBX-973922

Observed an SCM Process memory leak.

Impact: Existing memory is not freed before copying new info to the endPointAor by using SipRaCopyAOR.

Root Cause: The memory leak is observed when there are multiple calls to the function SipRaCopyAOR in the same call, and the same issue is observed during the call.

Steps to Replicate: This issue was observed during the registration and call load scenario. Run some registrations and make a call to registered users and run some load.

Freed the existing memory of the buffer before copying the information into the sipEndPointAor structure to address the issue.

Workaround: N/A

SBX-101335 | SBX-101154 2

Portfix SBX-101154: Transcode the percentage required to load DSPs in the sweTrafficProfile.

Impact: On specifying 100% tonesPercent in custom profile without selecting any transcode percentage in the SWe Traffic profile, the tpads are not loaded and dspStatus does not show any tones resources available.

Root Cause: This issue occurred due to an incorrect check that considers only the transcode percentage to allocate the DSP resource in the custom profile activation script.(partition_util.py).

Steps to Replicate: 

  1. Create a custom profile.
  2. Allocate the tone percent as 100.
  3. Load the profile.
  4. Check for show status system dspStatus.
  5. This shows no toneAvailable.

The code is modified to consider the transcode as well as tones percentage in the SWe traffic profile for allocating DSP resources in custom profile activation script(partition_util.py).

Workaround: Allocate some transcodePercent in the custom profile.

SBX-967832

The callCurrentStatistics continue to increment unexpectedly.

Impact: The "activeRegs" counter, provided by the CLI zone callCurrentStatistics | callIntervalStatistics command, can continuously increase.

Root Cause: The incorrectly-formed SIP REGISTER messages received by the SBC increments, but never decrements, the "activeRegs" counter.

Steps to Replicate: Send one or more bad SIP REGISTER messages to the SBC, and observe that the
"activeRegs" counter provided by the CLI zone callCurrentStatistics | callIntervalStatistics command increases (and does not decrease).

The code is modified to decrement the "activeRegs" counter when the SIP REGISTER message fails the SIP parser.

Workaround: N/A

SBX-1026172

The SIPFE crashed causing corruption on the msgObject.

Impact: Using the SNMP to query ipPeer statistics may core if an invalid zone or ipPeer name is entered.

Root Cause: When there was an SNMP walk for invalid zone/ippeer, the SBC may double free memory (introduced by SBX-51006).

Steps to Replicate: Using snmptool to walk through the data:
snmpwalk -c admin -t 20 -v 2c -m all sbxsus5-1 1.3.6.1.4.1.2879.2.10.2.243.1.2.14.65.68.68.82.95.67.      79.78.84.69.88.84.95.49.5.90.79.78.69.50.4.84.78.84.49

The code is modified to avoid freeing memory twice.

Workaround: Ensure the valid zone/ippeer is entered when querying

SBX-997522

A network issue occurred after an automatic restart of the M-SBC due to memory leak

Impact: The M-SBC loses network connectivity. This same issue occurred against SBX-93765, which is fixed in 7.2.3.

Additional minor np.log flood issues were experienced.

Root Cause: The SWe_NP logged an error when it received a small announcement packet (<32 bytes) from an application to send out of the interface. This is valid case and error should not be logged.

Steps to Replicate: Configure the SBC to play the announcement from pre-encoded tones using a codec with a small-sized packet.

The code is modified to remove the misleading logs.

Workaround: N/A

SBX-99123 | SBX-874152

Portfix SBX-87415: The ASAN detected the heap-use-after-free in the UasProcessMsgCmd.

Impact: The heap-use-after-free in the UasProcessMsgCmd

Root Cause: This was an error case scenario where the memory was deallocated when the refcount is "0". The refcount was decremented to "0", with an attempt by the SBC to access the freed memory.

Steps to Replicate: None.

The code is modified to remove the memory as there is no reason to call SipDialogReleaseCmd that decerements the refcount here.

Workaround: N/A

SBX-99909 | SBX-957692

Portfix SBX-95769: The AddressSanitizer detected a heap-use-after-free on the address 0x61d0005519b4 at pc 0x5609cd97443c bp 0x7f532d12e310 sp 0x7f532d12dac0.

Impact: One of the pointers related to the security information was not copied to the new structure when saving a request that needs to be processed after a asynchronous DNS response. This was leading to a bad read.

Root Cause: This issue is present since the feature related to SECURITY param was introduced in a nrma alloc and modify request.

Steps to Replicate: Run a MSRP B2BUA call with FQDN in the a=path attribute such that an asynchronous DNS response is received (meaning DNS results not cached in the SBC and the request actually reaches the DNS server and fetches results from there). This might require configuring the SRTP security profile; however, this is not used for the MSRP call.

The code is modified so the missing pointer value is copied from the original structure.

Workaround: N/A

SBX-99978 | SBX-999042

Portfix SBX-99904: The ASAN detected the stack-buffer-overflow in the CommandLineParser::isBindProcess.

Impact: The Stack_Buffer_Overflow in CommandLineParser::isBindProcess, resulting in killing the PIPE Process.

Root Cause: Creating a commandLineParser on the stack, and given the address to the PIPE_PROCESS.
When the function exits, the point in the stack variable goes out of scope, but the PIPE_PROCESS has a pointer to it and it uses it, although the variable does not exist anymore.

Steps to Replicate: The steps cannot be reproduced.

The code is modified to use a global object that is created in a heap, so that variable does not go out of scope.

Workaround: N/A

SBX-999182

The contact header parameters are not passed transparently in the redirected Invite.

Impact: With the Enhanced Local Redirection flag enabled, the contact header parameters received in the 3xx are not sent as parameters in Request URI if they are not processed by the SBC.

Root Cause: When implementing the changes for this new flag in 723 R1, this flag check was missed.

Steps to Replicate: 

  1. The UAC sends INVITE towards SBC over TG1.
  2. The SBC performs the D+ query and the Local Tagging is performed at PSX for the TG1 and returns the Redirector IP as part of the reply.
  3. The SBC sends the Egress Invite towards the SBC towards the Redirector.
  4. Redirector sends 3xx with the contact containing UAS IP and DTG info as mentioned below:

Contact: <sip:0xxxxxxxx@10.xx.xxx.xx:5060;dtg=SBC2_INGRESS_TG>

The code is modified to fix the issue.

Workaround: N/A

SBX-100100 | SBX-997612

Portfix SBX-99761: The SBC stops running after this OBS call flow.

Impact: Run a DLRBT and Downstream forking scenario where the UPDATE is received from the Egress after the cuttru is done.

Root Cause: De-allocating the memory, but not setting pointer to NULL.

Steps to Replicate: 

  1. Enable DLRBT.
  2. Set PRACK on both legs.
  3. Enable Forking for a non-forked call.
  4. Set UPDATE with the codec change received from the Egress after 180.
  5. Set firstRtp - SR.

The code is modified to set the hTempResponse to NULL to resolve the issue.

Workaround: N/A

SBX-101142 | SBX-999462

Portfix SBX-99946: The SBC is not sending a RR/RS:0 in 200 OK during RE-INVITE answer.

Impact: The SBC is not sending RR/RS :0/0 in 200 OK for RE-INVITE towards ingress.

Root Cause: The issue is due to the SBX-96087 JIRA changes.

Steps to Replicate: Configure the SBC and GSX to make an SBC-GSX SIP-SIP call.

Procedure:

  1. Perform the correct configuration:
    Egress PSP: AMR (WB) Bandwidth efficient.
    Ingress PSP: AMR (WB) Bandwidth efficient.
    The transcode conditional flag enabled on both PSP.
  2. Enable RTCP in Both ingress and egress PSP; and configure RR/RS bandwidth as 100 in Ingress PSP, and as 200 in Egress PSP.
  3. Enable flag 'Send RR/RS in SDP' in IP Signaling Profile for both Ingress and Egress.
  4. Initiate a SIP-SIP Audio call with Audio codec as AMR WB with RTCP bandwidth parameters in SDP as:
    b=RR:400
    b=RS:400
  5. Egress Answers with RTCP bandwidth parameters in SDP as
    b=RR:300
    b=RS:300
  6. Ingress end point sends Re-Invite with RTCP bandwidth parameters in SDP as:
    b=RR: 0
    b=RS: 0

Reverted changes made for the SBX-96087 Jira to fix the issue.

Workaround: N/A

SBX-99476 | SBX-946852

Portfix SBX-94685: Using the MRF when an audio passthrough call is upgraded to audio transcode with text as passthrough for the entire call flow, the RTCP packets are not getting generated on both the legs.

Impact: On an audio and text call, the audio updated from passThru to the transcode using MRF causes the RTCP packets drop.

Root Cause: When audio is updated to the xcode from the passThru, the mediaAssocLeg is no longer valid since both the ingress and egress leg are not bound to each other. Instead, they are bound towards MRF and as a result, the mediaAssocGcid in the callLegPtr is reset on the SBC.

However, it is not reset on the M-SBC, and this results in incorrect BRES getting picked during the NrmaProcessDsbcResCainSetup().


Steps to Replicate: Click this link to jump to expanded steps.


The code is modified so if the mediaAssocGcid from the SBC is NULL, then reset it on the callLegPtr structure on the M-SBC as well.

Workaround: N/A

Severity 3 Resolved Issues

The following severity 3 issues are resolved in this release:

Resolved Issues - Severity 3

Issue IDSevProblem DescriptionResolution
SBX-993093

A call hold using a=recvonly method is not sending the CPG information in SIP-I to SIP call.

Impact: In SIP-I to SIP call flow, after the call is answered when the egress Peer sends a re-INVITE with the recvOnly to the SBC, the SBC does not hold indication in ISUP body.

Root Cause: The SBC does not treat the recvOnly as hold and does not send hold indication to SS7 library.

Steps to Replicate: 

  1. After call is answered, the Egress peer sends recvOnly INVITE.
  2. The SBC sends recvOnly SIP to ingress and ingress responds with sendOnly.
    Observation: No hold indication sent in ISUP body to peer.
  3. With a fix, HOLD Indication is sent to ISUP and after receiving sendRecv reINVITE from the egress, the SBC sends a Retrieve indication in ISUP body to ingress.

The code is modified to ensure the SBC correctly treats recvOnly as hold and sends a hold indication in the ISUP body to peer. After retrieving the sendRecv INVITE, the SBC sends retrieve indication in the ISUP body.

Workaround: N/A

SBX-872873

The logic responsible for updating zone -> callCurrentStatistics -> totalOnGoingCalls counter is flawed - the totalOnGoingCalls counter does not get decremented in some scenarios.

Impact: In certain scenarios the zone->callCurrentStatistics->totalOnGoingCalls is not decremented and therefore it shows invalid values.

Root Cause: For an early cancel scenario, the code still considered being on-going call and displayed the incorrect totalOnGoingCall counter as a result.

Steps to Replicate: To replicate the issue, receive the 180 ringing from UAS and then hang up before the UAS answers the call. The ongoing calls counter should get decremented.

The code is modified to correctly display the callCurrentStatistics for early cancel scenarios.

Workaround: N/A

SBX-977583

The SIP Signaling Port was reserving +1 port for the TLS when the port was not enabled.

Impact: The SBC is automatically reserving port+1 for the TLS on a SIP Signaling Port (SSP) even when the TLS is not enabled as a protocol on the port. This reduces the number of available SIP Signaling ports when the same IP address is used for the multiple SIP Signaling Ports.

Root Cause: There was a design and coding issue.

Steps to Replicate: Configure multiple sipSigPorts with the same IP address in a zone. Use the consecutive portNumber values with transportProtocolsAllowed sip-tcp.

The code is modified to properly check and handle conflicting SipSigPort portNumber in existing the SSPs with the same ipAddressV4 and ipAddressV6.

Workaround: Use a wider range of port numbers when using the same IP address for SIP Signaling Ports.

SBX-99328 | SBX-992343

Portfix SBX-99234: Observed that the Resource memory congestion level 3 is approaching the threshold 90 sample 80 at the M-SBC.

Impact: Observed that the resource memory congestion level 3 is approaching the threshold 90 sample 80 at the M-SBC.

Root Cause: When the Link detection is configured, the raw sockets are created to exchange the ICMP pings on an active port and ARP probe messages on the standby port. Whenever a port switchover is initiated, these sockets are closed and re-opened as the role of the port changes. Due to a bug in code, these sockets were not getting closed and new sockets were opened. This leads to memory leak due to stale sockets under constant port toggling condition and eventually lead to memory congestion.

Steps to Replicate: Create a link detection group with link monitors configured on both ports in the redundancy group. Add an ACL to drop ICMP packets from the destination configured in Link Monitor. This results in constant port switchovers.

The code is modified to make the standard system close () instead of ACE close() to close the socket upon a port switchover.

Workaround: N/A

SBX-99955 | SBX-999233

Portfix SBX-99923: The HW SBC GCM SRTCP encrypted packets dropped by the SWe SBC.

Impact: The HW SBC GCM SRTCP encrypted packets dropped by the SWe SBC.

Root Cause: The HW SBC is not including the E bit along with the SRTCP index in GCM SRTCP encryption, with the results in the SWe SBC decryption error drops.

Steps to Replicate: Test calls between the HW SBC and SWe SBC with GCM crypto suites, and verify SRTP/SRTCP packets are decrypted, relayed fine.

The code is modified to include the E bit along with the SRTCP index in GCM SRTCP encryption.

Workaround: N/A

SBX-99976 | SBX-996513

Portfix SBX-99651: The SWe_NP crash to decrypt the SRTP packet.

Impact: There was a sporadic crash observed in the SWe_NP GCM decryption during SRTCP packet processing

Root Cause: In the distributed SWe NP packet and API processing model, a race condition is resulting in processing the SRTCP packet that the crypto context is already cleared with call disable and causing this sporadic crashes.

Steps to Replicate: Test call media load with GCM SRTP, SRTCP and verify the SWe SBC is not running in to any such issues. 

The code is modified to properly handle the scenario by discarding such media packets, whose call GCM crypto contexts are already cleared. In the latest release's SWe NP worker models, spin locks also enabled in all SWe SBC variants to prevent such race conditions.

Workaround: N/A

SBX-99275 | SBX-992043

Portfix SBX-99204: There was a TIPC log format change. The CHM code needs to be updated because of a duplicate error detection.

Impact: The duplicate TIPC address logic may fail to detect a duplicate TIPC address and nodes will fail to take the proper role and/or start.

Root Cause: The kernel message that is searched for has changed.

Steps to Replicate: Install both nodes as the primary node. When the second node is started, it should fail to start and report a standalone/HA pair configuration mismatch.

The code is modified to look for the proper error message.

Workaround: Correctly install of the nodes as primary and secondary, and use the proper setting of the TIPC ID in a SWe environment.

SBX-100842 | SBX-1008393

Portfix SBX-100839: The GR-HA leader election can choose the starting node that is not in sync.

Impact: A race condition exists with the G-HA leader election algorithm whereby when coming out of split-brain we could choose a node that is starting and not sync'd to be the leader. this causes a full outage

Root Cause: The root cause was when trying to check the wrong node's sync state when verifying the potential leader was in sync.

Steps to Replicate: 

  1. Cluster is configured for enhanced leader election.
  2. Both nodes are up.
  3. Issue a switchover so that the standby is promoted to active.
  4. While the active is coming up, force a split brain and then re-establish communication between the nodes.
  5. Verify that the booting node is chosen to restart even though it is the node that was active the shortest amount of time.

The code is modified so that the proper nodes sync state is checked.

Workaround: N/A

SBX-1013153

During an SBC switchover, the SCM process coredumped as a result.

Impact: The SCM process cored due to double freeing of a SIP structure related to Subscriptions.

Root Cause: The SCM process cored due to double freeing of a SIP structure related to Subscriptions.

Steps to Replicate: The issue is not reproducible. 

The code is modified to ensure that it does not attempt to free the structure that has already been freed.

Workaround: N/A

SBX-100596 3

The sipParamFilterProfile became broken.

Impact: When an extension is blocked by configuring in the sipParamFilterProfile, the SBC does not send an unsupported header when sending 420 Bad extension.

Root Cause: The SBC does not have logic to include unsupported header when an 420 Bad extension is sent while processing sipParamFilterProfile configuration.

Steps to Replicate: Click this link to jump to expanded steps.


The code is modified to ensure the SBC includes an unsupported header when sending a SIP 420 Bad extension.

Workaround: N/A

SBX-915193

There are unnecessary alarms on media port.

Impact: The SBC 5400 experienced false alarms for unused packet interfaces.

Root Cause: Code was missing to avoid unnecessary alarms for the unused packet ports.

Steps to Replicate: On an SBC 5400, disconnect the packet port cables and remove the configuration from the IpInterfacegroup to verify that alarms are not generated for unused packet ports.

The code is modified to handle cases where the packet port is not connected/configured in the IpInterfaceGroup to avoid unnecessary alarms.

Workaround: Connect the unused Ethernet ports to avoid getting alarms.

SBX-100370 | SBX-964583

Portfix SBX-96458: The GARP Request is not accepted by the SBC 7000 as a valid reply to the linkMonitor ARP probes.

Impact: The ARP packets were ignored on the standby SBC 7000.

Root Cause: Do not respond to a Broadcast ARP Request on the standby port because:

  1. There is no IP address assigned to the port.
  2. Attackers send the Broadcast ARP Requests to probe for IP addresses on the network and try to limit that.
  3. Expect a ARP Reply as a response to our request. Apply policers on the ARP packet to prevent the DoS attacks and prevent the LVM from having to process so many unnecessary packets. On a network that has many Broadcast ARP requests, the response to the ARP request could get policed with other Broadcast ARP request packets.

Steps to Replicate: 

  1. Enabled allowArpBroadcastProbeReply from CLI.
  2. Trigger the Broadcast ARP packets.
  3. On the SBC 7000, check arp_b_cast counters of standby packet ports in "STANDBY PORT STATISTICS" in /proc/sonus-bcm-drv.

The code is modified to allow any ARP broadcast packets on the standby port.

With this change, you can now drop the response from the switch if there is a flood of broadcast ARP request packets due to policing. This results in a false link detection failure.

The customer must ensure that the switch does not forward excess traffic of the Broadcast ARP request packets to the SBC.

Workaround: N/A

SBX-102046 | SBX-993293

Portfix SBX-99329: A race condition in handling of ccbPtr→bIsTonePlayingEgressFlag.

Impact: The SBC was incorrectly mapping the re-INVITE with a=inactive to a=sendonly when the  200OK arrives quickly after 180 without SDP and RBT configured.

Root Cause: When the ingress side is playing a tone, the ingress sends a message back to the egress side to notify the ingree side. The egress side is intended to clear this flag when the 200 OK message arrives. However, there was a race condition where the 200 OK could arrive before the ingress side is able to send the tone indication message to the egress side and then the flag is not reset.

The egress side uses this flag to update the SDP media direction to a=sendonly when a hold indication arrives and tone is being played to allow the SBC to finish playing out the tone.

Steps to Replicate: With the SBC configured to generate ring back tone on the receipt of 180 without SDP. Make a call where the SBC sends out INVITE and the egress side responds with 180 without SDP and immediately followed by a 200 OK. Once the call is answered, then send in an INVITE with a=inactive from the egress side and check that the SBC sends out INVITE with a=inactive on the ingress side.

The code is modified to no longer set the tone playing flag at the egress side if the 200 OK message is already received.

Workaround: N/A

SBX-100863 | SBX-971023

Portfix SBX-97102: During a direct dial to the call queue and then while transferring to another agent, there was no RBT was heard on the PSTN side.

Impact: While making a call from a PSTN user to Teams Call Q when the Teams1 user later transfers the call to Teams2 user, there is no RBT heard.

Root Cause: The call control was not in the correct state to generate the RBT on the subsequent transfer from Teams1 to Teams2.

Steps to Replicate: Make a call from PSTN user to the Teams Call Q, answer with Teams1 user and then transfer to Teams2 user and check that RBT is heard during the transfer.

The code is modified to ensure that call control transitions to the correct state in order to generate the RBT on the latest transfer.

Workaround: N/A

Resolved Issues Sev 2-4 - Steps to Replicate - Expansions

Issue IDSevProblem Description
SBX-979472

Pathcheck issue when TLS is in use - SRV DNS lookup returns port 5061 and SBC increments it by 1 when initiating the TLS connection.

Steps to Replicate: Click the blue arrow to expand the steps  

SBX-101424 | SBX-1011562

Portfix SBX-101156: When a video call is on hold, the SRTP context for video is omitted.


Steps to Replicate: Click the blue arrow to expand the steps  

SBX-100596 3

The sipParamFilterProfile became broken.


Steps to Replicate: Click the blue arrow to expand the steps 

SBX-99476 | SBX-946852

Portfix SBX-94685: Using the MRF when an audio passthrough call is upgraded to audio transcode with text as passthrough for the entire call flow, the RTCP packets are not getting generated on both the legs.


Steps to Replicate: Click the blue arrow to expand the steps 


Resolved Issues in 07.02.04R000 Release 

The following severity 1 issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-947361

The SBC is converting two of the same rtpmaps into one line.

Impact: A duplicated media payload may cause a syntax error when the sdpSelectedAttribueRelay and transcodefree is sent to the other side.

Root Cause: A duplicated attribute line was merged into one line.

Steps to Replicate: Configure the sdpSelectedAttribeRelay and transcodefree. 

Platform/Feature: SBC

Ignore the duplicated media payload and the attributes lines.
SBX-952411

The SCMP coredumps occurred on the Server.

Impact: The SBC was reading off the end of a memory block while trying to copy the called and calling party host name.

Root Cause: The SBC code was copying the SIP hostname/username in the diameter code, but it was always copying a fixed number of characters regardless of the username size. This resulted in the SBC reading more memory than was allocated for the hostname.

If the memory block passed was right at the edge of process memory, then it is possible this might cause a memory exception and a coredump.

Steps to Replicate: A coredump analysis and code review.

Platform/Feature: SBC

The code is modified to not read more characters that are present in the hostname to avoid reading off the end of the memory block.
SBX-946101

The Bye URI Messages do not include the domain.

Impact: When the incoming INVITE contains a Contact header with a GR tag.

And the call flow is: SISBC1 -- GW - GW - GSX- ISUP. The SBC includes an IP address in the reqURI of a BYE message and do not have FQDN present in the Contact of Ingress INVITE.

Root Cause: In a GW-GW scenario where the egress GW is GSX, the SBC sends IP address in ReqURI field of BYE message.

Steps to Replicate:

1. Reproduce the issue.
When the incoming INVITE contains a Contact header with a GR tag:

And call flow is: SISBC1 -- GW - GW - GSX- ISUP, SBC includes an IP address in the reqURI of a BYE message and do not have FQDN ( present in Contact of Ingress INVITE )

2. Verify the issue.
After a fix, the SBC sends FQDN in BYE sent towards the Ingress endpoint.

Platform/Feature: SBC

The code is modified to ensure the SBC sends FQDN ( present in Contact header of Incoming INVITE ) in the reqURI of a BYE message.
SBX-945391

Calls release cause 132 after a switchover.

Impact: The XRES uses the freed altMediaIpAddress unexpectedly in the standby XRM when the LIF is created.

Root Cause: When the standby XRM is notified with the LIF allocate request from NRS, it only receives the LIF's IP address. Any altMediaIpAddress will not be populated until the XRM has replied back to NRS. So when XRM is activating any XRES in the deferred activate list, the activation of XRES using altMediaIpAddress will be failed and freed.

Steps to Replicate: The SBC HA and SIPP call test setup:

1. Disable the keepAlive timer in the sipTrunkGroup.
2. Enable the debug INFO level logging.
3. Configure the altMediaIpAddress on LIF or LIFs if both ingress and egress legs have XRESs.
4. Configure the link detection on pkt port, threshold = 1 and enable it.
5. Make 5 basic SIP calls, call's mediaIpAddress = altMediaIpAddress, and call duration >= 20 mins.
6. Pull the cable from the pkt port, or ports if 2 pkt are interfaces involved, with link detection enabled.
7. Check the callCountStatus, wait for 5 min and plug in the cable on pkt port(s).
8. Check the callCountStatus again and wait for HA pair to finish syncing.
9. Perform a switchover again.

At step 6, the switchover triggered by link detection at step 7, 5 calls should be ACTIVE, check DBG log for following messages from XRM:

1. "XrmRedResAlloc: DEBUG! Context ID 0 XRES resId x on NIF y not allocated (on deferred list), LIF z not created"
2. "XrmNifMacAddrGet: Could not find LIF ifIndex z"
3. "XrmRedUdpAlloc: Context ID 0 Could not find UDP structure for LIF..."

At step 8, the calls should still be ACTIVE.
At step 9, the calls could be released during extensive audit, but not always.

Platform/Feature: SBC: CDR, Redundancy

The code is modified to skip the XRESs using altMediaIpAddress when the LIF is created in the standby XRM. Walk through the deferred activate list one more time when the altMediaIpAddress is added in the standby XRM.
SBX-950961

The SBC7K core dumps again after the 6.2.1F010 update.

Impact: A rare race condition can cause the SamProcess to core with a Healthcheck failure when using the TLS.

Root Cause: The root cause of this issue is a rare race condition that allows one of the threads in the SamProcess to free memory, that is still being used by another thread in the same process.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to prevent the race condition that causes the Healthcheck failure.
SBX-945771

The SBC services will not come up.

Impact: The standby fails to start and connect to the active, shutting down instead.

Root Cause: The address of the middleware checkpoint is lost and the checkpoint cannot be updated with the arrival of the new node, leading to it being shut back down.

Steps to Replicate: This is a one-off situation and can be easily reproduced.

Platform/Feature: SBC

The code is modified to recover the checkpoint address if it is unknown.
SBX-951141

The SBC IgnoreTransparency cannot be set on the EMA V6,7.2 and 8+.

Impact: The SBC IgnoreTransparency cannot be set on the EMA V6,7.2 and 8+.

Root Cause: There is no check whether the "not" is applied to complete expression or not.

Steps to Replicate:

  1. Log into the EMA.
  2. Navigate to
    All->profile->services->Transparency profile->SIP Header
  3. Select the transparency profile.
  4. Click on New Sip Header.
  5. After that, the "Ignore Transparency " field will be visible.

Platform/Feature: SBC

The code is modified to create a method for checking "not" is applied to a whole expression or not to a whole expression.
SBX-95784 | SBX-951561

Portfix SBX-95156: The SBC disconnects the call when it receives a 491.

Impact: A 491 received for a Re-Invite without an SDP was not being relayed to another Leg, even when the E2E Re-Invite and statusCode4xx6xx are enabled.

Root Cause: A 491 Relay logic is missing for the Re-Invite without SDP case.

Steps to Replicate:

  1. Enable the E2E Re-Invite and the statusCode4xx6xx.
  2. A 491 will be received for Re-Invite without a SDP sent.

Platform/Feature: SBC

The code is modified to Re-Invite without a SDP case when the E2E Re-Invite and statusCode4xx6xx are enabled.
SBX-95921 | SBX-952641

Portfix SBX-95264: Calls stopped working after an upgrade to SBC5110 from V05.00.05F008 to V06.02.03F005.

Impact: In the X-dmi parameter, the "p=0.0.0.0" was changed to "p=" in 6.2.3F5 that was failing the parser.

Root Cause: The root trigger was the change in the IPUtilGetStr() since early 6.2 release checks the given ipAddr is a V4 or V6 address. In this case, the ipAddress was unspecified, so IPUtilGetStr() returns '\0'.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to check the source IP address and initialize it to IPv4 if it is unspecified.
SBX-933111

The 488 Response to the T38 Reinvite.

Impact: For a G.711-T.38 Fax call, if the SBC receives a G.711 reInvite with some change in SDP from ingress peer, then the SBC sends a G.711 reInvite to egress peer.

The customer expected the SBC to stay in a Fax call and not send any reInvite to the Egress peer.

Root Cause: For a G.711-T.38 Fax call, if the SBC receives a G.711 reInvite or any other reInvite that has some change in the SDP from ingress peer, then the SBC initiates offer-answer negotiation and sends G.711 or any relevant codec reInvite to egress peer. In this case, the SBC also initiates a transition from fax to voice.

Steps to Replicate: The steps cannot be replicated.

Platform/Feature: SBC

The code is modified so when the SBC detects a change in the SDP for a Fax call LEG, and if the codec active for that fax call LEG is G711 and there is no change in G711 LAW, then SBC stays in a Fax call and sends the 200OK with answer-SDP as per last offer-answer negotiation. Any change in DTMF, silence Suppress mode and any other SDP parameter is ignored.

SBX-96629 | SBX-965241

Portfix SBX-96524: Getting the Pes Process coredump while running registrations.

Impact: Getting the Pes Process coredump while running registrations.

Root Cause: CallParamMatchName function is called with matchName which is of 15 byte array and strncpy is used to copy the string to the 50 byte array but with a wrong size of MATCH_NAME_SIZE which is defined as 30 byte*.*.

Passing bigger size than the actual destination string to strncpy is resulting in padding 0’s beyond the actual 15 bytes of the matchName. This was corrupting the stack and the stack pointer and causing a segmentation fault.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

Change the size of matchName[] to correct size.
SBX-960871

The SBC is not sending the RTCP to egress Peer for transcode only.

Impact: In the customer call flow:

With the Ingress Peer -(ISDN)> GSX ---(GW2GW)-> SBC --(SIP)-> Egress Peer, with the PSP setting as "transcode only" and RTCP enabled, the SBC does not send RTCP packets towards the egress.

Root Cause: Due to changes made for a previous feature SBX-6366, the SBC does not mark the XRES resource as duplex and marks it as receive only. As a result, the SBC does not send RTCP towards egress.

Steps to Replicate:

  1. Reproduce the problem in following call flow:
    Ingress Peer -- SIP -- GSX -- GW2GW -- SBC -- SIP -- Egress Peer
    This transcode only call and RTCP is enabled.
    Result: No RTCP sent by the SBC to egress.
  2. Verify the issue by applying SamP with GWFE change but not change in ScmP.
  3. Use the same setup. RTCP traffic was sent from the SBC to egress.

Platform/Feature: SBC

The code is modified to set RTCP send and receive bandwidth as the CPC_RTCP_BW_UNKNOWN if the CPC parameter is not received from the Ingress SBC or GSX. This ensures the RTCP mode for the XRES resource is duplex and the SBC sends RTCP towards the egress SIP endpoint.
SBX-96800 | SBX-897411

Portfix SBX-89741: There was a CPX core during an upgrade from V05.01.05R000 to V07.02.01R001.

Impact: The LSWU CLI command returned in a failure due to a failure to create package sub-dir under the external directory, but the upgrade continued on the backend.

Root Cause: The upgrade script needs to be fixed here to stop the upgrade and exit if the CLI command returns with a sub-dir creation failure.

Steps to Replicate: Test the LSWU to the fix version and verify if the upgrade is successful.

Platform/Feature: SBC

The code is modified to ensure the package sub-dir creation is successful and if CLI command returns failure, the upgrade is not continued further.
SBX-967061

Multiple switchovers causes non 5060 sipSigPorts to become inactive.

Impact: When a user configured >= 2 SIP Sig ports with same IP address but different port numbers, and they are using the same LIF group that contained 1 LIF, the pkt down triggered a switchover and it stayed down for extended time. After the pkt UP, a second switchover occurred, then only one Sig port went in service. The other Sig ports were stuck in OOS.

Root Cause: Since the pkt port was DOWN when the new standby node came back online, the SIP sig ports were restored while LIF was OOS. So address registrations were failed. After the SIPCM has reached a max number of retries, the LADDRs of the Sig ports, except the first one, were deleted in the NRS context.

When the pkt port came UP, the NRS brought LIF into service and registered the only one signaling address saved in the NRS context.

Steps to Replicate:

Test steps:
1. Configure 2 VLANs on the YF or BF pkt2.
2. Configure 4 SSPs on the first VLAN interface; 4 SSPs on the second VLAN interface. 4 SSPs use the udp/tcp port numbers 5060, 5160, 5260, and 5360 with the same IP address
3. Run the Sbxstop command.
4. Unplug the packet ports - YF pkt2
5. Run the Sbxstart command.
6. Display the SSPs on VLAN interfaces.

Platform/Feature: SBC

1. The code is modified to only delete LADDR before reaching the max number of retries.
2. Restore the pendingNrsReq flag properly when the address registration failed.

SBX-970791

After the LDG triggered a switch over, the SBC is rejecting all the register message with a 500 internal error.

Impact: The SCM process may coredump when the SIP signaling port was being used during a SIP registration call flow is state disabled.

Root Cause: The SCM process core dumped when it attempted to display a debug warning message that contained the disabled SIP signaling port number (but encountered a NULL pointer).

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to prevent accessing a NULL pointer, when attempting to generate the debug log message.
SBX-954511

The SCM fast memory increase causes a delayed switchover with an outage.

Impact: If a multilevel INVITE with Replaces is run, the memory and CPU utilization by the Scm Process increases drastically and leads to a core dump.

Root Cause: Each INVITE with Replaces is a new Callgroup. Each call group has its own segments. For each segment, there are associated segments.

When a Release call is invoked, it releases all segments and each call segment frees the associated call segments.
During the release flow for such a call CC_EV_ASG_DISC_CMD event is posted multiple times for various orig and term GCID’s.

Please note that this ultimately frees up everything although the memory and CPU utilization shoots up.

Steps to Replicate:

  1. Test multilevel INVITE replaces (more than 15).
  2. Crash will not occur.

Platform/Feature: SBC

Now in the CC state machine, the CC_EV_ASG_DISC_CMD event is not posted multiple times for the same original and term labels. This leads to drastically reducing the looping, while also ensuring that all call segments (and associated segments) are freed.

 
SBX-977431

The SBC fails to relay the 18x/2xx towards the ingress when the SBC is configured to play tone.

Impact: The SBC Fails to relay the 18x/2xx in case of the MSRP call when tone is configured. The SBC tries to allocate tone Resources even though the Audio stream is not present.

Root Cause: The SBC is going for Tone allocation, even though audio stream is not present.

Steps to Replicate: Run a MSRP call with the tone configured.

Platform/Feature: SBC: Application

The code is modified to not trigger tone for the MSRP only call.
SBX-96872 | SBX-918711

Portfix SBX-91871: The metavar was assigned to none.

Impact: When only one of the nodes detects a network glitch in the N:1 setup, usingMetavarsOf field of the other node is set to none.

Root Cause: A metavar response message is not sent from the node that did not detect the network glitch.

Steps to Replicate: Bring down the HA link for less than 5 seconds such that only one node detects the network glitch.

Platform/Feature: SBC

The code is modified so the ChmSendMetavarDetails indicates a reply is expected in case of NODE_SERVICE_ID_UP event.
SBX-944031

Unable to establish the same number of sessions after the switchover.

Impact: Calls were getting cleared under load conditions after a switchover in the first gateway in a GW-GW setup.

Root Cause: When sessionKeepAlive is set and the SBC switched over, the SBC starts sending refresh INVITEs to the endpoints. Since this is a GW-GW setup, in such scenario's, the newly active GW-1 will send call processing messages to the GW-2. There was an issue in call processing at the GW-2 that resulted in call failures.

Steps to Replicate:

  1. Create a SBC GW-GW setup and enable the sessionKeepAlive.
  2. Establish a call load of more than 25K and once the call is stable, perform a switchover at the GW-1.
  3. Calls will start failing

Platform/Feature: SBC

The code is modified to take care of processing multiple segments and successfully establishing a GW-GW connection.
SBX-942451

The SBC picks up an incorrect TG for incoming non-INVITE requests and responses to non-INVITE requests.

Impact: The SBC is picking up the wrong trunk group for incoming messages.
This is specific for a rare configuration when there is only 1 sigport sharing multiple trunkgroups, and the same peer source address routing traffic to different trunkgroups.

Root Cause: When the SBC processes inbound/outbound messages, it puts the TG into the cache table for processing after the response. In this case, there are two trunkgroups that swap back and forth for the same peer address. As a result, a subsequent request OOD may pick up the wrong TG due to registered end point.

Steps to Replicate: 

  1. Run a configuration where there is only 1 sigport sharing multiple trunkgroups, and the same peer source address routing traffic to different trunkgroups.
  2. Call B was sharing the same signaling port and the same peer IP.
  3. An OOD to the SBC and route back to A.
  4. Both outbound cases are using different TGs.

Platform/Feature: SBC

The code is modified to avoid swapping the TG. The SBC puts in a different new hash table, and later, the response from the request looks at the new hash table for the TG.
SBX-979601

An incorrect transparency functionality causes calls to fail.

Impact: The To header transparency becomes active and launches a successful ENUM query may cause an incorrect RURI format. 

Root Cause: The RURI build was based on the To header.

Steps to Replicate: Enable the To header transparency and PSX ENUM LNP response may contain an empty “Called URI”.

Platform/Feature: SBC

The code is modified so the RURI is independent of To header.
SBX-98993 | SBX-989921

Portfix SBX-98992: The EMA logs are not being copied in SysDump, however, the folder is there.

Impact: The EMA logs are not captured by the sysdump. 

Root Cause: The EMA log location was changed in the 6.0.0 and the sysdump was never updated with the change.

Steps to Replicate: Run sysdump and verify the EMA logs are captured.

Platform/Feature: SBC

The code is modified to use the correct location for the EMA logs.
SBX-971121

The EMA response time on the SBC 7.2.3 release is very high.

Impact: The EMA response time on the SBC 7.2.3 release is very high.

Root Cause: Making more than six TCP calls at a time from the browser.

Steps to Replicate: 

  1. Log in to EMA.
  2. Route from Configuration->System Provisioning-> Routing

A user can see the efficiency of screen loading.

Platform/Feature: SBC

The code is modified to fix the issue.
SBX-969961

The Scm Process cored.

Impact: When the pathcheck timeout, and the SBC is unable to find a zone, the SBC may core.

Root Cause: Access the null pointer.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

Check for the valid zone pointer before the access.
SBX-971991

The Customer SBC memory increasing.

Impact: There is a memory leak in the PRS. The structures associated with certain interprocess messages are leaking.

Root Cause: The structures associated with certain interprocess messages are leaking because these structures were not being freed.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to free the memory for certain interprocess messages.
SBX-953551

The SIP to SIP call no ring back tone passed to the ingress when PEM header is enabled on egress endpoint.

Impact: There was no RBT when the PEM header is enabled, the Split 18x moves into alerting and progress flag is enabled.

Root Cause: This flow was never tested with flag, and with Split 18x into alerting and progress.

Steps to Replicate: Setup call with PEM enabled on the egress and with Split 18x flag enabled.

Platform/Feature: SBC

Before 18x is split, the PEM header handling is updated and corrected.
SBX-932391

The caller SBC cancels the call after a 180 : 504 to the ingress, and CANCEL to egress.

Impact: A late media convert call with the DLRBT is not working.

Root Cause: A bad resource activation.

Steps to Replicate: Setup a late media convert call with the DLRBT enabled.

Platform/Feature: SBC

The code is modified to stop activating the full resource chain when the tone is being played.
SBX-96954 | SBX-958741

Portfix SBX-95874: The SBC's dump SCM process when running a MSRP call with the LI enabled.

Impact: The SCM process dumps when running a MSRP call with the PCSILI enabled.

Root Cause: The SBC sends an invalid Stream ID for non audio calls in NrmaDsbcSendDummySplitterCmd() and NrmaDsbcSendSplitterCmd() when invoking NrmaDsbcIssueXresCmd(). In the M-SBC, when processing the same correct stream, the EP res is not fetched because of an invalid stream ID and is why the SYS_ERR is triggered.

Steps to Replicate: Running a MSRP call with the PCSILI enabled.

Platform/Feature: SBC

Since this command is sent per leg and not per stream, the SBC cannot send streamIds. In M-SBC do not use the localEp res fetched based on streamId for processing of SPLITTER_CMD. To fix the issue, avoiding fetching localEpRes and comparing the same in the M-SBC.
SBX-978551

The wrong codec selection for the LRBT when one 183 with the SDP followed by two 180 Ringing.

Impact: The Ingress Trunk had theSIP-I and LRBT enabled and the Egress side Trunk is configured with the SIP.

The transcode conditional is enabled and the AMR-WB , AMR ,G711 and G729 are present in the Ingress and Egress Route PSP. Transcoding for AMR and AMR-WB is disabled but enabled for the G711 and G729.

After the INVITE OFFER is relayed by the SBC to Egress, the SBC receives the 183 with pcma followed by two 180 ringing alerts from the Egress.

The SBC should send 183 with PCMA in the SDP but instead it sends amr-wb, the first codec from the Offer, to the Ingress and as a result the tone is played in AMR-WB, which is incorrect.

Root Cause: For every 180 ringing alert received from the Egress, the tone is stopped and restarted. During the second tone restart, the SBC makes a new Offer with a Route PSP and discards the current answer received from the Egress Peer.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC: SIP Applications

If the tone context is present and SDP ANSWER is received, the SBC uses that to play the tone.
SBX-99017 | SBX-978561

Portfix SBX-97856: A bad Update sent by the SBC to Ingress during the LRBT.

Impact: The SIP-I on the Ingress TG and the SIP on the Egress TG.

With the transcode conditional enabled, the AMR-WB transcoding disabled in PSP and LRBT enabled, when making a call, during the LRBT, the Egress peer sends an update with change of media port but the SBC sends unwanted UPDATE towards ingress side with the AMR-WB | 16k DTMF

Root Cause: After an update followed by 180 ringing alert is received from the Egress Peer with change in the port only, the SBC generated a new Offer to the Ingress with a Route PSP codec preference of AMR-WB discarding the active codec PCMA already negotiated.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The existing active TONE Packet Service Profile that is already negotiated is used in the update.
SBX-94233 | SBX-943951

Portfix SBX-94395

Impact: RTCP Packets discarded.

IPv6 to IPv4, NAT enabled on V6 side – RTCP Packets discarded for Audio+T140 call after call modify.

Root Cause: For non-audio streams call-modify scenarios, the optional spec flag to mark the IP version was not set in the NP Interface.

Steps to Replicate: None.

Platform/Feature: SBC

Ribbon added code to set the flag for IPv6 in the NP Interface during a Modify flow.

The following Severity 2 and 3 issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-932472

A SCM leak on the Standby.

Impact: The SCM may leak memory in calls with a SIP Relay and FQDN. The memory used to store the Domain information may be leaked.

Root Cause: There is an edge case where the memory used to store the Domain information for a SIP Relay call is not being freed.

Steps to Replicate: This issue has been found by a code inspection and the steps to reproduce this case have not been identified.

Platform/Feature: SBC

The code is modified so that the memory used to store the Domain information is freed whenever the standby Relay Call Block is freed.
SBX-94865 | SBX-945122

Portfix SBX-94512: The RTCP packets count is not getting populated consistently in the callMediaStatus.

Impact: With the RTCP relay monitoring feature, sometimes the RTCP packets are not relayed or discarded.

Root Cause: In the SWe NP, due to endian alignment code issue, the RTCP mode configuration flags were not set as per the call flows enable/modifications.

Steps to Replicate: This is sporadic, when multiple times RTCP REL MON call flows, modifications tried it might occur.

Platform/Feature: SBC

The code is modified to be applied correctly in the SWe now.
SBX-949983

The SipSgProcessRelayRequestPrimitive: relay an INVITE without the cpcOrigMsgInfoPtr.

Impact: A increase in the DBG logs filling up with SipSgProcessRelayRequestPrimitive messages.

Root Cause: In case of an End2End Re-INVITE, the log message does not have any impact.

Steps to Replicate: The log level changed on the basis of code analysis and description.

Platform/Feature: SBC

Change the log level to info since it happens when the E2E Re-INVITE flag is enabled and does not have any negative impact.
SBX-925822

A large increase in sonusSbxSscsRouteFailureWithoutGapNotification2 traps.

Impact: When the PSX has more than 10 routes configured and the SBC receives those routes in multiple PSX responses and if all the routes fail, the SBC still makes additional diameter query towards the PSX. This causes the PSX to send an error: No Routes in Cache to the SBC. The SBC logs a trap after receiving No routes in the cache error.

Root Cause: The SBC makes an additional query to the PSX even after the PSX sent all the routes.

Steps to Replicate:

  1. Configure more than 10 routes on the PSX Routing Label (11 routes for example).
  2. All 10 routes fail.
  3. The SBC sends another query to get more route and those fail as well.
  4. The SBC still send additional query to the PSX which fails because the PSX have returned all the

Platform/Feature: SBC

The code is modified to ensure the SBC avoids sending additional Diameter query to the PSX when the PSX has returned all the routes.
SBX-95323 | SBX-939672

Portfix SBX-93967: Direct dial to a call queue, and then transfer to agent fails.

Impact: For the PSTN to Teams calls, when Teams was triggering an INVITE with replaces, perform a subsequent REFER. The SBC was not relaying the REFER-TO information from the REFER message to the subsequent INVITE. This was resulting in the wrong information being sent back to MS Teams and the call failed.

Root Cause: The SBC was not relaying the REFER-TO information from the REFER message to the subsequent INVITE.

Steps to Replicate: In a MS Teams setup run a call Q and transfer scenario where the call originates from the PSTN side.

Platform/Feature: SBC

The code is modified to pass the REFER-TO information from the REFER to the INVITE in this scenario for the MS Teams setup.
SBX-917372

External PSX became active after a switch over, though it was the OOS prior to the switch over.

Impact: When changing the multiple remote policy servers' mode together in one "commit", some of the server's operational stats in the standby node might not be synced.

Root Cause: When one of the remote policy servers' mode was being changed from the OOS to active, the standby node will not try to register with this server, and the iteration of all mode change servers will be stopped. This causes the rest of the servers, whose operStats have not been changed and remain unchanged. Therefore, the operStats of these servers at standby node will be out of sync with the active node.

Steps to Replicate:

  1. In a working HA, provision at least 3 working remote policy servers.
  2. While keeping the admin stat at enabled, only keep 1 of the servers mode as active, and rest are out of service.
  3. Change those servers' mode, commit only after all the set commands finished.
  4. Display the status using the 2 commands below:
    "show table system policyServer remoteServer"
    "show table system policyServer policyServerStatus"
  5. Perform a switchover.
  6. Repeat step 4. The operStat will be different from step 4.
  7. Making call load, may be a load call rate, when the Node A is active, and then when the Node B is active. When the Node B is active, the policy request may still be sent to the remote server that you have already made the OOS when the Node A was active.

Platform/Feature: SBC

The code is modified for all remote servers requested by the CLI users, although remote servers are not registered even if the mode is being changed from the OOS to active. As a result, the operStates at standby node stays synced with the active node.
SBX-921143

Calculated the size of a buffer as too small and error logs were being generated post upgrade.

Impact: Removes this incorrect log message:

SipsRedGetCallControlSizeCmd()
Minor .SIPSG: *SipsRedMirrorCallControlCmd: Potential for buffer
format ERROR. Available:16076 Calculated:383 Packed:277

Root Cause: This message is logged incorrectly when the code is calculating the size for a Redundancy message.

Steps to Replicate: The steps cannot be replicated.

Platform/Feature: SBC

The code is modified to remove this incorrect log message:

SipsRedGetCallControlSizeCmd()
Minor .SIPSG: *SipsRedMirrorCallControlCmd: Potential for buffer
format ERROR. Available:16076 Calculated:383 Packed:277

 
SBX-94814 | SBX-934562

Portfix SBX-93456: The SWe NP worker has a segfault.

Impact: There is an issue in the SBX-93456, where the SWe_NP was crashing multiple times due to the skb_work->skb corruption.

Root Cause: There is a point in normal media processing ( RTP and RTCP path), where an update to skb_work->skb from addr_ptr that is not necessary, may corrupt the skb_work->skb.

The corruption occurs in the path of processing RTCP XR packets, where the addr_ptr moves ahead by a few bytes, but the UPP processing expects the mbuf address to be present back at the 58 bytes from addr_ptr.

Steps to Replicate: Run JIO scenarios.

Platform/Feature: SBC

Avoid overwriting the skb_work->skb from add_ptr.
SBX-937122

The RTP Inactivity Timer fires early upon performing a port switch-over on the M-SBC.

Impact: If a call starts out with no RTP packet at all, the RTP Inactivity Notification is triggered earlier than the configured threshold. This is only observed on the SWe SBC.

Root Cause: The timestamp used for inactivity detection is not set when the media resource is enabled in the network processor code.

Steps to Replicate: Run a test that establishes a call where the ingress peer does not send RTP. There are no switchovers or other events and the calls are disconnected before the timer expires. The timer is set to 30 seconds.

Call service Duration with a disconnect 145.

Platform/Feature: SBC

Set the timestamp to the current time when the media resource is enabled.
SBX-948112

The SBC fails to route in advance to the 13th route.

Impact: When the PSX has more than 10 routes configured and all routes in the first policy response fail due to an internal cause, the call fails because the SBC cannot handle more routes correctly.

Root Cause: When the PSX has more than 10 routes configured and all routes in the first policy response fail due to an internal cause, the SBC's NRMA subsytem returns with an allocation failure.

Steps to Replicate:

1. Configure more than 10 routes on the PSX.
2. Force a failure on the first 10 routes due to an internal error.
3. Verify the call gets established on the routes in second policy response.

Platform/Feature: SBC

The code is modified to ensure the SBC handles more than 10 routes from the PSX correctly.
SBX-91463 | SBX-913982

Portfix SBX-91398: The ASAN heap-use-after-free on the address DnsClientQueryServerCmd.

Impact: The DNS client running in the SBC while trying to query the DNS server, tries to identify the transport protocol used. If the query fails on the first server, it accesses the first DNS server's data structure to get the type of transport protocol.

Root Cause: This issue was reported as part of the ASAN Testing on the DNS regression suite in the SBC lab.

Steps to Replicate: This issue was found while running the DNS regression test suites.

Platform/Feature: SBC

The code is modified to fetch the transport protocol from the next available DNS server in the list and trigger the DNS query.
SBX-910572

The SBC fails to relay the 4xx-6xx responses when the IPTG authentication is enabled - all SIP causes are mapped to the CPC176 CPC_DISC_TG_AUTH_FAIL.

Impact: When the IPTG authentication is enabled, the SBC maps all the 4xx-6xx SIP codes to the CPC 176. The SBC is unable to relay the cause code from the egress to ingress endpoint.

Root Cause: When the IPTG authentication is enabled, the SBC maps all the 4xx-6xx SIP codes to the CPC 176.

Steps to Replicate:

  1. Egress sends the 183 Session Progress.
  2. Egress sends the 486 Busy Here.
  3. The SBC does not send the 486 Busy code to Ingress.
  4. Instead, sends the 599 that is mapping of 176 ( CPC_DISC_TG_AUTH_FAIL, which is CPC code) to Ingress.

With a fix, the SBC sends the 486 buys to the ingress correctly.

Platform/Feature: SBC

The code is modified to ensure the SBC, upon receipt of provision response, clears the authentication flag and relays the cause code from the egress to the ingress.
SBX-950332

The SAM Process cores when the SNMP walk commands are executed during the TLS load.

Impact: When the getTlsSessionStatus command is executed when the TLS load is running, it will result in a SAM Process core.

Root Cause: The issue is because the SIPCM expects the SSL_get1_session() to increment the reference count of the SSL socketPtr. After the SIPCM returns from the SSL_get1_session() tries to decrement, the reference count during the time the socketPtr was deleted by another thread, which results in a double free.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to ensure to lock the SSL socketPtr before performing any operation so that no thread tries to access it.
SBX-931053

The SIP OPTIONS was not responding after a failover.

Impact: A syntax error message during a switch over is unable to respond.

Root Cause: Internal messages drop due to other subsystems not being ready to process the message. Subsequent messages are stuck in the queue.

Steps to Replicate: Simple ping Options messages during a switchover.

Platform/Feature: SBC

During a switchover, the message drops.
SBX-950072

The IPv4 Path MTU Discovery (RFC1191) was not working.

Impact: The IPv4 Path MTU Discovery (RFC1191) does not work.

The SBC uses the MTU of the outgoing network interface as the Path MTU.
Without the fix, the SBC does not update the Path MTU properly even if a router in the path sends "ICMP Destination Unreachable Fragmentation Needed" message with a smaller Path MTU value. The large packets requiring fragmentation to fit the Path MTU from the SBC will not reach the SIP peer.

Root Cause: In performing a route/fib, lookup in the updating Path MTU from "ICMP Destination Unreachable Fragmentation Needed" message did not consider the ipInterfaceGroup and addressContext. This resulted in not updating Path MTU of the proper route entry to the peer.

Steps to Replicate: The SBC sends IP packets of a length 1500 bytes toward the SIP peer when a path to the peer has a smaller MTU (e.g. 1400 bytes). A router with the smaller MTU sends "ICMP Destination Unreachable Fragmentation Needed" to the SBC. The SBC, with the fix, adjusts the Path MTU, performs the fragmentation and sends fragments to the SIP peer.

Platform/Feature: SBC

The code is modified to add ipInterfaceGroup and addressContext information in handling the "ICMP Destination Unreachable Fragmentation Needed" message in the Linux kernel. 
SBX-949942

The lwresd process on the active node is killed when a reboot is issued.

Impact: When a reboot is issued at the command prompt on the active node, the slwresd process is killed prior to it being properly shutdown. This causes a delay in reboot processing as the system goes through a fault recovery processes rather than an expedited shutdown.

Root Cause: The reboot wrapper that kills a non-SBC processes and using the drbd mount point was inadvertently killing the swlresd process.

Steps to Replicate: On the active CE, issue a reboot at a command prompt.

Platform/Feature: SBC

The code is modified to properly detect all the SBC processes so that the slwresd is not killed by the wrapper and therefore is not detected as having failed.
SBX-943772

A large number of TLS error messages were in DBG log.

Impact: The following log message was filling logs due to being incorrectly logged at the MINOR level (when it should have been at INFO level):

Minor .SIPSG: sipsgUtils.c (-27373) 27050. SipSgLogLevel4: missing callId need to parse

Root Cause: The following log message was incorrectly being logged at the MINOR level (when it should have been at INFO level):

Minor .SIPSG: sipsgUtils.c (-27373) 27050. SipSgLogLevel4: missing callId need to parse

Steps to Replicate: The only change was to change a log message from MINOR to INFO - there was no testing necessary.

Platform/Feature: SBC

The code is modified to change the following log message from MINOR to INFO:
Minor .SIPSG: sipsgUtils.c (-27373) 27050. SipSgLogLevel4: missing callId need to parse

SBX-89209 | SBX-890182

Portfix SBX-89018: The ASAN heap-buffer-overflow in the CpcOptionalParameterSave from the SipSgCopySipUrlToCpc

Impact: When an INVITE arrived to start a new call, the SIP service group control "callRouting useRouteSet" is set to the value of "received" to try and route the call based on the routeset in the INVITE. While processing the URI information in the header and trying to map it into internal structures, the code was reading off the end of a memory block. This setup can cause a crash if the memory block is at the end of the heap.

Root Cause: The code was trying to apply a 4 byte alignment to the internal parameter length after the memory had already been allocated. This meant that sometimes, the parameter length got set to a larger value than the memory block size.

Steps to Replicate: This problem was identified while running ASAN testing in the Ribbon lab and cannot be reproduced using normal images.

Platform/Feature: SBC

The code is modified to correctly handle the memory management so that it does not read off the end of the memory block.
SBX-947903

A backup/restore file cannot be downloaded from the EMA if the file name contains a dot (.).

Impact: A backup/restore file cannot be downloaded from the EMA if the file name contains a dot (.).

Root Cause: In the downloadSavedConfig block, making an API call both the time (Running on the SBC or running on the EMS).

Steps to Replicate:

  1. Login into EMA.
  2. Navigate to
    Administration -> System Administration -> Backup/Restore
  3. Download the Backup file.

Platform/Feature: SBC: EMA

Make an API call if it is running the EMS on a normal method while on the SBC.
SBX-91113 | SBX-724992

Portfix SBX-72499: The PesP cored on the active node.

Impact: The PesP cored on the active node.

Root Cause: The Ref count is getting incremented and once it reached the max value, it is becoming zero and destroying the object in one thread. At the same time, the other thread is accessing the object and crashing.

Steps to Replicate: Keep running calls for a longer time by using only one IpSignalingProfile.

Platform/Feature: SBC: Application, ERE

The code is modified to stop the Ref count from getting incremented when it reaches the max value.
SBX-95244 | SBX-950972

Portfix SBX-95097: The SBC is sending incorrect RACK in the PRACK for a Late Media Call.

Impact: The SBC is sending incorrect RACK in the PRACK for a Late Media Call.

Root Cause: Whenever the PRACK with SDP comes as an answer, the PRACK entry holding RSEQ details is not getting removed from the list while being sent out, because of any subsequent 18x/PRACK without SDP coming out at the same time; the SBC is adding old RSEQ in RACK.

Steps to Replicate: Late Media call with first 18x and PRACK with SDP followed by an 18x and PRACK without SDP.

Platform/Feature: SBC

To fix the issue, remove the RSEQ details from the PRACK entry List while sending PRACK with SDP out.
SBX-945712

Missing the Egress Response Code in the Field 59.19.

Impact: Egress error response code is not updated for the SIP response “487 Request Cancelled” in the field number 59.19 in ATTEMPT CDR record.

Root Cause: In the “487 Request Cancelled” case, because there is no CANCEL sent for the INVITE, the correct function is not called that is responsible for adding field number 59.19 in the ATTEMPT CDR record.

Steps to Replicate: Set up the SBC to make a simple call flow as below, and check the CDR for field 45.19/20 and 59.19/20:

UAC.xml SBX UAS.xml
| | |
| INVITE | |
|=======>| |
| 100 | |
|<=======| |
| | INVITE |
| |=====>|
| | 487 |
| |<=====|
| | ACK |
| |=====>|
| | |
|480 | |
|<=======| |
| ACK | |
|=======>| |

Platform/Feature: SBC

The code is modified to add the field number 59.19 in the ATTEMPT CDR record, in “487 Request Cancelled” case.
SBX-95833 | SBX-957492

Portfix SBX-95749: The SBC is not adding the Contact header in the 200 OK of UPDATE for a session refresh UPDATE.

Impact: The contact header is missing in the 200OK sent by the SBC for a session refresh UPDATE (an UPDATE without SDP or an UPDATE with the same SDP as last SDP).

Root Cause: The contact header is missing in the 200OK sent by the SBC for a session refresh UPDATE (an UPDATE without SDP or an UPDATE with the same SDP as last SDP).

Steps to Replicate:

  1. Enable the E2E Update.
  2. Trigger an UPDATE without SDP or an UPDATE with same SDP as last SDP.

Platform/Feature: SBC

The code is modified to add the contact header by the SBC when not provided by an application in the 200OK for a Session Refresh Update(an UPDATE without SDP or an UPDATE with the same SDP as last SDP).
SBX-954702

The SBC was using the incorrect SIP signaling port for the challenged SUBSCRIBE.

Impact: When the usePortRangeFlag is enabled, the SBC may use an incorrect SIP Signaling Port when handling a SUBSCRIBE request with an Authorization header, in the REGISTER - SUBSCRIBE scenarios when the initial SUBSCRIBE request is challenged.

Root Cause: When the usePortRangeFlag is enabled, the SBC may use an incorrect SIP Signaling Port when handling a SUBSCRIBE request with an Authorization header to the egress peer.

Steps to Replicate:

Provision the SBC to support CUCM (Cisco Unified Connection Manager) .
Ingress zone | sipTrunkGroup:
set addressContext default zone ZONE2 sipTrunkGroup SBXSUS4_LABSIP1 signaling registration requireRegistration required
set addressContext default zone ZONE2 sipTrunkGroup SBXSUS4_LABSIP1 signaling usePortRangeFlag disabled
set addressContext default zone ZONE2 sipTrunkGroup SBXSUS4_LABSIP1 signaling psxRouteForSubscribe enabled
commit

Egress zone | sipTrunkGroup:
set addressContext default zone ZONE4 sipTrunkGroup SBXSUS4_LABSIP2 signaling registration requireRegistration none
set addressContext default zone ZONE4 sipTrunkGroup SBXSUS4_LABSIP2 signaling usePortRangeFlag enabled
set addressContext default zone ZONE4 sipTrunkGroup SBXSUS4_LABSIP2 signaling psxRouteForSubscribe disabled
commit

set profiles signaling ipSignalingProfile DEFAULT_SIP commonIpAttributes relayFlags dialogEventPackage enable
commit

Perform REGISTRATION.

Perform a challenged SUBSCRIBE.

Platform/Feature: SBC

The code is modified to use the proper connection Id, when the usePortRangeFlag is enabled, and when the SUBSCRIBE request with Authorization header is sent to the egress peer.
SBX-952612

Co-existence of 4xx-6xx IPSP flag and Subscribe crankback is not working.

Impact: Out of dialog message fails to crankback when the relay 4xx-6xx is enabled.

Root Cause: The relay flag must not take precedent.

Steps to Replicate: Configure the crankback and enable relay 4xx-6xx flag. The subscribe response with failure must be able to crankback.

Platform/Feature: SBC: SIP

For failure response, the crankback feature must take precedent.
SBX-95941 | SBX-959303

Portfix SBX-95941: An unknown header transparency flag interaction with Tagging.

Impact: STIR-SHAKEN related headers are duplicated when the STI service type is tagging and transparency is enabled.

Root Cause: This scenario was not handled when STIR-SHAKEN was supported in 7.2.0.

Steps to Replicate: STI Profile is assigned on Ingress and Egress TG, on Ingress STI Profile “Override P-Headers with configured values”  flag is enabled.

In egress IPSP (IPTG section) “Unknown header” transparency flag is enabled.

Platform/Feature: SBC

STIR-SHAKEN related headers are given higher precedence and ignored transparency for the P-ORIGINATION-ID and P-ATTESTATION-INDICATOR headers when the STI service type is "tagging".
SBX-92128 | SBX-919962

Portfix SBX-91996: The SBC fails to send a=fmtp parameter towards the UAC, when the SBC received a=fmtp parameter above a=rtpmap in the answer from UAS.

Impact: The SBC fails to send a=fmtp parameter towards the UAC, when the SBC received a=fmtp parameter above a=rtpmap for the Dynamic Payload in answer from the UAS.

Root Cause: When the FMTP line is received prior to the RTP line for a dynamic payload, Internal Logical issue is causing the issue. When the string holding FMTP line is terminated with \0, the SBC unable to parse manually.

Steps to Replicate:

Test Configuration:
==============

  1. The SBC must be configured to handle the AMR passthru call.
  2. The transcoding must be set as conditional.

Test Procedure:
=============

  1. The UAC sends Invite with AMR WB codec.
  2. The UAS sends 180 Ringing with AMR with following SDP:

m=audio 6084 RTP/AVP 106 100
a=fmtp:106 mode-set=0,2,5,7;max-red=0
a=rtpmap:106 AMR/8000
a=rtpmap:100 telephone-event/8000

Platform/Feature: SBC

The code is modified to handle internal logic when FMTP line string is terminated with \0.
SBX-95831 | SBX-933602

Portfix SBX-93360: The SBC was sending an INVITE with the SRTP instead of RTP.

Impact: The SBC is sending the SRTP instead of RTP.

Root Cause: The intersection of working PSP and peer PSP does not take place in the stream absent case. The SRTP values are never updated.

Steps to Replicate:

  1. Create a UAC with RTP.
  2. Create two UAS with SRTP param.
  3. Send a port =0 for hold response.
  4. Check if the SBC is misbehaving while sending an INVITE to release hold from the far end.

Platform/Feature: SBC

The code is modified for the SRTP values for stream absent case.
SBX-95520 | SBX-716233

Portfix SBX-71623: The SMM header criteria not matching complete header value.

Impact: The SMM header criteria was not matching complete header value, it is only checking for the value between <>.

Root Cause: The SMM value being checked is enclosed between <>.

Steps to Replicate: Write a criteria on the header value and the issue will be displayed.

Platform/Feature: SBC: Application

The code is modified to consider the entire header of comparing the criterion.
SBX-95995 | SBX-858522

Portfix SBX-85852: The "Timeout detected -- Forcing read/write access" occurred during switchovers.

Impact: The message "Timeout detected -- Forcing read/write access" is observed during switchovers.

Root Cause: This message is logged on the NBI timer expiry (after 2mins) and configuration changes were allowed before the DBs are in sync. This occurs when standby initialization takes longer.

Steps to Replicate: Install the SBC with the fix build and perform a switchover. Ensure there is no timeout message and that configuration changes are allowed only after the DBs are in sync.

Platform/Feature: SBC

The code is modified to allow configuration changes only when both the CDB and ORACLE DB are available for READ_WRITE and when the sync is completed.
SBX-945182

Disable media lockdown does not suppress the media lockdown re-INVITE when the SRTP is enabled.

Impact: If the SBC offers crypto, and peer does not reply with crypto in the answer, a re-INVITE is sent to lockdown the crypto attribute (no crypto). If NAT is enabled, there is one second media drop while re-learning for the new re-INVITE is happening. For non-NAT cases, nothing will be observable except for signaling change.

Root Cause: This issue was SBC's original behavior.

Steps to Replicate:

  1. Setup the SBC so that it sends a crypto in offer.
  2. In the answer from the peer - do not send any crypto attribute.

Without a fix, the SBC will send another re-INVITE if the fallback to unencrypted is allowed. With a fix, this extra re-INVITE will be suppressed.

Platform/Feature: SBC

If a crypto line is sent in an offer and none are received in the answer, if the minimize media and media lockdown flags are appropriately set to minimize offer/answers, a re-INVITE to lock down cryto attribute is not sent.
SBX-708422

The R-URI in NOTIFY messages was not using the correct port number in case of TLS.

Impact: The SIP NOTIFY messages relayed through the TLS, may contain a R-URI that uses the SIP signaling port number verses the TLS port number.

Root Cause: The relay software used the SIP signaling port number instead of using the TLS port number.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC: Call Control

The code is modified to use the TLS port number when relaying the SIP NOTIFY messages.
SBX-599082

When the SBC receives route header with a port and TLS, it increments the port number.

Impact: When the SBC receives route header with a port and TLS, it increments the port number.

Root Cause: The SipSgPopulateAndSendToEgress() incorrectly increments the TLS signaling port number, when an out-of-dialog SIP OPTIONS message being relayed contains a "transport=TLS" parameter in the top most ROUTE header, and TLS transport is used.

Steps to Replicate: When the SBC receives OPTIONS with the Route header, the SBC relays that OPTIONS to a Port+1.

Platform/Feature: SBC: SIP

The code is modified to prevent incorrectly incrementing the TLS signaling port number, when an out-of-dialog SIP OPTIONS message being relayed contains a "transport=TLS" parameter in the top most ROUTE header, and TLS transport is used.
SBX-958102

The PrsP cored on the standby SBC node.

Impact: The standby PRS process core was triggered from the XRM, when processing the XRM_DEALLOCATE_CMD_MSG from the standby SIPFE before the XRM has received the RTM_SYNC_TO_ACT_START_NFY_MSG.

Root Cause: There were many registration bind timeouts reported on the active SIPFE that triggered deallocation of the registration blocks and closing of port range connections. An active SIPFE mirrored the port range connection close requests to the standby SIPFE that triggered XRM_DEALLOCATE_CMD_MSG being sent to the standby XRM. The bug was that active SIPFE used regular ICM alloc/send mechanism to send the redundancy requests while standby node was in the middle of sync to active node.

Steps to Replicate:

  1. HA pair, SIP registration load test, with high number of registrations.
  2. Cause registration binding timeouts.
  3. Restart the standby node.

Platform/Feature: SBC

Replace the regular ICM alloc/send with an RTM alloc/send in SIPFE when mirroring the port range connection close request to the standby node. The RTM then delivers the request to standby SIPFE properly based on the RTM sync state.
SBX-958953

The 4 SCMs cored after switchover.

Impact: The SCMs have cored after a switchover.

Root Cause: There is a bug that allows the RTM to attempt to process the Call Audit fault while still in the STANDBY mode. Since the Call Audit fault must only be processed while in the Active Mode - this causes a core.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to prevent the RTM from processing the Call Audit fault while in the STANDBY mode.
SBX-93067 | SBX-749222

Portfix SBX-74922: Modem calls failing when the DSP engaged in the ingress SBC.

Impact: The Bell 103 Modems in a G711-G711 transcoded call does not succeed.

Root Cause: The SBC G711-G711 transcoded calls perform a DTMF detection and the removal operation that can falsely remove some short signals, which is fine for speech perception but can affect modem signals that have similar characteristics of some modem signals. The SBC has signal detector for more modern modem that send a 2100 Hz tone to precede actual modem transmission. Once that is detected, the DSP media handling disables the DTMF removal. The SBC, however, does not detect older modems that sends a 2225 Hz signal in the beginning.

Steps to Replicate: 

  1. Make a G711-G711 forced transcoded call. Ensure that both legs have the DTMF remove enabled (dspchanstat).
  2. Use modem2225g711.pcap that has the modem signal captured from the customer in the ingress.
  3. Collect the media capture for the call and inspect the dspchanstat, as well as the output signal from egress.
  4. The dspchanstat and faxconfirmed field show 0x0. Signal output shows drops in the FSK modem signal between 18.72 and 19.65.

Platform/Feature: SBC

The code is modified to look for the 2225 Hz tone of at least 750 ms at which point, the DTMF remove feature is disabled. It is important to understand that this fix only applies to G711-G711 transcoded calls and not any compressed calls.
SBX-960942

Port the fix for SBX-86420 to 6.2 and 7.2 code branch.

Impact: Whenever the TLS transport is selected, the SBC is trying to increment FQDN port by 1. In this case, even when FQDNPort is Zero in SIPSG/SIPS, the port is incremented by 1. So the FQDN port is set 1 because of this SRV query is not sent to the DNS server.

Root Cause: Whenever the TLS transport is selected, the SBC is trying to increment FQDN port by 1. In this case, even when FQDNPort is Zero in SIPSG/SIPS, the port is incremented by 1. So the FQDN port is set 1 because of this SRV query is not sent to the DNS server.

Steps to Replicate:

  1. Send an INVITE with the TGRP parameters in R-URI.
  2. The SBC sends the TGRP information to the PSX.
  3. The PSX does TGRP based routing and sends route.
  4. The SBC must send the SRV query to the DNS to resolve port and IP details when egress peer is FQDN.

Platform/Feature: SBC

In case of the TLS transport at egress, remote the fqdnPort is incremented by 1 only when the port received from the PSX other then zero. A check is added in sipsgSendFsmRmAlloc() function.
SBX-96305 | SBX-961702

Portfix SBX-96170: When the SBC executes a "Teardown" to UPDATE request by the SMM, the To header and From header of response are malformed.

Impact: Write an SMM Rule to do a teardown on an UPDATE Request and Error Response has Malformed headers.

Root Cause: When a server request of UPDATE request is saved, optional headers are not being saved.

Steps to Replicate: Write a SMM rule to tear down update request with the 415 and the issue will be reproduced.

Platform/Feature: SBC

The code is modified to save the headers when saving an Update message as a server request.
SBX-957062

The direct media (release) not working, no x-dmi to BSFT in the 200 OK while the 18x has it.

Impact: The 200OK behindNapt and direct Media support is unable to treat as direct media.

Root Cause: The issue is due to an internal offer/answer update after the first 18x, the previous flags for behind NAPT was lost.

Steps to Replicate:

  1. Ingress configuration behind Napt and direct Media support.
  2. Egress sends the SRTP Invite and peer response 18x with non-secure RTP. Subsequent 18x/2xx sent to ingress is missing x-dmi line.

Platform/Feature: SBC: Media, Platform, SIP

The code is modified to update the flags again when received in subsequent 18x/2xx.
SBX-945462

To TAG broken when dialogTransp enabled and downStreamForking enabled.

Impact: When the dialog transparency, downstream forking and end to end PRACK is enabled, the SBC intermittently sends incorrect tagging in outgoing PRACK towards the egress.

Root Cause: A previous fix (SBX-63508) tries to address the scenario where downstream forking is enabled, dialog transparency is enabled and the 183 for the second dialog comes before PRACK when the first dialog is sent. But the pstCall structure was pointing to memory that may have been freed and re-used for storing some other SIP Message. So the To Tag sent from the SBC in an ACK message was incorrect.

Steps to Replicate:

  1. Enable Downstream forking, dialog transparency and E2E PRACK.
  2. Outgoing ACK from the SBC to egress has incorrect to Tag.

Platform/Feature: SBC: SIP

The code is modified to ensure to tag in the ACK message sent from the SBC is correct.
SBX-96802 | SBX-964482

Portfix SBX-96448: ICE not getting completed when the simultaneous ringing is enabled.

Impact: When simultaneous ringing is enabled to multiple MS teams endpoints, in certain cases where the ICE STUN requests are received by the SBC before an SDP is received in signaling messages, ICE is not getting completed for the endpoint that answers the call resulting in media to and from that endpoint not flowing through the SBC.

Root Cause: The SBC answers the first STUN message with a use candidate and completes ICE learning for that endpoint. Subsequent stun messages from other endpoints with use candidate were answered but ignored for ICE learning.

Steps to Replicate: With simultaneous ringing enabled to two MS teams endpoints, initiate call through the SBC to MS teams and verify that irrespective of when the endpoint answers the call voice media can flow through the SBC. Test must be repeated around 10 times and call answered from a different end point each time.

Platform/Feature: SBC

The code is modified so that after receiving a SDP with the ICE ufrag in signaling message. The SBC only completes ICE learning against the stun requests that have the same remote ufrag as that received in the SDP.
SBX-96817 | SBX-951702

Portfix SBX-95170: To allow early RTP ICE learning for the MS teams DLRBT media bypass scenarios.

Impact: In a media bypass call flow with the DLRBT enabled, if the MS Teams client takes a long time to answer the call, then the ICE processing does not complete. The MS Teams client never sends STUN with a useCandidate = 1 because it did not get responses to the previous STUN messages in the first ten seconds for the call.

Root Cause: For an outgoing call, the SBC was not enabling ICE learning and not responding to STUNs until an answer SDP is received.

Steps to Replicate: With MS Teams media bypass and DLRBT configuration on the SBC, make a call from PSTN to MS Teams and delay answering of the call for 30 seconds.

Platform/Feature: SBC

When the SBC receives the first 18x response for the outgoing call, as well as starting the ring back tone based on DLRBT, enable the ICE learning and respond to STUNs on the RTP port.
SBX-945792

Upgrade set all the CNAM Trunks to a Subscribe Rate of 1.

Impact: When the LSWU upgrade is completed, the SIP Trunk Group CAC ingress/egress subscribeRateMax and subscribeBurstMax are over written with the registerRateMax and registerBurstMax values.

Root Cause: This is functionality that was added in the SBC V3.1 when the SIP Trunk Group CAC ingress/egress subscribeRateMax and subscribeBurstMax were first added (but the values were not set).

Steps to Replicate:

Configure SIP Trunk Group CAC ingress/egress subscribeRateMax and subscribeBurstMax, for example:
% set addressContext default zone ZONE sipTrunkGroup SIPTRUNK cac ingress callRateMax 1 callBurstMax 1 registerRateMax 1 registerBurstMax 1 callLimit 0 emergencyOversubscription 0 extendedEmergencyIpLimit 0 subscribeRateMax 10 subscribeBurstMax 20 otherReqRateMax unlimited otherReqBurstMax unlimited hpcOversubscription 0
% commit
% set addressContext default zone ZONE sipTrunkGroup SIPTRUNK cac egress callRateMax 1 callBurstMax 1 registerRateMax 1 registerBurstMax 1 callLimit 0 emergencyOversubscription 0 extendedEmergencyIpLimit 0 subscribeRateMax 10 subscribeBurstMax 20 otherReqRateMax unlimited otherReqBurstMax unlimited hpcOversubscription 0

Perform an LSWU upgrade.

See that the SIP Trunk Group CAC ingress/egress subscribeRateMax and subscribeBurstMax are now set equal to registerRateMax and registerBurstMax values.

Platform/Feature: SBC

The source code that provides this functionality is removed, because it is no longer needed.
SBX-96856 | SBX-921172

After an upgrade, the SWAP partition has a wrong UUID.

Impact: The file /etc/fstab had an incorrect UUID for SWAP partition due to the timeout logs were seen on the boot-up.

Root Cause: As part of multiple upgrades going through different versions, the SWAP partition UUID has somehow been changed but the same is not reflected in fstab file.

Steps to Replicate: Install/upgrade to fix version and ensure there is no swap entry in fstab file and also there is no timeout logs.

Platform/Feature: SBC

The code is modified to remove the SWAP entry from the /etc/fstab file as there is not SWAP enabled on the SBC. So, after installing/upgrading to the fix version, there is no timeout logs.
SBX-737193

The SMM writeCdr was failing to write to ATTEMPT CDR when acting upon 300 Multiple Choice.

Impact: The SBC is failing to write the SMM fields in the ATTEMPT CDR when acting upon the 300 Multiple Choice.

Root Cause: The code was missing to handle the SMM information for a Redirect Scenario in the CDR.

Steps to Replicate: Test Redirect cases, and ensure SMM CDR write operation is successful in ATTEMPT record.

Platform/Feature: SBC

The code is modified to write the SMM information in the CDR for a Redirect Scenario.
SBX-96691 | SBX-946622

Portfix SBX-94662: The SBC is unable to handle emergency calls (E911) when ICE is enabled.

Impact: When the call limit for ordinary calls is already consumed on a trunk group, a new 911 emergency call on that trunk group does not complete using the emergency call bandwidth if ICE is also configured on the trunk group.

Root Cause: An issue in software was not processing ICE data correctly when the call was transitioning from using ordinary bandwidth to using emergency bandwidth.

Steps to Replicate: With the SBC trunk group configured with ordinary call limit and additional emergency call limit and ICE enabled:

  1. Establish as many calls as required routed via the trunk group to consume the ordinary call limit on that trunk group.
  2. While the previous calls are active, initiate a new 911 emergency call to be routed via the trunk group and verify the call succeeds.

Platform/Feature: SBC: Media, SIP

The code is modified to process the ICE data correctly when a call is transitioning to using emergency bandwidth.
SBX-96770 | SBX-967232

Portfix SBX-96723: The Zone SMM Profile was not working when performing a sbxrestart/reboot.

Impact: The Zone SMM is not getting applied when performing a SBC restart.

Root Cause: The Zone SMM profile is not being restored during an SBC restart.

Steps to Replicate: Attach a Zone Profile with the fixed order, and run a call. The Zone SMM profile will be applied, and when performing a  SBC restart and running the call, the Zone SMM is not getting applied.

Platform/Feature: SBC

The code is modified to restore the Zone SMM Profile during an SBC restart.
SBX-97194 | SBX-969372

Portfix SBX-96937: Running the sysDump.pl on OpenStack restarts the SBC.

Impact: Running the sysDump.pl on the 8.2.0R0 release on the SBC OpenStack cloud platforms causes the SBC application to restart.

Root Cause: The openclovis is monitoring some files as markers, using notify and taking it down when the file open operations are done.

Steps to Replicate: Once the SBC application is up and running:

  1. Run sysDump.pl and enter the default inputs.
  2. The SBC application will not go down.

Platform/Feature: SBC

As part of sysdump, backing up of /opt/sonus/sbx/openclovis/var/run/notify directory is excluded.
SBX-96945 | SBX-96939 2

Portfix SBX-96939: The ImPr cored when the SBC was running a call load.

Impact: The SBC ImProcess cored when the LI server became unavailable.

Root Cause: When the LI server becomes unavailable and a large number of packets are queued up for that server, the ImProcess takes more than 10 seconds to clean up all those packets, and the process coredumps.

Steps to Replicate:

  1. Establish a large number of LI calls.
  2. Bring the LI server down.
  3. Ensure that the ImProcess does not coredump.

Platform/Feature: SBC

The code is modified to disable the healthcheck while cleaning up the packets.
SBX-951762

7k DSP falsely detecting fax tone on music.

Impact: SBC falsely detects a modem tone (2100 Hz with phase reversals) for certain type of music.

Root Cause: Algorithm for modem tone detection first looks for 2100 Hz tone for 630 ms and a non-zero number of phase reversals. In certain type of rich harmonic tones, this results in large number of phase reversals. Typically for modem tones we expect no more than 2 phase reversals in 630 ms.

Steps to Replicate: Make g729 to g711 calls and stream the pcmu_stream1_withsilence3.pcap from the g711 leg.
Before a fix, a modem is detected on this signal as indicated in the dspchanstat.
tone2100PhaseRevCnt: 1.

Platform/Feature: SBC: DSP

Modem tone detection algorithm is modified so that in case it finds a modem tone for 630 ms, in case number of phase reversals is larger than 3, its rejected as a spurious detection.
SBX-946982

The SBC does not send invite to subsequent routes in native forking when the SBC receives Invite with call-ID as "i".

Impact: An incoming short callId header "i" fails to send subsequent Invite for multi routes.

Root Cause: There was missing logic to look for callId header with a short name.

Steps to Replicate: Configure the native forking call and have incoming call with short name "i' for callId header.

Platform/Feature: SBC

The code is modified to support short header name callId.
SBX-969922

TLS call failures were observed due to a port value set to 1 instead of 5061.

Impact: The SBC uses Port 1 for sending an INVITE out for the TLS protocol when the route header was received without a port.

Root Cause: The issue is because when the route header is received without a port in it, the SIPSG was incrementing the port for the TLS. Since the port was not received, the port received is considered as 0. For the TLS, increment by 1. When incremented, the port becomes 1 and this gets used for sending an INVITE that is resulting in calls failing.

Steps to Replicate: Send the Route Header without port Route: <sip:ipaddr:;lr>. The SBC will use port 1 for sending an INVITE that is causing the issue.

Platform/Feature: SBC

The code is modified to check when the port is received in route header or not.
If port is received, then increment the port for the TLS. If it is not received, then increment and allow the SIP stack to handle it.

SBX-968342

Asymmetric PRACK Interworking was not working as described.

Impact: Whenever any codec entry is deleted from codec list in the PSP and in the PSX, it rearranges the codec list immediately. There will not be any empty codec entry in the list.

The same issue is in the ERE, so it can be treated as a bug in the ERE.

Root Cause: When any CodecEntry is deleted, it is not rearranging the CodecEntry, which causes a NULL value in that place.

Steps to Replicate:

1. Configure the CodecEntry1 ,CodecEntry2 to CodecEntry12
2. Delete any CodecEntry.

Result: The call will be successful.

Platform/Feature: SBC: ERE

The code is modified so that there is no NULL value in between the two CodecEntry's.
SBX-933293

Update scripts in the common/debian/install/sbx-install and orca/install.

Impact: Monit paths needed to be updated with the new definitions.

Root Cause: New definitions were introduced for monit paths.

Steps to Replicate: The steps cannot be replicated.

Platform/Feature: SBC

Updated the monit paths to resolve this issue.
SBX-954742

The LCA errors seen when the SBC is spawned.

Impact: A sbcDiagnostic.sh flags error in the LCA, because it greps for ERROR.

Root Cause: The keyKeeper.py prints in the lca.log ERROR whenever it is unable to delete a file that contains a pswd. The file may already be deleted or not even created, this may also throw error.

Steps to Replicate: Run the sbcDiagonostic.sh and check no errors are present from keyKeeper.py.

Platform/Feature: SBC

The code is modified so the parameters sonusUtils.logger.error changes to sonusUtils.logger.info and some other logs so there is no grep ERROR.
SBX-96952 | SBX-964712

Portfix SBX-96471: While trying to become active on a switchover, the systrem rebooted since the DRBD could not be switched to the primary.

Impact: While trying to become active on a switchover, the systrem rebooted since the DRBD could not be switched to the primary.

Root Cause: The DRBD is configured so that whenever a low level error occurs, the DRBD will be detached and the dstate will become "diskless". This scenario was leading the standby for reboot.

Steps to Replicate:

  1. Run "drbdadm detach mirror" on standby.
  2. Perform a switchover.
  3. The switchover will be successful.

Platform/Feature: SBC

While coming up as active after a switchover, the dstate of DRBD is checked, and if it is "diskless" the DRBD is attached before proceeding further.
SBX-97545 | SBX-700593

Portfix SBX-70059: Support the HOLD/RESUME INVITE from the SIPREC SRS to pause and start pumping media towards the SRS.

Impact: With a second SIPREC server call hold, the RTP recording is not paused/stopped towards recording server.

Root Cause: With the RTCP snoop enabled, the NP API handler has an issue in handling the media snoop configuration update with a SIPREC hold.

Steps to Replicate: Test the SIPREC hold features with the RTCP snoop enabled.

Platform/Feature: SBC

The code is modified for the NP API handler to resolve this issue.
SBX-94935 | SBX-908553

Portfix SBX-90855: The ASAN has a new-delete-type-mismatch on the SrchCriteriaIb.

Impact: The ASAN has a new-delete-type-mismatch on the SrchCriteriaIb.

Root Cause: The srchCriteriaIbArray is a dynamically allocated array in the GUISERVER, but it was not released using delete, so it is reported by ASAN.

Steps to Replicate: Re-run the testcase in the ASAN build and verify that the issue is not reported again.

Platform/Feature: SBC

The code is modified to fix the issue.
SBX-873993

The IPACL causes a PRS deadlock.

Impact: The PRS process may coredump after the state disabling and enabling ACL rule(s), performing a switchover by powering the CE off immediately, and state disabling and enabling ACL rule(s).

Root Cause: The PRS used stale socket connections after the power off immediate switchover.

Steps to Replicate: Reproduce the PRS coredump issue by performing the following:

  1. Create the ACL rule using the installed role active CE when the HA system is synchronized (full redundancy protection).
  2. Perform a switchover to the installed roll standby CE.
  3. Wait until the HA becomes synchronized (full redundancy protection).
  4. Using EMA to installed roll standby CE:
    Disable the ACL rule
    Enable the ACL rule
    Disable the ACL rule
    Enable the ACL rule
  5. Verify that the system is synchronized.
  6. Power off the installed roll standby CE "Power Off Server - Immediate" using the BMC.
  7. Using EMA to installed roll active CE:
    Disable the ACL rule
    Enable the ACL rule <--- PRS CORED

Platform/Feature: SBC

The code is modified to re-open the connection to ConfD (on the immediate power off of the Active system), to prevent a PRS health check timeout coredump.
SBX-944862

The SBC was not releasing the other leg when a call is disconnected during hold( MOH enabled).

Impact: The SBC was not releasing the other leg when a call is disconnected during hold( MOH enabled).

Root Cause: This is a race condition in the CC where the handler for the event ASG_DISC_CMD is not present, and for the CC state CC_VIRT_ESCR_VDREQ due the call being hung.

Steps to Replicate:

  1. Make a TEAMS to PSTN call.
  2. TEAMS holds the call (MOH).
  3. TEAMS disconnects the call during MOH.

Platform/Feature: SBC

Added a handler for the event ASG_DISC_CMD for the CC state CC_VIRT_ESCR_VDREQ, so that the DISC cmd gets propagated to the other active peer call side and the call gets terminated correctly.
SBX-96178 | SBX-945622

Portfix SBX-94562: The ASAN has a heap-buffer-overflow in the SipSgACDMNaptQualTblAddEntry.

Impact: There was a Heap Buffer Overflow in the function SipSgACDMNaptQualTblAddEntry().

Root Cause: The Memcpy is being used instead of StrnCpyZ().

Steps to Replicate: Run the PCR 5637 regression on an ASAN Build.

Platform/Feature: SBC

The MemCpy is replaced by the StrnCpyZ().
SBX-96180 | SBX-944022

Portfix SBX-94402: The SBC was not throwing a parse error in TLS if the content-length is not sent in a PRACK message.

Impact: The SBC is not throwing a parse error when the content-length Header is not sent in PRACK request using the TLS transport.

Root Cause: Similar code is present in the TCP Transport but not in the TLS-TCP transport.

Steps to Replicate: 

  1. Make a TLS call with the 100rel enabled.
  2. Send PRACK without content-length header for 18x.

Platform/Feature: SBC

The code is modified for the TLS-TCP Transport to resolve the issue.
SBX-95118 | SBX-944032

Portfix SBX-94403: Unable to establish the same number of sessions after the switchover.

Impact: Calls were getting cleared under load conditions after a switchover in the first gateway in a GW-GW setup.

Root Cause: When the sessionKeepAlive is set and when the SBC switched over, the SBC starts sending refresh INVITEs to the endpoints. Since this is a GW-GW setup, a newly active GW-1 will send call processing messages to the GW-2. There was an issue in call processing at GW-2 that resulted in call failures.

Steps to Replicate:

  1. Create a SBC GW-GW setup and enable the sessionKeepAlive,
  2. Establish a call load of more than 25K and once call is stable, perform a switchover at the GW-1.
  3. Calls now start failing.

Platform/Feature: SBC

The code is modified to now take care of processing multiple segments and to successfully establish a GW-GW connection.
SBX-94782 | SBX-943892

Portfix SBX-94389: When call transferring to the PSTN, the SBC was sending RTP/AVP instead of RTP/SAVP towards Teams in the ReINVITE.

Impact: The SBC was sending a Re-INVITE towards Teams with m= line protocol as RTP/AVP instead of RTP/SAVP. Because of this, Teams is sending a 488 call was failed.

Root Cause: After an abort_ann_tone event, the CC was not moving to cutthru mode.

Steps to Replicate:

  1. The 'Announcement based tones' flag is enabled.
  2. Make a call from the PSTN - Teams n/w.
  3. After a call connect, a Teams user transfers the call to another Teams user, and the call will succeed.

Platform/Feature: SBC

During an inbandtones event triggered in the CC, when an abort_ann_tone event returns and if the cutthru is already received, set the cutthru to cutthru_pending.
SBX-973162

The Scm Process coredumps when there is NO ROUTE from the PSX = 0.

Impact: The Scm process coredumps when there is a call clearing with "no route found" from the PSX/ERE.

Root Cause: There was a bug in the call disconnect handler that resulted in the Scm crash for a non-configured number.

Steps to Replicate: Run a basic SIP call with a non-configured number and the Scm Process must not crash while handling the disconnect.

Platform/Feature: SBC: Application

The code is modified to handle call disconnects with 'no routes found' in the PSX/ERE without a Scm Process crash.
SBX-863742

The early media PEM has a behavior issue if there is no PEM in 18x.

Impact: When the egress TG early media method is P Early Media and the P Early Media header is not received, the SBC does not send media to the ingress caller.

Root Cause: The audio data path mode is set to inactive for the PEM structure.

Steps to Replicate: 

1. PEM Header transparency is enabled and the egress TG configuration is listed below:

set addressContext default zone IPX_SIGNALING_VOLTE sipTrunkGroup 1009074301 media earlyMedia method pEarlyMedia
set addressContext default zone IPX_SIGNALING_VOLTE sipTrunkGroup 1009074301 media earlyMedia egressSupport enabled
set addressContext default zone IPX_SIGNALING_VOLTE sipTrunkGroup 1009074301 media earlyMedia defaultGatingMethod sendrecv
set addressContext default zone IPX_SIGNALING_VOLTE sipTrunkGroup 1009074301 media earlyMedia forkingBehaviour firstProvResponse

Call Flow: The 183 Session Progress from the egress contains SDP and no PEM header.
Issue: The SBC does not send media from egress to ingress and the caller receives dead air.

Platform/Feature: SBC

The code is modified to ensure the audio data path mode is set to default gating mode.
SBX-99097 | SBX-943242

Portfix SBX-94324: In the SBC to GW to SBC scenario, the first SBC coredumps when the ingress invite contains four identity headers.

Impact: Making a GW-GW call that contains multiple identity headers will cause a crash.

Root Cause: There was a validation code to check that the internal CPC structures that carries the identity header information was correctly padded to a 4 byte alignment. This validation code was correct for one identity header but failed when more than one was present and as a result, triggered the system to crash.

Steps to Replicate: Send in an INVITE that contains two identity headers of type SHAKEN and route the call over a GW-GW connection to a second SBC.

Platform/Feature: SBC

The code is modified to ignore any padding rules for the particular internal CPC structures that carry the identity header information.
SBX-98387 | SBX-983562

Portfix SBX-98356: There was a SEGV on an unknown address 0x0000000000e5 (pc 0x5653a715fdde bp 0x7f84a52bfea0 sp 0x7f84a52bfe70 T9).

Impact: After a successful surrogate registration, if any configuration related to the IP Peers/TGs/Surrogate registration is deleted, the Scm Process will coredump.

Root Cause: The code was dereferencing a null pointer when the trunk group configuration data was no longer present and the surrogate registration response came back.

Steps to Replicate: Trigger the SBC to send out surrogate registration request and delete all the associated trunk group configurations before sending back a response from the remote server.

Platform/Feature: SBC

The code is modified to check that the trunk group configuration exists before trying to read the configuration.
SBX-956792

The trunks data cannot be displayed on the live monitor.

Impact: The Zone and Trunk Group based live monitor charts does not show any data if the trunk group name contains hyphen.

Root Cause: The Elastic Search interprets 'hypen' as a delimiter and as a result, the string is broken down into tokens for indexing. When a query is put in the ElasticSearch for data with trunkgroup name containing 'hyphen', no data is retrieved as the Elastic Search has stored the data not with the actual trunkgroup name but with tokens

Steps to Replicate: 

1. Create a trunkgroup with name containing hyphen.
2. Enable the Live Monitor.
3. Run Calls and wait for sometime.
4. Verify data is shown in Zone and Trunk Group based charts.

Platform/Feature: SBC

Before querying the ElasticSearch for data, check if trunkgroup name contains hyphen, if it does then it is broken into tokens and the token is used to query for data.
SBX-978302

The ipRecMetadataProfile does not work for the request-uri in the V07.02.02.

Impact: INVITE SIPREC or SIPREC INVITE may not have a request-uri beta or core.

Root Cause: The logical error that access the wrong data structure.

Steps to Replicate: Configure the metadataProfile with a request-uri and enable the SIPREC on ingress.

Platform/Feature: SBC

The code is modified to correct the logical error.
SBX-960282

The MAINTAIN ONLY CDR .ACT file extension during atomic write process was not utilizing the .TMP.

Impact: When the CDR files are copied to the remote server, the file is copied with a temporary extension .TMP. For some installations, the software running on the remote server moves those files with the .TMP extension before the SBC software renames them with an .ACT extension.

Root Cause: A temporary extension is used during the time files are copied to the remote server.

Steps to Replicate: Perform the following step:

  1. Unhide debug
  2. Set OAM accounting cdrServer admin primary useFilePostfix disable
  3. Transfer a large file.

Note that the file that is being uploaded to the remote server has an ACT extension while it is being transferred.

Platform/Feature: SBC

A new option is added to fix the issue:

  1. Unhide debug
  2. Set oam accounting cdrServer admin primary useFilePostfix disable

By default, the useFilePostfix is set to enabled.

When set to disable, a temporary extension is not used when copying the file to the remote server.

SBX-976173

The SBC application restarted twice.

Impact: The SCM cored due to a segmentation fault.

Root Cause: The SCM hit a segmentation fault due to an attempt to dereference a NULL pointer.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to ensure that the pointer is not NULL before dereferencing it.
SBX-978002

The PrsP cored on both the active and standby nodes at the same time.

Impact: The PRS process cored due to accessing a non accessible memory location while processing the MONSEC response from NP.

Root Cause: Based on the core analysis, the core dump was caused by an invalid MONSEC response from NP. There were many read media stats commands sent to NP at the same time with the MONSEC request. The response that was processing appeared like a valid PNPS_NP_RSP_RD_MEDIA_FLOW_STR response.Due to this observation, there may be some timing issue that sent media flow stat response to MONSEC.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to check that npPoolId and numSecIds are in the defined range.
SBX-978512

The SBC adds a media IP address in the outgoing SDP although the call is a direct media call.

Impact: When a direct media is enabled when handling the re-INVITE from ingress endpoint without a SDP change, the SBC sends a 200OK answer to ingress with the SBC's own media IP address. This causes a one way audio issue.

Root Cause: When the direct media is enabled, while handling a re-INVITE relay transaction, the SBC does not update the SIPStack SDP correctly.

Steps to Replicate: 

Configure for Direct media and enable the e2e Re-Invite.

  1. Send an Invite from A to B.


  2. B sends a re-Invite to A.


  3. A sends a re-Invite to B with SDP of 200 OK that is sent for previous re-Invite

Platform/Feature: SBC

The code is modified to ensure the SBC updates the SIPstack SDP for direct media scenarios.
SBX-980983

All call registrations were failing on the SJ SBC7K.

Impact: RFC-5626 PING/PONG traffic may cause severe CPU utilization issues in the SBC.

Root Cause: RFC-5626 PING/PONG traffic was sent from the SAM process to the SCM process and back.

Steps to Replicate: Send a lot of RFC-5626 PING/PONG traffic.

Platform/Feature: SBC: Call Control

The code is modified to fast-path RFC-5626 PING/PONG traffic.
SBX-969532

Investigate a PATHCHECK Process coredump.

Impact: The Pathcheck process may coredump (due to healthcheck timeout) when the zone tracerouteSigPort is enabled, and when the traceroute takes longer than 45 seconds to complete (after the endpoint becomes BLACKLISTED).

Root Cause: The Pathcheck process coredumps due to a healthcheck timeout when the traceroute to the BLACkLISTED endpoint takes longer that 45 seconds to complete.

Steps to Replicate: Enable the zone tracerouteSigPort, and configure an ipPeer in that zone that will become BLACKLISTED, and the traceroute to that ipPeer takes minutes to complete.

Platform/Feature: SBC

The code is modified to handle slower/longer traceroute completions.
SBX-954753

A double SCM core resulted in an outage.

Impact: A double SCM core resulted in an outage.

Root Cause: While building the outgoing IAD message, there might be a case where the null values for a request message result in incomplete From and To headers, and cause a crash as a result.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to avoid a coredump in cases where there are NULL values for a Request Message.
SBX-98198 | SBX-979162

The STI and Privacy interactions are incorrect.

Impact: When the STIR/SHAKEN is enabled, a default privacy behavior was not given preference when the Privacy header is present in the ingress INVITE as follows:

  1. The STIR/SHAKEN is generating PAI/Privacy:id headers for all services when the PSX IPSP, SIP HTP, or PrivacyProfile->passThruPrivacyInfo is not configured to send the PAI header out. “Add verstat to PAI” flag is set, the SBC was generating the PAI/Privacy: id to add the verstat to PAI when no PSX IPSP, SIP HTP, or PrivacyProfile->passThruPrivacyInfo is configured to send the PAI header out.
  2. The PrivacyParamRestricted configuration must have preference over STI service. The PrivacyParamRestricted->default must anonymize the From and Contact headers when Privacy: user,id,header,or uri is present in the ingress INVITE even when STI is enabled.
  3. The PrivacyProfile configuration should be given preference over STI, when a privacy profile is configured to “applyPrivacyId/supportPrivacyId” and STI should not generate PAI/Privacy: id for any service.
  4. The STIR/SHAKEN is removing the “Privacy: User” header from the egress signal after anonymizing From and Contact header, when the IPSP Privacy->Transparency is enabled and Privacy: User header is present in the ingress INVITE.
  5. Anonymization format should be based on Privacy->Privacy Information and variantType.

Root Cause: 

  1. After the verification service, the verstat should either be added to the PAI or the From header. The “Add verstat to PAI” needs enhancement to enable adding the verstat to From if the PAI is not present in the egress signal.
  2. The PrivacyParamRestricted->default behavior anonymizes the From and Contact headers when Privacy: user, id, header, or uri is present in the ingress INVITE. The STI was not giving preference to PrivacyParamRestricted->default anonymization behavior for the privacy: id.
  3. The PrivacyProfile configuration was not given preference when the “applyPrivacyId/supportPrivacyId” is enabled, and the STI was generating PAI/Privacy: id headers.
  4. The SBC will not remove privacy: user after just anonymizing the From and Contact header and let the downstream switch(es) perform further anonymization.
  5. A preference was not given to Privacy information and variantType while determining the anonymization format.

Steps to Replicate: Configuration:

  1. Configure the STI profile on the SBC and attach the profile on to both the ingress and egress TG.
  2. Configure the STI profile for Signing/Tagging/Verification service on the PSX.

Observations:

  1. When no PSX IPSP->Privacy, SIP HTP, or PrivacyProfile->passThruPrivacyInfo configuration is enabled and the From is anonymized in the egress INVITE, PAI/Privacy header is generated.
  2. The Ingress TG->Signaling->PrivacyParamRestricted->default is configured. Observed that “From” and contact headers are not anonymized, if the privacy: id is present in the ingress INVITE.
  3. When no PSX IPSP->Privacy, SIP HTP, or PrivacyProfile->passThruPrivacyInfo configuration is enabled and privacyProfile configuration is:
    • The PrivacyProfile is configured with the “applyPrivacyId” flag enabled. The PAI/Privacy header is generated when the Privacy: id is present in the ingress INVITE.
    • The PrivacyProfile is configured with the “supportPrivacyId” flag enabled. The PAI/Privacy header is generated.
    (Note: The PrivacyProfile behaviour without any STIR/SHAKEN interactions. When PrivacyProfile is configured to “applyPrivacyId” and attached to the ingress TG or when the “supportPrivacyId” is configured in egress TG, the SBC will remove PAI headers from egress INVITE when the Privacy:id header is received in the invite. When the privacyProfile with the “supportPrivacyId” is configured in the egress TG, the SBC will remove PAI headers from egress INVITE, irrespective of the Privacy header.)
  4. The “Privacy: User” header is not present in the egress signal, when the IPSP Privacy->Transparency, SIP HTP or PrivacyProfile->passThruPrivacyInfo is enabled and the Privacy: User header is present in the ingress INVITE.
  5. The From and contact headers has “Anonymous@Anonymous.invalid” as opposed to "Anonymous” <sip:Restricted>. If the privacy: user header is present in the INVITE and when IPSP->Privacy->Privacy Information is P-Preferred-Id or Remote-Info Party.

Platform/Feature: SBC

When the STI is enabled, the Privacy behavior is given preference over STI, which effectively means no changes in privacy behavior.
  1. The STIR/SHAKEN does not generate the PAI/Privacy: id headers for any services when no control is set to send the PAI headers out(no PSX IPSP, SIP HTP or PrivacyProfile->passThruPrivacyInfo configured), one of the mentioned control must be set for the PAI header to go out. The “Add verstat to PAI” Flag is changed to the “Prefer PAI”, to enable sending verstat in From if PAI is not present in the egress INVITE.
  2. The PrivacyParamRestricted->default anonymizes the From and Contact headers when the Privacy: user,id,header,or uri is present in the ingress INVITE. The PrivacyParamRestricted->default anonymization behaviour for privacy: id is retained even when the STI is enabled.
  3. The PrivacyProfile is given preference over the STI service.
  4. The SBC is not removing the “Privacy: User” header after anonymizing the From and Contact header as part of STIR/SHAKEN service, when the IPSP Privacy->Transparency is enabled and Privacy: User header is present in the ingress INVITE. This enables the downstream switch(es) to perform further anonymization.
  5. The format of anonymized From and Contact headers when IPSP->Privacy->Privacy Information is P-Preferred-Id or Remote-Party-ID is retained even when the STI profile is enabled. The example below is for variantType,
From: "Anonymous" <sip:Restricted@example.com>;tag=gK08000282
Contact: "Anonymous" sip:Restricted@example.com:5060
Format of anonymized From and Contact headers when STI profile is enabled, when IPSP->Privacy set to P-Asserted-ID is as follows,
From: "Anonymous" <sip:Anonymous@Anonymous.invalid>;tag=gK080004bb
Contact: "Anonymous" sip:Anonymous@10.54.46.45:5060
SBX-98566 | SBX-945132

Portfix SBX-94513: The Antitrombone will not have a kickstart but undesired pattern "PCR7400 Direct Media Antitrombone Call" is found in the dbg.

Impact: For a direct media call using X-dmi, the SBC is not preferring X-dmi over anti trombone direct media. This could cause one way or two way audio issue.

Root Cause: The SBC selects the Antitrombone direct media instead of X-dmi.

Steps to Replicate: 

  1. Run a basic XDMI DM call
  2. Run a basic DM with NAT call with XDMI
  3. Run a basic Antitrombone call with XDMI enabled

Platform/Feature: SBC

The code is modified to ensure the X-dmi is preferred over anti trombone
SBX-98598 | SBX-969512

Portfix SBX-96951: Unable to write to the CDR in the ATTEMPT record due to 3xx.

Impact: Run a redirect scenario and write a SMM CDR operation on the 302 message. The CDR information is not populated in the attempt record.

Root Cause: The CDR information is not being updated to CC in this scenario.

Steps to Replicate: 

  1. Run a Redirect Scenario.
  2. Write a SMM CDR operation on the 302 message.

Platform/Feature: SBC

The code is modified to update the CC about the SMM CDR Information.
SBX-95970 | SBX-937643

Portfix SBX-93764: The CAC handling is not working with the REFER and INVITE with replaces to 7.2.x.

Impact: In MS Teams call flows, they support music on hold service by default. The “on hold” feature was implemented by sending a REFER to the SBC so that the SBC then generates an INVITE out to the MS Teams music server and the B-leg is then released. The "off hold" feature was added to have the MS Teams phone replace the music on hold server call leg. Customer's are running with the CAC enabled in the lab and have call limit set to 10. Every time the SBC gets an INVITE with replaces, it reduces the CAC count on the ingress trunk group and then eventually fails.

Root Cause: The issue is that the Trunk Group and the Zone CAC are being performed for call pickup. Since CAC has already been performed for a call that is being picked up, a double count occurs that causes incorrect CAC failures.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified so the CAC is not performed for call pickup scenarios and for double counting all call licenses for call pickup.
SBX-968583

A security patch drift for 7.2.4.

Impact: There are Nessus scan vulnerabilities.

Root Cause: There are Nessus scan vulnerabilities.

Steps to Replicate: Run a Nessus scan.

Platform/Feature: SBC

Update vulnerable packages to latest.
SBX-93229 | SBX-871802

Portfix SBX-87180: Enable to trace with the TRC file SIP message outside the call, such as REGISTER and SUBSCRIBE.

Impact: Trace logs were not coming in the case of OOD when the trace level is set to 1 and the key is ipPeer

Root Cause: The current code does not send the TRC logs for OOD when the level is set to 1, and this option enabled now for OOD.

Steps to Replicate: Pre-Configuration:

-------------------------
admin@ELEANORSBX% show global callTrace | details
errorFilter {
errorType any;
}
maxTriggerCount 10;
callTraceTimer 111;
callFilter Naga {
state enabled;
level level1;
key peerIpAddress;
stopMatch unsupported;
match {
called "";
calling "";
contractor "";
redirecting "";
transferCapability unrestricted;
trunkGroup "";
peerIpAddress 10.54.81.11;
cddn "";
}
mediaPacketCapture disable;
}
signalingPacketCapture {
signalingPacketCaptureTimer 180;
state disable;
}
[ok][2019-04-19 14:44:24]

[edit]

In the configuration above, traces for all methods will be captured,

Platform/Feature: SBC

The code is modified to send the TRC logs when the level is set 1 and the key is ipPeer.
SBX-986603

The heap-use-after-free in the DnsClientTcpMonitorDnsServerTimeout.

Impact: When using the DNS over the TCP, if there was a failure in reading from the TCP socket, the timeout processing was invoked for the outstanding DNS query and it was reading memory that has already been freed up.

Root Cause: This is an edge case error processing scenario where the pointers were being passed around internally and did not get updated to be null when the memory was freed.

Steps to Replicate: Issue was analysed based on a coredump and code review. The exact call scenario that caused the issue is unknown.

Platform/Feature: SBC

The code is modified to pass around the index values rather than the pointers and memory blocks being retrieved based on the index value that allows the code to verify if the associated memory block is free before accessing it.
SBX-96686 | SBX-944862

Portfix SBX-94486: The SBC was not releasing the other leg when call was disconnected during hold( MOH enabled).

Impact: The SBC is not releasing the other leg when call is disconnected during hold( MOH enabled).

Root Cause: This is a race condition in CC where the handler for the event ASG_DISC_CMD is not present for the CC state CC_VIRT_ESCR_VDREQ and as a result, the call is hung.

Steps to Replicate: 

  1. Make a TEAMS to PSTN call.
  2. The TEAMS holds the call (MOH).
  3. The TEAMS disconnect the call during MOH.

Platform/Feature: SBC

The code is modified so that, the DISC cmd gets propagated to the other active peer call side and the call gets terminated correctly.
SBX-945912

The CE_Node2 log fill up disk space causing a switch over.

Impact: The SYS ERRs from the CpcGenericCodecIsRfc3389Applicable() were filling up the SYS log and CE_logs quickly.

Root Cause: Based on the analysis of genCodecData in SCM core file and source code inspection, a bug was found in CpcGenCodecCriterionMatch() that could return an unpredictable value when all attributes are invalid in a specified criterion. In the SCM core, call control blocks were found in the SIPSG with the GSM audio encoding that has all attributes set to invalid in the criterion.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

1. Fix the bug in the CpcGenCodecCriterionMatch().
2. Downgrade the debug message from the SipSgConvNsdMediaRawTransparencyToSdp() to the INFO level.
SBX-979482

The SBC drops a request from egress to a registered user.

Impact: Non-Invite messages may drop if received immediately after a registration/Subscribe from the AS.

Root Cause: When a request was sent out to the server, internally, it creates a control block for handling the response. When a Peer sends a request back with the same callId, the SBC found the control block that is wrong and causing the SBC to drop.

Steps to Replicate: A register an to B, and the B send message back the SBC.

Platform/Feature: SBC

The code is modified to ensure the internal callId is unique so the incoming request can create a separate one.
SBX-984012

A SIP-I Issue with HOLD for the SIP-I to SIP call.

Impact: The SIP-I body is not being sent out in a re-INVITE for HOLD.

Root Cause: The SIP subsystem is making a dip into the ISUP stack with wrong even type, that's why ISUP stack is not returning SIP-I body to be sent with.

Steps to Replicate: It is a complex scenario that is run into this situation when the re-INVITE for HOLD is to be sent out. It requires multiple offer/answers before the call is setup to end up in this situation. 

Platform/Feature: SBC: SIP Applications

If flag is set for PROGRESS and MID_CALL_INFO, the precedence is set to send the event as PROGRESS for dipping into the ISUP stack for ISUP body.


SBX-96816 | SBX-958512

Portfix SBX-95851: The LeakSanitizer detected memory leaks in the DiamCsvAddPeer.

Impact: Unable to resolve the SRV fqdn for a diameter peer. Without this fix, the diameter connection cannot be established towards the diameter peer.

Root Cause: The wrong domain name is attached to diameter peer when a peer is created with the SRV domain fqdn internally in code.

Steps to Replicate: Create a  diameter peer with SRV fqdn.

Platform/Feature: SBC

Removed attaching the wrong domain name to the diameter peer when the SRV based FQDN is configured for a diameter peer.
SBX-96754 | SBX-946193

Portfix SBX-94619: The intel microcode bundle is not the latest version.

Impact: There are vulnerabilities in hardware.

Root Cause: The CPU microcode is outdated.

Steps to Replicate: Run the Spectra-melt-down script on a host and check vulnerabilities.

Platform/Feature: SBC

The code is modified to reflect the latest version.

Resolved Issues in 07.02.03R000 Release 

The following issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-924792

In the I-SBC, PKT Port redundancy support is not present in 7.2.2 release.

Impact: The SBC Release 7.2.2 is missing the PKT Port redundancy support, when it is listed as available.

Root Cause: In the I-SBC, the PKT Port redundancy support is added in the 8.x releases, but not present in the 7.2.2 release.

Steps to Replicate: Configure the pkt port redundancy, port the switchover to see the service continuity on PKT ports with redundancy enabled.

Platform/Feature: SBC

Back ported support is added in the 8.x to 7.2.2. releases.
SBX-917231

Observing the CLI port SWO in the M-SBC is causing the MGMT link to go down.

Impact: On the CLI port, a switchover on packet interface has random connectivity loss for few seconds on other interfaces.

Root Cause: A bug in SWe_NP code was picking the incorrect NIF control blocks for standby ports causing intermittent signaling packet loss and a loss of ICMP packets resulting in connectivity failures. This happens specifically on high call loads, when workers are at 80% capacity.

Steps to Replicate:

  1. Bring up setup with port redundancy and perform multiple CLI switch over.
  2. Observe the link status of various ports.

Platform/Feature: SBC

The code is modified to correct NIF control blocks are chosen for standby ports.
SBX-88061 | SBX-874043

Portfix SBX-87404: A reInvite is triggered before an ACK is verified. (Originated in release 6.2.4)

Impact: When the online validation (sessId and verId) is set to zero in 200OK, the SIPS fails to save the peer SDP.

Root Cause: When the o-line validation (sessId and verId) is set to zero in 200OK, the SIPS fails to save the peer SDP. This could trigger an unnecessary reInvite.

Steps to Replicate: Configure the SDP o-line version only. The SDP received in 200 Ok (multi codecs) for egress has a sessId and verId of zero. The SBC could send an unnecessary reInvite to the peer.

Platform/Feature: SBC

The code is modified so the peer SDP is saved properly.
SBX-920372

Optional fax parameters are being parsed by the SBC and, as a result, the 200 Ok is being discarded.

Impact: The SBC returns a parser error (4xx) for unsupported t38 attributes.

Root Cause: When the unsupported t38 attributes are received, the SBC shows it as an error.

Steps to Replicate: When the Incoming call has unsupported t38 attributes, the SBC shows a reply 4xx (parsed error).

Platform/Feature: SBC

The code is modified so the SBC ignores the attributes and does not display an error message.
SBX-912731

The EMA receives a Proxy error whenever an operation takes a long time to complete.

Impact: When the user navigates to a SIP trunk group or DM PM rule creation screen, there is no response from the UI and after approximately a 2 minute interval, "Proxy error" is shown to the user.

Root Cause: The EMA reads the DM PM Rule, DM PM Sub Rule and DM PM Criteria data from the CDB through the Netconf interface. With a large amount of data, there is a significant delay in rendering the UI. The request from the browser times out, resulting in a Proxy Error to the user.

Steps to Replicate:

1. Configure more than 25,000 DM PM Criterias and more than 25,000 DM PM Rules.
2. Navigate to a SiP Trunk Group Creation Screen or DM PM Rule creation screen.
3. The create screen does not load and after some time results in Proxy error.

Platform/Feature: SBC

Instead of a CDB, the EMA reads the data for DM PM Rule, DM PM Sub Rule and DM PM Criteria directly from the Oracle Database, reducing the delay to a larger extent in rendering the UI.

When the Copy Trunk Group operation is performed, it can take up to 3 minutes to complete the copy operations. The 3 minute delay is due to the EMA performing some additional operation compared to new TG creation.

SBX-916823

The MS Teams scenario with ICE causes the RTCP port value discrepancy with X when the RTP is Y and when MUX is supported.

Impact: When the SBC sends out re-INVITE messages on a call leg supporting ICE, it can still include a=rtcp:<rtp port + 1> value in the SDP that is different to the previously agreed RTP/RTCP MUX setup with the remote end.

Root Cause: The SBC was not considering the SDP answer from the peer when setting the RTCP port value.

Steps to Replicate:

1. Send INVITE to SBX ingress with valid audio stream in SDP.

2. From the egress endpoint, respond to the INVITE with a 180 ringing and a 200 OK, and in both cases include valid SDP that has an RTP ICE candidate (no RTCP).

a=rtcp-mux

3. At the ingress endpoint, respond to a 200 OK with valid ACK.

4. From ingress endpoint, send a re-Invite that includes an existing audio stream and add a new video stream in SDP.

5. Complete the call signaling and then clear the call.

Platform/Feature: SBC: MS Teams

The code is modified to send a=rtcp:<rtp port> when sending re-INVITE messages for streams previously agreed to support muxed behaviour.
SBX-89807 | SBX-864953

Portfix SBX-86495: Add a lightweight MPSTAT analysis as a warning to the user. (Originated in release 8.1.0)

Impact: The SBC had random timeouts/healthchecks due to the high %steal (in mpstat output).

Root Cause: There is no warning given when the %steal value is high.

Steps to Replicate: On a VM or cloud machine, manually add a value in the mpstat.log and then run the script.

Plaform/Feature: SBC

The code is modified to check if the system is running with high steal% value and showing a warning to the user.
SBX-907583

The SIP level4 call trace filter must not be restricted by the maxTriggerCount.

Impact: Level 4 call traces are incorrectly restricted by the maxTriggerCount value.

Root Cause: The intention is that the level 4 traces runs all messages and not be restricted by the system wide trigger count. The count must only apply to per call level 1-3 traces.

Steps to Replicate:

  1. Configure a level 4 call trace.
  2. Configure the maxTriggerCount to a non-zero value.
  3. Change calls that are traced as well as subsequent calls – once maxTriggerCount calls have been made, not be traced.

Platform/Feature: SBC

The code is modified to ensure level 4 traces are unrestricted.
SBX-92266 | SBX-881222

Portfix SBX-88122: The SBC failed to re-establish media session between the SBC and MS Teams Client after a call transfer initiated by Teams client has failed. (Originated in release 7.2.1)

Impact: In scenarios where MS Teams referred the call to another, the SBC started to play a RBT (ring back tone) and if the REFER failed due to the C-party not answering, the media is not established again between the A and B party.

Root Cause: The media resource used to play the RBT did not get freed up correctly when the REFER failed and this blocked the media flow from A to B being re-established.

Steps to Replicate: Make a call from PSTN to MS Teams, have MS Teams REFER the call to another user. Let the phone ring as C-party but do not answer it.

Platform/Feature: SBC

The code is modified to correctly free up the RBT resources so the A- to-B call can re-establish.
SBX-908672

The Ssreq coredumped on the SYD SBC.

Impact: The ssreq server has a memory leak that may eat up virtual memory, when there is call load through the ssreq client.

Root Cause: The memory allocated for call data and call trace is not being deleted properly, leaving those memory blocks idle forever.

Steps to Replicate:

  1. Set up the SBC system with a light or heavy call load.
  2. Add a call load through ssreq client to the system, light traffic is enough.
  3. Use the top command to watch the memory growth.

Platform/Feature: SBC

The code is modified to remove the memory blocks promptly.
SBX-91744 | SBX-914811

Portfix SBX-91481: The SamP cored. (Originated in release 6.2.4)

Impact: Under certain conditions, the SBC sends out a duplicate OPEN_ACK, causing the receiving GW to crash.

Root Cause: A bug in the GW Signaling code can cause a duplicate OPEN_ACKS to send when GW Signaling Links are bouncing.

Steps to Replicate: This problem is not reproducible.

Platform/Feature: SBC

The code is modified to only send out one OPEN_ACK per tcp/ip connection.
SBX-91726 | SBX-878611

Portfix SBX-87861: While performing a port switchover, the SBC active performed a reboot and the Standby did not takeover the calls. (Originated in release 8.1.0)

Impact: An SWe_NP thread hang was observed on a packet port pull out.

Root Cause: A cable pull was calling a reset on an interface that may take more than 5s on a thread health check threshold, causing the thread to lock on reset.

Steps to Replicate:

  1. Bring up setup in port redundancy setup.
  2. Cable pull packet interface to trigger port switchover.

Platform/Feature: SBC

The code is modified to adjust the thread health check mechanism on a port reset.
SBX-91585 | SBX-915102

Portfix SBX-91510: An ASAN global-buffer-overflow for the IPUtilGetIpAddressForPrefix. (Originated in release 8.1.0)

Impact: In the SBC, while validating whether the peer RTP address is trusted or not, the IP address is validated. While validating the IP Address, the prefix is passed along with the IP Address. The prefix length is passed as 128, irrespective of the IP Address version.

Root Cause: This issue was reported as part of the ASAN Testing on a PCR 8709 regression suite in the SBC lab.

Steps to Replicate: This issue was found while running a PCR 8709 regression test suite.

Platform/Feature: SBC

The code is modified by passing the correct prefix length and by checking the IP Address version (i.e. If IPV4, pass prefix length as 32. If IPV6, pass prefix length as 128).
SBX-921372

The RTP is sent to RTCP after a monitor success indication.

Impact: The SBC learns the RTCP port number and uses that to send RTP packets to the end point when RTP monitoring is enabled.

Root Cause: When the RTP montoring is enabled for a call and the media stream sends RTCP packet within the number of packets for authorization, an Network Processor (NP) learns the RTCP packet and notifies the application about the sourceIP and sourcePort.

Steps to Replicate:

  1. Enable the RTP monitoring for a call.
  2. Send RTCP packet first and then RTP packets.
  3. The SBC may send to the learned RTP source port.

Platform/Feature: SBC

The SBC does not learn the RTCP packet when the RTP monitoring/x_cnt feature is enabled.
SBX-91724 | SBX-910902

Portfix SBX-91090: PrsNP process core dump on standby of I-SBC HA on KVM while doing an sbxrestart. (Originated in release 8.1.0)

Impact: There is rare potential of race in healthcheck implementation of SWe_NP. It can cause a false healthcheck failure of the SWe thread and a result in SWe_NP thread crash.

Root Cause: Read and write a healthcheck global variable occurred in non-atomic manner from two different cores.

Steps to Replicate: This is a rare occurrence that happens randomly on idle systems. The steps cannot be consistently reproduced.

Platform/Feature: SBC

The code is modified to make the healthcheck variable update as atomic.
SBX-909463

Replace the cdb_get when processing status commands.

Impact: Multiple issues were reported where the process cored from healthcheck timeout. The application must not call out to the CONFD when processing the CLI status requests.

Root Cause: Application must not call out to CONFD when processing the CLI status request.

Steps to Replicate:

1. Configure IPSEC testbed.

2. Start to run some calls.

3. From CLI, issue the following commands: "show table addressContext <address context> ipsec ikeSaStatus" "show table addressContext <address context> ipsec ikeSaStatistics" "show table addressContext <address context> ipsec ipsecSaStatus" "show table addressContext <address context> ipsec ipsecSaStatistics" "show table addressContext <address context> ipsec systemStatistics"

Platform/Feature: SBC

The code IKE process code is modified to avoid calling out to CONFD when processing CLI status requests.
SBX-920022

The DALSBX71A core dumped.

Impact: The SBC core dumped while processing a call with the call stack in 5.0.5R000 software.

Root Cause: NRMA has resources getting cleaned up in response to the ingress hanging up. At the same time, in response to egress received 183 Session Progress and 180 Ringing, the activate starts. In this race condition, the ipCktInfo is NULL and code illegally tries to access it and causes a core dump.

Steps to Replicate: No steps to replicate, only a code inspection was done to test the issue.

Platform/Feature: SBC

A null pointer check is put in place.
SBX-908771

Failover from Node-A to Node-B.

Impact: Healthcheck failure while switching from nodeA to nodeB.

Root Cause: Functions that configure the DRBD subsystem are taking longer and causing a health check timeout.

Steps to Replicate: Switchover from Active to standby.

Platform/Feature: SBC

The code is modified to run DRBD setup commands in the background and unblock the caller immediately.
SBX-92402 | SBX-912572

Portfix SBX-91257: No Ring back is heard during a blind transfer. (Originated in release 7.2.1)

Impact: The SBC was playing a ring back tone while processing REFER and transferring the call. However, the tone was not heard on the original call leg because MS Teams had put the original call on hold.

Root Cause: The code was intentionally not sending re-INVITE messages in this scenario.

Steps to Replicate: Run any MS Teams transfer call scenario.

Platform/Feature: SBC

The code is modified to send out a re-INVITE message to take the original call off hold so that it can hear the ring back tone being played.
SBX-920912

Call Graphs are showing more calls after upgrade.

Impact: Stale calls may be found on a newly upgraded SBC if upgrading from a version older then 6.1.0 to a version higher.

Root Cause: As a result of changes that were made to the call ID in 6.1 code, any calls during the LSWU that existed prior to the upgrade and then were modified or terminated after the upgrade started will be left in a hung state.

The only way to clean up these calls is to use the following commands:

unhide debug
request sbx rtm debug command “cleanup <gcid>

Steps to Replicate:

1. Create an audit key greater than 31 by multiple switch over on a HA system or by using instrumented code.

2. The audit key will create GCID values using the high bits ( bit 30-31) of GCID value.

3. Setup SIP calls on the system.

4. Initiate the LSWU on standby and after standby is upgraded to newer version, all the established calls on active will be synced.

5. Start the LSWU on active.

6. At this point, standby will become Active.

7. Hang up calls that were established before standby became Active.

8. Issue "show table global callSummaryStatus" CLI command and for all those calls data will be Unavailable.

9. These calls will consume resources. To verify the issue, perform the same steps mentioned above. After upgrading to version with fix, after calls are hung, resources must be released and show table global callSummaryStatus command will not show any orphaned calls.

Platform/Feature: SBC

The code is modified to prevent calls from being hung during an upgrade from versions older than 6.1.
SBX-92274 | SBX-913321

The ipPeerCurrentStatistics and ipPeerIntervalStatistics are not working.

Impact: Getting the IP peer current statistics for individual IP peers was not working. The issue is reproduced when multiple IP peers are configured under the same zone.

Root Cause: Multiple IP Peers must be configured under same zone to reproduce this issue. When obtaining specific peer statistics, the peer name comparison within the same zone was missing.

Steps to Replicate: Configure multiple IP Peers under the same zone and then execute the command to obtain IP Peer Current/Interval statistics for a specific peer.

Platform/Feature: SBC

The code is modified by adding the comparison for IP peer specified in the CLI against the IP peer statistics list with other existing validations.
SBX-91725 | SBX-909471

Portfix SBX-90947: The NP process core dumped while running a load on the HA setup.

Impact: A random SWe_NP crash occurs on a standby node while running a transcoded load.

Root Cause: RTCP resources are not managed properly by application layer on standby node. This causes a restart of already running timers on the SWe that causes a race and random crash.

Steps to Replicate:

  1. Run a large number of transcoded calls, on HA pair.
  2. Perform multiple swtichovers of SWE_NP coredump will be observed on standby node.

Platform/Feature: SBC

Maintain the state in the SWe_NP of running RTCP timers in the context block and guard the double start of timers.
SBX-917383

When using the metaVariableDynamic, LinkDetection is not activated in the SBC.

Impact: If the LinkDetection interfaces are configured to use addresses specified in the systemMetaVariable dynamic table, those addresses are not properly read and the LinkDetection is not activated.

Root Cause: The addresses were not properly read from the metaVariableDynamic table.

Steps to Replicate:

1. Add new entries to the metavariableDynamic table.
2. Create an ipInterface with meta keys added to metaVariableDynamic table.
3. Configure the Link Detection on the ipInterface.
4. Check the Link Detection status.

Platform/Feature: SBC

The code is modified to properly read the addresses from the metaVariableDynamic table.
SBX-920013

Memory leaks in the SIPSG.

Impact: While debugging a bug in a previous release (SCM crashed from segmentation fault fired from malloc()), memory leaks were found in the SIPSG related to subscription.

Root Cause: Observed through a source code inspection.

Steps to Replicate: Perform SIP regression tests.

Platform/Feature: SBC

The code is modified to free memory blocks properly.
SBX-92430 | SBX-906542

Portfix SBX-90654: Unable to retrieve the parked call on MS Teams. (Originated in release 7.2.1)

Impact: The SBC was unable to retrieve a parked call. The call was not working correctly because the NRMA process had incorrectly swapped PSP information on the call legs.

Root Cause: This is a new call scenario being implemented for the MS Teams interop.

Steps to Replicate: Run a test call in the MS teams for call park and retrieve.

Platform/Feature: SBC: MS Teams

The code is modified to correctly process PSP information on the different call legs during parking and retrieving a call.
SBX-92160 | SBX-919072

Portfix SBX-91907: The SBC fails to mount a cinder volume on first boot. (Originated in release 8.1.0)

Impact: The SBC fails to mount a cinder volume on first boot.

Root Cause: The bootcmd instruction to mount the volume was executed before the cinder volume was attached as part of instance creation. The cinder volume was not mounted on first boot and as a result, the SBC results in a failure.

Steps to Replicate: Launch the SBC instance with a cinder volume attached and ensure volume is mounted properly.

Platform/Feature: SBC

The code is modified to wait until the cinder volume is detected and then proceed with the mount.
SBX-92414 | SBX-918202

Portfix SBX-91820: In crank back scenarios, the SBC is taring down the SRS call even before the CS call is torn down.(Originated in release 7.2.1)

Impact: The SBC was immediately disconnecting the SRS call after establishing the SIP Rec session with the next available SRS. The initial SRS responds with a failure 4xx response.

Root Cause: The SBC, after finding the next reachable SRS when the initial one has failed with 4xx response, creates a new SIP Rec Call Block data matching to new SRS. In the older version of the SIP Rec Call Block, the state machine was invoked with a incorrect event. The incorrect event in the state machine was causing the deletion of old SIP Rec Call Block along with deleting the new SIP Rec Call Block.

Steps to Replicate:

1. Create a SRS Group with three SRS Servers.
2. Configure the num streams to 2.
3. The SBC tries to send SRS Invite to first 2 SRS.
4. Send the 4xx response from the first SRS and 2xx response from the 2nd SRS.
6. After receiving the 4xx response, the SBC tries to send new INVITE to 3rd SRS.
7. Send a 2xx response from 3rd SRS.
8. At this step, after ACK towards 3rd SRS, SBC immediately sends BYE to 3rd SRS.

Platform/Feature: SBC

The code is modified to invoke the State machine with a proper event so that only the old SIP Rec Call Block data is removed and the new SIP Rec Call Block data is retained. This avoids immediate disconnection of new SIPREC Call that is established with the second SRS.
SBX-910362

A DTMF transcoding caused the call to disconnect.

Impact: A certain percentage of the traffic (5%of the calls) are failing due to an incorrect DTMF payload being sent by BROADSOFT.

Root Cause: The SBC was expecting that for a single HD CODEC entry in the 200 OK ANSWER, the Peer/Endpoint must send a matching 16K DTMF payload as per the RFC standard. But the BROADSOFT server at the Egress side is non compliant and sending a 8K DTMF, which is causing the call disconnection.

Steps to Replicate:

1. Enable the DTMF either on both the legs and Different Transcode Flag.

2. Send the PCMU with DTMF 8K from Ingress leg.

3. From Egress side, send the PCMU without any DTMF.

4. Ensure that the call is transcoded.

Platform/Feature: SBC

The code is modified so the strict check is now relaxed and for single codec entry, the SBC does not match the DTMF clock with the codec clock frequency.
SBX-919851

The SIP calls drop with vertical service code *65 after a minute.

Impact: The SBC is not able to send ACK to the Egress for call to connect.

Root Cause: A logical error when combined with multi features (e2eAck, e2eReInvite, and DLRBT).

Steps to Replicate:

  1. Configure the e2e Ack, e2e reInvite, and DLRBT.
  2. Egress response 183(sendrecv), 183(onhold), 180(no SDP), 200OK(sendrecv).
  3. Peer change the SDP in 18x/2xx response causing internal offer/answer.
  4. Ingress peer sends the reInvite right after ACK, causing internal state not able to send ACK out.

Platform/Feature: SBC

Correct logical errors when multi features e2e ack, e2e reIvnite, and DLRBT are enabled.
SBX-915522

Q.850 reason header has a grammar issue.

Impact: Invalid format in the reason header in a SIP 500 message.

Root Cause: When the reason header transparency is enabled, a bug appears in the code.

Steps to Replicate: Enable the Reason header transparency along with ANM to CPG feature.

Platform/Feature: SBC

The code is modified so that even when transparency is enabled, the Reason header is sent out in the correct format.
SBX-92658 | SBX-915993

Portfix SBX-91599: There was a ASAN stack-buffer-overflow on the address in the StrNCpyZ.

Impact: There is an array, which is being used with string specifier and is not null terminated, which causes the overflow problem.

Root Cause: A buffer overflow.

Steps to Replicate: The steps are not reproducible.

Platform/Feature: SBC

The log is removed to stop the buffer overflow.
SBX-926601

The SBC failed over DEADLOCK detected and a ScmP core was generated as a result.

Impact: Access the NULL pointer in NRMA when deleting a tone profile.

Root Cause: The given targets name does not exist.

Steps to Replicate: Use CLI command to delete the non-existing announcement tone profile.

Platform/Feature: SBC

The code is modified to validate the return value from lookup function before accessing the value.
SBX-921151

The SCMP coredump was related to ARS.

Impact: The SCM process may core dump when the SIP signaling port is out of service, and if calls are in progress and a SIP transaction timeout occurs.

Root Cause: If the SIP signaling port is out of service, and if calls are in progress and a SIP transaction timeout occurs.

Steps to Replicate: The steps cannot be replicated.

Platform/Feature: SBC

The code is modified to check that the SIP signaling port is in service when handling SIP transaction timeout events.
SBX-926212

*BrmRedBresAlloc messages are overloading DBG logs.

Impact: BRM redundancy messages were filling up DBG logs.

Root Cause: Those were debug messages to help debug resource leaking issue.

Steps to Replicate: Use regression test only.

Platform/Feature: SBC

Downgraded the related BRM redundancy messages to INFO/Minor level to avoid overloading the DBG logs.
SBX-919522

Oracle Java JDK vulnerabilities were observed for Nessus scans.

Impact: The Nessus Scan was reporting that embedded java in Oracle database has security vulnerabilities.

Root Cause: Oracle 12c has Java 1.6.0_75 embedded.

Steps to Replicate: Run a Nessus scan and the earlier vulnerability will go away.

Platform/Feature: SBC

Upgraded the Oracle 12c 12.1.0.2 embedded java to 1.7.0_221 using the patch provided by Oracle.
SBX-915702

Calls from MS Teams may have an audio loss for 30 seconds and then switch-over.

Impact: If there is an SBC switch-over after the call is established, there can be a delay (for example, 30 seconds) when re-establishing the media from the PSTN to MS Teams.

Root Cause: The stored SSN value does not get updated before the SBC switch-over occurs, and it causes the SSN to jump backwards after a switch-over, which causes the one way audio issue until the SSN value increments past the previously set value.

Steps to Replicate: Perform a switch-over after the LRBT is played and check that there is no one way audio issue.

Platform/Feature: SBC: MS Teams

After the LRBT is played, the latest SSN value is sent to the standby SBC so it can correctly jump the SSN forward on a switch-over and the media flow continues without delay post switch-over.
SBX-908752

The LSASBX71 switched over and causes both sides to core.

Impact: A bug in GW Signaling code can cause a core when GW Signaling Links are bouncing.

Root Cause: A bug in GW Signaling code can cause a core when GW Signaling Links are bouncing.

Steps to Replicate: The steps are not reproducible.

Platform/Feature: SBC

The GW Signaling code is modified to prevent a core.

SBX-917501

Observed "SamProcess" core dump on an active box while running SIP-GW (cyclic) calls.

Impact: The SBC may core if the GW Signaling Port configuration is disabled while GW Signaling Link is up.

Root Cause: The core is caused by an attempted NULL pointer access.

Steps to Replicate: Disable the GW Sig Port while GW Sig Link is up.

Platform/Feature: SBC

The code is modified to check for NULL pointer to GW Signaling Port before attempting to access this pointer.
SBX-917722

The application is generating "User Error: monitoring/0/101 PAM authentication succeeded" in .SEC file.

Impact: The SEC log records all successful PAM authentication, which is causing the disc to fill.

Root Cause: Due to constant value re-organization, successful PAM authentication has been mistakenly logged in to SEC log.

Steps to Replicate:

  1. Ensure that logs are configured at MAJOR level.
  2. Put a TLS load on the SBC.
  3. Many of the similar lines in the SEC log, as shown in the example below:

    154 07092019 155039.345656:1.01.00.56147.MAJOR .CHM: *User Error: monitoring/0/101 pam authentication succeeded via rest

  4. Apply the same procedure in a fix version SBC and those lines will not be seen.

Platform/Feature: SBC

The code is modified to exclude a successful case when logging in PAM authentication failures.
SBX-923861

When running the 7.2.1R2 release, the SBC is responding with 'a=inactive' instead of 'a=sendrecv' in a 200OK SDP to late media re-invite, causing no audio.

Impact: It was not RFC compliant to send a=inactive to the late media re-INVITE after peer put the SBC on hold.

Root Cause: A missing requirement.

Steps to Replicate:

Step 1: Generate SIP scripts for a call flow.
Step 2: Setup 7.2.1 system without a fix.
Step 3: Run the call flow to see that the problem is observed.

Platform/Feature: SBC

The code is modified to send a=sendrecv to make it RFC compliant.
SBX-933892

The MS Teams call flow when using hold/resume then transfer causes SCM crash.

Impact: When music on hold is used in the deployment and a call is put on hold/resumed and then transferred, the call is causing the SBC to coredump in the SCM process.

Root Cause: The SCM process was de-referencing a null pointer.

Steps to Replicate: Music on hold is used in the deployment and a call is put on hold/resume and then transferred.

Platform/Feature: SBC: MS Teams

The code is modified to validate the pointer as not null before trying to use it.
SBX-92980 | SBX-924842

Portfix SBX-92484: The SBC is dropping the 2nd codec for a text stream when the sendOnlyPreferredCodec flag is enabled. (Originated in release 8.1.0).

Impact: The SBC was dropping the second payload for a text stream if the "Send Only Preferred Codec flag" was enabled and the offer answer contains both t140 and red as payloads for this stream.

Root Cause: The "Send Only Preferred Codec" flag's logic was applied even to a text stream that resulted in the SBC picking the first codec and dropping the other.

Steps to Replicate:

1. Bring up the setup for an A-B call.

2. Enable the flag t140 on both PSPs.

3. Enable the flag sendOnlyPreferredCodec on both IPSPs.

4. Send INVITE from A with both Audio and text media stream with 2 codecs for text(t140 and red).

5. Send 200 OK from B with both Audio and text media stream with 2 codecs for text(t140 and red). Both of the payload is received through the t140 and red is received and no payload is dropping.

Platform/Feature: SBC

The code is modified to exclude text stream from "Send Only Preferred Codec" logic.
SBX-925802

The SIP Domain is missing in the FROM header after an upgrade.

Impact: The DM rule for the FROM Uri is not working.

Root Cause: Introduced in a previous release to treat the FROM Uri for theRewriteIdentity only.

Steps to Replicate: Configure the PSX for FROM Uri, and a SIP-SIP call. Verify the FROM header is picking up the DM rule of FROM Uri.

Platform/Feature: SBC

The code is modified to support the old behavior for allowing the FROM URI taking effect, even when RewriteIdentity is disabled
SBX-929183

Inconsistent handling of the SDP in 200 OK on an egress SIP leg.

Impact: "Send Updated SDP in 200OK" was enabled and GW-GW call will fail when the 2xx response SDP is different from the previous 18x response.

Root Cause: The feature flag "Send Updated SDP in 200OK" is applicable for SIP-SIP call only.

Steps to Replicate: Turn on the flag, make a GW-GW call where the 200OK SDP is different from the previous 18x response.

Platform/Feature: SBC

Added logic to disable the feature even if configuration is enabled
SBX-92470

The SamP has a memory leak.

Impact: There is possible slow memory leak in the SAM process when running GW-GW calls.

Root Cause: GWFE is leaking a copy of the incoming PDU that was queued internally.

Steps to Replicate: The steps are not reproducible.

Platform/Feature: SBC

The code is modified to free the memory that was being leaked.
SBX-922522

The SBC was sending an INVITE out for the first user only.

Impact: The Native Forking fails to send out on 2nd route.

Root Cause: If an incoming call that has capital "CALL-ID", the SBC fails to find the parent incoming call.

Steps to Replicate: Configure the native forking feature, and incoming call has capital "CALL-ID".

Platform/Feature: SBC

The code is modified so the "CALL-ID" is case insensitive.
SBX-925852

The SBC SWe is dropping packets on the pkt0.

Impact: The pkt0 interface stops pinging after a long time.

Root Cause: The SWe_NP code has a slow leak when it is in standby mode, causing the pkt0 to get exhausted after sufficiently long time.

Steps to Replicate: On a standby node, run a program/utility to send packet out of the interface.

Platform/Feature: SBC

Ensure all packets are freed that are read from the KNI devices in SWE_NP code.
SBX-930562

The SBC failed to generate Enum lookup after updating the dynamic metaVariable.

Impact: The SBC failed to generate Enum lookup after updating the dynamic metaVariable

Root Cause: When the dynamic metaVariable updated for the sipSigPort, the trigger was missing for lwresdProfile and update of sipSigPort IP was not happening that causes the issue.

Steps to Replicate:

1.Configure the SBC for A-B call.
2.Create a dynamic metaVariable to add to sipSig port.
Example:

admin@vsbc1% show addressContext default zone ZONE_ING_V6 sipSigPort
sipSigPort 3 {
 ipInterfaceGroupName LIG_ING_V6;
 portNumber 5060;
 mode inService;
 state enabled;
 transportProtocolsAllowed sip-udp,sip-tcp;
 ipVarV6 lpl_ing;
}
[ok][2018-10-16 15:40:32]
[edit]
admin@vsbc1% q
[ok][2018-10-16 15:40:34]
admin@vsbc1> show table system metaVariableDynamic
CE NAME NAME VALUE
-----------------------------------------------------
vsbc1-10.34.195.109 lpl_egg fd00:10:6b50:5d20::c9
vsbc1-10.34.195.109 lpl_ing fd00:10:6b50:5d20::c7


3. Configure for an Enum call and run an Enum call make sure Enum over sipSigPort and observe an Enum call is successful over sipSigPort.
4. Update the dynanamic metaVaribale lpl_ing to fd00:10:6b50:5d20::ec and restart the SBC and try the call.
5. After updating the metaVaribale lpl_ing to fd00:10:6b50:5d20::ec, the Enum call must be successful.

Platform/Feature: SBC

The dynamic metaVariable trigger is added for lwresdProfile to update sipSigPort IP to fix the issue.
SBX-933072

Configuring the multiple NNI profiles in a single commit does not work.

Impact:

The following tables are not read correctly by the SIP application, if multiple rows are changed in the same commit in the CLI:
E164 Profile
SIP Filter Profile
NNI Profile
Privacy Profile
PSX Script Profile
SIP Security Profile
SIP Param Filter Profile
SRVCC
STI Profile

Root Cause: There was a coding error.

Steps to Replicate:

  1. Configure two or more NNI profiles.
  2. Configure SIP trunk groups using each of the NNI profiles.
  3. When making SIP calls, the controls on only one of the NNI profiles (the one which is displayed first when running show command) are effective.

Platform/Feature: SBC

The code is modified to process multiple rows in a commit.
SBX-920921

A possible memory leak in the Sam process.

Impact: The SAM process will leak memory in the case where a De-REGISTER is received and then within less than 30 seconds, another REGISTER in the same AOR is received. This will only happen if multiple contacts in the AOR flag is disabled.

Root Cause: The code does not free certain memory blocks.

Steps to Replicate:

  1. Multiple contacts per AOR flag will be disabled
  2. Do a Register for particular AOR and do a de-register.
  3. Within less than 30 secs, re-send the registration for same AOR so that SIPFE selects the same preferred slot which was used for registering the same AOR earlier. By registering multiple users with same time period, leak will be reproduced.

Platform/Feature: SBC

The code is modified to free the memory blocks.
SBX-923873

The service instance messages for "Call_Hold" and "Call_Retrieve" are not generated in some GW-GW scenarios.

Impact: When a SIP-SBX-GW-GW-GSX-ISUP call is intercepted, if hold/retrieve is received from either side, the SBC does not send service instance messages to the LI server.

Root Cause: The SBC is not sending the service instance messages to the LI server.

Steps to Replicate:

1. Start the LI server.
2. Initiate the SIP-ISUP call with HOLD from egress.
3. Check LI server logs for service instance msg for hold and retrieve.

Platform/Feature: SBC

The code is modified to pass the Hold/Retrieve indications from one GW to other GW.
SBX-930892

Admin credentials are visible to non-root users during PM login.

Impact: The credentials for admin were visible to linuxadmin.

Root Cause: Previously a shell was invoked by PHP and inside it pamValidator was called with credentials as arguments.

Steps to Replicate: Run the following in a session as linuxadmin while

  1. Apply pgrep -a pam; done.
  2. Log into PM now credentials should not be present in the output of the command.
30131 /usr/local/bin/pamValidator 30131 /usr/local/bin/pamValidator 30131
 /usr/local/bin/pamValidator 30131 /usr/local/bin/pamValidator 30131
 /usr/local/bin/pamValidator 30131 /usr/local/bin/pamValidator

Platform/Feature: SBC

The code is modified so pamValidator takes input from the ENV instead of cmdline arguments.
SBX-912113

"X509_STORE_add_cert failed 0" when multiple certificates are created using the same certificate file.

Impact: "X509_STORE_add_cert failed 0" error log is continually logged onto .DBG from the standby (HW only) when a remote certificate is added that does not have a 'success' status.

Root Cause: The certificate does not properly exist in CLI, therefore the certificate cannot be properly read from CDB.

Steps to Replicate: Create multiple certificates using the same remote.

Platform/Feature: SBC

The timer used to import the certificate on the standby now checks the certificate status and successfully exits in cases where the certificate status is not a 'success'.
SBX-932851

Observing a box reboot while the application is coming up as standby after a port-failure.

Impact: After a node switchover, the standby node may reboot while the application is coming up.

Root Cause: During a node switchover, when application comes up on standby node, the health monitoring for worker thread fails because of an incorrect evaluation of CPU cycles spent by the thread. A failure to health monitoring causes the standby node to reboot.

Steps to Replicate:

Execute node switchover with the following steps:
1) Bringing down all active ports.
2) Applying the appropriate CLI command.
3) Fail the application on the active node.

Platform/Feature: SBC

The code is modified so the health check monitoring for the worker thread is correct.
SBX-933262

Receiving text populated as null in mediaStream2Codec and in callMediaStatus.

Impact: When audio and text media call is made, the mediaStream2Codec of text is being populated as null.

Root Cause: Text has been removed from a fix in a previous release, which has made "mediaStream2Codec" field not to populate for text media.

Steps to Replicate:

  1. Bring up the box with the latest SBC build that supports T.140 session.
  2. Enable the following CLI and attach to Ingress and Egress TG's.

    -set profiles media packetServiceProfile DEFAULT flags t140Call enable


  3. Send INVITE with Audio+T.140 sessions from UAC.
  4. Send 200 OK with Audio+T.140 sessions from UAS.
  5. Send BYE.

Platform/Feature: SBC

The code is modified to include the text stream to populate "mediaStream2Codec".
SBX-931243

The SBC changes the format of P-Access-Network-Info header on the 18x and 200OK.

Impact: When transparency is enabled in the P-Access-Network-Info Egress and received by P-Access-Network-Info in the 18x, the message forwarded to the ingress has an incorrect syntax.

Root Cause: A logical error related to double quote string parameter was causing a syntax error to be sent out.

Steps to Replicate:

  1. On SIP-SIP call, enable the header P-Access-Network-Info transparency.
  2. Egress receives P-Access-Network-Info in 18x and forwards to the ingress with an incorrect syntax.

Platform/Feature: SBC

The code is modified to correct the logical error.
SBX-93553 | SBX-934691

Portfix SBX-93469: The 1-CASBC-02 Box A had a SCMP coredump. (Originated in release 7.2.3)

Impact: The SBC cored when accessing Box A, switching over to Box B instead.

Root Cause: Enabling the SDP transparency and the directMediaAllow to show a simple 18x response from the peer may cause a core dump due to access from an invalid address.

Steps to Replicate: Disable either the SDP transparency or the directMediaAllow.

Platform/Feature: SBC

The code is modified to ensure it does not have access with an invalid address.
SBX-921551

The SBC is releasing the call with 504 when the DLRB and Downstream Forking are enabled.

Impact: The SBC releasing the call with 504 when the DLRB and Downstream Forking are enabled.

Root Cause: The race condition is not handled properly. When first 180 message without SDP is received, the forking list and stored the message were updated. The second time the 180 message with SDP was received, the forking list and stored the 180 message were updated, but since RTP learning was applied earlier, it was not replicated again.

Steps to Replicate: Send the RTP before sending the 180 Ringing (CSeq: 961529 INVITE RSeq: 629928).

Platform/Feature: SBC

If RTP learning happens before the corresponding 18x message with SDP is received, save the SDP into a queue of possible SDPs to cut-thru for use while 200 OK is received.
SBX-934762

Fix the double free scenario in NAT and in a multicast scenario.

Impact: There will be a random SWe_NP core dump when either NAT is enabled or the LI is enabled at peak loads.

Root Cause: There was double free of mbuf pointer, which can cause corruption.

Steps to Replicate: Run calls with the LI or NAT enabled at a peak load.

Platform/Feature: SBC

The code is modified to fix the double free of mbuf pointer.
SBX-935661

The Signaling SBC cored.

Impact: When the MRF Modify is received, the MRFRM fsm state must be OA_ACTIVE. But in this issue, the state is leading to incorrect typecasting.

Root Cause: The defensive was checked.

Steps to Replicate: Run the MRF load.

Platform/Feature: SBC

When the MRFRM is in OA-NULL state, the call must not be in connected state.
SBX-93325 | SBX-931752

Portfix SBX-93175: Receiving a null in the mediaStream2Codec and in the callMediaStatus. (Originated in release 8.1.0)

Impact: When a audio+ text media call is made, the mediaStream2Codec is being populated as null.

Root Cause: Text has been removed through a fix in a previous release, which has made "mediaStream2Codec" field to not populate for text media.

Steps to Replicate:

  1. Bring up the box with the latest SBC build that supports T.140 session.
  2. Enable the following CLI and attach to the Ingress and Egress TGs.

    -set profiles media packetServiceProfile DEFAULT flags t140Call enable


  3. Send INVITE with Audio+T.140 sessions from UAC.

  4. Send 200 OK with Audio+T.140 sessions from UAS.

  5. Send BYE.

Platform/Feature: SBC

The code is modified to include the text stream to populate "mediaStream2Codec".
SBX-93551 | SBX-694123

Portfix SBX-69412: o= version was not incrementing. (Originated in release 6.0.0)

Impact: The SBC responds to an Update without an incremental SDP session version.

Root Cause: Enable the "Only Selected Codec in Session Refresh", peer answer the SDP in 18x, and send an Update with a different SDP. However, the SDP version did not increment.

Steps to Replicate: Enable the "Only Selected Codec in Session Refresh", peer answer the SDP in 18x, and send an Update with a different SDP.

Platform/Feature: SBC

The SBC responds to an UPDATE with a different SDP in a previous Invite. The SBC correctly increments the SDP version.
SBX-93492 | SBX-907112

Portfix SBX-90711: ELT: Observed Negative accepted packets at the "request sbx xrm debug command acl\ -stat".

Impact: Observed a negative packet count for the ACL and aggregate ACL while running CLI commands.

Root Cause: We were using an incorrect format specifier. We were using %d to print an unsigned long instead of %u.

Steps to Replicate: Tested with pumping packets to specific ACL. The counters are working as expected.

Platform/Feature: SBC

Corrected the format specified usage.
SBX-937142

Unable to configure more than 2 IPIFs into 1 IPIG.

Impact: Cannot create 4 IP Interfaces under a single IPIG in Yellowfin. As Yellowfin has a single NP, a port map needs to be created for all ports on the NP0.

Root Cause: During the Yellowfin development, creating 4 IP Interfaces in the same Interface groups was not evaluated correctly.

Steps to Replicate:

1. Attempt to create 4 interface groups under the same Interface group.
2. Associate it to other signaling elements such as sipSigPort to validate NP friendly checks.

Platform/Feature: SBC

Create a port map for packet ports pkt2 and pkt3 using the NP0.
SBX-927803

'request SBC arm debug command' commands stop working after a switchover.

Impact: Request the SBC arm debug command help is not working when a switchover was made from active box to standby one.

Root Cause: Inside the ArmCsv.c, the CsvMgObjRegisterObject() was not enabled when "request sbx arm debug command help" is configured in Debug Mode.

Steps to Replicate:

1. Setup HA.
2. Start both the boxes.
3. Run "request system admin <SBC_NAME> switchover" to do a switchover.
4. Wait for full sync let standby box come as active.
5. Run "request SBX arm debug command help" on the new active SBC (former standby SBC).

Platform/Feature: SBC: CLI, confd

Enable the CsvMgObjRegisterObject(andarmCsv->csvCb, "/sbx/arm/debug") function.
SBX-932552

Unable to change the Source Port to any port on the EMA.

Impact: Unable to change the Source Port to any port on the EMA.

Root Cause: The source port attribute is validated as an integer instead of a Alpha Numeric.

Steps to Replicate:

  1. Successfully verified the loading of the EMA Application.
  2. Successfully changed the SourcePort number from 'any' to 'int' and 'int' to 'any'

Platform/Feature: SBC

The code is modified to validate source port as type Alpha Numeric instead of an integer.
SBX-932872

The SBC was not responding to 483 for PRACK with the Max-Forwards=0 and rfc7332ValidateMaxForwards enabled.

Impact: If the SBC received a PRACK request with the Max-Forwards header value as zero, the SBC was not rejecting the request with 483 error response.

Root Cause: The part of code was missed from the code merge from 7.2 to main branch.

Steps to Replicate:

Test steps:
1. Send PRACK with Max-Forwards 0.
2. Verify the SBC is rejecting it with 483 Error response.

Platform/Feature: SBC

The code is modified to handle Max-Forward with 0.
SBX-911542

There is a call failure due to a FQDN in the request URI.

Impact: When the SBC sends a query for SRV record to the external server and the Peer Domain in the reqURI is disabled, the SBC intermittently sends a FQDN in the request URI of egress INVITE. The correct behavior is to send an IP and address in reqURI of egress INVITE.

Without a fix, the SBC will send a FQDN in reqURI even when Peer Domain in reqURI is disabled.

Root Cause: The SBC does not use a formatted SIP message when the external query is made for finding the SRV record and a record is found in the cache. As a result, the SBC cannot apply the "Peer Domain in ReqURI" flag in the egress SIP message.

Steps to Replicate:

  1. Use the following configurations on the PSX:
    1. Set the IP PEER as FQDN abc.com instead of IP address.
    2. Enable "noPortNumber5060" on the IPSP (This is for done for NAPTR, SRV query)
    3. Disable "Peer Domain in the reqURI " on IPSP (This is done to ensure FQDN is not sent in egress INVITE's reqURI)
  2. Use External DNS server.
    1. Configure SRV record and A record on the external DNS server with different Time To Live values.
  3. Run high number of calls.
  4. With fix, the SBC is sending IP and Port for all the calls since Peer Domain in ReqURI is disabled.

Platform/Feature: SBC

The code is modified to have the SBC use the saved formatted SIP message when the external DNS query is made for SRV record and a record is fetched from the cache. This allows the SBC to apply the "Peer Domain in ReqURI" flag in the egress SIP message.
SBX-933121

The SBC Memory has High alerts.

Impact: When the Local Ring back tone is configured on the SBC and egress endpoint sends a 183 Session Progress with SDP followed by a 180 Ringing, the ScmProcess does not free up memory allocated even after call is completed. Without a fix, the ScmProcess will leak memory.

Root Cause: When the Local Ring back tone is configured on the SBC and egress endpoint sends a 183 Session Progress with SDP followed by a 180 Ringing, the ScmProcess does not free up memory allocated even after call is completed.

Steps to Replicate: Run a call load with the Local Ring back tone configured and monitor the virtual memory usage of the ScmProcess.

With a fix, the virtual memory of ScmProcess must not be high after all calls have been disconnected.

Platform/Feature: SBC

The code is modified to ensure the memory allocated for packet service profile structure is freed when no longer required.
SBX-918991

SBCv6 Unexpected 183 (CPG) sending - out of PER6608 spec.

Impact: Early cut through may not work for trusted configured RTP Servers on system restart.

Root Cause: The system restores the SIP service group data before the RTP Server data which is incorrect.

Steps to Replicate:

Provisioned the rtpServerTable (OLIVER_RTP_SRV_TBL), and associated it which the egress sipTrunkGroup SBXSUS9_LABSIP2
(as shown below):

admin@sbxsus9> show configuration details addressContext default rtpServerTable OLIVER_RTP_SRV_TBL
rtpServer 10.8.20.75 32;

admin@sbxsus9> show configuration details addressContext default zone ZONE4 sipTrunkGroup SBXSUS9_LABSIP2 media earlyMedia
method rtpServerTable;
rtpServerTableName OLIVER_RTP_SRV_TBL;
forkingBehaviour lastReceivedSdp;

Platform/Feature: SBC

Fixed the ordering of the initialization procedure to restore the RTP server profile configuration data before restoring the SIP service group data.
SBX-93562 | SBX-933552

Portfix SBX-93355: P-Charge-Info header not relayed by the SBC in out-of-dialog MESSAGE request even though the transparency setting is enabled.

Impact: P-Charge-Info Header is not relayed transparently for OOD Message even though Transparency profile is enabled for P-Charge-Info.

Root Cause: P-Charge-Info Header is dropped in case of relay framework.

Steps to Replicate: Run the message OOD which has P-Charge-Info Header in the incoming Message and Transparency is enabled for that header.

Platform/Feature: SBC

P-Charge-Info Header is copied in case of relay framework.
SBX-926111

Outbound call Failing with 488.

Impact: Transcode call, after 40 onhold/offhold, call fail.

Root Cause: Internal process Nrma TransactionId did not reset properly after wraparound (12 bits limit). As resulted, it is sending the same transactionId for allocating DRM resources for both Ingress and Egress legs.

DRM reject due to duplicated transactionId.

Steps to Replicate: sip-sip call with transcoding. Call fail after 40 onhold/offhold.

Platform/Feature: SBC

 Properly reset the TransactionId when it reach 12 bit limit.
SBX-941412

Call Transfer call to PSTN gets failed second time ,when MOH is played in the initial call.

Impact: After multiple holds and resumes, if the first call transfer fails due to reject by transfer target then the transferee and transferer are reconnected successfully. For any subsequent call transfer, the SBC is rejecting the call transfer request.

Root Cause: Since, the first call transfer failed, the SBC tries to reconnect the original call. As part of this, the original call is not moving to the stable state. So, any call transfer request in such state is getting rejected by the SBC.

Steps to Replicate:

1.TEAMS to PSTN1 call
2.TEAMS hold and resume the call
3.TEAMS transfer call to PSTN2
4.PSTN2 rejects the call
5.TEAMS resume the call and transfer again to PSTN2

Platform/Feature: SBC

Added missing code to move the original call state to the stable state during re-connection.
SBX-934752

IngressIpPrefix data deleted when removing SMM from TG.

Impact: IngressIpPrefix data deleted when removing SMM from TG

Root Cause: When deleting SMM Profile, code is there to delete ipPrefix data as well

Steps to Replicate: Remove a SMM rule from the TG in the EMA it also deletes the ingressIpPrefix metadata causing ingress calls to fail.

Platform/Feature: SBC

Added checks not to delete ipPrefix data when we delete the SMM Profile.
SBX-93394 | SBX-925543

Portfix SBX-92554: TTY is not enabled for EVRC and EVRCB in the H/W SBC.

Impact: TTY was not enabled for transcoded calls of EVRC and EVRCB codec in the SBC 52x0 and SBC7000 and SBC54xx.

Root Cause: TTY was disabled for unknown reasons.

Steps to Replicate:

  1. Setup EVRC/EVRCB<=>g711 call.
  2. Send media with TTY characters from G711 side.
  3. Observe the PCAP of EVRC/B. TTY has special code points in the EVRC/B. Before the fix, TTY signals were encoded as EVRC codec media. With the fix, you will observe TTY special code points in PCAP.

Platform/Feature: SBC

Enable the TTY. There is no API/CLI to enable TTY.
SBX-936013

MS Teams Call Park has an intermittent failure.

Impact: In a Microsoft Teams environment, Microsoft has a bug in the client code that can randomly cause messages to be sent out of sequence. For example, when trying to transfer calls, Microsoft can send REFER and then INVITE with a=inactive afterwards. The out of sequence message processing was causing processing issues on the SBC and the call did not complete.

Root Cause: Microsoft agrees that their message sending is broken and are working on a fix.

Steps to Replicate: Repeatedly run Microsoft Teams Call Park scenarios. The problem is not always reproducible and is possibly dependent on the Microsoft server and location of the associated client.

Platform/Feature: SBC: MS Teams

The code is modified to be more defensive against the out of sequence messaging, such as:
1) Reject the INVITE with 491 if REFER is being processed on a call leg.
2) Reject the REFER if the SBC has an outstanding INVITE waiting to be sent.

SBX-93532 | SBX-934732

Portfix SBX-93473: The SBC is core dumping when the diversionHistoryInfoInterworking flag is enabled in the egress IPSP.

Impact: When the interworking diverts Diversion Headers to History Info for Japan NNI, on a call where ingress SIP performs an INVITE/UPDATE due to preconditions, the SBC core dumps.

Root Cause: The cause is from a code bug.

Steps to Replicate: Make an SIP-SIP call where ingress side has preconditions, such that INVITE/UPDATE sequence is needed. The received INVITE will contain Diversion headers. Egress side is configured with an NNI profile attached to the trunk group with historyInfoInterworking enabled.

Platform/Feature: SBC

The code is modified to no longer core dump.
SBX-93608 | SBX-917872

Portfix SBX-91787: Debian vulnerabilities are observed for Nessus scans. (Originated in release 7.2.2)

Impact: Nessus scan display vulnerabilities.

Root Cause: Many packages are out of date, which can cause vulnerability.

Steps to Replicate: Run Nessus scan.

Platform/Feature: SBC

Packages and kernels are updated to fix this issue.
SBX-940622

Unexpected INFO was received.

Impact: DTMF inter-working from RFC 2833 to SIP INFO was not generating signal event packets and only signal-update are coming on the SWe.

Root Cause: On the SWe, due to endian mismatch from low level platforms to SIP applications, the signal event was not raised.

Steps to Replicate: Enable the DTMF inter-working and send the 2833 media from one-leg, observe the SIP signal, signal-update events on the other leg.

Platform/Feature: SBC

The code is modified so that the signal event is generated correctly.
SBX-90831 | SBX-898602

Portfix SBX-89860: There is no bit-exactness across warp for Mode 8. (Originated in release 8.1.0).

Impact: In the case of GPU AMRWB 23.85kbps, there is no bit-exactness in the output across warps even though the same input is fed to all the warps.

Root Cause: The size of one of the scratch buffers was incorrectly used in a macro. The macro eventually led to memory corruption.

Steps to Replicate: The issue was found in the standalone test and cannot be executed outside development.

Platform/Feature: SBC

The code is modified by rectifying the size in the macro.
SBX-90816 | SBX-903122

Portfix SBX-90312: ASAN: Heap-buffer-overflow on the address in SipFeGetCseqType. (Originated in release 8.1.0).

Impact: This issue was found during ASAN regression testing. While processing the CSEQ header, the code was reading off the end of allocated memory block.

Root Cause: The code was expecting the CSEQ string to be null terminated and it was not.

Steps to Replicate: This issue is only seen with the engineering ASAN build.

Platform/Feature: SBC

The code is updated to correctly handle the case where the CSEQ is not null terminated.
SBX-940531

The SBC OpenStack installation fails with an OAM node and core dumps.

Impact: Upgrade fails if any of the SNMP trap targets are 32 characters in length.

Root Cause: Right sized buffer was allocated to fetch data from the database but passed incorrect length field to database API. In the case where the field being fetched has max allowed length, the API fails because the API verifies that there is not enough room to terminate the field with NULL.

Steps to Replicate:

  1. Create SNMP trap target of 32 character long.
  2. Attempt to upgrade.
  3. The upgrade will fail.
  4. Perform upgrade with the fix, and the upgrade will succeed.

Platform/Feature: SBC

The code is modified to add the correct buffer length to configuration database APIs.
SBX-939033

Large SIP messages in TRC are divided into several syslog messages to the rsyslog server.

Impact: TRC PDU's are broken into multiple syslog messages.

Root Cause: There was a limit to the message size of ~1.8K and TRC messages beyond that would be split into multiple syslog messages.

Steps to Replicate:

  1. Reproduce the issue.
  2. Generate TRC files (size>1800) and transfer to remote syslog server.
  3. Single TRC is broken into multiple syslog messages.

Platform/Feature: SBC

The code is modified to transfer a complete TRC PDU as one syslog message.
SBX-935482

When the transfer call is not answered from PSTN, MS TEAMS client is unable to resume the existing call.

Impact: In a Microsoft Teams call flow where the call gets transferred and the C-party has sent back a 180 without the SDP, which triggers the SBC to play RBT and then C-party sends 183 with SDP and finally rejects with a 6xx, it can result in the SBC internally getting into a bad state. This results in the SBC not being able to resume the call and the call getting released.

Root Cause: The resource management in the SBC was getting confused on the packet service profile for the various call legs that lead to the call being released.

Steps to Replicate:

1.TEAMS to PSTN1 call.
2.TEAMS transfer call to PSTN2.
3.PSTN2 does not answer the call.
4.TEAMS resume the call and transfer again to PSTN2.

Platform/Feature: SBC

The code is modified to correctly manage the packet service profile and other call leg information so it can correctly handle the transfer rejection from C-party.
SBX-939932

The Quality of Announcement tone played by the SBC is bad.

Impact: Bad Announcement quality.

Root Cause: A software bug in DSP was resetting the first sample of every announcement frame to zero.

Steps to Replicate:

1. The set-up requires the SBC and the PSX. A PSX script is implemented, which has information about what announcement to play and DTMF digits that need to be entered to switch to the second stage of the call.
2. Client makes a call to the SBC. In the first dip, the SBC plays the announcement configured in the script and waits for DTMF digits to be entered.
3. A route is present in the PSX for DTMF digits entered.
4. After entering digits, the PSX now goes for second dip for the new digits entered and returns a route to the SBC.
5. With this route, the SBC calls Egress end point
6. Monitor the announcement quality played at step #2.

Platform/Feature: SBC

The code is modified to not remove the first sample.
SBX-907522

The ASAN creates a global-buffer-overflow on the address in s_finish.

Impact: This issue was found during ASAN regression testing.

The coding was reading from invalid memory block during the process of a CDB transaction completion event.

Root Cause: The code was looking for CDB worker socket that matched with the CDB transaction completion event and in a case where the worker socket did not exist,the code was reading off the end of an array.

Steps to Replicate: Run the SVT test suite using a ASAN specific build.

Platform/Feature: SBC

The code is modified to ensure it does not read off the end of the worker socket array to prevent the problem.
SBX-922832

Transport the attribute populated twice in the RURI of INVITE request towards the peer, when the To header transparency is enabled.

Impact: A call directed to the registered endpoint has duplicated the URI parameters in the RURI.

Root Cause: Introduced in a previous release.

Steps to Replicate: Configure the TO header transparency. Endpoint registered with contact has multiple RUI parameters. Server makes a call to the endpoint. The SBC sends out an Invite with a duplicated URI parameters.

Platform/Feature: SBC

The code is modified to avoid duplicated RUL parameters in the RURI.
SBX-932622

The SBC generates a RTCP goodbye to ingress after the 200 OK.

Impact: When Downstream forking is enabled and the Early Media Response is set to "last received SDP", when the call gets answered the resource chain will be re-built and the RTCP BYE will be generated.

Root Cause: Root cause lies in feature completed in a previous release. The feature required that if the ingress peer does not have 100 rel support, and egress gets multiple 18xs, then the transcode is forced even though pass through is possible to support codec change.

Steps to Replicate: Enable Downstream Forking and forking response as anything except the first prov response.

PSPs are setup to perform a transcode only.

Platform/Feature: SBC

The code is modified according to the following:
1. Downstream forking is enabled.
2. Early media behavior - non FIRST PROV RESP.
3. One forking dialogue.
4. No SDP is sent in 2xx if the 18x reliable.

SBX-931032

There is no relay of an UPDATE with the SDP when the media mode has changed and when the DRBT is configured.

Impact: When the Downstream Forking and DLRBT is enabled, an UPDATE received from the ingress are not going out to egress (UPDATE received after the media cut-thru has happened because of receipt of RTP from egress).

Root Cause: If it is marked as OA_COMPLETE, the updates received are sent to the other leg if that other leg is 100rel/PRACK supported. This issue was caused due to some legs not being marked as OA_COMPLETE due to an incomplete implementation.

Steps to Replicate: Set Downstream Forking and DLRBT as enabled.

Platform/Feature: SBC

The code is modified to mark OA_COMPLETE in all instances where the parallelRingPsp is being appended with the new SDP's received in 18x's.
SBX-937651

CS04A01 lost communication with the CM04A04. Post-recovery, other M-SBCs cannot talk to the CM04A04.

Impact: The IPv6 address becomes unreachable in standby port cable pull scenarios.

Root Cause: The SWe code was not handling saving the multicast mac address list and re-applying it on the hardware port during a link up/down event for standby ports.

Steps to Replicate:

  1. Bring down any standby port by cable pull on host.
  2. Configure a new IPv6 address on that PKT port.
  3. Re-insert the cable for same standby port.
  4. Do a port switchover by plugging out active physical port's cable so that the standby becomes active for same port.
  5. Ping the new configured IP from in step 2 from outside. The ping will result in a failure.

Platform/Feature: SBC

The code is modified to handle the programming of multicast MAC list for standby ports properly.
SBX-923422

Call diagnostics were not working through EMA.

Impact: Call diagnostics fails due to errors in EMA.

Root Cause: Call diagnostics fails due to the STDERR for CP commands in dumpCommonFunction.

Steps to Replicate:

  1. Open EMA-> Troubleshooting and run call diagnostics.
  2. Save the call diagnostics.
  3. Call diagnostics are saved successfully.

Platform/Feature: SBC

The code is modified by redirecting stderr to /dev/null.
SBX-91196 | SBX-859382

Portfix SBX-85938: The SMM tears down the Operation on Early dialog, and the SBC sends CANCEL before completing the 18x transaction. (Originated in release 8.1.0)

Impact: The SMM tears down the Operation on Early dialog, and the SBC sends CANCEL before completing the 18x transaction.

Root Cause: In case of End2End, PRACK is enabled and SMMTearDownFunctionality was not working as expected.

Steps to Replicate:

1.Tested the call by triggering an SMM teardown functionality in Invite, the SBC tear downs the call as per the call flow.
2. Tested the call by triggering an SMM teardown in 180 response where PRACK is mandatory, the SBC tear downs the call by initiating a SMM Teardown as per the call flow (after PRACK-200ok is complete).
3.Tested the call by triggering a SMM Teardown in 200 OK of PRACK.
4.Tested the call by triggering a SMM Teardown in 200 OK of Invite.

Platform/Feature: SBC

The code is modified to make the SMM Teardown functionality to initiate and not to take any action if the 18x/PRACK transaction is pending and enedtoendprack is enabled. Once the response of PRACK is received/sent based on the call flow, the teardown is initiated based on the SMMTearDown action state.
SBX-927782

The Edit route action taking a long time to complete.

Impact: The Edit Route action was taking long time and failing.

Root Cause: Use of special characters, such as # in destination National field, can cause the failure of the Edit route action.

Steps to Replicate:

  1. Create Route with special character in Destination National.
  2. Select the Route that is created in Special Character.
  3. Edit Form must be load.

Platform/Feature: SBC

A few more special characters to support Destination National field in the Edit route are allowed.
SBX-93959 | SBX-933662

Portfix SBX-93366: The SBC is not able to update a transcode from a pass thru call.

Impact: The SBC is not able to update a transcodec call after a pass thru call.

Root Cause: In this issue, it is changing from the pass thru to transcode because the sendOnlyPreferredCodec was enabled in the IPSP and in ModifyReq(Ans Side new PSP), it is taking RxPT of old PSP.

Steps to Replicate: Tested the call by sending PCMU/G729/PCMA in the 183 call is working as expected.

Platform/Feature: SBC

In the NrmaSelectCodecEntryFromPspForXcode() function, adding a condition to overwrite the PT only if it is a valid RxPT(old psp).
SBX-94171 | SBX-941151

Portfix SBX-94115: The I/O scheduler was incorrectly configured after upgrade.

Impact: Kernel scheduling issues are causing intermittent issues, including lost pings across the HA interface. The lost pings induce a split brain and subsequent split brain recovery. Transient calls are lost during the split brain and recovery, and depending on call flow, stable calls may be lost as well.

Root Cause: The I/O scheduler is being reverted from 'deadline' to 'noop' due the upgrade due to a bug in the upgrade script.

Steps to Replicate: After upgrade to 6.2.x or 7.x, verify the scheduler with the following command:

cat /sys/block/sda/queue/scheduler

The output must show brackets around deadline to indicate it is in use, for example:

[root@SBX24-154a log]# cat /sys/block/sda/queue/scheduler
noop [deadline] cfq

Platform/Feature: SBC

The code is modified to properly specify the I/O scheduler.
SBX-943131

There is a core dump during an A to B tandem call in (GSX)SIP-gw-gw-SIP(SBX) when the egress IP Signaling Profile is not configured.

Impact: The GSX-SIP-Gw-Gw-SIP-SBX has a core dump in the SBC if the egress Signaling Profile is not attached.

Root Cause: The issue was found by providing a fix to another issue, not through attempting a call with no egress signaling profile attached.

Steps to Replicate: Make an A to B call using the GSX-SIP-Gw-Gw-SIP-SBX and on the egress TG in the PSX. Do not attach the egress Signaling Profile. These steps will result in a core dump.

Platform/Feature: SBC

The code is modified to create a zeroed out IPSP and pass it for the system to act on instead of NULL the PTR. When the code looks for specific IPSP flags, none of the flags are enabled, but there is active memory.
SBX-941183

EMA CLI script import stays "In Progress" if the script contains a special character.

Impact: EMA CLI script import stays "In Progress" if the script contains a special character.

Root Cause: Non printable characters are present in the error message.

Steps to Replicate:

  1. Log into EMA Application.
  2. Click on Administration->System Administration->File upload->Add the files to queue.
  3. Select the CLI file that you want import.
  4. Click on "Upload All files".

Platform/Feature: SBC

Remove Non printable characters from the error message.
SBX-940892

SAM crash on standby SBC (SIPFE stby).

Impact: The standby SBC may core when IpPeer deletes or creates the same structure in a different zone.

Root Cause: When using the IpPeer delete, the function will fail to remove the internal data structure from the hashtable. Later on, the IpPeer will create a new structure again in a different zone, it fails to insert a new data structure into the hashtable and deletes the new data structure.

There was a logical error that still has access to the new data structure after free.

Steps to Replicate: Create an IpPeer from one zone. Delete it and create the same IpPeer in a different zone.

Platform/Feature: SBC

The code is modified to fix the initial IpPeer delete issue and ensure not the new data structure is not accessed if it is already freed.
SBX-94667 | SBX-945802

Portfix SBX-94580: The GWSG is missing a svcGrp entry for the TG while a few duplicate entries in the srvcGrpTbl. (Originated in release 6.2.2).

Impact: Duplicate entries shown in the GWSG service group table.

Root Cause: The root problem is that the create GWSG does not validate the TG name. Currently, the GWSG only goes through the srvcGrpTbl[] and finds the first empty slot’s index. If the new index != original entry’s index, the NamedInsert() will insert SUCCESS and set duplicate entry at the new location in the table, otherwise the NamedInsert() will return FAILURE and the duplicated entry will be freed.

On the standby node, when it is coming up, the GWSG restores all GWSG_SRVC_GRP_STR from the CDB. Once configuration restore is done, the active node will start to sync over all the GWSG_SRVC_GRP_STR, which caused the standby node to have duplicate entries.

Steps to Replicate: Refer to /sonus/sw/Specs/TSBX-94580.txt.

Platform/Feature: SBC: GW-GW

The code is modified to validate if the specified name is already in the table before creating a new one.
SBX-93562 | SBX-933552

Portfix SBX-93355: P-Charge-Info header was not relayed by the SBC in a out-of-dialog MESSAGE request, even though the transparency setting is enabled.

Impact: The P-Charge-Info Header is not relayed transparently for the OOD Message, even though the Transparency profile is enabled for P-Charge-Info.

Root Cause: The P-Charge-Info Header is dropped, in case of the relay framework.

Steps to Replicate: Run the message OOD that has the P-Charge-Info Header in the incoming Message and Transparency is enabled for that header.

Platform/Feature: SBC

The P-Charge-Info Header is copied in case of a relay framework.
SBX-943203

The SBC application is resulting in a failure after switchover.

Impact: The SBC results in a failure due to being unable to mount the DRBD post switchover.

Root Cause: Post switchover, the DRBD mount failed as one of the DRBD setup command was being run in the background, but this command needs to complete execution before mounting the DRBD.

Steps to Replicate: Bring up the SBC and perform a switchover. Verify that the switchover is successful and the SBC application comes up fine on both nodes.

Platform/Feature: SBC

The code is modified to run the DRBD command in foreground and then mount the DRBD.

SBX-94552 | SBX-766693

Portfix SBX-76669: With the sipOod set to unlimited, MAJOR errors are displayed in DBG log.

Impact: With the sipOod set to unlimited, MAJOR errors are displayed in DBG log.

Root Cause: If the sipOod licensedMaxRateLimit is set to UNLIMITED, it was generating a TRAP and MAJOR level logging that is incorrect. 

Steps to Replicate:

Make a OOD call and no MAJOR logs be visible, as presented in the example below:

152 12242018 083916.769675:1.01.00.00493.MAJOR .SIPFE: threshold reached notification for OOD message Rate. Active OOD rate 1 and OOD Rate Limit is 0
152 12242018 083916.769675:1.01.00.00493.MAJOR .SIPFE: threshold reached notification for OOD message Rate. Active OOD rate 1 and OOD Rate Limit is 0

Platform/Feature: SBC: Application, FM/Traps and Alarms

Instead of assigning a value 0 to the variable, the value is assigned to a INTMAX.
SBX-93931 | SBX-937991

Portfix SBX-93799: A SCM process coredump was observed when the sipParamFilterProfile is configured.

Impact: This issue is a result of a bug in a previous release (Configuring multiple JJ9030 profiles in a single commit does not work) fix.

Root Cause: Reading the Profile XML tag from the confd when the confd iterator is not pointed to a profile.

Steps to Replicate:

Configure the sipParamFilterProfile as shown below:
1. Set the profiles services sipParamFilterProfile as a Test sipHeader to require action passthru all.
2. The SBC will generate SYS_ERROR when the confd iterator is not pointed to the profile.

Platform/Feature: SBC

The code is modified to read XML tag from the confd when the confd iterator is pointed to the profile.
SBX-871192

The SAM Process may core.

Impact: The SAM Process cored due to a deadlock occurring in the SIPCM.

Root Cause: In one thread, the SSL_CTX_add_session() was trying to do cache cleanup and in another thread the SipCmOpenSSLSSessinCacheCleanup() was trying to do cache cleanup at the same time. If the cache entries exceed 20480, then the SSL_CTX_add_session() will start clearing old cache entries. At the same time, the SipCmOpenSSLSSessinCacheCleanup() is also removing entries from entries from cache. This resulted in deadlock.

Steps to Replicate: The steps cannot be replicated.

Platform/Feature: SBC

The code is modified to invoke SipCmOpenSSLSSessinCacheCleanup() only in standby mode.
SBX-94146 | SBX-930923

Portfix SBX-93092: The npLogRotate (np log rotation) must occur on the basis of a log file size.

Impact: A New SWe_NP log used to be created everyday and used to get rotated after 10 log files. The rotation allowed very limited timeframe for SWe_NP debug log capturing.

Root Cause: The setting in npLogRotate was causing the issue.

Steps to Replicate: Analyse the SWe_NP debug logs.

Platform/Feature: SBC

Create a new SWe_NP log file when a previous file has exceeded certain size (i.e 50M) and not on a daily basis.
SBX-91727 | SBX-914252

Portfix SBX-91425: Low MOS score on the ingress leg when both legs are recorded with LI.

Impact: Random packets losses are observed, when the called and calling number are set as LI during transcoded calls.

Root Cause: An uninitialized field of structure that is used to hold the incoming packet from DSP in SWe_NP was causing this behavior of a random packet drop.

Steps to Replicate:

  1. Setup was called and calling number as LI.
  2. Run the transcoded call.

Platform/Feature: SBC

Initialize the field correctly.
SBX-942552

Updated the kernel configuration file that was not installed after the LSWU.

Impact: After the LSWU, the kernel configuration and grub menu is not updated properly as mentioned in the description.

Root Cause: Missing the kernel configuration and an invalid grub menu.

Steps to Replicate: Perform the LSWU and verify the grub menu and kernel configuration file in /boot.

Platform/Feature: SBC

Updated the grub menu and copied the kernel configuration after the LSWU.
SBX-92346 | SBX-907222

Portfix SBX-90722: There was an inconsistency in generating the sonusSbxTrunkGroupOutOfResourcesNotification2 trap.

Impact: There was an inconsistency in the sonusSbxTrunkGroupOutOfResourcesNotification2 trap generation using the MTRG CAC.

Root Cause: Once the CAC resource usage reaches 100%, the SBC internally marks the congested flag and generates sonusSbxTrunkGroupOutOfResourcesNotification2 trap. During a call release, if the available/free CAC resource reaches above 15%, the SBC must disable the congestion flag. However, the SBC failed to disable/reset internal the congestion flag once the free resource reaches above 15% due to the failed generated trap. (This issue occurs only when the TG's cac callLimit is set to unlimited).

Steps to Replicate:

Procedure:
1. Run 10 calls.
2. Disconnect 2 calls.
3. Run another 2 calls.
4. Disconnect 2 calls.
5. Run another 2 calls.

Expected Result:
1. Trap must be generated when receiving the 10th call.
2. A disconnected call must be successful.
3. When receiving the 2nd call, trap must be generated.
4. Call disconnect must be successful.
5. When receiving the 2nd call, trap must be generated.

Platform/Feature: SBC

The code is modified to reset internal congestion flag when the CAC free resource reaches above 15%.
SBX-922433

Upgrade failed from 7.1R0 to 8.1R0.

Impact: An upgrade failed between 7.1R0 to 8.1R0.

Root Cause: A mandatory node /eventLog{memusage}/servers{server1} is not created with an upgrade code.

Steps to Replicate: The steps cannot be replicated.

Platform/Feature: SBC

The code is modified to create a /eventLog{memusage}/servers{server1}.
SBX-91729 | SBX-914672

Portfix SBX-91467: The SBC fails to populate statistics in the callCurrentStatistics under zone for the trunkgroup towards MRF. (Originated in release 8.1.0)

Impact: The SBC fails to populate statistics in the callCurrentStatistics under zone for the trunkgroup towards MRF.

Root Cause: There was code missing to populate statistics in the callCurrentStatistics under zone for the trunkgroup towards MRF

Steps to Replicate:

1) UAC sends an Invite with the PCMU.
2) UAS sends 180 Ringing without the SDP.
3) UAS sends 200 OK with the PCMA.
4) SBC sends an Invite with the m1=PCMU m2=PCMA towards the MRF.
5) MRF responds with 200 OK with m1=PCMU and m2=PCMA.
6) A PCMU-PCMA transcoded call is established.
7) Check the trunkgroupStatus for the TG towards MRF.
8) Check the callCurrentStatistics for the TG towards MRF.

Platform/Feature: SBC

The code is modified to increment the callCurrentStatistics on the MRF legs.
SBX-92473 | SBX-915082

Portfix SBX-91508: The ASAN frees SipSgClearOtherForkedCalls. (Originated in release 8.1.0)

Impact: As part of the Call Forking testing, the SBC sends multiple requests as part of forking. When one of the forked leg answers the call, the SBC tries to clear the other forked calls. While clearing/releasing the call, some of the elements in the CCB forked structure are accessed/set even after the structure is freed.

Root Cause: This issue was reported as a part of the ASAN Testing on Call Forking regression suite in the SBC lab.

Steps to Replicate: This issue was reported as part of Call Forking feature with regression testing.

Platform/Feature: SBC

The code is modified to release the CCB forked structure at the end (after all the elements in the structure are accessed/set with the correct values).
SBX-918932

The NOA fields for the redirecting number and the original called number are not supported in the SBC.

Impact: The NOA fields for redirecting number and original called number are not supported in X2 interception in the Service Instance messages and the Signaling Start messages.

Root Cause:

The following message types were never supported for NOA on the SBC:

Service Instance messages:
Calling Party Number
Called Party Number
Redirected From Party Number
Redirected To Party Number

Signaling Start messages:
Calling Party Number
Called Party Number
Last Redirecting Party
Original Called Party

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

A new CLI is added to support this feature.

set addressContext default intercept callDataChannel <cdc_name> 
noaParamSupport enabled/disabled


SBX-93767 | SBX-934903

Portfix SBX-93490: The SBC duplicates the supported header in the outgoing OPTIONS.

Impact: The SBC duplicates the supported header in the outgoing OPTIONS.

Example:
Supported: timer,100rel,199,precondition,replaces,gruu
Supported: timer,100rel,199,precondition,replaces,gruu

Root Cause: When the gruu parameter was present, there was a logical issue in software that adds one additional Supported Header.

Steps to Replicate: For the Registered Endpoint, an OPTIONS message coming with supported Header having gruu parameter will cause this issue.

Platform/Feature: SBC

The code is modified so a duplicate entry is created for the supported Header.
SBX-93687 | SBX-935722

Portfix SBX-93572: There was a LeakSanitizer in the NrmaSessDescClone.

Impact: There was a memory Leak while running the NrmaSessDescClone. Fax transmissions cannot be performed with T.38 relay mode, when the trunk group is configured as T.38FallbackToG711 and uses voice codec in the G.711-REGR.

Root Cause: As part of Additional offer creation, memory is getting added for session attributes and is not getting freed.

Steps to Replicate: Fax transmissions cannot be performed with T.38 relay mode, when the trunk group is configured as T.38FallbackToG711 and use a voice codec in the G.711-REGR.

Platform/Feature: SBC

Allocated memory is freed.
SBX-93536 | SBX-934112

Portfix SBX-93411: The ASAN global-buffer-overflow on the address in __interceptor_vsnprintf.

Impact: This is an ASAN issue regarding the buffer overflow.

Root Cause: Boundary conditions are missing, leading to a buffer overflow.

Steps to Replicate: The steps cannot be reproduced.

Platform/Feature: SBC

The code is modified to add additional boundary conditions.
SBX-92794 | SBX-922682

Portfix SBX-92268: The SBC fails to tear down a call towards the UAS until the 200 OK Invite timeout occurs when the MRF responds with a 3xx message.

Impact: The SBC fails to tear down a call towards the UAS until the 200 OK Invite timeout occurs when the MRF responds with a 3xx message.

Root Cause: The handling missing when the SBC receives a 3xx from the MRF server.

Steps to Replicate:

1) SBC must tear down a call towards the UAS upon receiving a 3xx from the MRF.

2) SBC must not wait for a 200 OK Invite timeout.

Platform/Feature: SBC

Disconnect the call immediately when the SBC receives a 3xx message from the MRF server.
SBX-92336 | SBX-914462

Portfix SBX-91446: Observing a MAJOR logs flood related to SipSgRedundDeleteMrfCbData during the S-SBC SWO. (Originated in release 8.1.0)

Impact: Changing to INFO from MAJOR.

Root Cause: Logs listed as INFO were kept as MAJOR.

Steps to Replicate:

  1. Initiate 1000 cps of load with 60 CHT.
  2. Once the calls are stable, initiate the S-SBC SWO.

Platform/Feature: SBC

The code is modified to change unwanted MAJOR logs as INFO.
SBX-91172 | SBX-908442

Portfix SBX-90844: The SBC must not add the 100 rel for the 180 Ringing without the SDP. (Originated in release 8.1.0)

Impact: The SBC must not add Require:100 rel for 180 Ringing when the other leg does not receive the provided E2E PRACK and the Dialog-Transparency are enabled.

Root Cause: The design was changed in between to handle 18x and PRACK leg specific.

Steps to Replicate:

  1. Enable the dialogTransparency on both egress and ingress leg.
  2. Enable the transcoderFreeTransparency flag on PSP.
  3. Enable the 'downstreamForkingSupport' flag on the egress leg.
  4. Keep the value of 'forkingBehavior' as 'lastProvResponse' in early media on Egress leg.
  5. Enable the preconditions flag on both TG. 6) Enable sdpAttributesSelectiveRelay on both TG.

Replication procedure -

  1. From the UAC, send an initial INVITE with Require header Require: 100rel
  2. From the UAS, send forked 18x with dialog d1.
  3. From the UAS, send 2nd forked 18x with dialog d2 and UPDATE from UAC for dialog d1 at the same time.
  4. Send the 3rd dialog 18x from UAS and 2nd dialog update from UAC at the same time.
  5. Send a 180 Ringing from UAS without sdp for dialog D1.

Platform/Feature: SBC

The code is modified so that the SBTM needs to relay behaviour for non-reliable 18x when the E2E PRACK and Dialog-Transparency are enabled.
SBX-92881 | SBX-876072

Portfix SBX-87607: The SBC is unable to tear down the leg towards the MRF when the Malformed packet in a 200 OK is received with a 1 m line in the SDP from the MRF.

Impact: The SBC is unable to tear down the leg towards the MRF when the Malformed packet in a 200 OK is received with a 1 m line in the SDP from the MRF.

Root Cause: The handling is missing when the Malformed packet in a 200 OK is received with a 1 m line in the SDP from the MRF.

Steps to Replicate:

  1. USER A sends an INVITE with AMR.
  2. The SBC sends an INVITE to USER B.
  3. USER B responds with a 200 OK with EVRC codec in the SDP.
  4. The SBC sends an INVITE towards an MRF.
  5. MRF responds with a 200 OK with a 1 m line in the SDP.
  6. The SBC sends a BYE towards USER B and a 488 towards USER A.
  7. The SBC tear down the legs towards USER A and USER B, but unable to tear down the leg towards MRF.

Platform/Feature: SBC

Tear down the call when the Malformed packet in a 200 OK is received with the 1 m line in a SDP from the MRF.
SBX-919873

Multiple 'CONFD_NOTIF_USER_SESSION' logs were in the app.latest.

Impact: Notification messages are printed in the logs.

Root Cause: Session logs are logged as MAJOR.

Steps to Replicate:

  1. Set the logs to Major.
  2. Log into the CLI.
  3. Check the logs and ensure session logs are not printed.

Platform/Feature: SBC

The code is modified to change session logs to DEBUG logs.

Resolved Issues in 07.02.02R000 Release 

The following issues are resolved in this release:


Resolved Issues

Issue IDSevProblem DescriptionResolution
SBX-861932

The D-SBC DFE module, which controls connections to the MSBC/TSBC, continues to read memory after being freed.

This issue was found from ASAN testing in the lab.

Root Cause: This issue was due to not stopping a timer correctly after a link to MSBC/TSBC went down whereby the timer later expired it causing the timer handler to read the freed memory. Although the memory was being read, it was first being used to check that the memory block was associated with the timer by looking at the timerID field in the memory block. If the block did not match then nothing more was read. If the block did match, then the code should have stopped doing any further processing as all the associated calls would have already been cleared up. This issue is only seen for an edge case scenario where the timerID part of memory is not updated, but other fields are updated.

Impact: The D-SBC DFE module continues to read memory after being freed.

Steps to Replicate: Run the NWDL SVT automation suite on ASAN images.

Platform/Feature: SBC

The code is modified to stop the timer when the gateway control block in DFE is freed so the timer does not expire and try to access the freed memory.
SBX-866841

The SCM Process cores when making a REFER call where more than two SCMs are present in an I-SBC configuration. When the scenario occurs, the SBC does not recognize the N:1 Slot and will not pick the changes.

Impact: SCM Process cores 

Root Cause: When N:1 changes came, Refer code is not modified to pick the changes of N:1 slot ID.

Steps to Replicate: Execute a Refer call and ensure that call lands on SCM greater than 2 (because coredump will not occur if call lands on SCM0 or SCM1).

Platform/Feature: SBC

The code is modified to pick N:1 changes for slot ID.
SBX-864802

The SCM may core due to memory corruption caused by processing Global PCDR Info received from the Policy Server.

Impact: Repeated SCM cores.

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to free previously allocated Global PCDR Info structure before allocating to a new one.
SBX-861802

During the write process to create a new policy status reporting file, the correct read privileges were not present to allow the successful completion of the status reporting session.

Impact: The status reporting process wrongly reports a sync in progress.

Root Cause: /home/oraadmin/SSDB/PolicyDBSyncStatus is getting removed by logrotate. When the new file was created by write process, it did not have the correct privs to be read by status reporting session, so the status reporting process wrongly reported sync in progress.

Steps to Replicate: N/A

Platform/Feature: SBC: Application

The code is fixed to resolve this issue.
SBX-86667 / SBX-864682

Portfix SBX-86468: When the "Registration Expires in Expire Header" flag is enabled in the surrogate registration on Ingress TG IPSP, the de-registration is sent before the registration can refresh, which results in a call failure. (Originated in release 6.2.3F2)

Impact: The SBC is not picking the correct expiration value resulting in a long refresh timer (more than expired value); de-registration is sent before the registration refresh.

Root Cause: The SBC is not picking the correct expiration value that results in along refresh timer (more than the expire value), and de-registration is sent before registration refresh.

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to pick up the correct expiration value from response PDU if "Registration Expires in Expire Header" flag is enabled for surrogate registration.
SBX-869991

The SBC added a REFER method in the Allow header when the condIncMethInAllowHdr was enabled, though REFER is set to Reject in TG methods instead of Allow Only.

Impact: N/A

Root Cause: N/A

Steps to Replicate:

  1. Run a SIP->SIP call with default settings. REFER was included in the Allow header in the outbound INVITE.
  2. Set the refer to "reject" under the egress trunk group->signaling -> methods -> refer. Now in the Allow header of the outbound INVITE, REFER was not included. This works as expected.
  3. Set flag condIncMethInAllowHdr under the egress trunk group->signaling to "enabled". Now in the Allow header of the outbound INVITE, REFER was included. This shows that this flag changed the behavior.

Platform/Feature: SBC

REFER is set to Allow only if it is not rejected in the TG methods.
SBX-85144 / SBX 726932

PortFix SBX 72693: FPGA failures are observed on DSP cards. (Originated in release 8.0.0)

Impact: Communication lost between the CPU on the SBC and FPGA on the DSP card.

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC: DSP

A server reboot is initiated to restore communication.
SBX-864933

SBC adds "Max-Forwards: 71" header into SIP responses in violation of RFC3261 section 20

Impact: After receiving the error message with Max-Forwards header, End User may report for Invalid message as it deviate from RFC3261 response message header inclusion.

Root Cause: When the SBC does not find the route information when adding the Max-Forwards header for an incoming call, the SBC rejects the call.

Steps to Replicate: N/A

Platform/Feature: SBC

Avoid Max-Forwards header addition while forming the SIP response.
SBX-865231

When the PCRF is enabled, a SCM may core on switchover.

Impact: N/A

Root Cause: The function SipSgReconstructParentRcb() allocates a structure (pcrfInfo), but leaves it empty if sbyRdbPtr->diamRxHandle is 0. One of the fields in this structure is a list pcrfGCIDList, and this list is left uninitialized if sbyRdbPtr->diamRxHandle is 0. Later, SipSgIncomingCallNfy() attempts to insert something in this uninitialized list causing a core.

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to prevent the PCRF related SCM core on a switchover.
SBX-862462

The SBC reads the end of a memory block while processing DTLS signaling.This issue was found while running ASAN regression in the SVT lab.

Impact: This can result in invalid accessing of memory. This can potentially lead to coredumps if the memory block is at the end of the process memory as it will then try to access invalid memory.

Root Cause: The code was processing the fingerPrint information associated with DTLS calls and was reading of the end of the memory block because it was not correctly null terminated.

Steps to Replicate: Execute the SVT STIR/SHAKEN-related test suite to reproduce this issue.

Platform/Feature: SBC

The code is modified to prevent the additional CR and LF (0x0d, 0x0a) characters at the end of an ISUP MIME body.
SBX-688582

The SBC CDR 'GMT' timestamps are skipping forward and backward in some call scenarios.

Impact: This issues causes incorrect call start/stop/duration timestamps in the CDRs.

Root Cause: N/A

Steps to Replicate:

  1. Execute command: set system ntp timeZone pjk zone gmtPlus02-Athens
  2. Execute: sbxstop
  3. Set time on the NTP server to before the daylight saving time: date -s "2018-03-25 UTC 00:40:00".
  4. Execute: sbxstart, and make sure the SBC gets in sync with the NTP server.
  5. Start some call load to monitor the timestamps in the CDRs.
  6. Wait until 7:00 local time to see both CDR timestamp jump.

Platform/Feature: SBC: CDR

The code is modified to calculate the correct timestamps when daylight savings time begins and ends. 

SBX-874561

CRLF in 7K mime causes fGenband SST to send extra hex data at bottom of ACM

A TDM customer places a call that is routed via CS2k/C20 Genband switch through a Sonus SBC.

Impact: If the call hits an SBC 7000, the SIP-T ACM passed back to the CS2K/SST has a length indicator in the SDP that is not present when the call hits a SBC 9000.

Root Cause: Extra CR, LF (0x0d, 0x0a) characters are added at the end of an ISUP MIME body immediately before the correct CR, LF is associated with the boundary line.

Steps to Replicate: N/A

Platform/Feature: SBC: SIP

The code is modified so that extra CR, LF (0x0d, 0x0a) characters are no longer added at the end of an ISUP MIME body.


SBX-635712

"Call/Registration Data" stays in syncInProgress after the B node performs a LSWU.

Impact: The Active SBC may fail to synchronize ("Call/Registration Data" remains in syncInProgress) after an LSWU upgrade of the Standby SBC when using an IpPeer pathCheck profile.

Root Cause: N/A

Steps to Replicate: Test setup: LSWU from v5.1.2R0 to v5.1.2R2

  1. Create a pathCheck profile
  2. Create 100+ ipPeers with IPv4 ipAddress and ipPort
    1. Make sure the ipAddress / ipPort does NOT respond to the OPTIONS ping
  3. Assign pathCheck profile to the 100+ ipPeers
  4. State enable the 100+ ipPeers pathCheck profile
  5. Verify that the 100+ ipPeers have been blacklisted.
  6. Assign the 100+ ipPeers pathCheck profile hostName and hostPort
  7. Start LSWU of the Standby CE to v5.1.2R2
  8. Wait for LSWU of Standby CE to complete.
  9. Verify that the Synchronization Status for 'Call/Registration Data' remains in 'SyncInProgress' forever.
  10. Verify the following error message exists in the SYS log:
    "MAJOR .RTM: .RTM .PsObjectFactoryManager: Failed to find object's prototype while operating on object ID 154415 (0x25b2f)"

Platform/Feature: SBC: Application

The RTM process is updated to handle pathCheck messages that may occur during LSWU.


SBX-873402

The DNS NAPTR transport is not used during surrogate Authentication REGISTRATION attempt. The Transport is not correctly set while the SBC is sending an Authorization request.

Impact: The subsequent Registration attempt fails as the SBC is changing the TCP port from a normal TCP port 47xxx to 5060 after it got challenged.

Root Cause: The SBC sends no NAPTR only SRV followed by A query and Surrogate registration successful.

Steps to Replicate:

  1. Set FQDN port to "0".
  2. Set Transport type in IPSP to "none"
  3. Enable noPortNumber5060 flag in IPSP.

Platform/Feature: SBC

The code is modified to set a correct transport type while sending an Authorization request.

SBX-876413

When copying a SIP Adaptor Profile in the EMA using the "Copy SIP Adaptor Profile" option, and the "advancedSMM" flag is enabled on the original SIP Adaptor Profile, the flag is not copied over once the new profile is saved (the flag stays disabled).

Impact: Once the new profile is saved, the advancedSMM flag does not get saved and stays disabled.

Root Cause: The value of the advance SMM for a 'copy SMM' operation is not fetched in backend.

Steps to Replicate:

  1. Create a sip adaptor profile with enabling the “advanced SMM flag”
  2. Save the profile
  3. Copy the same profile using “copy sip adaptor button”
  4. Save with different name.

Platform/Feature: SBC

The code is modified to copy the flag state to the new profile.

SBX-87684 / SBX-734242

Portfix: SBX-73424: The CDR field 8 in START and STOP records always shows zero, even if there is a delay in the PSX response (Originated in release 6.2.4).

Impact: N/A

Root Cause: The setup message time and the PSX response time are getting set to the same value, and thus the delta always results in zero.

Steps to Replicate:

  1. Make continuous LI calls before starting the upgrade in the base build (i.e 7.2.1R000).
  2. Spawn OAM nodes - the time taken by the OAM nodes to come up and get registered on EMS was less than 5 mins.
  3. Upgrade M-SBC standby 8.0.0A20_84 using stack delete and create procedure.
    Result: The SmProcess dumped core in the upgraded build in M-SBC standby.
  4. Once the SBC is up and in sync, upgrade the M-SBC active to 8.0.0A20_84 using stack delete and stack create method.
    Result: The M-SBC standby takes over as new active and running successfully, but LI interception fails.No calls are getting intercepted.
  5. Upgrade the primary SBC to 8.0.0A20 build.
    Result: SmProcess core dump occurs.

The same is observed while upgrading S-SBCs.

Platform/Feature: SBC: CDR

The code is modified to correctly calculate the delta for the setup message time and the PSX response time.

SBX-87190 / SBX-867481

Portfix SBX-86748: The fragment timeout logic is decrementing the wrong interface's current in-use count. This problem only impacts hardware SBCs. (Originated in release 7.2.1)

Impact: If the PSX responses are large and the IP packets are fragmented, the SBC may retry multiple times due to reassembly failures resulting in packet drops.

Root Cause: The SBC's ability to handle defragmented packets will deteriorate. The NO DEFRAG MATCH count in "show table system networkProcessorStatistics defragStatistics" increments rapidly.

Steps to Replicate: N/A

Platform/Feature: SBC 5xx0, 7000

Fixed the fragment timeout logic that was decrementing the wrong interface's current in-use count. This problem only impacts the SBC hardware. 
SBX-862392

The CDR connection timeouts greater than 127 seconds are not honored, as the TCP sessions times out after 127 seconds.

Impact: N/A

Root Cause: The TCP session times out in 127 seconds.

Steps to Replicate: N/A

Platform/Feature: SBC

Changed the range for the connection timeout to a range of 15 to 120 seconds.

SBX-87708 / SBX-874481

Portfix SBX-87448: In the AWS SBC, SSH keys stored in CONFD database are lost during the upgrade to 07.xx.xx. (Originated in release 7.2.0)

Impact:  Any SSH key stored in the CONFD database is lost during the upgrade.

Root Cause: In AWS deployment where the volume replacement-based upgrades are used, the standby undergoing upgrade is not requesting CONFD.conf keys from older active SBCs.

Steps to Replicate:

  1. Perform LSWU from 7.0S407 to 7.2S400
  2. Call load of 700 sessions @7cps is running
  3. Trigger a switchover

Observation:

  1. Calls are running fine.
  2. Switchover is successful but observing errors in DBG file.

Platform/Feature: SBC

The issue is resolved by ensuring that the standby being upgraded requests the confd.conf keys from the active before proceeding with the upgrade. 
SBX-879442

SBC is not processing the 200 OK.

Impact: N/A

Root Cause: Blind transfer call fails due to DLRBT. The internal tone flag on leg B was not reset properly, as a result of leg C failing to the cancel tone.

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to reset the tone flag when B is connected. 
SBX-880031

When the End to End PRACK is enabled and if call fails after sending 18x to Ingress before receiving PRACK or if any PRACK drops happens; there may be a memory leak.

Impact: N/A

Root Cause: When End to End PRACK is enabled, just after receiving 18x; memory will be allocated for storing reliable data. And this will be cleared when PRACK is sent out. But If there is PRACK drop (It happened as Call is simulated with SIPP scripts and it is closed abruptly) there is chance of memory leak.

Steps to Replicate: Run Call with reliable 18x messages and Enable End-To-End PRACK flag in IPSP. Close scripts just after sending 18x out or don't send PRACK from INGRESS.

Platform/Feature: SBC: SIP

The code is modified to release the memory while clearing call details for a call failure.

SBX-858942

IPTABLES rules are incorrect on the SBC SWe after an upgrade where non-default addresses are configured for HA ports.

Impact: This may prevent the HA peers from communicating when one of the configured HA IP addresses is the same as the default address, but the other peer is not.

Root Cause: IPTABLES rules are incorrect on the SBC SWe after an upgrade in the case where non-default addresses were configured for HA ports.

Steps to Replicate: N/A

Platform/Feature: SBC SWe

The code is modified to flush the IPTABLES rules before adding the rules for the configured HA addresses.
SBX-87911 / SBX-877681

Portfix SBX-87768: Standby links are down after upgrading to 7.2. This issue occurred as routers respond to ARP probe request sent by the SBC with a GARP request and target MAC in that ARP request is set to a broadcast MAC. The SBC expects the target MAC in ARP response sent by router to contain the MAC address of the SBC port from which request was sent. (Originated in release 7.2.1

Impact: Standby links are down.

Root Cause: The SBC is not treating the ARP probe request as a valid response which resulted in the SBC reporting standby links as DOWN.

Steps to Replicate: N/A

Platform/Feature: SBC

The issue is fixed by comparing the target IP address received in a ARP response to the destination IP configured in Link Monitor when target MAC comparison fails. In a GARP request/response, the target IP is be set to the IP of the router sending these packets. This change results in considering the GARP request sent by the router as valid response and reports link status correctly.

SBX-88061 / SBX-874043

Portfix SBX-87404: When the SBC compare SDP online only and the peer answers with a 200 OK with SDP (where sessId and sessVer are zero), the SBC incorrectly sends a reInvite out before sending the acknowledgement. (Originated in release 6.2.4)

Impact: This issue may trigger an unnecessary reInvite.

Root Cause: SIPS fails to save the peer SDP when online validation only and both online and offline validation sessId and verId are zero in 200 OK.

Steps to Replicate:

Platform/Feature: SBC

The code is modified to change the order of validating profile to ensure it returns correctly.
SBX-88168 / SBX-876152

Portfix SBX-87615: After the announcement script is completed, the CC validates this as a multiparty call and transfer script and notifies ingress to connect the call.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

After ann script is completed, the CC instructs the ingress to connect the call. 
SBX-87828 / SBX-869302

Portfix SBX-86930: e2e prack is not working if require header is present and no 100rel. (Originated in release 6.2.4)

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

If 100rel not in require header, it is validated in supported.
SBX-87826 / SBX-860992

Portfix SBX-86099: Minimize the logic suppressing the Update. (Originated in release 6.2.4)

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to send for the Update regardless of if the Minimize flag is set to ON.
SBX-860803

When multiple DM Nat tables are configured, calls which should have been sent to Direct Media are being media anchored through the SBC.

Impact: N/A

Root Cause: DM Nat table entries are not getting properly created and entries are getting added to wrong tables - this is leading to Direct Media not working for entries configured in DM NAT table.

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to create the entries correctly.
SBX-87824 / SBX-860683

Portfix SBX-86068: reInvite after an authentication call is missing logic to copy the SMM scope variable data into a new message. (Originated in release 6.2.4)

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

Copied the SMM scope variable to new message so the SMM can apply the new logic.
SBX-880701

In case a call to sonusPeerUpload.expect is made and if the peer goes down then, there may be a waittime for the SCP connection, resulting in the application healthcheck timing out after 10 seconds, which causes the application to crash.

Impact: N/A

Root Cause: The scp operation may get stalled if standby goes down while scp was in progress resulting in health check timeout in application in turn causing a crash suspecting deadlock.

Steps to Replicate: N/A

Platform/Feature: SBC

The SCP used times out in sonusPeerUpload.expect script to ensure that the wait time for the SCP connection to establish is no longer than 2 seconds.
SBX-880361

Because of the Anonymize flag, the host name will get updated with Egress SIP Sig port in an outgoing PAI header. When the Source host name size (SIP Sig IP) is bigger than destination, the host name size (an existing host name in PAI received on INGRESS) issue will appear.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to reallocate memory before updating a host name value.
SBX-86920 / SBX-862363

Porfix SBX-86236: The SWe TPAD channel modify code had a bug that had a response sent to a different entity on the host (SWEA instead of DDH) and that resulted in DDH major log event. (Originated in release 8.0.0)

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC: DSP

The code is modified to correct the behavior. 
SBX-886252

Shadow file copy is available to admin user after an upgrade.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to remove the pre-upgrade shadow file saved during an upgrade.
SBX-885412

The SBC ignored the ACK and failed to relay it to the INGRESS peer. As a result, after 10 seconds, the OA-FSM timer expired on the egress call leg and the call was torn down. 

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified so that the ACK can be relayed to the other call leg and the call can stay up.
SBX-873253

The Scm Process may core dump while trying to double free the memory associated with the username of registration of the AOR.

Impact: N/A

Root Cause: The previous register AOR block was freed, however the username field was not set to NULL and subsequent re-registration or refresh comes in and reuses the heap memory that was freed for the previous registration. When we try to free our current registration block, double free is detected and hence we core.

Steps to Replicate: The problem is not reproducible.

Platform/Feature: SBC

Perform a Defensive check for stEndpointAOR.puchUserName and to set the value to NULL after its freed to avoid double free.
SBX-886102

Possible memory leak when the parameter rewriteIdentities is enabled on a SIP trunk group.

Impact: N/A

Root Cause: If a SIP trunk group has the feature "rewriteIdentities" enabled, there is an edge case in which memory which was allocated for temporary storage of a toHeader is never freed.  

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified so that in all scenarios, memory is freed, which is allocated for temporary storage of toHeader.
SBX-872612

When a E2E PRACK is disabled and PRACK is received from the caller with preconditions, the SBC does not relay the precondition changes to the callee.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The SBC sends an UPDATE towards egress to relay the preconditions to the callee.
SBX-881321

NAPT learning is broken if the following events occur:

RTP and RTCP NAPT learning are enabled when call comes up 
No packets are received within 1.5 seconds 
RTCP packet is received 
RTP packet is received 

In this scenario, the source IP address and RTCP port learn from the received RTCP packet, but any subsequent RTP packets (from same source IP address) are not learned. So, the RTP port is never learned.

Impact: N/A

Root Cause:

This problem occurs because we checked in some NP code changes that basically added NATL support to learn source IP address from RTCP packet (which we never supported before), but we didn’t check in the necessary XRM changes to support this feature. Our thinking at the time was that the NP changes were backward-compatible with the existing XRM code, and thus the new NP RTCP NATL learning functionality would not be executed; the NP would continue to operate as before (RTCP packets received before NATL learning from RTP packet had occurred would be discarded).

In 8.0 we implemented the XRM/application changes that, coupled with the previously checked in NP changes, fully support RTCP NATL learning.

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to add a NATL support to learn source IP address from an RTCP packet.
SBX-886522

When an Audio transcode is possible and below the line index is zero, all non-core streams are being removed even when multipleAudioStreamsSupport is enabled.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC: Media Resource Management

The code is modified by skipping the audio transcode for AUDIO/IMAGE streams under the multipleAudioStreamsSupport flag.
SBX-887152

The SBC was reading the end of a memory block while trying to play an announcement, due to pre-conditions interworking happening on the ingress call leg.

Impact: N/A

Root Cause:

The code was passed in a memory block which contained the name of an announcement and was copying the name into a fixed size memory buffer. The code was always copying a fixed amount of memory. However the name of the announcement was less than the fixed amount being copied so the code was reading more than the allocated space.

If the memory block passed in was right at the edge of process memory then its possible this might cause a memory exception and coredump.

Steps to Replicate: This was found while running SVT pre-conditions test suite.

Platform/Feature: SBC

The code is modified to not copy more memory than required to hold the name of the announcement, to avoid reading invalid memory.
SBX-88596 / SBX-853352

Portfix SBX-85335: The SBC replaces custom EMA SSL certificate with a self-signed certificate during an upgrade. (Originated in release 8.1.0).

Impact: N/A

Root Cause: User installed certificates were not being restored after upgrade and were getting replaced by default EMA certificates. Also, SSLVerifyClient was not being restored to its configured value after upgrade.

Steps to Replicate:

To verify restoration of SSLVerifyClient:
1. Setup and verify mutual authentication for EMA
2. Verify value of SSLVerifyClient ("required" when clientAuthMethod set to pkiCertOnly; "optional" when clientAuthMethod set to usernamePassworkOrPkiCert)
3. Perform upgrade and verify that the value of SSLVerifyClient remains the same as configured

Platform/Feature: SBC: EMA

While restoring certificates (server certificate and client CA certificate for EMA TLS Profile) from the CDB to the cache, they now restore to /opt/sonus/ema/apache/.
SBX-883861

A second REFER comes in too fast when the previous referer has not completed the teardown. It sets the teardown in an invalid state.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

Sending of ACK is delayed until the previous referer tears down. The subsequent REFER is accepted by the SBC.
SBX-885532

The logical implementation for the flag CondIncMethInAllow is incorrect. 

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

New logic is added to rework the CondIncMethInAllow flag
SBX-883272

Standby logs (/var/log/messages and syslog and user.log) are flooded with CpsShmAttach event log messages.

Impact: N/A

Root Cause:

CpsShmAttach() is being incorrectly being call by the standby for every SIP Registration.
The only negative consequence of this is that a log message with the following text is logged for every registration:
"CpsShmAttach: Attached to shared memory"

Steps to Replicate: N/A

Platform/Feature: SBC

The standby code is modified to no longer call CpsShmAttach() unnecessarily.
SBX-88755 / SBX-721653

Portfix SBX-72165: The mandatory users (admin, guest, operator) in the SNMP users table are user removable. If removed, the SNMP commands may fail. (Originated in release 6.2.4).

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC: CLI, EMA

Validation is added to ensure the mandatory users admin, guest, and operator are not removable.
SBX-88768 / SBX-885483

Portfix SBX-88548: For a non-SIP to SIP call, the transparency/relay flags are still in effect. (Originated in release 6.2.4)

Impact: N/A

Root Cause: Resolved: Change the logic to disable/ignore all transparancy/relay flags if it is not end to end SIP call.

Steps to Replicate: N/A

Platform/Feature: SBC: SIP Applications

The code is modified to disable/ignore all transparency/relay flags for call flows that are not end-to-end SIP calls. 
SBX-883252

If a user enables/disables the audit system (auditd + kernel's audit system), the existing CLI command "set oam eventLog platformAuditLogs state <enabled/disabled>" will be used.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to:

  • change the default state of the platformAuditLogs to enabled Stop audit system (auditd + Kernel audit system) for stopping auditd,
  • disable the audit system when platformAuditLogs's state is disabled and persists on restart.
SBX-889252

Software editions of the SBC use uninitialized values during the SmProcess startup.

Impact: N/A

Root Cause: Coding error.

Steps to Replicate: Use valgrind on SmProcess at startup to find use of uninitialised values.

Platform/Feature: SBC

The code is modified to initialize values on software editions.
SBX-890481

The SBC is not able to send 200OK to the Ingress due to tone playing and a "Send Update SDP in 200OK" flag.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

Fixed the logical error so the SBC can send 200OK out.
SBX-892003

e2e PRACK is not working if the required header is present and 100rel is not.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

Changed the logic to accommodate if 100rel is not in the required header, it is validated in supported header.
SBX-89320 / SBX-888822

Portfix SBX-88882: A 200 OK INVITE received immediately after a UPDATE/200 OK gets stuck and the call fails. (Originated in release 7.2.1)

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to avoid using a tone swap when a 200 OK INVITE is received immediately after a UPDATE/200 OK.
SBX-89288 / SBX-882202

Portfix SBX-88220: SBC system configuration: sysctl variables, hardening. (Originated in release 8.1.0)

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

Implemented security hardening measures to load the Yama security module at startup to block non-child tracing by ptrace.
SBX-886651

NAPT not learning due to a delay in media being received. NAPT is learning for 1sec for a re-INVITE and after the learning, the previously learned address is returned to NRMA (which does not work for end changes).

Impact: N/A

Root Cause: NAPT not being learnt due to delay in media being received. NAPT is learnt for 1sec only for a re-INVITE and after that the previously learned address is returned to NRMA ( which doesn't work in this case as far end changes it's IP:PORT ).

Steps to Replicate: For re-INVITE send media after 1/2 seconds and see that napt learning is restarted after timer expiry.

Platform/Feature: SBC

The code is modified to restart NAPT learning again after a timeout for re-INVITE.
SBX-89284 / SBX-892021

Portfix SBX-89202: When ISUP/QSIG message body is present in the OOD requests, the SCM coredump occurs since the hSipCallHandle will not be present. (Originated in release 8.1.0)

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

Added a Null check for hSipCallHandle.
SBX-889742

An OOD MESSAGE Request with the same CSeq and different from tag for a challenged request will be rejected with an 482 Loop Detected.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A
Platform/Feature: SBC

OOD MESSAGE Request with same CSeq and different from tag for a challenged request is processed automatically.
SBX-89336 / SBX-882212

Portfix SBX-88221: High auditd activity is causing disk issues and registration failures on the SWe. (Originated in release 6.2.4)

Impact: N/A

Root Cause: High activity of auditd was mainly caused due to flooding of MAC_IPSEC_EVENT messages in /var/log/audit/audit.log

Steps to Replicate:

1. run ipsec.sh script
2. Simultaneously, on another session, try "mpstat -P ALL 1", verify that high values of %iowait are not found
3. If high activity of auditd is still causing issues, auditing can be stopped using "set oam eventLog platformAuditLogs state disabled"
4. After disabling auditd, verify that auditd has been disabled, using "auditctl -s" and "systemctl status auditd"
5. Also verify that audit messages are not being logged in /var/log/audit/audit.log and /var/log/messages

Platform/Feature: SBC

Added an audit rule to exclude MAC_IPSEC_EVENT messages from being logged by the auditd.
SBX-889891

R-URI userpart is incorrect when the ToHeader Transparency is on and with registration. 

Impact: N/A

Root Cause: Logical error.

Steps to Replicate: N/A

Platform/Feature: SBC

The R-URI is based on contact received from an IAD registered end point.
SBX-893022

Application can fail to start if the name chosen for the SBC ends with "net". 

Impact: N/A

Root Cause:

In implicit registration case, SBC fails to unsubscribes with PCRF during De-Registration and that results in PCRF keep on sending notifications to SBC
even after De-registration and that result in coredump(Because SBC tried to access Registration Control Block which is given by callback function which does not exist)

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to handle the SBC names ending with "net".
SBX-887431

The SCM Process cores when receiving notifications from the PCRF, which does not exist on the Registration Control Block.

Impact: N/A

Root Cause:

In implicit registration case, SBC fails to unsubscribes with PCRF during De-Registration and that results in PCRF keep on sending notifications to SBC
even after De-registration and that result in coredump(Because SBC tried to access Registration Control Block which is given by callback function which does not exist)

Steps to Replicate:

1. Enable Rx feature and signallingPath flag on access TG
2. Run implicit Registration
3. Send De-Register request


Platform/Feature: SBC

The code is modified to terminate the RX session on receiving De-Registration, so that the PCRF does not send any notifications to the SBC. A fix is added to handle notifications received from the PCRF that the Registration Control Block does not exit. 
SBX-90034 / SBX-744702

Portfix SBX-74470: SIP (LM) -> GW call (x-fer on this side) - call is torn down. (Originated in release 6.2.4)

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC: Gw-Gw, Media Resource Management

The code is modified to define a new NRMA state, for conditional assignment of the state, and faking the answer when required, to avoid the timer expiry. 
SBX-89983 / SBX-899813

Portfix SBX-89981: Contact Transparency issue(HTP) for a Late Media Invite is not working as expected when excluded methods are configured. (Originated in release 8.1.0)

Impact: N/A

Root Cause:

When Excluded methods is configured and Late Media INVITE is received, we are checking the transparancy bits for Contact before
actually calling the CopyTransparancyContent where transparancy bits are actually set.

Steps to Replicate: Enable Contact transparency with HTP and exclude methods as below and execute call flow as mentioned in description.

Platform/Feature: SBC

Added a fix for calling the parameters SipSgCheckAndSetContactHeaderTrasparency after SipSgCopyTransparencyContent.
SBX-90044 / SBX-759692

Portfix SBX-87984: RCA: web server leaks a private IP address through its HTTP headers. The web server will expose internal IP addresses that are usually hidden or masked behind a Network Address Translation (NAT) Firewall or proxy server. (Originated in release 8.0.0). 

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC: EMA, Security

The header is edited before sending the response from Apache 2 server.
SBX-866893

A change in the return code for Platform REST API calls for passwords mismatch.

Impact: N/A

Root Cause: In case of password mismatch, Platform REST API was returning status code 200 with error message. Which is not correct for authentication.

Steps to Replicate: Login into platform manager with wrong password, response should come with 401 status code and error message.

Platform/Feature: SBC

To fix this issue, set the status code to 401 for authentication.
SBX-865862

SIPSG_GET_DMINFO_RPY_MSG is not sent when the DM Info is not sent. The SCM lookup times out after 1 second and the 200 OK is released after 1 second.

Impact: N/A

Root Cause: It is the day one behavior of Direct Media Anti-trombone feature.

Steps to Replicate: N/A

Platform/Feature: SBC

SIPSG_GET_DMINFO_RPY_MSG is sent irrespective of whether the DM Info is present or not.
SBX-893772

When the Enhanced Dynamic black list feature is configured for a Receipt of message event type, the ScmProcess leaks memory.

Impact: N/A

Root Cause: When Enhanced Dynamic black list feature is configured for Receipt of message, ScmProcess allocates memory for ICM message but do not free the memory.

Steps to Replicate: Execute the DM Anti-trombone call flow so that two calls hits different SCM's.

Platform/Feature: SBC

The code is modified to ensure the ScmProcess frees the memory allocated for the ICM Message carrying the Dynamic black list feature data.
SBX-900882

Subscription information is lost on an SBC switchover in a particular direction.

The NOTIFY request is rejected with a 489 Bad Event message after a double switchover.

Impact: N/A

Root Cause: Ingress and Egress transparancy profile *present* bits was not set in Relay CB because of which they are not getting mirrored during second switchover.

Steps to Replicate:

1. Register and Subscribe from Active Machine.
2. Do a switchover so that Standby machine becomes active.
3. Do a switchover again so that Active machine becomes active again.
4. Now send Notify from core.

Platform/Feature: SBC


The code is modified to allow a successful double switchover.
SBX-90128 / SBX-889963

Portfix SBX-88996: As, the single character search is an exhaustive search operation which would in turn consume more time and space , the browser witnesses Timeout Exception due to which the blank screen is rendered to the user. (Originated in release 6.2.4).

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC: EMA

The code is modified to avoid and disallow single character search by rendering an appropriate error message to the user if the input does not match the criteria entered.
SBX-90204 / SBX-901953

Portfix SBX-90195: A transport parameter is transparently sent when the Request-URI transparency is enabled for all messages. (Originated in release 8.1.0).

Impact: N/A

Root Cause: As prat of transparency support for Request URI, this parameter was transparently sent which shouldn't be sent.

Steps to Replicate:

1. Enable transparency for Request URI.
2. Make a TLS-UDP or TCP-UDP call with transport parameter in Request URI.
3. Transport parameter will sent transparently though the call is UDP in egress leg.

Platform/Feature: SBC

The code is modified to remove the transport parameter in a request URI when request URI transparency is enabled.
SBX-90042 / SBX-763933

Portfix SBX-76393: The CPX process was timing out when requests were made for specific rows in an interval statistics table, only used to populate the statistics tar file. (Originated in release 6.2.4).

Impact: N/A

Root Cause:  Interval statistics tables that are used only to populate the statistics tar file do not support requests for individual rows, and those requests time out.

Steps to Replicate: N/A

Platform/Feature: SBC: confd

The code is modified to return a request immediately with no data.
SBX-898771

For registration, the 200OK has the service-route, and the flag Stored service route enabled. If the Server sends multiple notifications without a record-route before the Subscribe is stable, the SBC may core due to duplicated freed memory.

Impact: N/A

Root Cause: SBC may core due to duplicated memory free.

Steps to Replicate: Test: ~stran/sipp/sippc_89788.xml and sipps_89788.xml

Platform/Feature: SBC

The code is modified to correctly initiate a NULL pointer after the memory is freed.
SBX-88048 / SBX-873211

Portfix SBX-87321: Sip Parser has predefined method length restriction set to 128 and a negative test case in Codenomicon test suite with a method including more than 128 characters is resulting in a coredump. (Originated in release 8.0.0).

Impact: N/A

Root Cause:

1)When ever CSEQ method name comes beyond 127 character size and SMM profile is applied, SBC taking box down as it is missing boundary condition

2)When From Tag is missing in Dialog scope variable data, SBC taking box down as it is missing NULL check

Steps to Replicate: N/A

Platform/Feature: SBC

Added software checks to enforce upper limit as well as NULL termination

SBX-92225 / SBX-757152

Portfix SBX-75715: The SCM reports a deadlock when multiple set operations are committed. The feature previously worked in earlier releases and does not work in 7.x releases. (Originated in release 8.0.0).

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC: CLI

A check is added in the CPX to limit the maximum number of trunkGroups set per commit to 2 to avoid a SCM process core dump due to a healthcheck timeout.
SBX-881292

Registrations with a syntax error cause an incorrect REG counter.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to update the TRM and SIPFE correctly.

SBX-89592 / SBX-892202

Portfix SBX-89220: The 200 OK is not being sent for call HOLD when the sdpAttributeRelay is enabled on the Trunk Group. (Originated in release 8.1.0).

Impact: N/A

Root Cause: Setting this flag SIP_SDP_CTRL_IS_CHANGED_SDP and properly not resetting it is causing the issue

Steps to Replicate: Run a Audio Video call and UAS sends the answer with Audio and Video(Stream disabled). Send the hold invite with change in datapath mode, 200 OK for this is not being sent.

Platform/Feature: SBC

The code is modified to reset the flag SIP_SDP_CTRL_IS_CHANGED_SDP when there is change in the Session Attributes.
SBX-882533

The PSX Name field is not being populated in CDR's.

Impact: N/A

Root Cause: Code was missing to handle the PSX name and copy to CDR's

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to include the PSX name in the CDRs.
SBX-902501

When "show status addressContext <addressContext_name> ipsec ipsecSaStatistics" and "show status addressContext <addressContext_name> ipsec ipsecSaStatus" commands are run and the IPSec is configured, the IKE Process will leak memory.

Impact: N/A

Root Cause: Memory leak occurs because of double allocation of key and value buffers which hold IKE statistics.

Steps to Replicate:

Configure IP SEC AKA on SBC.
Run valgrind.
show status addressContext <addressContext_name> ipsec ipsecSaStatistics.

show status addressContext <addressContext_name> ipsec ipsecSaStatus
Make sure AKA is configured and working correctly.
Check valgrind output.
Certain blocks of size 664 and 16 will be shown.

Platform/Feature: SBC: IPSec, SIP

The code is modified to ensure buffers are allocated once when generating the IPSec IKE statistics.
SBX-903641

[SMM] The Scm process core dumped while modifying the URI scheme.

Since the stHdrString is not MemZero and when we try to free the memory which is junk, coredump occurs.

Impact: N/A

Root Cause: The core dump was observed as memory of few structures were not memzero.

Steps to Replicate: N/A

Platform/Feature: SBC: Application

The code is modified to add a MemZero to the structures.
SBX-905102

The call setup time under the currentCallStatistics output was not calculated correctly.

Impact: N/A

Root Cause: The code was incorrectly managing the cumulative total for this field and dividing it by 100.

Steps to Replicate: Make multiple calls with a delay between sending INVITE and receiving 18x message and check the call setup time is correct.

Platform/Feature: SBC

The code is modified to simply keep a total of the number of ticks. For example, 100ths of a second for each call.
SBX-899963

In old scenario, using ':' for separation between attribute name and value.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

Code was added to read the file properly if instead of ':', the file uses double quotes (") as a separator.
SBX-903931

When the saveCallFlows is enabled, and only Out of Dialog Messages are received, a memory leak occurs.

Impact: N/A

Root Cause: Packets without a GCID associated with them are stored in a queue until a packet is sent or received with a GCID

Steps to Replicate: N/A

Platform/Feature: SBC

When the queue of packets exceeds the saveRecentCallFlowsInMemory maxMemoryUsage, the oldest entries are purged.
SBX-901801

When the SIPT library was returning a DISCARD_MSG event to SIPSG while trying to send out a message, it results in the call being released if the MIME disposition was required.

Impact: N/A

Root Cause: If the SIPT library returns DISCARD_MSG there is no need to release the call.

Steps to Replicate: Make a SIPT to SIPT call where the ingress revision is spirou and the egress revision is itut92+ and send a CPG message with the event indicator of 5 in the backward direction.

Platform/Feature: SBC

The code is updated to not release the call if the SIPT library returns DISCARD_MSG while sending out a message.
SBX-873421

During the long load run, a few 503 responses are seen from the SBC.

Impact: N/A

Root Cause: The issue is seen because of SBC wrongly identified INVITE PDU type as OTHER and not INVITE only in the case when first partial PDU received over TCP as fractional INVITE word.

Steps to Replicate: In long load run over TCP on ingress side.

Platform/Feature: SBC

The SBC corrected the pre-parsing logic in partial PDU cases, when the INVITE word received in first partial PDU is fractional and rest of the PDU in a second partial PDU.
SBX-90526 / SBX-903791

Portfix SBX-90379: Pathcheck process currently supports 32 DNS records, whereas the DNS client supports 100 so there was a mismatch and this pathcheck process crash was seen when there are more than 32 records. (Originated in release 8.1.0).

Impact: N/A

Root Cause: PathCheck process crash was seen due mishandling of the records when the number is more than 32.

Steps to Replicate:

1. Configure patch check profile to IP peer to send OPTION sip message as ping.
2. Patch check host name peer as FQDN.
3. TCP fallback enabled for DNS server configuration.
4. TC flag set coming from DNS server, which basically indicates that DNS response is truncated.
5. DNS reply has more than 32 SRV records.

Platform/Feature: SBC

The Maximum records supported in a pathcheck is increased to 100, so that it will be in sync with a DNS client.
SBX-904253

During registration failures, and peer tries to register again, the SIPFE and SIPSG may become out of sync.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

SIPS is no longer responsible to answer the re-transmissions and the application directly handles the answer to avoid an out of sync registration.

 
SBX-902312

The SCM may core while processing SIP INVITE headers.

Impact: N/A

Root Cause: The received INVITE message is not as per RFC 5626 that requires +sip.instance to be followed by a value.

Steps to Replicate: N/A

Platform/Feature: SBC

A NULL pointer check is added to avoid a core dump when far end SIP endpoints are not following the standard.
SBX-856751

When invoking an API with an input param, the input params were not getting validated because the validation code was not present for the rest of the API input params.

Impact: N/A

Root Cause: When we were invoking any rest API with some input param. Input params were not getting validate because validation code was not present for rest API input params.

Steps to Replicate: Call rest API using curl command with invalid input params value.

Platform/Feature: SBC

A new class is added to validate all the API input params to fix this issue.
SBX-864252

The mgmtRedundancyRole is displaying Unknown instead of active/standby.

Impact: N/A

Root Cause: SmaGetMgmtRedundancyRole() which returns the mgmtRedundancyRole is returning rgmRedundancyRole instead of redundancyRole

Steps to Replicate:

Run cli command: show table system serverStatus <system name> mgmtRedundancyRole

admin@CEGVM3> show table system serverStatus CEGVM3 mgmtRedundancyRole
mgmtRedundancyRole active;

Platform/Feature: SBC

Make the SmaGetMgmtRedundancyRole() return to redundancyRole instead of rgmRedundancyRole.
SBX-865892

When there are multiple ipInterfaces in different subnets in an ipInterfaceGroup, the sipSigPort address can remain bound to an ipInterface with an unmatching subnet. The sipSigPort address does not move to an ipInterface with the matching subnet when the ipInterface with the matching subnet becomes enabled and in-service.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The signaling port address is properly relocated to an ipInterface with the matching subnet if the address is currently bound to an ipInterface in a different subnet.
SBX-866532

When the packets are logged as part of the SBC Packet Collector for Core Dump Analysis functionality, if there are SMM rules applied to those packets, the packets are not stored after the SMM rules have been applied.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to save the packets after SMM rules have been applied.
SBX-856761

The user was able to read any file from the under-privilege REST user through a GET request.

Impact: N/A

Root Cause: In old scenario, input sanitization for rest call parameters not present.

Steps to Replicate: N/A

Platform/Feature: SBC

The input sanitation is added to verify the REST call before executing the API.
SBX-76813 / SBX-708083

Portfix SBX-70808: It is not possible to use the EMA "Test SIP Adaptor Profile" or a CLI command "request profiles signaling sipAdaptorProfile getDigits testProfile" to test an SMM rule that manipulates an ISUP MIME body, because these mechanisms only support ASCII characters and the MIME body is binary. (Originated in release 8.0.0).

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The CLI command is extended to allow processing of files contained binary MIME bodies. Processing of the inputPduString option and the EMA text screen is changed to only support the ASCII. 
SBX-862772

The packets are captured out of order. Though all packet data is present in memory, the packets are not stored in the proper order.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to capture the packets in the correct order.
SBX-868522

/home/log/session directory has a record of the terminal session logs for all the users and the directory is world-writable without being set. 

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to set sticky bit for /home/log/session directory.
SBX-859972

A user is not able to create a group starting with '.'

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to not take groups starting with '.' as input, and to delete the groups staring with '.' at the time of the LSWU.
SBX-874473

The OS user linuxadmin was not getting the shortened lockout time of 10 seconds, when the OSAccountAging goes from being disabled to enabled.

Impact: N/A

Root Cause: Misspeliing in command to update the PAM config files.

Steps to Replicate: N/A

Platform/Feature: SBC

The passwd.sh script is updated to correct the incorrect spelling.
SBX-871012

The Packet Loss Threshold is not set properly in the NP, so the NP will report a packet loss incorrectly.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

Extract the pktLossThreshold setting from a proper location in the enable media API in the SWeNP code.
SBX-859883

When the To header transparency and call route by TN is on, the R-URI is uncorrected.

Impact: N/A

Root Cause: Incorrect logic to treat RURI as transparency.

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to not treat R-URI as transparent.
SBX-874611

When the DRM (Application) is not receiving the response from the UXPAD for the health check messages, the DRM sends SIGABRT signal to the unresponsive UXPAD (using the UXPAD process number) to generate a coredump. 

Impact: N/A

Root Cause:

While we get the PID of the Process using the UXPAD process number, we were not searching for the exact match.
If the UXPAD number is 1, it matches all the UXPADs/TPADs that have 1 in their process number ex: 1, 10, 11, 12, 21 etc, and the SIGABRT signal was sent to all those processes.

Steps to Replicate:

This issue can be produced with instance having more than 10 UXPADs.
We don't need to run calls to reproduce this.

Kill UXPAD with process number 0 or 1.

Get the PID of the desired UXPAD
> ps -elf | grep UXPAD
(/opt/sonus/bin/swe/SWe_UXPAD -c 0x8 -n 1 --proc-type=secondary --no-pci -- -c4 -t1)
choose the PID with process number 0 to 1 (process number is the last field "-t<process number>" in the output when the above command is executed).

Kill the UXPAD.
> kill -9 <PID>

Since the UXPAD was killed, the DRM does not get the response for the health check messages and it issues the SIGABRT Signal.

Without this fix the coredump gets generated for the wrong UXPAD that matched the process number (not exact match)
With this fix it does not generate the core as the desired UXPAD was not live.

We can monitor these logs in "/var/log/syslog", search the relevant messages with the keyword "coredumpSweDsp"
Also we can check cores dumps in "/var/log/sonus/sbx/coredump"

Platform/Feature: SBC

Search for the exact match while the admin retrieves the PID of the Process.
SBX-858072

Privilege Escalation by www-data on the SBC (Runtime Diagnostics Test).

Impact: N/A

Root Cause: runDiagField.sh has sonusadmin ownership and can be modified by sonusadmin to escalate to root.

Steps to Replicate: N/A

Platform/Feature: SBC

Updated the permission and ownership of /opt/sonus/sbx/diags/runDiagField.sh from the (-rwxr--r-- 1 sonusadmin sonus) to (-r-xr----- 1 root sonus) through the updateOwnerAndPermissions.sh.
SBX-874522

When the configuration for the connected realm (Address Context > Realm > Connected Realm) is created and the realm name used already exists, the code was reading off the end of a memory buffer.

Impact: N/A

Root Cause: The code was using a memory copy routine which always copied a fixed amount of memory regardless of the string size that existed in the source memory location. This lead to reading off the end of the memory buffer.

Steps to Replicate: This issue is only seen when using special ASAN images

Platform/Feature: SBC

The code is updated to use a string copy instead of a memory copy functions to avoid reading off the end of the memory buffer.
SBX-871401

First, a DNS query was getting initiated through the mgmt even if the IP was configured. The Patchchk process core dumps when the truncated DNS response is received from DNS server.

Impact: N/A

Root Cause:

As default static routes are configured and mgmt. get the preference, that's the reason DNS query was initiated via mgmt. interface.
Ptachcheck process core dump was happening because of its inability to handle truncated DNS response.

Steps to Replicate:

1. configure patch check profile to IP peer to send OPTION sip message as ping.
2. Patch check host name peer as FQDN.
3. TCP fallback enabled for DNS server configuration.
4. TC flag set coming from DNS server, which basically indicates that DNS response is truncated.

Platform/Feature: SBC

The Static route for the IP interface to the DNS server is provided, which solves the problem of the DNS query not going through the IP interface. 
SBX-878622

The SecureNAT does not learn the remote IP address.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The prefix match result of the received srcIP against the programmed srcIP is in Big Endian format, so it needed to be byte-swapped to Little Endian format.
SBX-881682

SIPS/SIPSG: The 200 Ok (connect) is not sent to the ingress, and ACK is not sent to the egress, when a call is handled using a custom call script.

After the announcement script run is completed, the CC confuses the script as a multiparty call transfer script and not telling the ingress to connect the call (send 200OK).

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modifed to allow the CC to inform the ingress to connect the call after the custom call script completes.
SBX-87527

The SBC allowed a user to use the same IP address for a route next hop that caused a loss of traffic to all off-net peers across the SBC interface.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to validate that static route's next top IP address is not same as IP interface's altMediaIpAddress.
SBX-851322

For sRTP call, the SBC does not reset the ROC while doing an sRTP encryption, even if the SSRC changes. This may cause the remote decryption operation to fail on some 3rd party equipment.

Impact: N/A

Root Cause: The fast path design wasn't paying attention to the SSRC changes while doing sRTP encryption operation.

Steps to Replicate:

This specific fix has been tested/verified in unit-test environment. The following is not required, but just for the sake of completeness:

Set up an sRTP call, run it for 25 minutes, make sure there is two-way audio.
Without signaling it, force a change to the SSRC on one side
check if there is one-way audio.
Repeat the above step with 6.2.0R0 and 6.2.3A16.

Platform/Feature: SBC

The code is modified to remember the SSRC from the last RTP packet, and comparing it with the SSRC of current RTP packet before sRTP encryption is applied. If a change is detected, the ROC is reset to 0 before sRTP encryption is applied.
SBX-881972

An internal module's passphrase generation method was not strong.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to use a stronger method.
SBX-888352

The SBC, while trying to create DM NAPT table (after retrieving the details from the Database), was trying to read the end of a memory block for some of the parameters in the table (such as table name, etc).

Impact: N/A

Root Cause: While copying the different parameters from the database to DM NAPT table, the code was copying fixed size table name string. This might result in reading off the end of a memory block and if the memory block is at the top of the heap then it can cause invalid memory access and result in crash.

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to not copy more memory than required, to hold the table name of the DM NAPT table to then avoid reading invalid memory.
SBX-86712 / SBX-759432

Portfix SBX-75943: When an video+audio directmedia call with m=audio after m=video in the SDP is made (audio becomes the last stream), the LIF bandwidth is allocated though it is a DM call.(Originated in release 8.0.0).

Impact: N/A

Root Cause: In nrmaResAlloc.c, the code to set the session BW to 0 (xrmBwChangeCmd.sessionBwBps = 0) is never processed for audio since it is inside a block meant for non-audio streams.

Steps to Replicate: N/A

Platform/Feature: SBC

A loop is added to save the streamId of the last non-audio stream. The code is modified to check if the audio is the last stream to be a part of this. An additional check is added to reset the session BW to 0 for the last non-audio stream for a direct media call, if the audio is found to be the last stream. 
SBX-89773 / SBX-890892

Portfix SBX-89089: If a name change operation is performed to swap any of the two system names (CE name or peer CE name), the SBC application may fail to start. (Originated in release 8.1.0).

Impact: N/A

Root Cause: There are some config files where there is no distinction between the key used for specifying the system name and CE names. A swap in such a file cannot be done correctly.

Steps to Replicate: N/A

Platform/Feature: SBC

The name change operation is enhanced to reject any name change operation that involves swapping any of the two system names (CE name or peer CE name).
SBX-864861

The I-SBC does not span across multiple vNUMA nodes, causing a SWe_NP failure to launch.

Impact: N/A

Root Cause: The failure happens due to improper allocation of hugepages for SWe_NP in case it is dual NUMA ,failing SWe_NP to come up.

Steps to Replicate: Follow the guidance to restrict ISBC to be confined within same NUMA in which packet port is connected.

Platform/Feature: SBC

The SWe SBC software is updated to enforce I-SBC instances to run only with single vNUMA node in order to achieve deterministic performance.


SBX-89996 / SBX-895863

Portfix SBX-89586: Loading the TEAMS Template token from the EMA is not working. The Token load option does not load values into the template. No action is triggered even after clicking the Token load. (Originated in release 8.1.0).

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

Updated the code to successfully load the token and display the value corresponding to the attributes.
SBX-901573

The radiusSharedSecret may appear in plain text in the logs.

Impact: N/A

Root Cause: Debug print statements caused the passphrase to be written to the logs.

Steps to Replicate: N/A

Platform/Feature: SBC

The code printing the plain text passphrase is removed.
SBX-90515 / SBX-902893

Portfix SBX-90289: The SBC cored after swapping a name (CE and System) and performing a clearDb action. (Originated in release 8.1.0).

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to compare all system names against each other before accepting a name change, and then generate a warning, when applicable.
SBX-904153

Currently, all filters are not displayed for tables such as Call Detail Status, Call Media Status, and Call Resource Detail Status.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to display filters for all columns in the tables.
SBX-903231

In case of SUBSCRIBE Relay refresh, the the R-URI must be based on the last Contact received if the first route set has the lr parameter.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The logic is changed based on the RFC3261.
SBX-90789 / SBX-900854

Portfix SBX-90085: When special character inputs are used for the call number filter in the CDR viewer table, the input validation fails and the page keeps showing the table as 'Loading...'. (Originated in release 6.2.4 ).

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified so the user can filter the called number data in CDR Viewer table, with numbers and few special characters such as #, *, +, -

SBX-883192

When history info header is received and International Nature of Address (NOA) Plus flag is enabled, the NOA printed in CDR log is incorrect. The NOA for the original called and redirecting number must be set to International.

Impact: N/A

Root Cause: When history info header is processed , International Noa Plus flag is not considered.

Steps to Replicate:

Reproduce the issue by
Enabling following 2 flags :
History Info on Ingress SIP TG.
International Noa Plus

Send INVITE with
History-Info: <sip:+nnnnnnnnnn@domain.xx;user=phone?privacy=history>;index=1
History-Info: <sip:+nnnnnnnnnnnn@domain.nn;user=phone;cause=302>;index=1.1

Actual Result in CDR ACT logs :
REDI,20,442071899987,442071899987,3,3,1,1,1,2,,,,,,,,,,,0,2

Expected Result:
REDI,20,442071899987,442071899987,3,3,1,1,1,3,,,,,,,,,,,0,3 --> two HI

Difference is NOA parameter for redirecting original called number. It should be 3.

Platform/Feature: SBC

The code is modified to check International NOA Plus flag before setting NOA for the original and redirecting number when the history info header is received.
SBX-903082

When LRBT is enabled for an ICE call and egress, the endpoint responds to initial INVITE with an 183 progress message with the SDP parameters followed by an 180 without the SDP and a 200 OK with the SDP. Following the local ring back tone, the SBC initiates re-INVITE to the egress endpoint that is missing ICE ufrag, password and RTCP candidate line in the SDP.

Impact: N/A

Root Cause: Error in the software that was causing the ICE information for the call to be incorrectly cleared in this particular scenario.

Steps to Replicate:

Create sbx configuration to allow ICE sip to sip call to be routed between ingress and egress TG's.
Create a toneAndAnnouncementProfile for LRBT with dynamicLRBT disabled and associate the profile to the ingress and egress TG's.
Enable rtcpMux on the PSP associated with the ingress and egress TG's

Method
----------
1. Send INVITE to SBX ingress with valid ICE SDP including rtp and rtcp candidates and a=rtcp-mux.

2. From egress endpoint, respond to INVITE with with following sequence
183 Session progress including valid SDP with ICE
180 Ringing without an SDP
200 OK including valid SDP with ICE

3. At ingress endpoint,
Respond to 200 Ok with ACK
At egress endpoint,
Respond to re-INVITE with valid 200 OK

Complete call signaling and stun exchange at ingress and egress

Platform/Feature: SBC

The software is modified to not clear the ICE information in this scenario.
SBX-858203

CDR records are broken into multiple syslog messages.

Impact: N/A

Root Cause: There was a limit to the message size of ~1.8K and CDR messages beyond that would be split into multiple syslog messages.

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to transfer a complete CDR as one syslog message.
SBX-907622

During SMM testing, the code for handling message scope variables could read off the end of a memory block while printing a debug statement.

Impact: N/A

Root Cause: There was a limit to the message size of ~1.8K and CDR messages beyond that would be split into multiple syslog messages.

Steps to Replicate: N/A

Platform/Feature: SBC

The specific debug log line is deleted because there was a second debug line that is already printing from null terminated string.
SBX-901232

If a domain license is installed on the head end node, but the license is pushed out to another node more than an hour later, the push of the license is not successful.

Impact: N/A

Root Cause: N/A 

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to allow the push of the domain licenses to other nodes, if it has been successfully installed on another node of the cluster before.
SBX-905102

The call setup time under the currentCallStatistics output was not calculated correctly.

Impact: N/A

Root Cause: The code was incorrectly managing the cumulative total for this field and dividing it by 100. 

Steps to Replicate: Make multiple calls with a delay between sending INVITE and receiving 18x message and check the call setup time is correct.

Platform/Feature: SBC

The code is modified to keep a total of the number of ticks. (i.e. 100th's of a second for each call).
SBX-851362

Software Update fails if an snmp trapTarget with a name containing white-space characters is configured.

Impact: N/A

Root Cause: A change was added to remove prefixes on trapTarget names during software update. This change does not work with names containing spaces, which is possible when manually creating a trapTarget from CLI only.

Steps to Replicate: On old software, manually create a trapTarget from CLI with a name containing at least one white-space character - to do this, the name must be quoted.
Then perform LSWU - this fails.

Platform/Feature: SBC

The LSWU code is modified to deal with trapTarget names containing whitespace.
SBX-900613

The function SipSgContinueCallProcessing() acquires pstCall using SipCallFromHandleAndLockCCBCmd() and after use, the function was not releasing pstCall, causing memory leaks.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to release pstCall using SipUnLockAndReleaseCCBCmd() after a use.
SBX-914643

When the HA peer is upgraded, the upgrade screen shows an error pop up with "Internal Operation error session_start" content.

Impact: N/A

Root Cause: It was happening because of cnxipm directory was deleted and not able to create again, meantime system was trying to session under cnxipm director.

Steps to Replicate: To reproduce this issue, we have to upgrade the system in HA peer mode.

Platform/Feature: SBC

The code is modified to check to create cnxipm directory.
SBX-734512

SNMP v3 doesn't work after the upgrade/restore.

Impact: N/A

Root Cause: SNMP version is not applied after upgrade/restore

Steps to Replicate: N/A

Platform/Feature: SBC: confd, Install/Upgrade Platform

The upgrade/restore version is applied after the SBX starts from the incoming configuration database.
SBX-914041

There is One way audio after call transfer is made on the SWe when Ring Back is enabled with SRTP towards the MS TEAM to relay it back to PSTN behind the SBC. 

Impact: N/A

Root Cause: With this call transfer BRES is deactivated, activated again, while reusing BRES associated SRTP ENC context it should retain the old required values in contexts, which is missing in SBC SWe

Steps to Replicate: N/A

Platform/Feature: SBC

With these session modification flows, the NP code is modified to retain the enc contexts required for re-enabling so the endpoint can start accepting media.
SBX-913332

An Application on active may crash when the HA connection is frequently bouncing.

Impact: N/A

Root Cause: If the HA connection bounces while an scp operation is in progress then the copying gets stalled resulting in health check timeout in application in turn causing a crash suspecting deadlock.

Steps to Replicate: N/A

Platform/Feature: SBC

The SCP operation is completed in the background thread to ensure there is no timeout on the health check.
SBX-912242

The SBC is using the surrogate Registration hostPart as the target FQDN. 

Impact: N/A

Root Cause: surrogate hostPart is over-write egress IpPeer fqdn (target route)

Steps to Replicate:

1. configure surrogate registration with hostPart.
2. configure Egress route as fqdn (Egress IpPeer is fqdn).
3. enable surrogate registration.


Platform/Feature: SBC

The code is modified to not over-write egress IpPeer fqdn(target route) with the surrogate hostPart.
SBX-91322 / SBX-894913

Portfix SBX-89491: If a split-brain occurs prior to the standby being up and being fully synced, selecting the former standby as the leader when coming out of a split-brain will result in a complete outage. (Originated in 8.1.0).

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

 Platform/Feature: SBC

The enhanced GR-HA leadership algorithm is updated to take the standby's sync state into account when deciding if the former standby is to be the post split-brain leader.
SBX-908972

The template form on the Configuration Script and Template Import page is not getting displayed due to some failure. 

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to display the Configuration template form properly when a Configuration is chosen from the table. The Configurations list table is always displayed first when 'Create Configuration from Template' is clicked.
SBX-912262

Unable to upload configuration in the SBC in the Provision Management.

Impact: N/A

Root Cause: unable to create export directory to store configuration file.

Steps to Replicate:

  1. Logged in to ems gui as admin user
  2. Switch to Networks tab
  3. Go to provisioning
  4. Clicked on SBC Core under provisioning
  5. Clicked on upload configuration
  6. Provided the required configurations.
  7. Clicked on upload.
  8. Before fixing the issue --
  9. Configuration did not got uploaded.
  10. After fixing the issue ---
  11. Configuration uploaded successfully.

Platform/Feature: SBC

The code is modified to create export directory to store the configuration file.
SBX-911453

DSP card present status is not updated if the card is administratively disabled.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to monitor the DSP card presence status every 10 seconds, irrespective of the card being disabled or enabled.
SBX-905812

When using EMA and accessing the Call Trace/Logs/Monitors > Log Management > TShark, the screen does not list the files if there are more than 130 files in the directory.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to correctly cope when a large volumes of pcap files are present.
SBX-911312

Serialization errors are logged in the SYS log for type 137603, which points to CPC_OP_TYPE_AC_ZONE_INFO, that in-turn caused the coredump.

Impact: N/A

Root Cause: Serialization errors are because of CPC_OP_TYPE_AC_ZONE_INFO (137603) not getting registered and trying to send it to standby SBC.

Steps to Replicate: Execute LSWU from any version above 7.2.1 R1 to any other above versions.

Platform/Feature: SBC

The registration issue for CPC_OP_TYPE_AC_ZONE_INFO (137603) is fixed.
SBX-903882

The NRS task failed healthcheck when there was over 3000 status requests per minute.

Impact: N/A

Root Cause: NRS task was calling out to CONFD for each packet LIF status request.

Steps to Replicate: N/A

Platform/Feature: SBC: Application, confd

Updated the NRS packet LIF status request processing routine to retrieve address context ID from a local cache instead of calling out to the CONFD.
SBX-90837 / SBX-899572

Portfix SBX-89957: In TR87 service (CSTA) call flow, INVITE transaction in SIP stack on ingress is not killed, the timer G expires and continues re-sending 200 OK to ingress. (Originated in release 6.2.4)

Impact: N/A

Root Cause: SBC is not killing INVITE transaction in SIP stack on ingress once we receive ingress ACK (to complete INVITE-200).

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to terminate the INVITE transaction on the receiving end of ACK.
SBX-91048 / SBX-908463

Portfix SBX-90846: Memory leak due to the use of the delete operator. (Originated in release 8.1.0).

Impact: N/A

Root Cause: Memory leak due to use of delete operator

Steps to Replicate: N/A

Platform/Feature: SBC

Delete operator is used to deallocate the memory allocated via strdup() and is replaced by the delete operator with the free().
SBX-91779 / SBX-915942

Portfix SBX-91594: When SBC-7000 is under high call load with RTCP termination and unstable traffic (reaching 10Gb traffic instantaneously), the Network Processors cores stall. Media traffic stops and PRS coredump is generated. (Originated in release 6.2.4).

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC: Firmware

Configure the work scheduler module so that UPF, DPF, UPP, DPP cores are guaranteed to have work occupy the in-unit work entry.
SBX-908752

A bug in GW Signaling code can cause a core when the GW Signaling Links are bouncing.

Impact: N/A

Root Cause: A bug in GW Signaling code can cause a core when GW Signaling Links are bouncing.

Steps to Replicate: N/A

Platform/Feature: SBC

The GW Signaling code is modified to prevent a core .
SBX-909791

Apache server is not running.

Impact: N/A

Root Cause: Missing library.

Steps to Replicate: Start apache server.

Platform/Feature: SBC: Platform

Apache server app is rebuilt with the required library.
SBX-740333

When a logicalMgmtIpInterface is configured, and the useIpAddrAsSnmpSource is set to true. The source for snmp traps are the specified address in the logicalMgmtIpInterface ipAddress field. However, the source of the traps is not the correct address, and instead the address is of one of the management IP ports.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC: confd, Management, Platform

The flag snmpListenOnlyOnThisInterface is added to the logicalMgmtIpInterface configuration. The default value for this flag is set to false. When the flag is set to true, the confd daemon only listens on the address specified in the logicalMgmtIpInterface with useIpAddrAsSnmpSource set.
SBX-903661

AppContextId within NRMA_CALL_PTR is not being synced to standby after a switchover. As a result, Wile bridging calls NRMA identifies the Id as zero and crashes.

Impact: N/A

Root Cause: AppContextId within NRMA_CALL_PTR was not being synced to standby after switchover.

Steps to Replicate:

1) Make a call between A and B
2) Switchover
3) REFER C
4) Swithover
5) REFER to wrong IP

No crash should happen

Platform/Feature: SBC

The code is modified to syncing AppContextId to standby.
SBX-908762

Gencom client sends a 481 for call park retrieval INVITE. When an incorrect tag in Replaces header, it is sent through the SBC.

Impact: N/A

Root Cause: Also, When we do egress lookup when replaces call isn't connected yet, we are not finding CCB because of incorrect tag setting during lookup.

Steps to Replicate: Execute call park and retrieve case where parked call is not established yet.

Platform/Feature: SBC

The code is modified to merge an issue and egress lookup using the correct tags.
SBX-917383

If the LinkDetection interfaces are configured to use addresses specified in the systemMetaVariable dynamic table, those addresses are not properly read and LinkDetection is not activated.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to properly read the addresses from the metaVariableDynamic table.
SBX-874411

The Broadsoft AS returns the 403 for a REFER Request due to From and To tags are swapped.

Impact: N/A

Root Cause: "To tag" and "from Tag" were being swapped twice, resulting to their original respective values in outgoing REFER's Replaces header section.

Steps to Replicate: N/A

Platform/Feature: SBC

The SBC application code is modified to correctly populate the From tag and To tag values in outgoing REFER's replaces header section.
SBX-904422

ARM calculates the amount of memory that needs to be freed from the NP (Y has a multiple of certain number of fixed sized PNPS_ANN buffers) to fit in a new announcement the size of a WavFile_X. Due to design size, Y is not equal to size of WavFile_X.

Impact: N/A

Root Cause: Customer hit this issue because they touched the max amount of announcements cached in the system. Probably no other customer did that and that’s why it never came out.

Steps to Replicate: Run customer flow with customer's announcements all dumped into system.

Platform/Feature: SBC

The code is modified (Y is modified to Y') so that new announcements are added properly.
SBX-858581

The ACL rules in a non-default address context were not getting added back to the NP after a sbxrestart/reboot. Without this fix, the ACL rules configured in non-default address context do not work.

Impact: N/A

Root Cause: Root cause for this issue was iteration of rules list wasn't proper resulting in non-default address context rules not being added back after sbxrestart/reboot.

Steps to Replicate: This issue can be reproduced by adding some ACL rules in default address context and some in non-default address context, After a sbxrestart/reboot, only the rules in default address context work.

Platform/Feature: SBC

The code is modified to iterate the rules list in a correct fashion.

SBX-883381

The Policy Data is showing a sync in progress.

Impact: N/A

Root Cause: /home/oraadmin/SSDB/PolicyDBSyncStatus was being removed by logrotate. When the new file was created by write process, it did not have the correct privs to be read by status reporting session, so the status reporting process wrongly reported sync in progress.

Steps to Replicate: Modified logrotate script should not remove /home/oraadmin/SSDB/PolicyDBSyncStatus file.
Platform/Feature: SBC

Stop the logrotate to remove this file.

SBX-91054 / SBX-887661

Portfix SBX-88766: The improper value for RFactor was displayed under the CLI command: trunkGroupQoeStatus. (Originated in release 7.2.1)

Impact: N/A

Root Cause: This became broken as part of N:1 feature done in release 6.1

Steps to Replicate: N/A

Platform/Feature: SBC

The wrong context was fetched to calculate the RFactor value. The code is modified for the RFactor calculation.
SBX-911861

In the case of status commands executed from the CLI, a request is sent to both active and standby nodes. An LVM running on active and standby nodes compares the CE name configured in the LDG with a server name and returns stats only for LDGs that are configured on that CE. However, there is no similar check in the case of a PF stat. Without the check for a PF stat,the statistics displayed for LDGs configured on standby node was not correct.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to compare the CE name and return stats associated with the LDGs configured on the respective nodes.
SBX-914052

The cluster configuration for saveConfigStoreFile fails on the head end node due to a change of permission by keyKeeper.py. The sbcRegistration was not readable by the admin as a result of the configuration failure.

Impact: N/A

Root Cause: N/A 

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified and the admin is able to read the sbcRegistration.
SBX-911861

Failure stats are not being printed in the SBC stats file while it is showing in "show table addressContext default linkDetectionGroupStatistics". The LDGs are configured on both active and standby nodes. An LVM running on active and standby nodes compares the CE name configured in the LDG with server name, and returns stats only for the LDGs that are configured on that CE. However, there is not a similar check in case of PF stat. In response, the statistics displayed for the LDGs configured on standby node are not correct.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to compare the CE name and return stats associated with the LDGs configured on the respective nodes.

SBX-911141

The SRTP enables calls in the SWe SBC and causes the NP_Work_2 to sporadically crash and core.

Impact:

Root Cause: In SWe SBC, NP API updates are asynchronous w.r.t packet processing, If packet processing is accessing the API cleared pointer it result in crash.

Steps to Replicate: This is sporadic, running SRTP calls load can trigger this crash sometimes.

Platform/Feature: SBC

The SRTP SSRC update checks the in packet processing to verify whether the API updates cleared the reference to avoid null access.
SBX-905942

The SBC was not sending the ACK to the 200OK for an INVITE after the 4th switchover.

Impact: N/A

Root Cause: Syncing of transferred calls to standby was not proper

Steps to Replicate:

1) Make a call form A to B
2) Switcover
3) Transfer from B to C
4) Switchover
5) Refer from C to D
6) Switcover
7) Refer from D to E
8) Call should be connected between A and E

Platform/Feature: SBC

The syncing is done in all states for transferred calls to remove the issue.
SBX-89851 / SBX-870532

Portfix SBX-87053: The SBC fails to apply an ARS procedure on collecting a 503, with or without a Retry-After header when the FQDN is configured on the IP Peer. (Originated in release 8.0.0).

Impact: N/A

Root Cause: When FQDN configured on IP Peer, on getting 503 SBC should look for DNS resolved IP address, instead SBC looking at FQDN configured in IP peer and hence it fails to apply ARS.

Steps to Replicate:

1. Configure FQDN in IP peer
2. Enable uriPreference flag
3. Simulate UAS to reject INVITE with 503
4. SBC should apply ARS procedure on getting 503

Platform/Feature: SBC

The code is modified to have the DNS resolved IP address on collecting a 503 when the FQDN configured in the IP peer.
SBX-890392

The System Diagnostics throws an error in Custom-> View Custom Perspectives through the xpath, which is incorrect.

Impact: N/A

Root Cause: Xpath was old must have been changed. Old xpath was not part of model.

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to point to the correct xpath.
SBX-889944

The status of the Routing Label Route in a table shows as out of service, even if it is In service when created. The out of service status shows when the code picks the wrong data for validating the status.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to adjust the Routing Label Route Status, which was shown as Out of Service.
SBX-88860 / SBX-859022

Portfix SBX-85902: Whenever there is any SMM rule for a SDP body, the SMM will remove all linear white space before and after the “=” character from each SDP line.The removal of the white space before and after the "=" character results in a SIP parse error when valid lines "s= " or "l= ". (Originated in release 8.1.0).

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified not to remove any spaces for an S and I Line when using the SMM.
SBX-887163

Remove the plainText EMS Passwords from the userData/MetaData files in cloud. EMS plain text password cannot be present in the SBC, it must be replaced with hashes.

Impact: N/A

Root Cause: N/A

Steps to Replicate: N/A

Platform/Feature: SBC

The plain text password of EMS is replaced with encrypted passwords.
SBX-878832

A call is torn down if the SendOnlyPreferred enabled.

Impact: N/A

Root Cause: The receive and transmit payload type for ULAW and ALAW are not correctly set.

Steps to Replicate:

sipp -sf /sonus/support/SBX-87883/scenario_0x00408a30_UAC.xml -s 890 172.23.243.230 -m 1 -i 10.7.20.75
sipp -sf /sonus/support/SBX-87883/scenario_0x00408a30_UAS.xml -p 16284 -i 10.7.20.75

Enable SendOnlyPreferredCodec and HOP and HRP.

Platform/Feature: SBC

The code is modified to correctly set the receive and transmit payload type for the ULAW and ALAW. The ULAW and ALAW does not use an asymmetric payload type and is used for adding the logic.
SBX-88454 / SBX-872422

Portfix SBX-87242: When the DNS packets are received over a TCP, during the failure case (primarily when the length is less than 0 after a reading from the socket), there is no validation of the DNS TCB (Transaction Control Block) pointer while processing. (Originated in release 8.1.0).

Impact: N/A

Root Cause:

This issue was reported as part of ASAN testing in SBC lab.
When SBC is receiving packets/PDUs from DNS server via TCP, it does the following
1. Process the PDU (valid data received from TCP socket). Once the PDU is processed, the Transaction Control Block (TCB) maintained is freed.
2. For the same transaction, if some data is received with the length < 0, we check if the TCB exist to process the connection failure. Here we are not checking whether the TCB pointer is already freed (i.e. NULL) or not.

Steps to Replicate: N/A

Platform/Feature: SBC

A defensive check (to validate if the TCB pointer is NULL or not) is added before processing a connection failure.
SBX-757371

The Nessus scan found multiple vulnerabilities (1 critical, 3 high, 2 medium).

Impact: N/A

Root Cause: Many packages are out of date.

Steps to Replicate: Run Nessus scan.

Platform/Feature: SBC: Application

The code is modified to upgrade the vulnerable packages.
SBX-87367 / SBX-871822

Portfix SBX-87182: There is an error while importing a perspective having " - " in the perspective name. (Originated in release 6.2.4).

Impact: N/A

Root Cause: Missing Validation for checking unwanted and illegal characters in the file names.

Steps to Replicate: N/A

Platform/Feature: SBC

The code is modified to implement the logic to verify and ensure that only valid characters are present in the file names.
SBX-87171 / SBX-865933

Portfix SBX-86593: An EMA Template fails to import the Config when Special Characters are present. (Originated in release 6.2.4).

Impact: N/A

Root Cause: Logic to escape the HTML Characters was used while reading the request parameters . (Java Escape HTML Logic was in place).

Steps to Replicate: N/A

Platform/Feature: SBC

The logic to escape HTML Characters is removed in the TemplateConfigServlet.java file.

Known Issues

Known Issues in 07.02.05R000 to 07.02.05R009

There are no known issues in this release.

Known Issues in 07.02.04R000 

The following issue exists in this release:


Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
SBX-993102

Support of Identity headers with multiple values.

Platform/Feature: SBC

Impact: The SBC supports standalone multiple Identity headers but does not support single Identity headers with multiple values, each comma separated. 

Workaround: Use the SMM to separate out the comma separated list into individual standalone Identity headers.

SBX-94948

2

On attaching dnsGroup to zone, the SBC failed to link dnsGroup Id with all the TGs of the corresponding zone.

Platform/Feature: SBC

Impact: The SBC uses an incorrect DNS group to resolve the FQDN associated with diameter peer.

Workaround:

  1. After setting the dnsGroup configuration, perform a manual switchover (so during an application restart and all configuration restored properly).
  2. The dnsGroup has to be attached to zone before creating TGs under this zone. When a new TG is created under the zone, it will read as a configured dnsGroup id.

Known Issues in 07.02.02R000 and 07.02.03R000

There are no known issues in this release. 

Known Issues in 07.02.01R002 

The following issue exists in this release:


Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
SBX-877402

LI call not working when standby M-SBC is upgraded.

Platform/Feature: SBC

Impact: Interception of LI calls fail during upgrade (for instance, when the setup has S-SBC and the M-SBC running on different versions). The impact is only for in-service upgrade. No impact with respect to LI calls, when the VNF is brought down and re-created for upgrade..

Workaround: No workaround available.

Known Issues in 07.02.01F001 and 07.02.1F002 Releases

There are no known issues in these releases.

Known Issues in 07.02.01R001 Release 

The following issue exists in this release:


Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
SBX-880031

 If there are any PRACK drops and call fails, a memory leak occurs.

Platform/Feature: SBC

Impact: In the rare case where a PRACK for 18x is dropped and the call eventually fails, a small leak of SCM memory can occur.

Workaround: No workaround available.

Known Issues in 07.02.01R000 Release 

The following issues exist in this release:


Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
SBX-85825 2

When a headend cluster configuration is pushed, the Standby SBC reboots and hangs without getting the Configuration.

When a Standby SBC is rebooted, it transitions to registered online then later unregistered offline. This also happens in #1, Standby reboot after Configuration is pushed.

Platform/Feature: SBC Core: EMA

Impact: When a headend cluster configuration is pushed, Standby SBC fails to download the configuration and so fails to come up properly.

Workaround: To resolve the above issue, the fill rate and bucket size needs to be increased in lca.py script and the Standby SBC system needs to be rebooted so that it can download the configuration again.

SBX-863542

CallMedia and CallDetailstatus do not show in the EMA during the load run.

Platform/Feature: SBC Core: EMA

Impact: Call details Status and Call Media Status are intermittently not visible in the EMA.

Workaround: Call details status and Call Media status can be viewed from CLI.

SBX-852282

Observed M-SBC reboot and PrsProcess crash during 30000 NP based tones playing.

Platform/Feature: SBC Cloud

Impact: Under load with 30,000 simultaneous NP tones playing M-SBC switches over. M-SBC system confirmed to perform fine up to 28,000 simultaneous NP tones.

Workaround: No workaround available.

Known Issues in 07.02.00R002 Release 

The following issues exist in this release:


Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
SBX-850713

The SBC did not like the <4K size INVITE PDU since the maxPduSizeValue = 6K.

Platform/Feature: SBC

Impact: A PDU of a size less than 6K is rejected with 400 Bad Request, when maxPduSizeValue is set to 6K.

Workaround: Increase the maxPduSizeValue to 15k.

SBX-770542

An LSWU Upgrade from 7.0 to 7.1 failed.

Platform/Feature: SBC 5000/7000 Series: Application

Impact: While upgrading from pre-7.1 releases to 7.1 and 7.2 releases, if the SNMP trap targets are setup with <space> in the name field then the upgrade fails. This affects all the platforms (SBC 5xxx/7xxx/SWe).

Workaround: Prior to the upgrade, the user must check and delete/replace any trap targets that are setup with <space> in the name.

SBX-86003

1

While UPDATE is pending and a subsequent 18x is received on Egress, the SBC includes SDP in the subsequent 18x on Ingress.

Platform/Feature: SBC Core: SIP Application

Impact: The peer may reject the call.

Workaround: No workaround available.

SBX-860942

Call fail after onhold and offhold.

Platform/Feature: SBC Core: SIP Application


Impact: A call onhold/offhold before being connected by Update may fail.

Workaround: Enable E2E Update.


SBX-858592

A race condition occurs under a 3x load scenario where MRF is configured as FQDN and none of the MRF server responds.

Platform/Feature: SBC: D-SBC

Impact: The SCM process may core dump.

Workaround: No workaround available.



Known Issues in 07.02.00R001 Release 

The following issues exist in this release:


Known Issues

Issue IDSevProblem DescriptionImpact/Workaround
SBX-760662

The SBC is discarding media packets when the SBC is monitoring and media packets are received from IPV6 terminated peer.

Platform/Feature: SBC CE: Application

Impact:

The RTP monitoring feature will not work for IPv6 terminated peers, and therefore the following behavior will be observed.

  1. If The SBC is in tone playing state and expecting media cut through after successful monitoring, the SBC will continue the tone play even though the expected RTP packet count is received, which is discarded by the SBC because of this issue.
  2. If the SBC does not have conditions for delayed tone play, is not in tone playing state and is expecting media cut through after successful monitoring, the SBC will discard media packets because of this issue.
  3. If the SBC has conditions for delayed tone play, is not in tone playing state, and is expecting media cut through after successful monitoring, the SBC will discard media packets because of this issue and therefore the delayed tone play starts because of the monitoring failure.

Workaround: no workaround for IPv6, but the same feature works for IPv4.

SBX-850713

The SBC did not like the <4K size INVITE PDU since the maxPduSizeValue = 6K.

Platform/Feature: SBC

Impact: A PDU of a size less than 6K is rejected with 400 Bad Request, when maxPduSizeValue is set to 6K.

Workaround: Increase the maxPduSizeValue to 15k.

SBX-770542

An LSWU Upgrade from 7.0 to 7.1 failed.

Platform/Feature: SBC 5000/7000 Series: Application

Impact: While upgrading from pre-7.1 releases to 7.1 and 7.2 releases, if the SNMP trap targets are setup with <space> in the name field then the upgrade fails. This affects all the platforms (SBC 5xxx/7xxx/SWe).

Workaround: Prior to the upgrade, the user must check and delete/replace any trap targets that are setup with <space> in the name.


Known Issues in 07.02.00R000 Release

The following issues exist in this release:


Known Issues

Issue ID

Sev

Problem Description

Impact/Workaround

SBX-74179


1

Cannot ping the G/W from the V6 interface alternatively when Alt_IP's are configured in X710 NIC card server.

Platform/Feature: SBC CE: Application, Platform

Impact: IPv6 with X710 NIC cards in SRIOV mode will not work as multicast packets will be dropped by the PF.

Workaround:

Set the trust mode to "on" for all the VFs on the computes.

ip link set dev <PF name> VF <vf id> trust on

This needs to be done for all computes and all created VFs (this change is not persistent across reboots). This will allow Multicast promiscous mode to work.

Otherwise, add a static neighbor table entry on the remote servers connecting to the SBC using the following command:

ip -6 neigh add <IPv6 address> lladdr <link-layer address> dev <device>

SBX-73218


 1

The S-SBC is unable to register 1M endpoints with 1000 RPS and is having a 180 second refresh Register with RHEL 7.5, RHOSP 13 (Queens) setup.

Platform/Feature: SBC CE: Application

Impact: Virtual ports intermittently stop responding on compute node running on RHOSP 13 (Queens) under certain conditions. Specifically, at 1000 RPS with refresh registration interval at 180 seconds, virtual ports stop responding after reaching 500K registrations. This issue is not seen when the refresh registration interval is configured as 200 seconds and above

Workaround: Use SR-IOV ports only when using RHOSP 13 (Queens) release.

SBX-73943


2

The SBC does not add all codecs when Update is received with updated SDP from egress and sends 200 OK for Update with all supported codecs towards egress, the SBC is playing tone.

Platform/Feature: SBC Core: Application

Impact: The call signaling and media work properly, but media clipping can occur if the final cut-thru codec received from UAS is different from the codec that is being used for playing tone. 

Workaround: No workaround available.

SBX-74945

 4

Unable to commit pkt and sip-sig config with single commit command. An error message is thrown when the commit command is given.

Platform/Feature: SBC Core: CLI

Impact: Commit cannot be issued in for all set commands until the ipInterfacegroup is committed.

Workaround: Commit should be issued for ipInterfacegroup first and then commit for the remaining set commands can be executed.

SBX-73660


 2

Unable to view TRAPS under Fault Management in I-SBC Cloud (OpenStack Nova Platform) in EMS.

Platform/Feature: SBC CE: Application, EMA/EMS

Impact: EMS will not be able to identify the trap since the source IP address is packet interface.

Workaround: Add a static route to EMS from the SBC through management interface.

SBX-725132

Memory congestion was observed when executing around 64K calls in the 32GB SWe system.

Platform/Feature: SBC SWe: SIP-Peering

ImpactOn a SWe system with 32GB 32vCPU, the SBC is only able to scale up to 60K calls instead of 64K, due to per call memory increase.

Workaround: No workaround available.

SBX-713032

Observing 503 response for more time post port SWO in S-SBC.

Platform/Feature: SBC CE: Application

Impact: The load is 1000cps/120K calls. After doing port SWO on S-SBC, SBX rejects calls with a 503 response for 86 seconds. Later SBX again responds with 503 responses for approx 36 seconds. After that, it stabilizes.

Workaround: No workaround available.

SBX-727362

The SBC is not able to handle 150 Sa/Sec IPsec load on the Yellowfin Platform.

Platform/Feature: SBC 5000/7000 Series: SIP

Impact: If the rate for IPsec SA setup using IKE is increased beyond 60 SA/s, errors are seen.

Workaround: No workaround available.

SBX-72652


2

The SBC observing system is in continuous iRTT congestion during the overload test.

Platform/Feature: SBC CE: Application

Impact: IRTT congestion is observed continuously for the 15 mins duration of 3x overload. There is no congestion during normal 1x load. This is 1000cps/120K in D-SBC (SBC).

Workaround: No workaround available.

SBX-745462

The SBC failed to generate Enum lookup after updating the dynamic metaVariable.

Platform/Feature: SBC CE: Application

Impact: Enum lookup fails to generate if the meta variable related to sipSigPort (used for the Enum lookup) is dynamically updated.

Example:

Before updating sipSigPort with new dynamic metaVariable:

admin@vsbc1% show global servers lwresdProfile

lwresdProfile DEFAULT {

    description          DEFAULT;

    enumDomainNameLabel  DEFAULT_ZONE_LABEL;

    enableLwresdLog      disable;

    type                 signalingIp;

    addressContext       default;

    eDnsGlobalBufferSize 4096;

    eDnsMonitorInterval  120;

    zone                 ZONE_ING_V6;

    sipSigPort           3;

    ipInterfaceGroupName LIG_ING_V6;

}

admin@vsbc1% show addressContext default zone ZONE_ING_V6 sipSigPort

sipSigPort 3 {

    ipInterfaceGroupName      LIG_ING_V6;

    portNumber                5060;

    mode                      inService;

    state                     enabled;

    transportProtocolsAllowed sip-udp,sip-tcp;

    ipVarV6                   IF2.IPV6;

}

[root@VSBCSYSTEM-vsbc1 linuxadmin]# lsof -ni:5060

COMMAND     PID       USER   FD   TYPE  DEVICE SIZE/OFF NODE NAME

CE_2N_Com 32059 sonusadmin  110u  IPv6 3716854      0t0  UDP [fd00:10:6b50:5d20::c9]:sip

CE_2N_Com 32059 sonusadmin  111u  IPv6 3716855      0t0  TCP [fd00:10:6b50:5d20::c9]:sip (LISTEN)

CE_2N_Com 32059 sonusadmin  112u  IPv6 3716856      0t0  UDP [fd00:10:6b50:5d20::a9]:sip

CE_2N_Com 32059 sonusadmin  113u  IPv6 3716857      0t0  TCP [fd00:10:6b50:5d20::a9]:sip (LISTEN) 

ENUM query is successful from sipSigport (fd00:10:6b50:5d20::a9)

After updating sipSigport to new dynamic metaVariable:

admin@vsbc1> show table system metaVariableDynamic

CE NAME              NAME     VALUE                 

-----------------------------------------------------

vsbc1-10.34.195.109  lpl_egg  fd00:10:6b50:5d20::c9 

vsbc1-10.34.195.109  lpl_ing  fd00:10:6b50:5d20::c7 

admin@vsbc1% show addressContext default zone ZONE_ING_V6 sipSigPort

sipSigPort 3 {

    ipInterfaceGroupName      LIG_ING_V6;

    portNumber                5060;

    mode                      inService;

    state                     enabled;

    transportProtocolsAllowed sip-udp,sip-tcp;

    ipVarV6                   lpl_ing;

}

[root@VSBCSYSTEM-vsbc1 linuxadmin]# lsof -ni:5060

COMMAND     PID       USER   FD   TYPE  DEVICE SIZE/OFF NODE NAME

CE_2N_Com 32059 sonusadmin  110u  IPv6 3716854      0t0  UDP [fd00:10:6b50:5d20::c9]:sip

CE_2N_Com 32059 sonusadmin  111u  IPv6 3716855      0t0  TCP [fd00:10:6b50:5d20::c9]:sip (LISTEN)

CE_2N_Com 32059 sonusadmin  112u  IPv6 3716856      0t0  UDP [fd00:10:6b50:5d20::c7]:sip

CE_2N_Com 32059 sonusadmin  113u  IPv6 3716857      0t0  TCP [fd00:10:6b50:5d20::c7]:sip (LISTEN)

ENUM query is not picking new sipSigport (fd00:10:6b50:5d20::c7) updated with dynamic metaVariable


Workaround: Do not update the metavvariable associated with a sipSigPort if Enum is being used.

Example:

Don't update the sipSigport to new metaVariable

admin@vsbc1% show addressContext default zone ZONE_ING_V6 sipSigPort

sipsigPort 3 {

    ipInterfaceGroupName      LIG_ING_V6;

    portNumber                5060;

    mode                      inService;

    state                     enabled;

    transportProtocolsAllowed sip-udp,sip-tcp

    ipVarV6                   IF2.IPV6;

}

SBX-756092

The SBC VM is failing to join back the cluster post switchover after healing (Recreate_destroy) N:1 M-SBC VM.

Platform/Feature: SBC CE: Install/Upgrade(Platform)

 Impact: The Ribbon VNF Manager provides functionality to manually heal a VM within an  orchestrated VNF.  There are a number of options for healing provided, including a Recreate_destroy option.  There is an issue if the Recreate_destroy is executed on a VM that has DHCP enabled on its interfaces.  In this case, the VM is provided new IP addresses, causing that VM to be unable to re-join in the cluster.

Workaround: There is no workaround that is not service impacting.  Do not execute the Recreate_destroy option on a VM that has DHCP enabled.

SBX-742692

The IPv6/v4 Interface update with a new dynamic meta Variable is not deleting the old IP address.

Platform/Feature: SBC CE: Application

Impact: The old IP address is not getting deleted when the ipInterfaceGroup is updated with new dynamic meta variable.

Example:

Before updating ipInterfaceGroup with dynamic metaVariable:

admin@vsbc1> show table system metaVariable | match IF2.IPV6

vsbc1-10.34.195.109  IF2.IPV6      fd00:10:6b50:5d20::a9 

admin@vsbc1% show addressContext default ipInterfaceGroup LIG_ING_V6

ipInterface PKT_ING_V6 {

    ceName      SSBCACTIVE;

    portName    pkt0;

    mode        inService;

    state       enabled;

    ipVarV6     IF2.IPV6;

    prefixVarV6 IF2.PrefixV6;

    vlanTagVar  IF2.VlanId;

}

pkt0.609  Link encap:Ethernet  HWaddr fa:16:3e:ee:70:92 

          inet6 addr: fd00:10:6b50:5d20::a9/60 Scope:Global

          inet6 addr: fe80::f816:3eff:feee:7092/64 Scope:Link

          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1

          RX packets:8954 errors:0 dropped:0 overruns:0 frame:0

          TX packets:9060 errors:0 dropped:0 overruns:0 carrier:0

          collisions:0 txqueuelen:0

          RX bytes:780288 (762.0 KiB)  TX bytes:902476 (881.3 KiB)                                                          

Creating dynamic metaVariable:

admin@vsbc1> show table system metaVariableDynamic

CE NAME              NAME  VALUE                 

--------------------------------------------------

vsbc1-10.34.195.109  lpl   fd00:10:6b50:5d20::cf 

vsbc1-10.34.195.110  lpl   fd00:10:6b50:5d20::ff 

[ok][2018-11-13 07:11:41]

After updating ipInterfaceGroup with dynamic metaVariable (lpl) old IP (IF2.IPV6) is not deleted from interface

admin@vsbc1% show addressContext default ipInterfaceGroup LIG_ING_V6

ipInterface PKT_ING_V6 {

    ceName      SSBCACTIVE;

    portName    pkt0;

    mode        inService;

    state       enabled;

    ipVarV6     lpl;

    prefixVarV6 IF2.PrefixV6;

    vlanTagVar  IF2.VlanId;

}

pkt0.609  Link encap:Ethernet  HWaddr fa:16:3e:ee:70:92 

          inet6 addr: fd00:10:6b50:5d20::a9/60 Scope:Global

          inet6 addr: fe80::f816:3eff:feee:7092/64 Scope:Link

          inet6 addr: fd00:10:6b50:5d20::cf/128 Scope:Global

          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1

          RX packets:9093 errors:0 dropped:0 overruns:0 frame:0

          TX packets:9209 errors:0 dropped:0 overruns:0 carrier:0

          collisions:0 txqueuelen:0

          RX bytes:792396 (773.8 KiB)  TX bytes:917382 (895.8 KiB)


Workaround: To change an addressContext ipInterfaceGroup to use a different ipVarV6 you must delete the ipInterfaceGroup and recreate it.

Example:

Delete the interface group:

 delete addressContext default ipInterfaceGroup LIG_ING_V6

Create interface group with new dynamic metaVariable:

admin@vsbc1% show addressContext default ipInterfaceGroup LIG_ING_V6

ipInterface PKT_ING_V6 {

    ceName      SSBCACTIVE;

    portName    pkt0;

    mode        inService;

    state       enabled;

    ipVarV6     lpl;

    prefixVarV6 IF2.PrefixV6;

    vlanTagVar  IF2.VlanId;

}

pkt0.609  Link encap:Ethernet  HWaddr fa:16:3e:ee:70:92 

          inet6 addr: fd00:10:6b50:5d20::cf/60 Scope:Global

          inet6 addr: fe80::f816:3eff:feee:7092/64 Scope:Link

          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1

          RX packets:9093 errors:0 dropped:0 overruns:0 frame:0

          TX packets:9209 errors:0 dropped:0 overruns:0 carrier:0

          collisions:0 txqueuelen:0

          RX bytes:792396 (773.8 KiB)  TX bytes:917382 (895.8 KiB)

 Note: Similar procedure for IPV4.

SBX-758473

The RTCP port is not transparently passed in Direct Media.

Platform/Feature: SBC Core: Application

Impact: In case of a Direct Media call, the SBC will add an RTCP port in the outgoing INVITE SDP, when RTCP is enabled on Egress PSP and the RTCP port was not received in the incoming INVITE SDP.

Workaround: Disable RTCP flag on Egress PSP.

set profiles media packetServiceProfile PSP_DM_DTLS rtcpOptions rtcp disabled


Known Limitations

The following limitations exist in this release:

  1. Due to a known EMA GUI issue, it can take up to 10 minutes to process and commit an SMM profile. This may be seen when the profile contains the max of 256 rules within it and provisioning of the SMM profile is being done using the EMA GUI. This will be fixed in a future release.

  2. The Access Control List (ACL) is not installed to configure SNMP traps for accepting traffic. A dynamic ACL is added to configure SNMP traps. An ACL must be installed for SNMP traps for accepting traffic.
  3. The physical NIC connectivity must be in active state at the hypervisor level before starting the SWe instance on the SBC SWe platforms. In case of SWe instance with SR-IOV interfaces, manual restart of the SWe instance is required if physical NIC connectivity goes down while the instance is in progress.
  4. The Antitrombone feature is not supported on the D-SBC.
  5. EMS identifies the nodes based on the VNFC-ID. While instantiating SBC/PSX cloud nodes, ensure that you use a unique VNFC-ID only. If you reuse an existing VNFC-ID, EMS treats this as a re-registration request and overwrites the existing data on the cloud node.
  6. While configuring the SBC SWe Cloud instances, the CLIs commits successfully even if any metaVariable provided is incorrect. The SBC SWe Cloud instance cannot validate the CLIs, as the CDB configuration file is stored in the SBC Configurator and is shared among all the other SBC SWe Cloud instances in the cluster.
  7. Editing IP Interface is not reflected in the if configuration (ifConfig). This behavior is observed only on the S-SBC when action is set to "dryup" mode on the IP Interface. The IP address changes are not updated in the kernel and will not be displayed when ifconfig linux command is executed. In case of S-SBC, if the ipInterface configuration needs to be modified and if the action is set to "dryup" in ipInterface configuration, it must be set to "force" before disabling the ipInterface and making any changes.
  8. A LSWU on an SBC 7000 should only be performed when the total number of active calls on the system is below 18,000. If the criteria is not met, a double failure during the upgrade may occur thereby losing all active calls. If such a failure occurs, both active and standby SBC services will go down.  Contact Ribbon Support immediately.

The VLAN tagged SRIOV packet interfaces are unable to ping endpoint Gateway IPs in the VMware platform because of an issue with VMware.

Performing Heat Stack Update when userdata is Updated with SSH Keys

When upgrading SBC SWe cloud instances to release 7.2.x, you must update your Heat template userdata section to include mandatory SSH key information. An issue in OpenStack requires that you use the stack-update process rather than re-launch after updating the template, which leads to a new UUID for the instance. As a result, you must regenerate and apply new license bundles to the upgraded instances during the upgrade.

Refer to Upgrading M-SBCs in an N:1 Redundancy Group for the relevant procedure.