Commit graph

180930 commits

Author SHA1 Message Date
jnemeth
1fdc34555c Update to Asterisk 1.8.8.2. This fixes AST-2010-001:
Asterisk Project Security Advisory - AST-2012-001

   +------------------------------------------------------------------------+
   |       Product        | Asterisk                                        |
   |----------------------+-------------------------------------------------|
   |       Summary        | SRTP Video Remote Crash Vulnerability           |
   |----------------------+-------------------------------------------------|
   |  Nature of Advisory  | Denial of Service                               |
   |----------------------+-------------------------------------------------|
   |    Susceptibility    | Remote unauthenticated sessions                 |
   |----------------------+-------------------------------------------------|
   |       Severity       | Moderate                                        |
   |----------------------+-------------------------------------------------|
   |    Exploits Known    | No                                              |
   |----------------------+-------------------------------------------------|
   |     Reported On      | 2012-01-15                                      |
   |----------------------+-------------------------------------------------|
   |     Reported By      | Catalin Sanda                                   |
   |----------------------+-------------------------------------------------|
   |      Posted On       | 2012-01-19                                      |
   |----------------------+-------------------------------------------------|
   |   Last Updated On    | January 19, 2012                                |
   |----------------------+-------------------------------------------------|
   |   Advisory Contact   | Joshua Colp < jcolp AT digium DOT com >         |
   |----------------------+-------------------------------------------------|
   |       CVE Name       |                                                 |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Description | An attacker attempting to negotiate a secure video       |
   |             | stream can crash Asterisk if video support has not been  |
   |             | enabled and the res_srtp Asterisk module is loaded.      |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Resolution | Upgrade to one of the versions of Asterisk listed in the  |
   |            | "Corrected In" section, or apply a patch specified in the |
   |            | "Patches" section.                                        |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                           Affected Versions                            |
   |------------------------------------------------------------------------|
   |            Product            | Release Series |                       |
   |-------------------------------+----------------+-----------------------|
   |     Asterisk Open Source      |     1.8.x      | All versions          |
   |-------------------------------+----------------+-----------------------|
   |     Asterisk Open Source      |      10.x      | All versions          |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                              Corrected In                              |
   |------------------------------------------------------------------------|
   |                 Product                  |           Release           |
   |------------------------------------------+-----------------------------|
   |           Asterisk Open Source           |           1.8.8.2           |
   |------------------------------------------+-----------------------------|
   |           Asterisk Open Source           |           10.0.1            |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                                Patches                                 |
   |------------------------------------------------------------------------|
   |                             SVN URL                             |Branch|
   |-----------------------------------------------------------------+------|
   |http://downloads.asterisk.org/pub/security/AST-2012-001-1.8.diff |v1.8  |
   |-----------------------------------------------------------------+------|
   |http://downloads.asterisk.org/pub/security/AST-2012-001-10.diff  |v10   |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |   Links   | https://issues.asterisk.org/jira/browse/ASTERISK-19202     |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Asterisk Project Security Advisories are posted at                     |
   | http://www.asterisk.org/security                                       |
   |                                                                        |
   | This document may be superseded by later versions; if so, the latest   |
   | version will be posted at                                              |
   | http://downloads.digium.com/pub/security/AST-2012-001.pdf and          |
   | http://downloads.digium.com/pub/security/AST-2012-001.html             |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                            Revision History                            |
   |------------------------------------------------------------------------|
   |      Date       |       Editor       |         Revisions Made          |
   |-----------------+--------------------+---------------------------------|
   | 12-01-19        | Joshua Colp        | Initial release                 |
   +------------------------------------------------------------------------+

               Asterisk Project Security Advisory - AST-2012-001
              Copyright (c) 2012 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
2012-01-20 07:31:17 +00:00
jnemeth
76c813b9ae Updated comms/asterisk10 to 10.0.1 2012-01-20 07:29:20 +00:00
jnemeth
11bec36c12 Update to Asterisk 10.0.1. This fixes AST-2012-001:
Asterisk Project Security Advisory - AST-2012-001

   +------------------------------------------------------------------------+
   |       Product        | Asterisk                                        |
   |----------------------+-------------------------------------------------|
   |       Summary        | SRTP Video Remote Crash Vulnerability           |
   |----------------------+-------------------------------------------------|
   |  Nature of Advisory  | Denial of Service                               |
   |----------------------+-------------------------------------------------|
   |    Susceptibility    | Remote unauthenticated sessions                 |
   |----------------------+-------------------------------------------------|
   |       Severity       | Moderate                                        |
   |----------------------+-------------------------------------------------|
   |    Exploits Known    | No                                              |
   |----------------------+-------------------------------------------------|
   |     Reported On      | 2012-01-15                                      |
   |----------------------+-------------------------------------------------|
   |     Reported By      | Catalin Sanda                                   |
   |----------------------+-------------------------------------------------|
   |      Posted On       | 2012-01-19                                      |
   |----------------------+-------------------------------------------------|
   |   Last Updated On    | January 19, 2012                                |
   |----------------------+-------------------------------------------------|
   |   Advisory Contact   | Joshua Colp < jcolp AT digium DOT com >         |
   |----------------------+-------------------------------------------------|
   |       CVE Name       |                                                 |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Description | An attacker attempting to negotiate a secure video       |
   |             | stream can crash Asterisk if video support has not been  |
   |             | enabled and the res_srtp Asterisk module is loaded.      |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Resolution | Upgrade to one of the versions of Asterisk listed in the  |
   |            | "Corrected In" section, or apply a patch specified in the |
   |            | "Patches" section.                                        |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                           Affected Versions                            |
   |------------------------------------------------------------------------|
   |            Product            | Release Series |                       |
   |-------------------------------+----------------+-----------------------|
   |     Asterisk Open Source      |     1.8.x      | All versions          |
   |-------------------------------+----------------+-----------------------|
   |     Asterisk Open Source      |      10.x      | All versions          |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                              Corrected In                              |
   |------------------------------------------------------------------------|
   |                 Product                  |           Release           |
   |------------------------------------------+-----------------------------|
   |           Asterisk Open Source           |           1.8.8.2           |
   |------------------------------------------+-----------------------------|
   |           Asterisk Open Source           |           10.0.1            |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                                Patches                                 |
   |------------------------------------------------------------------------|
   |                             SVN URL                             |Branch|
   |-----------------------------------------------------------------+------|
   |http://downloads.asterisk.org/pub/security/AST-2012-001-1.8.diff |v1.8  |
   |-----------------------------------------------------------------+------|
   |http://downloads.asterisk.org/pub/security/AST-2012-001-10.diff  |v10   |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |   Links   | https://issues.asterisk.org/jira/browse/ASTERISK-19202     |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Asterisk Project Security Advisories are posted at                     |
   | http://www.asterisk.org/security                                       |
   |                                                                        |
   | This document may be superseded by later versions; if so, the latest   |
   | version will be posted at                                              |
   | http://downloads.digium.com/pub/security/AST-2012-001.pdf and          |
   | http://downloads.digium.com/pub/security/AST-2012-001.html             |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                            Revision History                            |
   |------------------------------------------------------------------------|
   |      Date       |       Editor       |         Revisions Made          |
   |-----------------+--------------------+---------------------------------|
   | 12-01-19        | Joshua Colp        | Initial release                 |
   +------------------------------------------------------------------------+

               Asterisk Project Security Advisory - AST-2012-001
              Copyright (c) 2012 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
2012-01-20 07:29:08 +00:00
taca
38d0c46102 Make sure to update distinfo. 2012-01-20 07:03:10 +00:00
obache
582ff12d65 + nagstamon-0.9.8 2012-01-20 04:46:30 +00:00
obache
eb415b33ad HOMEPAGE had been moved. 2012-01-20 04:44:49 +00:00
obache
f876f29923 PKGREVISION must not be in Makefile.common. 2012-01-20 04:20:43 +00:00
taca
606f7700fc Note PHP suhosin related updates:
lang/php53		5.3.9nb1
        security/php-suhosin	0.9.33
2012-01-20 03:24:48 +00:00
taca
c337d4d682 Update php-suhosin package to 0.9.33 to fix security problem.
SektionEins GmbH
                        www.sektioneins.de

                     -= Security  Advisory =-

     Advisory: Suhosin PHP Extension Transparent Cookie Encryption Stack
Buffer Overflow
 Release Date: 2012/01/19
Last Modified: 2012/01/19
       Author: Stefan Esser [stefan.esser[at]sektioneins.de]

  Application: Suhosin Extension <= 0.9.32.1
     Severity: A possible stack buffer overflow in Suhosin extension's
               transparent cookie encryption that can only be triggered
               in an uncommon and weakened Suhosin configuration can lead
               to arbitrary remote code execution, if the FORTIFY_SOURCE
               compile option was not used when Suhosin was compiled.
         Risk: Medium
Vendor Status: Suhosin Extension 0.9.33 was released which fixes this
vulnerability
    Reference: http://www.suhosin.org/
               https://github.com/stefanesser/suhosin
2012-01-20 03:23:34 +00:00
taca
f36adb398d Use official suhosin-patch for PHP 5.3.9 instead of local one based on
for PHP5.3.7.

Bump PKGREVISION.
2012-01-20 03:22:08 +00:00
tez
39992dba2b CVE-2012-0035 fix for emacs & emacs-nox11 2012-01-19 20:52:16 +00:00
tez
aadc6af9b3 Add fix for CVE-2012-0035, bump PKGREVISION in Makefile.common since this
affects editors/emacs-nox11 also
2012-01-19 20:50:00 +00:00
gdt
cb901eb743 Updated devel/scmgit to 1.7.7.6 2012-01-19 20:41:09 +00:00
gdt
b513320f12 Update to 1.7.7.6 from 1.7.7.2.
Fixes since v1.7.7.2
--------------------

 * Adjust the "quick-install-doc" procedures as preformatted
   html/manpage are no longer in the source repository.

 * The logic to optimize the locality of the data in a pack introduced in
   1.7.7 was grossly inefficient.

 * The logic to filter out forked projects in the project list in
   "gitweb" was broken for some time.

 * "git branch -m/-M" advertised to update RENAME_REF ref in the
   commit log message that introduced the feature but not anywhere in
   the documentation, and never did update such a ref anyway. This
   undocumented misfeature that did not exist has been excised.

Fixes since v1.7.7.3
--------------------

 * A few header dependencies were missing from the Makefile.

 * Some newer parts of the code used C99 __VA_ARGS__ while we still
   try to cater to older compilers.

 * "git name-rev --all" tried to name all _objects_, naturally failing to
   describe many blobs and trees, instead of showing only commits as
   advertised in its documentation.

Fixes since v1.7.7.4
--------------------

 * After fetching from a remote that has very long refname, the reporting
   output could have corrupted by overrunning a static buffer.

 * "git checkout" and "git merge" treated in-tree .gitignore and exclude
   file in $GIT_DIR/info/ directory inconsistently when deciding which
   untracked files are ignored and expendable.

Fixes since v1.7.7.5
--------------------

 * The code to look up attributes for paths reused entries from a wrong
   directory when two paths in question are in adjacent directories and
   the name of the one directory is a prefix of the other.

 * A wildcard that matches deeper hierarchy given to the "diff-index" command,
   e.g. "git diff-index HEAD -- '*.txt'", incorrectly reported additions of
   matching files even when there is no change.

 * When producing a "thin pack" (primarily used in bundles and smart
   HTTP transfers) out of a fully packed repository, we unnecessarily
   avoided sending recent objects as a delta against objects we know
   the other side has.
2012-01-19 20:34:01 +00:00
is
b439f3caba Fix build problem on IRIX (missing strdup prototype). Reported in
PR 45766, patch from there.
2012-01-19 20:17:47 +00:00
drochner
9f54992fb5 update to 2.28.4
changes:
-Fix numerous bugs in the FreeBSD backend
-Split off OpenBSD code in its own backend, and fixes
-Updated translations
2012-01-19 19:43:56 +00:00
drochner
f159773170 reset PKGREV for base pkg update 2012-01-19 19:35:11 +00:00
drochner
1d22f467f5 update to 2.32.4
changes:
-minor fixes
-translation updates
2012-01-19 19:34:46 +00:00
drochner
439ca2ec3b update to 1.5.1
changes:
-bugfixes
-minor feature additions
2012-01-19 19:22:35 +00:00
drochner
c712c6113b update to 1.1.6
changes:
-handle more attributes
-added support of clipPath element
-added support of visibility style property
-fixed handling of aspect ratio of video
2012-01-19 19:19:21 +00:00
drochner
70922670cb update to 0.15.0
changes: many fixes and feature improvements
2012-01-19 19:15:18 +00:00
drochner
d6b9cae45a update to 3.6.7
changes: minor bugfixes
2012-01-19 19:10:40 +00:00
joerg
3fc8d211eb Shut up cast warning. 2012-01-19 18:53:32 +00:00
chs
85e7dedeb5 Updated emulators/suse113_openssl to 11.3nb6 2012-01-19 15:55:10 +00:00
chs
bdb868068e update to libopenssl1_0_0-1.0.0-6.13.1.
fixes CVE-2011-4108 CVE-2011-4576 CVE-2011-4577 CVE-2011-4619 CVE-2012-0027.
2012-01-19 15:54:55 +00:00
reed
f3be5f68a4 Bump API dependency due to eggdbus dependency removed. 2012-01-19 15:26:59 +00:00
reed
1e7109d63f need newer libXi dependency due to:
gdkinputprivate.h:38:35: error: X11/extensions/XInput.h: No such file or directory

(header got switched to different package)
2012-01-19 15:17:42 +00:00
reed
47fb160414 set API depends for newer gst-plugins0.10-base.
configure error was:

Requested 'gstreamer-plugins-base-0.10 >= 0.10.30' but version of
GStreamer Base Plugins Libraries is 0.10.26
2012-01-19 15:00:35 +00:00
ryoon
50d297f3eb Updated devel/jenkins to 1.424.2 2012-01-19 14:40:50 +00:00
ryoon
7724280d6c Update to 1.424.2
* This release contains security fix.
  See http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-01-10.cb

Changelog:
* Viewing large console logs with timestamper plugin cause Jenkins
  to crash (issue 9349)
* Maven3 parallel build fails with java.util.ConcurrentModificationException
  in Jenkins (issue 11256)
* Jenkins PID changes after restart (issue 11742)
* Running Jenkins with the bundeled Winstone is succeptible to the hash table
  attack http://www.ocert.org/advisories/ocert-2011-003.html (SECURITY-22)
2012-01-19 14:39:21 +00:00
tsutsui
e729f3aa6f Updated devel/bison to 2.5nb3 2012-01-19 13:34:10 +00:00
tsutsui
0d68480154 Add workaround optimization hacks for bison that dumps core in net/libIDL
on NetBSD/arm -current with gcc-4.5.3. PR pkg/45834

Bump PKGREVISION.
2012-01-19 13:32:05 +00:00
adam
7e05b7c25e Updated net/openvpn to 2.2.2 2012-01-19 13:27:56 +00:00
adam
25c99e5b54 Changes 2.2.2:
* Only warn about non-tackled IPv6 packets once
* add missing break between "case IPv4" and "case IPv6"
* bump tap driver version from 9.8 to 9.9
* log error message and exit for "win32, tun mode, tap driver version 9.8"
* Backported pkcs11-related parts of 7a8d707237bb18 to 2.2 branch
2012-01-19 13:26:55 +00:00
obache
53b0cfe395 OpenBSD-2.9 and later support kqueue(2). 2012-01-19 10:53:56 +00:00
hiramatsu
be7fbb2a8d Updated net/p5-Net-Twitter to 3.18001nb1. 2012-01-19 10:43:46 +00:00
fhajny
d2bd6601d4 Update erlang to R14B04
This release is mainly a stabilization of the R14B03 release (but as
usual there are some new functionality as well).

One pkgsrc change: add flex to USE_TOOLS, so that megaco_flex_scanner_drv
gets built on all SunOS flavors.

Read full announcement at
http://www.erlang.org/download/otp_src_R14B04.readme
2012-01-19 10:17:56 +00:00
hiramatsu
9c3b047d01 Updated DEPENDS to match with the "requires" section of META.yml.
Problem and fixes are reported in PR pkg/45821.
2012-01-19 09:28:40 +00:00
taca
d8be55d86e Note update of security/openssl package to 0.9.8t. 2012-01-19 00:52:14 +00:00
taca
306d66e6f5 Update security/openssl package to 0.9.8t.
OpenSSL CHANGES
 _______________

 Changes between 0.9.8s and 0.9.8t [18 Jan 2012]

  *) Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.
     Thanks to Antonio Martin, Enterprise Secure Access Research and
     Development, Cisco Systems, Inc. for discovering this bug and
     preparing a fix. (CVE-2012-0050)
     [Antonio Martin]
2012-01-19 00:51:23 +00:00
pettai
697116ed70 Updated net/ldns to 1.6.12 2012-01-18 22:32:05 +00:00
pettai
1782f048f7 1.6.12
* bugfix #413: Fix manpage source for srcdir != builddir
        * Canonicalize the signers name rdata field in RRSIGs when signing
        * Ignore minor version of Private-key-format (so v1.3 may be used)
        * Allow a check_time to be given in stead of always checking against
          the current time. With ldns-verify-zone the check_time can be set
          with the -t option.
        * Added functions for updating and manipulating SOA serial numbers.
          ldns-read-zone has an option -S for updating and manipulating the
          serial numbers.
        * The library Makefile is now GNU and BSD make compatible.
        * bugfix #419: NSEC3 validation of a name covered by a wildcard with
          no data.
        * Two new options (--with-drill and --with-examples) to the main
          configure script (in the root of the source tree) to build drill
          and examples too.
        * Fix days_since_epoch to year_yday calculation on 32bits systems.
2012-01-18 22:31:26 +00:00
abs
73c57ca979 Pull across (modified) patch for qt-4.8 from wip/kdelibs4. PKGREVISION++ 2012-01-18 22:03:23 +00:00
wiz
90e9a5b9bf + abcm2ps-6.6.3, byacc-20120115, dillo-3.0.2 [pkg/45852], gedit-3.2.6,
gtkwave-3.3.30, imp-5.0.18, kronolith-3.0.14, libreoffice3-3.4.5,
  p0f-3.00b, puzzles-9377, py-bsddb3-5.3.0, rudiments-0.35,
  squidclamav-6.5, taskjuggler-3.1.0, tellico-2.3.5, turba-3.0.11.
2012-01-18 21:10:45 +00:00
drochner
00482f219a remove gtkmozembed support -- it is not used by any gnome app in pkgsrc,
and it depends on xulrunner192
bump PKGREV
2012-01-18 19:34:19 +00:00
drochner
3eee908d22 reset PKGREV for base pkg update 2012-01-18 18:37:16 +00:00
drochner
78a629db9b update to 0.97.2
changes:
-bugfixes
-translation updates
-more colors for SADT
2012-01-18 18:36:51 +00:00
drochner
a926dcb913 disable gnome desktop integration features which depend on libgsf-gnome,
the latter is discontinued upstream
bump PKGREV
2012-01-18 18:31:10 +00:00
chs
4379dcddec Updated print/acroread9 to 9.4.7 2012-01-18 15:35:43 +00:00
chs
28e4e868a0 update to acroread 9.4.7. fixes CVE-2011-2462. 2012-01-18 15:34:46 +00:00