Commit graph

1754 commits

Author SHA1 Message Date
jnemeth
6ae49e7a32 Update to Asterisk 10.4.0: this is a bug fix release.
The Asterisk Development Team has announced the release of Asterisk 10.4.0.

The release of Asterisk 10.4.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are the issues resolved in this release:

* --- Prevent chanspy from binding to zombie channels

* --- Fix Dial m and r options and forked calls generating warnings
      for voice frames.

* --- Remove ISDN hold restriction for non-bridged calls.

* --- Fix copying of CDR(accountcode) to local channels.

* --- Ensure Asterisk acknowledges ACKs to 4xx on Replaces errors

* --- Eliminate double close of file descriptor in manager.c

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.4.0

Thank you for your continued support of Asterisk!
2012-05-03 06:23:37 +00:00
jnemeth
be535d88a2 Update to Asterisk 1.6.2.24. This fixes AST-2012-004 and AST-2012-005.
The 1.6.2 series went End of Life on April 21st 2012, so this was
the last update.  This package will be deleted in the not too
distnat future.

The Asterisk Development Team has announced security releases for
Asterisk 1.6.2 , 1.8, and 10. The available security releases are
released as versions 1.6.2.24, 1.8.11.1, and 10.3.1.

The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the
following two issues:

 * A permission escalation vulnerability in Asterisk Manager
   Interface.  This would potentially allow remote authenticated
   users the ability to execute commands on the system shell with
   the privileges of the user running the Asterisk application.

 * A heap overflow vulnerability in the Skinny Channel driver.
   The keypad button message event failed to check the length of
   a fixed length buffer before appending a received digit to the
   end of that buffer.  A remote authenticated user could send
   sufficient keypad button message events that th e buffer would
   be overrun.

These issues and their resolution are described in the security
advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2012-004, AST-2012-005, and
AST-2012-006, which were released at the same time as this
announcement.

For a full list of changes in the current releases, please see the
ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.24

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf

Thank you for your continued support of Asterisk!
2012-04-30 03:19:40 +00:00
jnemeth
77aac310b2 Update to Asterisk 10.3.1. This Fixes AST-2012-004, AST-2012-005,
and AST-2012-006.

The Asterisk Development Team has announced security releases for
Asterisk 1.6.2 , 1.8, and 10. The available security releases are
released as versions 1.6.2.24, 1.8.11.1, and 10.3.1.

The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the
following two issues:

 * A permission escalation vulnerability in Asterisk Manager
   Interface.  This would potentially allow remote authenticated
   users the ability to execute commands on the system shell with
   the privileges of the user running the Asterisk application.

 * A heap overflow vulnerability in the Skinny Channel driver.
   The keypad button message event failed to check the length of
   a fixed length buffer before appending a received digit to the
   end of that buffer.  A remote authenticated user could send
   sufficient keypad button message events that th e buffer would
   be overrun.

In addition, the release of Asterisk 1.8.11.1 and 10.3.1 resolve
the following issue:

 * A remote crash vulnerability in the SIP channel driver when
   processing UPDATE requests.  If a SIP UPDATE request was received
   indicating a connected line update after a channel was terminated
   but before the final destruction of the associated SIP dialog,
   Asterisk would attempt a connected line update on a non-existing
   channel, causing a crash.

These issues and their resolution are described in the security
advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2012-004, AST-2012-005, and
AST-2012-006, which were released at the same time as this
announcement.

For a full list of changes in the current releases, please see the
ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.3.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-006.pdf

Thank you for your continued support of Asterisk!
2012-04-30 02:53:25 +00:00
jnemeth
7fdb7497f0 Update to Asterisk 1.8.11.1. This fixes AST-2012-004, AST-2012-005,
and AST-2012-006.

The Asterisk Development Team has announced security releases for
Asterisk 1.6.2 , 1.8, and 10. The available security releases are
released as versions 1.6.2.24, 1.8.11.1, and 10.3.1.

The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the
following two issues:

 * A permission escalation vulnerability in Asterisk Manager
   Interface.  This would potentially allow remote authenticated
   users the ability to execute commands on the system shell with
   the privileges of the user running the Asterisk application.

 * A heap overflow vulnerability in the Skinny Channel driver.
   The keypad button message event failed to check the length of
   a fixed length buffer before appending a received digit to the
   end of that buffer.  A remote authenticated user could send
   sufficient keypad button message events that th e buffer would
   be overrun.

In addition, the release of Asterisk 1.8.11.1 and 10.3.1 resolve
the following issue:

 * A remote crash vulnerability in the SIP channel driver when
   processing UPDATE requests.  If a SIP UPDATE request was received
   indicating a connected line update after a channel was terminated
   but before the final destruction of the associated SIP dialog,
   Asterisk would attempt a connected line update on a non-existing
   channel, causing a crash.

These issues and their resolution are described in the security
advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2012-004, AST-2012-005, and
AST-2012-006, which were released at the same time as this
announcement.

For a full list of changes in the current releases, please see the
ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.24
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.11.1
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.3.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-006.pdf

Thank you for your continued support of Asterisk!
2012-04-30 02:33:21 +00:00
obache
99dc9c311a Recursive bump from icu shlib major bumped to 49. 2012-04-27 12:31:32 +00:00
manu
16dc293b63 Fix patch checksum 2012-04-18 02:53:34 +00:00
manu
94b2d36683 Link chan_oss.so with libossaudio to avoid startup load failure because
Undefined PLT symbol "_oss_ioctl" (symnum = 64)
2012-04-18 01:33:24 +00:00
wiz
3249e0a82f Reset maintainer, developer has left the building 2012-04-15 22:00:58 +00:00
wiz
4773e0d7e2 All supported python versions in pkgsrc support eggs, so remove
${PLIST.eggfile} from PLISTs and support code from lang/python.
2012-04-08 20:21:41 +00:00
dholland
a73577548f Hack this to build against libtiff 4.x. With luck, it'll still work.
Because it depends on changes to the API in libtiff 4.x, set the minimum
BUILDLINK_API_DEPENDS accordingly. And, even though it wasn't building,
bump PKGREVISION to 7; the new package depending on tiff>=4.0 needs to
be distinguishable from the old package depending on tiff<4.0.

XXX: This package desperately needs to be updated. It is years out of
XXX: date with respect to upstream.
2012-04-08 03:25:03 +00:00
dholland
914fa0d73c Use SPECIAL_PERMS and switch to user-destdir mode. While this is intended
to produce the same binary package, if something went wrong it might not,
so bump PKGREVISION (to 2) as a precaution.
2012-04-08 01:28:35 +00:00
dholland
f3907f56ec Rework config patches somewhat so they might work on non-NetBSD.
Attempt to honor VARBASE instead of blithely dropping stuff into /var;
may be incomplete. Doing this right may require sorting out multiple
/var trees as it shouldn't, at least by default, be working dialer
locks in the pkgsrc VARBASE; however, it's not clear that those will
always necessarily be in /var either. For now the package assumes
they will be though.

*** If I have broken this for you, please let me know ASAP.
2012-04-08 00:47:26 +00:00
dholland
443a770aed Don't warn in ~every file that DEVICE_GROUP is being defined on the
command line. Eliminates a lot of build noise.
2012-04-08 00:04:12 +00:00
dholland
e673e159a5 Explicitly pass LIBS to the package's makefile. Fixes build on netbsd-6
and -current.
2012-04-07 23:51:00 +00:00
jnemeth
ff5a71f75d Update to Asterisk 1.8.11.0:
pkgsrc change: eliminate ilbc option now that the iLBC codec is always built

The Asterisk Development Team has announced the release of Asterisk 1.8.11.0.

The release of Asterisk 1.8.11.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are the issues resolved in this release:

* --- Fix potential buffer overrun and memory leak when executing "sip
      show peers"

* --- Fix ACK routing for non-2xx responses.

* --- Remove possible segfaults from res_odbc by adding locks around
      usage of odbc handle

* --- Fix blind transfer parking issues if the dialed extension is not
      recognized as a parking extension.

* --- Copy CDR variables when set during a bridge

* --- push 'outgoing' flag from sig_XXX up to chan_dahdi

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.11.0

Thank you for your continued support of Asterisk!
2012-04-07 20:10:45 +00:00
jnemeth
e0b9f9a631 Update to Asterisk 10.3.0:
pkgsrc change: eliminate ilbc option now that iLBC codec is always built

The Asterisk Development Team has announced the release of Asterisk 10.3.0.

The release of Asterisk 10.3.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are the issues resolved in this release:

* --- Fix potential buffer overrun and memory leak when executing "sip
      show peers"

* --- Fix ACK routing for non-2xx responses.

* --- Remove possible segfaults from res_odbc by adding locks around
      usage of odbc handle

* --- Fix blind transfer parking issues if the dialed extension is not
      recognized as a parking extension.

* --- Copy CDR variables when set during a bridge

* --- push 'outgoing' flag from sig_XXX up to chan_dahdi

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.3.0

Thank you for your continued support of Asterisk!
2012-04-07 20:05:57 +00:00
rhaen
78ea77d815 Updated to 1.06
Changes:

1.06 Wed 9 Nov 2011
	- No functional changes
	- Moved to production version
	- Updating to Module::Install::DSL 1.04
	- New Perl back-compatibility target of 5.6
	- Made the Perl back-compat target explicit
	- Bumping a variety of dependencies to pick up bug fixes
	- Don't import from Params::Util
	- Various whitespace/tabbing fixes
	- Removed the use of base.pm
	- Updated bundled author tests and moved to xt
2012-04-01 19:04:34 +00:00
rhaen
81e1eee3fb Updated to 1.56
Changes:
1.56  Thu Sep 29 13:43:31 CEST 2011
    - [RT#71330] Unbroken the MANIFEST file. 1.55 was non functional.
      Thanks to Vita Cizek for reporting.

1.55  [BROKEN RELEASE. AVOID] Fri Sep 23 22:01:31 CEST 2011
    - Performance improvements by Ed Wildgoose, long time user. Thanks Ed!
      Windows users, please test this release!
2012-04-01 19:00:49 +00:00
rhaen
b9478ac52c Updated to 1.60
Changes:
1.60  Fri Mar 16 12:14:07 CET 2012
    - Removed the syslog test. Was artificial and pointless,
      and it failed on Windows and Solaris. Thanks to CPAN testers reports.

1.59  Thu Mar  8 10:13:30 CET 2012
    - Fixed RT #75619, POD fixes to make the POD clean for Debian packaging.
    - Applied .perltidyrc to all source files. Watch out if you had patches :)
2012-04-01 18:56:54 +00:00
rhaen
b3a017c6a2 Updated to 1.03
Changes:
1.03	Fix AGI.pm from printing warnings on some optional
        variables (http://bugs.debian.org/525025)

1.02	Fix POD for AGI.pm thanks to Lawrence Gilbert
	Fix Manager.pm parsing values that were 0
	Fix verbose example in AGI.pm
	Fix return in _readparse in AGI.pm
	Fix quoting on a few AGI.pm commands
2012-04-01 18:49:01 +00:00
jnemeth
a7cf22f030 Update to 1.6.2.23:
This is a security fix update.  It fixes AST-2012-002.

NOTE NOTE NOTE

This is likely to be the last update to this package.  This version
of Asterisk will be EOLed on April 21st, 2012.  It will probably
be removed from pkgsrc not long after that.  If you are still using
this package, you should consider switching to comms/asterisk18,
the Long Term Support version, or comms/asterisk10 in the near
future.

NOTE NOTE NOTE

The Asterisk Development Team has announced security releases for
Asterisk 1.4, 1.6.2, 1.8, and 10. The available security releases
are released as versions 1.4.44, 1.6.2.23, 1.8.10.1, and 10.2.1.

The release of Asterisk 1.4.44 and 1.6.2.23 resolve an issue wherein
app_milliwatt can potentially overrun a buffer on the stack, causing
Asterisk to crash.  This does not have the potential for remote
code execution.

These issues and their resolution are described in the security
advisory.

For more information about the details of these vulnerabilities,
please read the security advisories AST-2012-002 and AST-2012-003,
which were released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.23

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-002.pdf

Thank you for your continued support of Asterisk!
2012-03-25 02:59:53 +00:00
jnemeth
57f06faf74 Update to 10.2.1:
This is a security fix release.  It fixes AST-2012-002 and AST-2012-003.

pkgsrc changes:

- adapt to having iLBC source code included
- fix building on Solaris
- adapt to new sound tarball

----- 10.2.0 -----

The Asterisk Development Team has announced the release of Asterisk 10.2.0.

The release of Asterisk 10.2.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Prevent outbound SIP NOTIFY packets from displaying a port of 0 ---

* --- Include iLBC source code for distribution with Asterisk ---

* --- Fix callerid of originated calls ---

* --- Fix outbound DTMF for inband mode of chan_ooh323 ---

* --- Create and initialize udptl only when dialog requests image media ---

* --- Don't prematurely stop SIP session timer ---

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.2.0

Thank you for your continued support of Asterisk!

----- 10.2.1 -----

The Asterisk Development Team has announced security releases for
Asterisk 1.4, 1.6.2, 1.8, and 10. The available security releases
are released as versions 1.4.44, 1.6.2.23, 1.8.10.1, and 10.2.1.

The release of Asterisk 1.8.10.1 and 10.2.1 resolve two issues.
First, they resolve the issue in app_milliwatt, wherein a buffer
can potentially be overrun on the stack, but no remote code execution
is possible.  Second, they resolve an issue in HTTP AMI where digest
authentication information can be used to overrun a buffer on the
stack, allowing for code injection and execution.

These issues and their resolution are described in the security
advisory.

For more information about the details of these vulnerabilities,
please read the security advisories AST-2012-002 and AST-2012-003,
which were released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.2.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-002.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-003.pdf

Thank you for your continued support of Asterisk!
2012-03-25 02:17:47 +00:00
jnemeth
ca5359ecde Update to 1.8.10.1: this fixes AST-2012-002 and AST-2012-003.
pkgsrc changes: adapt to having iLBC coded included in the asterisk
tarball and newer version of sounds tarball.

----- 1.8.10.0 -----

The Asterisk Development Team has announced the release of Asterisk 1.8.10.0.

The release of Asterisk 1.8.10.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Prevent outbound SIP NOTIFY packets from displaying a port of 0 ---

* --- Include iLBC source code for distribution with Asterisk ---

* --- Fix callerid of originated calls ---

* --- Fix outbound DTMF for inband mode of chan_ooh323 ---

* --- Create and initialize udptl only when dialog requests image media ---

* --- Don't prematurely stop SIP session timer ---

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.10.0

Thank you for your continued support of Asterisk!

----- 1.8.10.1 -----

The Asterisk Development Team has announced security releases for
Asterisk 1.4, 1.6.2, 1.8, and 10. The available security releases
are released as versions 1.4.44, 1.6.2.23, 1.8.10.1, and 10.2.1.

The release of Asterisk 1.8.10.1 and 10.2.1 resolve two issues.
First, they resolve the issue in app_milliwatt, wherein a buffer
can potentially be overrun on the stack, but no remote code execution
is possible.  Second, they resolve an issue in HTTP AMI where digest
authentication information can be used to overrun a buffer on the
stack, allowing for code injection and execution.

These issues and their resolution are described in the security
advisory.

For more information about the details of these vulnerabilities,
please read the security advisories AST-2012-002 and AST-2012-003,
which were released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.10.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-002.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-003.pdf

Thank you for your continued support of Asterisk!
2012-03-22 03:43:42 +00:00
obache
34a560cbb0 Bump PKGREVISION from default python to 2.7. 2012-03-15 11:53:20 +00:00
ryoon
9c53210756 Recursive PKGREVISION bump for xulrunner, nss, and nspr. 2012-03-06 17:38:53 +00:00
wiz
b630ed46ca More pcre PKGREVISION bumps. 2012-03-03 12:54:15 +00:00
wiz
e64308b04b Recursive bump for pcre-8.30* (shlib major change) 2012-03-03 00:11:51 +00:00
hans
623c84891f Set perl path from TOOLS_PATH.perl instead of assuming it is in PREFIX. 2012-02-28 11:21:50 +00:00
jnemeth
de5c5fc0e2 Upgrade to 10.1.3:
The Asterisk Development Team has announced the release of Asterisk 10.1.3.

The release of Asterisk 10.1.3 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are the issues resolved in this release:

* --- Fix ACK routing for non-2xx responses.
  (Closes issue ASTERISK-19389. Reported by: Karsten Wemheuer)

* --- Fix regressions with regards to route-set creation on early dialogs ---
  (Closes issue ASTERISK-19358. Reported-by: Karsten Wemheuer)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.1.3

Thank you for your continued support of Asterisk!
2012-02-27 00:18:09 +00:00
jnemeth
3b9d7aed4f Update to 1.8.9.3:
pkgsrc changes:

- maintain patch naming convention
- detect kqueue properly

The Asterisk Development Team has announced the release of Asterisk 1.8.9.3.

The release of Asterisk 1.8.9.3 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are the issues resolved in this release:

* --- Fix ACK routing for non-2xx responses.
  (Closes issue ASTERISK-19389. Reported by: Karsten Wemheuer)

* --- Fix regressions with regards to route-set creation on early dialogs ---
  (Closes issue ASTERISK-19358. Reported-by: Karsten Wemheuer)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.9.3

Thank you for your continued support of Asterisk!
2012-02-26 23:12:56 +00:00
hans
7175625441 Fix build on SunOS. 2012-02-17 13:49:47 +00:00
hans
c95fc8aefd Fix build on SunOS. 2012-02-16 18:00:20 +00:00
hans
705bbd10fc Fix build on SunOS. 2012-02-16 17:47:04 +00:00
hans
caf46b4e91 Fix build on SunOS. 2012-02-16 17:35:30 +00:00
hans
76a9a6328f Fix build on SunOS. 2012-02-16 17:25:16 +00:00
hans
6f8b4e9e4f Buildlink textproc/wbxml2 in buildlink3.mk. 2012-02-16 17:22:39 +00:00
hans
fa38e0743a Don't enable bluetooth on SunOS. 2012-02-16 17:21:15 +00:00
hans
448c05d20a Don't use -export-dynamic on SunOS. 2012-02-16 17:20:07 +00:00
hans
9607f0baec Don't try to install SysV init scripts. That used to fix the build on
SunOS. Now it breaks because of tiff 4.0.
2012-02-16 17:18:50 +00:00
hans
9ee4c3a265 Fix build on SunOS. 2012-02-16 17:13:03 +00:00
hans
b546c53c83 Fix build on SunOS. 2012-02-16 16:47:57 +00:00
hans
5b3c5c0f69 Fix build on SunOS. 2012-02-16 16:40:34 +00:00
hans
5184ce61ac Fix build on SunOS. 2012-02-16 16:30:03 +00:00
hans
34b818fd25 Fix build on SunOS. 2012-02-16 16:13:51 +00:00
jnemeth
31a88688c3 The release of Asterisk 10.1.2 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are the issues resolved in this release:

* --- Fix SIP INFO DTMF handling for non-numeric codes ---
  (Closes issue ASTERISK-19290. Reported by: Ira Emus)

* --- Fix crash in ParkAndAnnounce ---
  (Closes issue ASTERISK-19311. Reported-by: tootai)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.1.2
2012-02-12 20:17:16 +00:00
jnemeth
48d75bc385 Update to Asterisk 1.8.9.2:
The release of Asterisk 1.8.9.2 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are the issues resolve
2012-02-12 20:16:31 +00:00
jnemeth
931b9ca490 Update to 1.8.9.1:
The release of Asterisk 1.8.9.1 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Fixes deadlocks occuring in chan_agent ---

* --- Ensure entering T.38 passthrough does not cause an infinite loop ---

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.9.1

Thank you for your continued support of Asterisk!
2012-02-08 07:27:24 +00:00
jnemeth
64a9723170 Update to 10.1.1:
The release of Asterisk 10.1.1 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Fixes deadlocks occuring in chan_agent ---

* --- Ensure entering T.38 passthrough does not cause an infinite loop ---

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.1.1

Thank you for your continued support of Asterisk!
2012-02-08 05:42:32 +00:00
wiz
72030d7165 Revbump for
a) tiff update to 4.0 (shlib major change)
b) glib2 update 2.30.2 (adds libffi dependency to buildlink3.mk)

Enjoy.
2012-02-06 12:39:42 +00:00
wiz
404512084a Revbump for
a) tiff update to 4.0 (shlib major change)
b) glib2 update 2.30.2 (adds libffi dependency to buildlink3.mk)

Enjoy.
2012-02-06 12:39:17 +00:00
jnemeth
3a9b587c2a Update to Asterisk 10.1.0:
The Asterisk Development Team is pleased to announce the release of
Asterisk 10.1.0. This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/

The release of Asterisk 10.1.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* AST-2012-001: prevent crash when an SDP offer
  is received with an encrypted video stream when support for video
  is disabled and res_srtp is loaded.  (closes issue ASTERISK-19202)
  Reported by: Catalin Sanda

* Allow playback of formats that don't support seeking.  ast_streamfile
  previously did unconditional seeking on files that broke playback of
  formats that don't support that functionality.  This patch avoids the
  seek that was causing the problem.
  (closes issue ASTERISK-18994) Patched by: Timo Teras

* Add pjmedia probation concepts to res_rtp_asterisk's learning mode.  In
  order to better handle RTP sources with strictrtp enabled (which is the
  default setting in 10) using the learning mode to figure out new sources
  when they change is handled by checking for a number of consecutive (by
  sequence number) packets received to an rtp struct based on a new
  configurable value called 'probation'.  Also, during learning mode instead
  of liberally accepting all packets received, we now reject packets until a
  clear source has been determined.

* Handle AST_CONTROL_UPDATE_RTP_PEER frames in local bridge loop.  Failing
  to handle AST_CONTROL_UPDATE_RTP_PEER frames in the local bridge loop
  causes the loop to exit prematurely. This causes a variety of negative side
  effects, depending on when the loop exits. This patch handles the frame by
  essentially swallowing the frame in the local loop, as the current channel
  drivers expect the RTP bridge to handle the frame, and, in the case of the
  local bridge loop, no additional action is necessary.
  (closes issue ASTERISK-19095) Reported by: Stefan Schmidt Tested
  by: Matt Jordan

* Fix timing source dependency issues with MOH.  Prior to this patch,
  res_musiconhold existed at the same module priority level as the timing
  sources that it depends on.  This would cause a problem when music on
  hold was reloaded, as the timing source could be changed after
  res_musiconhold was processed. This patch adds a new module priority
  level, AST_MODPRI_TIMING, that the various timing modules are now loaded
  at. This now occurs before loading other resource modules, such
  that the timing source is guaranteed to be set prior to resolving
  the timing source dependencies.
  (closes issue ASTERISK-17474) Reporter: Luke H Tested by: Luke H,
  Vladimir Mikhelson, zzsurf, Wes Van Tlghem, elguero, Thomas Arimont
  Patched by elguero

* Fix RTP reference leak.  If a blind transfer were initiated using a
  REFER without a prior reINVITE to place the call on hold, AND if Asterisk
  were sending RTCP reports, then there was a reference leak for the
  RTP instance of the transferrer.
  (closes issue ASTERISK-19192) Reported by: Tyuta Vitali

* Fix blind transfers from failing if an 'h' extension
  is present.  This prevents the 'h' extension from being run on the
  transferee channel when it is transferred via a native transfer
  mechanism such as SIP REFER.  (closes issue ASTERISK-19173) Reported
  by: Ross Beer Tested by: Kristjan Vrban Patches: ASTERISK-19173 by
  Mark Michelson (license 5049)

* Restore call progress code for analog ports. Extracting sig_analog
  from chan_dahdi lost call progress detection functionality.  Fix
  analog ports from considering a call answered immediately after
  dialing has completed if the callprogress option is enabled.
  (closes issue ASTERISK-18841)
  Reported by: Richard Miller Patched by Richard Miller

* Fix regression that 'rtp/rtcp set debup ip' only works when a port
  was also specified.
  (closes issue ASTERISK-18693) Reported by: Davide Dal Reviewed by:
  Walter Doekes

For a full list of changes in this release candidate, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-10.1.0

Thank you for your continued support of Asterisk!
2012-01-28 20:39:10 +00:00
jnemeth
7a29462b7c Update to Asterisk 1.8.9.0:
The Asterisk Development Team is pleased to announce the release of
Asterisk 1.8.9.0. This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/

The release of Asterisk 1.8.9.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* AST-2012-001: prevent crash when an SDP offer
  is received with an encrypted video stream when support for video
  is disabled and res_srtp is loaded.  (closes issue ASTERISK-19202)
  Reported by: Catalin Sanda

* Handle AST_CONTROL_UPDATE_RTP_PEER frames in local bridge loop.  Failing
  to handle AST_CONTROL_UPDATE_RTP_PEER frames in the local bridge loop
  causes the loop to exit prematurely. This causes a variety of negative side
  effects, depending on when the loop exits. This patch handles the frame by
  essentially swallowing the frame in the local loop, as the current channel
  drivers expect the RTP bridge to handle the frame, and, in the case of the
  local bridge loop, no additional action is necessary.
  (closes issue ASTERISK-19095) Reported by: Stefan Schmidt Tested
  by: Matt Jordan

* Fix timing source dependency issues with MOH.  Prior to this patch,
  res_musiconhold existed at the same module priority level as the timing
  sources that it depends on.  This would cause a problem when music on
  hold was reloaded, as the timing source could be changed after
  res_musiconhold was processed. This patch adds a new module priority
  level, AST_MODPRI_TIMING, that the various timing modules are now loaded
  at. This now occurs before loading other resource modules, such
  that the timing source is guaranteed to be set prior to resolving
  the timing source dependencies.
  (closes issue ASTERISK-17474) Reporter: Luke H Tested by: Luke H,
  Vladimir Mikhelson, zzsurf, Wes Van Tlghem, elguero, Thomas Arimont
  Patched by elguero

* Fix RTP reference leak.  If a blind transfer were initiated using a
  REFER without a prior reINVITE to place the call on hold, AND if Asterisk
  were sending RTCP reports, then there was a reference leak for the
  RTP instance of the transferrer.
  (closes issue ASTERISK-19192) Reported by: Tyuta Vitali

* Fix blind transfers from failing if an 'h' extension
  is present.  This prevents the 'h' extension from being run on the
  transferee channel when it is transferred via a native transfer
  mechanism such as SIP REFER.  (closes issue ASTERISK-19173) Reported
  by: Ross Beer Tested by: Kristjan Vrban Patches: ASTERISK-19173 by
  Mark Michelson (license 5049)

* Restore call progress code for analog ports. Extracting sig_analog
  from chan_dahdi lost call progress detection functionality.  Fix
  analog ports from considering a call answered immediately after
  dialing has completed if the callprogress option is enabled.
  (closes issue ASTERISK-18841)
  Reported by: Richard Miller Patched by Richard Miller

* Fix regression that 'rtp/rtcp set debup ip' only works when a port
  was also specified.
  (closes issue ASTERISK-18693) Reported by: Davide Dal Reviewed by:
  Walter Doekes

For a full list of changes in this release candidate, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.9.0

Thank you for your continued support of Asterisk!
2012-01-28 19:11:35 +00:00
marino
d800865005 comms/efax-gtk: Fix indirect linking error on DragonFly only 2012-01-24 23:55:57 +00:00
sbd
ec681430da Recursive dependency bump for databases/gdbm ABI_DEPENDS change. 2012-01-24 09:10:50 +00:00
jnemeth
769a2cc62a Update to Asterisk 1.8.8.2. This fixes AST-2010-001:
Asterisk Project Security Advisory - AST-2012-001

   +------------------------------------------------------------------------+
   |       Product        | Asterisk                                        |
   |----------------------+-------------------------------------------------|
   |       Summary        | SRTP Video Remote Crash Vulnerability           |
   |----------------------+-------------------------------------------------|
   |  Nature of Advisory  | Denial of Service                               |
   |----------------------+-------------------------------------------------|
   |    Susceptibility    | Remote unauthenticated sessions                 |
   |----------------------+-------------------------------------------------|
   |       Severity       | Moderate                                        |
   |----------------------+-------------------------------------------------|
   |    Exploits Known    | No                                              |
   |----------------------+-------------------------------------------------|
   |     Reported On      | 2012-01-15                                      |
   |----------------------+-------------------------------------------------|
   |     Reported By      | Catalin Sanda                                   |
   |----------------------+-------------------------------------------------|
   |      Posted On       | 2012-01-19                                      |
   |----------------------+-------------------------------------------------|
   |   Last Updated On    | January 19, 2012                                |
   |----------------------+-------------------------------------------------|
   |   Advisory Contact   | Joshua Colp < jcolp AT digium DOT com >         |
   |----------------------+-------------------------------------------------|
   |       CVE Name       |                                                 |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Description | An attacker attempting to negotiate a secure video       |
   |             | stream can crash Asterisk if video support has not been  |
   |             | enabled and the res_srtp Asterisk module is loaded.      |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Resolution | Upgrade to one of the versions of Asterisk listed in the  |
   |            | "Corrected In" section, or apply a patch specified in the |
   |            | "Patches" section.                                        |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                           Affected Versions                            |
   |------------------------------------------------------------------------|
   |            Product            | Release Series |                       |
   |-------------------------------+----------------+-----------------------|
   |     Asterisk Open Source      |     1.8.x      | All versions          |
   |-------------------------------+----------------+-----------------------|
   |     Asterisk Open Source      |      10.x      | All versions          |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                              Corrected In                              |
   |------------------------------------------------------------------------|
   |                 Product                  |           Release           |
   |------------------------------------------+-----------------------------|
   |           Asterisk Open Source           |           1.8.8.2           |
   |------------------------------------------+-----------------------------|
   |           Asterisk Open Source           |           10.0.1            |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                                Patches                                 |
   |------------------------------------------------------------------------|
   |                             SVN URL                             |Branch|
   |-----------------------------------------------------------------+------|
   |http://downloads.asterisk.org/pub/security/AST-2012-001-1.8.diff |v1.8  |
   |-----------------------------------------------------------------+------|
   |http://downloads.asterisk.org/pub/security/AST-2012-001-10.diff  |v10   |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |   Links   | https://issues.asterisk.org/jira/browse/ASTERISK-19202     |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Asterisk Project Security Advisories are posted at                     |
   | http://www.asterisk.org/security                                       |
   |                                                                        |
   | This document may be superseded by later versions; if so, the latest   |
   | version will be posted at                                              |
   | http://downloads.digium.com/pub/security/AST-2012-001.pdf and          |
   | http://downloads.digium.com/pub/security/AST-2012-001.html             |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                            Revision History                            |
   |------------------------------------------------------------------------|
   |      Date       |       Editor       |         Revisions Made          |
   |-----------------+--------------------+---------------------------------|
   | 12-01-19        | Joshua Colp        | Initial release                 |
   +------------------------------------------------------------------------+

               Asterisk Project Security Advisory - AST-2012-001
              Copyright (c) 2012 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
2012-01-20 07:31:17 +00:00
jnemeth
50eca4f158 Update to Asterisk 10.0.1. This fixes AST-2012-001:
Asterisk Project Security Advisory - AST-2012-001

   +------------------------------------------------------------------------+
   |       Product        | Asterisk                                        |
   |----------------------+-------------------------------------------------|
   |       Summary        | SRTP Video Remote Crash Vulnerability           |
   |----------------------+-------------------------------------------------|
   |  Nature of Advisory  | Denial of Service                               |
   |----------------------+-------------------------------------------------|
   |    Susceptibility    | Remote unauthenticated sessions                 |
   |----------------------+-------------------------------------------------|
   |       Severity       | Moderate                                        |
   |----------------------+-------------------------------------------------|
   |    Exploits Known    | No                                              |
   |----------------------+-------------------------------------------------|
   |     Reported On      | 2012-01-15                                      |
   |----------------------+-------------------------------------------------|
   |     Reported By      | Catalin Sanda                                   |
   |----------------------+-------------------------------------------------|
   |      Posted On       | 2012-01-19                                      |
   |----------------------+-------------------------------------------------|
   |   Last Updated On    | January 19, 2012                                |
   |----------------------+-------------------------------------------------|
   |   Advisory Contact   | Joshua Colp < jcolp AT digium DOT com >         |
   |----------------------+-------------------------------------------------|
   |       CVE Name       |                                                 |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Description | An attacker attempting to negotiate a secure video       |
   |             | stream can crash Asterisk if video support has not been  |
   |             | enabled and the res_srtp Asterisk module is loaded.      |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Resolution | Upgrade to one of the versions of Asterisk listed in the  |
   |            | "Corrected In" section, or apply a patch specified in the |
   |            | "Patches" section.                                        |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                           Affected Versions                            |
   |------------------------------------------------------------------------|
   |            Product            | Release Series |                       |
   |-------------------------------+----------------+-----------------------|
   |     Asterisk Open Source      |     1.8.x      | All versions          |
   |-------------------------------+----------------+-----------------------|
   |     Asterisk Open Source      |      10.x      | All versions          |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                              Corrected In                              |
   |------------------------------------------------------------------------|
   |                 Product                  |           Release           |
   |------------------------------------------+-----------------------------|
   |           Asterisk Open Source           |           1.8.8.2           |
   |------------------------------------------+-----------------------------|
   |           Asterisk Open Source           |           10.0.1            |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                                Patches                                 |
   |------------------------------------------------------------------------|
   |                             SVN URL                             |Branch|
   |-----------------------------------------------------------------+------|
   |http://downloads.asterisk.org/pub/security/AST-2012-001-1.8.diff |v1.8  |
   |-----------------------------------------------------------------+------|
   |http://downloads.asterisk.org/pub/security/AST-2012-001-10.diff  |v10   |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |   Links   | https://issues.asterisk.org/jira/browse/ASTERISK-19202     |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Asterisk Project Security Advisories are posted at                     |
   | http://www.asterisk.org/security                                       |
   |                                                                        |
   | This document may be superseded by later versions; if so, the latest   |
   | version will be posted at                                              |
   | http://downloads.digium.com/pub/security/AST-2012-001.pdf and          |
   | http://downloads.digium.com/pub/security/AST-2012-001.html             |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   |                            Revision History                            |
   |------------------------------------------------------------------------|
   |      Date       |       Editor       |         Revisions Made          |
   |-----------------+--------------------+---------------------------------|
   | 12-01-19        | Joshua Colp        | Initial release                 |
   +------------------------------------------------------------------------+

               Asterisk Project Security Advisory - AST-2012-001
              Copyright (c) 2012 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
2012-01-20 07:29:08 +00:00
jnemeth
b45fb72e08 PR/35369 -- David Wetzel -- add support for speex codec (enabled by default) 2012-01-17 07:07:33 +00:00
jnemeth
7467979952 PR/35369 -- David Wetzel -- add support for speex codec (enabled by default) 2012-01-17 06:29:41 +00:00
jnemeth
9d0816f809 PR/35369 -- David Wetzel -- add support for speex codec (enabled by default) 2012-01-17 02:12:52 +00:00
jnemeth
ae2d50acd4 add and enable asterisk10 2012-01-15 18:39:32 +00:00
jnemeth
9d8621036c Import Asterisk 10.0.0:
The Asterisk Development Team is proud to announce the release of
Asterisk 10.0.0. This release is available for immediate download
at http://downloads.asterisk.org/pub/telephony/asterisk/

Asterisk 10 is the next major release series of Asterisk. It will
be a Standard support release, similar to Asterisk 1.6.2. For more
information about support time lines for Asterisk releases, see
the Asterisk versions page:

   https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions

With the release of the Asterisk 10 branch, the preceding '1.' has
been removed from the version number per the blog post available
at

http://blogs.digium.com/2011/07/21/the-evolution-of-asterisk-or-how-we-arrived-at-asterisk-10/

The release of Asterisk 10 would not have been possible without
the support and contributions of the community.

You can find an overview of the work involved with the 10.0.0
release in the summary:

http://svn.asterisk.org/svn/asterisk/tags/10.0.0/asterisk-10.0.0-summary.txt

A short list of available features includes:

* T.38 gateway functionality has been added to res_fax.
* Protocol independent out-of-call messaging support. Text messages not
   associated with an active call can now be routed through the Asterisk
   dialplan. SIP and XMPP are supported so far.
* New highly optimized and customizable ConfBridge application capable
   of mixing audio at sample rates ranging from 8kHz-192kHz
* Addition of video_mode option in confbridge.conf to provide basic video
   conferencing in the ConfBridge() dialplan application.
* Support for defining hints has been added to pbx_lua.
* Replacement of Berkeley DB with SQLite for the Asterisk Database (AstDB).
* Much, much more!

A full list of new features can be found in the CHANGES file.

   http://svn.asterisk.org/svn/asterisk/branches/10/CHANGES

Also, when upgrading a system between major versions, it is imperative
that you read and understand the contents of the UPGRADE.txt file,
which is located at:

   http://svn.asterisk.org/svn/asterisk/branches/10/UPGRADE.txt

Thank you for your continued support of Asterisk!
2012-01-15 18:36:18 +00:00
jnemeth
cb7c2af02c Update to Asterisk 1.8.8.1.
share/doc/asterisk/AST.{txt,pdf} has been replaced with
share/doc/asterisk/Asterisk_Admin_Guide.  You will need a browser
to read the latter.

----- Asterisk 1.8.8.1 -----

The release of Asterisk 1.8.8.1 resolves a regression introduced
in Asterisk 1.8.8.0 reported by the community, and would have not
been possible without your participation.  Thank you!

The following is the issue resolved in this release:

* Handle AST_CONTROL_UPDATE_RTP_PEER frames in local bridge loop

  Failing to handle AST_CONTROL_UPDATE_RTP_PEER frames in the local
  bridge loop causes the loop to exit prematurely.  This causes a
  variety of negative side effects, which may include having Music
  On Hold failing during a SIP Hold.

For a full description of the changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.8.1

Thank you for your continued support of Asterisk!

----- Asterisk 1.8.8.0 -----

The release of Asterisk 1.8.8.0 resolves several issues reported
by the community and would have not been possible without your
participation.  Thank you!

The following is a sample of the issues resolved in this release:

* Updated SIP 484 handling; added Incomplete control frame
   When a SIP phone uses the dial application and receives a 484
   Address Incomplete response, if overlapped dialing is enabled
   for SIP, then the 484 Address Incomplete is forwarded back to
   the SIP phone and the HANGUPCAUSE channel variable is set to
   28. Previously, the Incomplete application dialplan logic was
   automatically triggered; now, explicit dialplan usage of the
   application is required.

* Prevent IAX2 from getting IPv6 addresses via DNS
   IAX2 does not support IPv6 and getting such addresses from DNS
   can cause error messages on the remote end involving bad IPv4
   address casts in the presence of IPv6/IPv4 tunnels.

* Fix bad RTP media bridges in directmedia calls on peers separated by
  multiple Asterisk nodes.

* Fix crashes in ast_rtcp_write()

* Fix for incorrect voicemail duration in external notifications.
   This patch fixes an issue where the voicemail duration was being
   reported with a duration significantly less than the actual
   sound file duration.

* Prevent segfault if call arrives before Asterisk is fully booted.

* Fix remote Crash Vulnerability in SIP channel driver (AST-2011-012)
     http://downloads.asterisk.org/pub/security/AST-2011-012.pdf

* Fix locking order in app_queue.c which caused deadlocks

* Fix regression in configure script for libpri capability checks

* Prevent BLF subscriptions from causing deadlocks.

* Fix deadlock if peer is destroyed while sending MWI notice.

* Fix issue with setting defaultenabled on categories that are already
  enabled by default.

* Don't crash on INFO automon request with no channel
     AST-2011-014. When automon was enabled in features.conf, it
     was possible to crash Asterisk by sending an INFO request if
     no channel had been created yet.

* Fixed crash from orphaned MWI subscriptions in chan_sip
   This patch resolves the issue where MWI subscriptions are orphaned
   by subsequent SIP SUBSCRIBE messages.

* Default to nat=yes; warn when nat in general and peer differ
     AST-2011-013. It is possible to enumerate SIP usernames when
     the general and user/peer nat settings differ in whether to
     respond to the port a request is sent from or the port listed
     for responses in the Via header.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.8.0

Thank you for your continued support of Asterisk!
2012-01-15 03:32:47 +00:00
jnemeth
fabb14e9f4 Update to Asterisk 1.6.2.22:
The release of Asterisk 1.6.2.22 corrects two flaws in sip.conf.sample
related to AST-2011-013:

* The sample file listed *two* values for the 'nat' option as being the default.
   Only 'yes' is the default.

* The warning about having differing 'nat' settings confusingly referred to both
   peers and users.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.22

Thank you for your continued support of Asterisk!
2012-01-14 08:30:15 +00:00
obache
1f4649c8a2 Recursive bump from audio/libaudiofile, x11/qt4-libs and x11/qt4-tools ABI bump. 2012-01-13 10:54:43 +00:00
dholland
c87af0dd05 USE_TOOLS, not TOOLS. Apparently my fault 2012-01-04 14:33:53 +00:00
joerg
506783b52f Remove partial RCS ID from patch which confuses the pkgsrc logic 2011-12-26 03:11:10 +00:00
wiz
091cd93cb6 Fix build with gcc-4.5.
Mark as not MAKE_JOBS_SAFE (doesn't wait for library to be built before
linking it).
2011-12-19 13:44:07 +00:00
wiz
2af63f0e1a Fix build (add missing headers). 2011-12-19 13:25:22 +00:00
dholland
7164817cea Fix user/group handling; use SPECIAL_PERMS; support user-destdir mode.
Add patch comments.
Fix void main plus a couple build warnings.
PKGREVISION -> 3.
2011-12-18 18:18:50 +00:00
dholland
e1d63b683d Needs curses, not termcap. Doesn't build, so no revbump. 2011-12-18 15:52:44 +00:00
sbd
d8de65c459 Add missing mk/termcap buildlink.
Respect LDFLAGS

Bump PKGREVISION
2011-12-17 10:15:00 +00:00
sbd
ad7e969f11 Add missing mk/termcap buildlink.
Bump PKGREVISION
2011-12-17 10:14:56 +00:00
jnemeth
ee44b13ae7 This update is to fix AST-2011-013 and AST-2011-014.
Asterisk Project Security Advisory - AST-2011-013

         Product        Asterisk
         Summary        Possible remote enumeration of SIP endpoints with
                        differing NAT settings
    Nature of Advisory  Unauthorized data disclosure
      Susceptibility    Remote unauthenticated sessions
         Severity       Minor
      Exploits Known    Yes
       Reported On      2011-07-18
       Reported By      Ben Williams
        Posted On
     Last Updated On    December 7, 2011
     Advisory Contact   Terry Wilson <twilson at digium.com>

         CVE Name

    Description  It is possible to enumerate SIP usernames when the general
                 and user/peer NAT settings differ in whether to respond to
                 the port a request is sent from or the port listed for
                 responses in the Via header. In 1.4 and 1.6.2, this would
                 mean if one setting was nat=yes or nat=route and the other
                 was either nat=no or nat=never. In 1.8 and 10, this would
                 mean when one was nat=force_rport or nat=yes and the other
                 was nat=no or nat=comedia.

    Resolution  Handling NAT for SIP over UDP requires the differing
                behavior introduced by these options.

                To lessen the frequency of unintended username disclosure,
                the default NAT setting was changed to always respond to the
                port from which we received the request-the most commonly
                used option.

                Warnings were added on startup to inform administrators of
                the risks of having a SIP peer configured with a different
                setting than that of the general setting. The documentation
                now strongly suggests that peers are no longer configured
                for NAT individually, but through the global setting in the
                "general" context.

                               Affected Versions
                Product              Release Series
         Asterisk Open Source             All        All versions

                                  Corrected In
     As this is more of an issue with SIP over UDP in general, there is no
     fix supplied other than documentation on how to avoid the problem. The
        default NAT setting has been changed to what we believe the most
      commonly used setting for the respective version in Asterisk 1.4.43,
                             1.6.2.21, and 1.8.7.2.

            Links

    Asterisk Project Security Advisories are posted at
    http://www.asterisk.org/security

    This document may be superseded by later versions; if so, the latest
    version will be posted at
    http://downloads.digium.com/pub/security/AST-2011-013.pdf and
    http://downloads.digium.com/pub/security/AST-2011-013.html

                                Revision History
           Date                 Editor                 Revisions Made

               Asterisk Project Security Advisory - AST-2011-013
              Copyright (c) 2011 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

     __________________________________________________________________

               Asterisk Project Security Advisory - AST-2011-014

         Product        Asterisk
         Summary        Remote crash possibility with SIP and the "automon"
                        feature enabled
    Nature of Advisory  Remote crash vulnerability in a feature that is
                        disabled by default
      Susceptibility    Remote unauthenticated sessions
         Severity       Moderate
      Exploits Known    Yes
       Reported On      November 2, 2011
       Reported By      Kristijan Vrban
        Posted On       2011-11-03
     Last Updated On    December 7, 2011
     Advisory Contact   Terry Wilson <twilson at digium.com>

         CVE Name

    Description  When the "automon" feature is enabled in features.conf, it
                 is possible to send a sequence of SIP requests that cause
                 Asterisk to dereference a NULL pointer and crash.

    Resolution  Applying the referenced patches that check that the pointer
                is not NULL before accessing it will resolve the issue. The
                "automon" feature can be disabled in features.conf as a
                workaround.

                               Affected Versions
                Product              Release Series
         Asterisk Open Source           1.6.2.x      All versions
         Asterisk Open Source            1.8.x       All versions

                                  Corrected In
                   Product                              Release
            Asterisk Open Source                   1.6.2.21, 1.8.7.2

                                     Patches
                              Download URL                            Revision
   http://downloads.asterisk.org/pub/security/AST-2011-014-1.6.2.diff 1.6.2.20
   http://downloads.asterisk.org/pub/security/AST-2011-014-1.8.diff   1.8.7.1

            Links

    Asterisk Project Security Advisories are posted at
    http://www.asterisk.org/security

    This document may be superseded by later versions; if so, the latest
    version will be posted at
    http://downloads.digium.com/pub/security/AST-2011-014.pdf and
    http://downloads.digium.com/pub/security/AST-2011-014.html

                                Revision History
           Date                 Editor                 Revisions Made

               Asterisk Project Security Advisory - AST-2011-014
              Copyright (c) 2011 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
2011-12-12 06:52:40 +00:00
jnemeth
d889e29d94 This update fixes AST-2011-013 and AST-2011-014. It also adapts to changes
in the iLBC codec files.

     __________________________________________________________________

               Asterisk Project Security Advisory - AST-2011-013

         Product        Asterisk
         Summary        Possible remote enumeration of SIP endpoints with
                        differing NAT settings
    Nature of Advisory  Unauthorized data disclosure
      Susceptibility    Remote unauthenticated sessions
         Severity       Minor
      Exploits Known    Yes
       Reported On      2011-07-18
       Reported By      Ben Williams
        Posted On
     Last Updated On    December 7, 2011
     Advisory Contact   Terry Wilson <twilson at digium.com>

         CVE Name

    Description  It is possible to enumerate SIP usernames when the general
                 and user/peer NAT settings differ in whether to respond to
                 the port a request is sent from or the port listed for
                 responses in the Via header. In 1.4 and 1.6.2, this would
                 mean if one setting was nat=yes or nat=route and the other
                 was either nat=no or nat=never. In 1.8 and 10, this would
                 mean when one was nat=force_rport or nat=yes and the other
                 was nat=no or nat=comedia.

    Resolution  Handling NAT for SIP over UDP requires the differing
                behavior introduced by these options.

                To lessen the frequency of unintended username disclosure,
                the default NAT setting was changed to always respond to the
                port from which we received the request-the most commonly
                used option.

                Warnings were added on startup to inform administrators of
                the risks of having a SIP peer configured with a different
                setting than that of the general setting. The documentation
                now strongly suggests that peers are no longer configured
                for NAT individually, but through the global setting in the
                "general" context.

                               Affected Versions
                Product              Release Series
         Asterisk Open Source             All        All versions

                                  Corrected In
     As this is more of an issue with SIP over UDP in general, there is no
     fix supplied other than documentation on how to avoid the problem. The
        default NAT setting has been changed to what we believe the most
      commonly used setting for the respective version in Asterisk 1.4.43,
                             1.6.2.21, and 1.8.7.2.

            Links

    Asterisk Project Security Advisories are posted at
    http://www.asterisk.org/security

    This document may be superseded by later versions; if so, the latest
    version will be posted at
    http://downloads.digium.com/pub/security/AST-2011-013.pdf and
    http://downloads.digium.com/pub/security/AST-2011-013.html

                                Revision History
           Date                 Editor                 Revisions Made

               Asterisk Project Security Advisory - AST-2011-013
              Copyright (c) 2011 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

     __________________________________________________________________

               Asterisk Project Security Advisory - AST-2011-014

         Product        Asterisk
         Summary        Remote crash possibility with SIP and the "automon"
                        feature enabled
    Nature of Advisory  Remote crash vulnerability in a feature that is
                        disabled by default
      Susceptibility    Remote unauthenticated sessions
         Severity       Moderate
      Exploits Known    Yes
       Reported On      November 2, 2011
       Reported By      Kristijan Vrban
        Posted On       2011-11-03
     Last Updated On    December 7, 2011
     Advisory Contact   Terry Wilson <twilson at digium.com>

         CVE Name

    Description  When the "automon" feature is enabled in features.conf, it
                 is possible to send a sequence of SIP requests that cause
                 Asterisk to dereference a NULL pointer and crash.

    Resolution  Applying the referenced patches that check that the pointer
                is not NULL before accessing it will resolve the issue. The
                "automon" feature can be disabled in features.conf as a
                workaround.

                               Affected Versions
                Product              Release Series
         Asterisk Open Source           1.6.2.x      All versions
         Asterisk Open Source            1.8.x       All versions

                                  Corrected In
                   Product                              Release
            Asterisk Open Source                   1.6.2.21, 1.8.7.2

                                     Patches
                              Download URL                            Revision
   http://downloads.asterisk.org/pub/security/AST-2011-014-1.6.2.diff 1.6.2.20
   http://downloads.asterisk.org/pub/security/AST-2011-014-1.8.diff   1.8.7.1

            Links

    Asterisk Project Security Advisories are posted at
    http://www.asterisk.org/security

    This document may be superseded by later versions; if so, the latest
    version will be posted at
    http://downloads.digium.com/pub/security/AST-2011-014.pdf and
    http://downloads.digium.com/pub/security/AST-2011-014.html

                                Revision History
           Date                 Editor                 Revisions Made

               Asterisk Project Security Advisory - AST-2011-014
              Copyright (c) 2011 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
2011-12-12 05:05:33 +00:00
sbd
bf54b39851 1) Add missing mk/curses buildlink.
2) Pass BUILDLINK_CPPFLAGS and BUILDLINK_LDFLAGS to the make process.
3) Have the build variables  HAVE_LIBCURSES and HAVE_CURSES needed for the
   linux build set the by pkgsrc.

Bump PKGREVISION
2011-12-06 01:19:15 +00:00
adam
2668cfccc1 Put <limits.h> back and fix PR#45540 2011-12-05 08:10:18 +00:00
jnemeth
706e8e5965 Now that -current has sqlite3 included in base, enable it here. 2011-12-05 04:18:32 +00:00
hans
7903b2358d Fix previous fix. 2011-11-30 23:48:18 +00:00
hans
59c642b4a7 Fix a warnings about assigned but unused variable, which caused the
build to fail.
2011-11-29 15:12:07 +00:00
joerg
a3a7423bb3 Fix build with newer GCC 2011-11-27 19:36:09 +00:00
joerg
a438b87c86 Fix various missing includes. 2011-11-25 21:34:34 +00:00
joerg
3fa6cc0dcb Fix build with newer GCC 2011-11-24 14:16:18 +00:00
tron
cbb4d921a8 Fix build under recent versions of Mac OS X by selectin a make target
that actually exists.
2011-11-20 12:01:50 +00:00
dholland
9d5c6ec94d TOOLS+=yacc, may unbreak Linux build 2011-11-14 01:36:46 +00:00
taca
bb52e4f7a7 * Remove .require_paths from PLIST
* Bump PKGREVISION.
2011-11-08 15:37:33 +00:00
hiramatsu
870113f082 Add LICENSE. 2011-11-05 23:13:27 +00:00
sbd
ff3e585f03 Recursive bump for graphics/freetype2 buildlink addition. 2011-11-01 06:11:52 +00:00
sbd
94b37b4e43 Recursive bump for graphics/freetype2 buildlink addition. 2011-11-01 06:00:33 +00:00
obache
f7a6457f89 distutils package, register egg-info.
Bump PKGREVISION.
2011-10-29 13:22:16 +00:00
jnemeth
fc1d4bc105 Update to 1.8.7.1 -- this update fixes AST-2011-012
pkgsrc change:  now what sqlite3 has been imported into NetBSD, enable it

               Asterisk Project Security Advisory - AST-2011-012

          Product         Asterisk
          Summary         Remote crash vulnerability in SIP channel driver
     Nature of Advisory   Remote crash
       Susceptibility     Remote authenticated sessions
          Severity        Critical
       Exploits Known     No
        Reported On       October 4, 2011
        Reported By       Ehsan Foroughi
         Posted On        October 17, 2011
      Last Updated On     October 17, 2011
      Advisory Contact    Terry Wilson <twilson@digium.com>
          CVE Name        CVE-2011-4063

    Description  A remote authenticated user can cause a crash with a
                 malformed request due to an unitialized variable.

    Resolution  Ensure variables are initialized in all cases when parsing
                the request.

                               Affected Versions
           Product         Release Series
    Asterisk Open Source       1.8.x       All versions
    Asterisk Open Source        10.x       All versions (currently in beta)

                                  Corrected In
                  Product                              Release
            Asterisk Open Source                 1.8.7.1, 10.0.0-rc1

                                    Patches
                             Download URL                           Revision
   http://downloads.asterisk.org/pub/security/AST-2011-012-1.8.diff 1.8
   http://downloads.asterisk.org/pub/security/AST-2011-012-10.diff  10

            Links

    Asterisk Project Security Advisories are posted at
    http://www.asterisk.org/security

    This document may be superseded by later versions; if so, the latest
    version will be posted at
    http://downloads.digium.com/pub/security/AST-2011-012.pdf and
    http://downloads.digium.com/pub/security/AST-2011-012.html

                                Revision History
           Date                 Editor                 Revisions Made

               Asterisk Project Security Advisory - AST-2011-012
              Copyright (c) 2011 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
2011-10-17 23:40:50 +00:00
hiramatsu
b7313c7abf Fix build with perl 5.14.1 2011-10-14 11:26:31 +00:00
jnemeth
148b3440d2 Update to 1.8.7.0nb1.
This update adds a "jabber" option which is enabled by default.
This option pulls in iksemel which is used by the res_jabber.
Doing this allows chan_jingle (jabber) and chan_gtalk to work.
2011-10-12 03:21:07 +00:00
jnemeth
8334f3ade1 Revert previous. This package was marked OWNER= for a reason! 2011-10-11 03:15:50 +00:00
jnemeth
538a7e98a0 Update to 1.8.7.0 (mainly bug fixes).
pkgsrc changes:
- adjust for ilbc changes after it was acquired by Google
- install AST.pdf IAX2-security.pdf into share/doc/asterisk

1.8.7.0:
========

The release of Asterisk 1.8.7.0 resolves several issues reported
by the community and would have not been possible without your
participation.  Thank you!

Please note that a significant numbers of changes and fixes have
gone into features.c in this release (call parking, built-in
transfers, call pickup, etc.).

NOTE:

Recently, we were notified that the mechanism included in our
Asterisk source code releases to download and build support for
the iLBC codec had stopped working correctly; a little investigation
revealed that this occurred because of some changes on the
ilbcfreeware.org website. These changes occurred as a result of
Google's acquisition of GIPS, who produced (and provided licenses
for) the iLBC codec.

If you are a user of Asterisk and iLBC together, and you've already
executed a license agreement with GIPS, we believe you can continue
using iLBC with Asterisk. If you are a user of Asterisk and iLBC
together, but you had not executed a license agreement with GIPS,
we encourage you to research the situation and consult with your
own legal representatives to determine what actions you may want
to take (or avoid taking).

More information is available on the Asterisk blog:

http://blogs.asterisk.org/2011/09/19/ilbc-support-in-asterisk-after-googles-acquisition-of-gips/

The following is a sample of the issues resolved in this release:

* Added the 'storesipcause' option to sip.conf to allow the user to
   disable the setting of HASH(SIP_CAUSE,) on the channel. Having
   chan_sip set HASH(SIP_CAUSE,) on the channel carries a significant
   performance penalty because of the usage of the MASTER_CHANNEL()
   dialplan function.

   We've decided to disable this feature by default in future 1.8
   versions. This would be an unexpected behavior change for anyone
   depending on that SIP_CAUSE update in their dialplan. Please
   refer to the asterisk-dev mailing list more information:

   http://lists.digium.com/pipermail/asterisk-dev/2011-August/050626.html

* Significant fixes and improvements to parking lots.
   (Closes issues ASTERISK-17183, ASTERISK-17870, ASTERISK-17430,
   ASTERISK-17452, ASTERISK-17452, ASTERISK-15792.)

* Numerous issues have been reported for deadlocks that are caused
   by a blocking read in res_timing_timerfd on a file descriptor
   that will never be written to.

   A change to Asterisk adds some checks to make sure that the
   timerfd is both valid and armed before calling read(). Should
   fix: ASTERISK-18142, ASTERISK-18197, ASTERISK-18166 and possibly
   others.  (In essence, this change should make res_timing_timerfd
   usable.)

* Resolve segfault when publishing device states via XMPP and not connected.
   (Closes issue ASTERISK-18078.)

* Refresh peer address if DNS unavailable at peer creation.
   (Closes issue ASTERISK-18000)

* Fix the missing DAHDI channels when using the newer chan_dahdi.conf
   sections for channel configuration.
   (Closes issue ASTERISK-18496.)

* Remove unnecessary libpri dependency checks in the configure script.
   (Closes issue ASTERISK-18535.)

* Update get_ilbc_source.sh script to work again.
   (Closes issue ASTERISK-18412)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.7.0

Thank you for your continued support of Asterisk!


1.8.6.0:
========

The release of Asterisk 1.8.6.0 resolves several issues reported
by the community and would have not been possible without your
participation.  Thank you!

The following is a sample of the issues resolved in this release:

* Fix an issue with Music on Hold classes losing files in playlist
   when realtime is used.  (Closes issue ASTERISK-17875.)

* Resolve a potential crash in chan_sip when utilizing auth= and
   performing a 'sip reload' from the console.  (Closes issue
   ASTERISK-17939.)

* Address some improper sql statements in res_odbc that would cause
   an update to fail on realtime peers due to trying to set as
   "(NULL)" rather than an actual NULL.  (Closes issue ASTERISK-17791.)

* Resolve issue where 403 Forbidden would always be sent maximum
   number of times regardless to receipt of ACK.

* Resolve issue where if a call to MeetMe includes both the dynamic(D)
   and always request PIN(P) options, MeetMe will ask for the PIN
   two times:  once for creating the conference and once for entering
   the conference.

* Fix New Zealand indications profile based on
   http://www.telepermit.co.nz/TNA102.pdf
   (Closes issue ASTERISK-16263.)

* Segfault in shell_helper in func_shell.c
   (Closes issue ASTERISK-18109.)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.6.0

Thank you for your continued support of Asterisk!
2011-10-11 03:12:55 +00:00
jnemeth
0bdd852e06 Revert previous. This package is marked OWNER= for a reason! 2011-10-11 02:13:40 +00:00
dholland
250957fce9 Fix native X build by cleaning up FONTDIR after imake. Ride previous bump. 2011-10-09 03:53:31 +00:00
dholland
60612921b6 Add a monster cleanup patch, posted as a distfile, to fix rampant
misuse of function pointer casts and mismatched function calls and
arguments. Now this has some chance at running on something other
than i386.

PKGREVISION -> 12.
2011-10-09 03:35:26 +00:00
shattered
d2b6c1f974 Remove zaptel option everywhere (zaptel-netbsd package was removed) 2011-10-08 13:49:08 +00:00
dholland
bc5be7a58e Not MAKE_JOBS_SAFE 2011-10-08 07:04:34 +00:00
wiz
177d83dba0 Remove zaptel option, zaptel-netbsd was removed. 2011-10-06 08:35:01 +00:00
wiz
94fb8b8e3e Remove packages depending on the removed packages. 2011-10-02 14:32:31 +00:00
wiz
01245dbaa5 Remove packages scheduled to be deleted according to the pkgsrc-2011Q2
release notes.
2011-10-02 14:11:51 +00:00
joerg
c2fa0a34c0 Add a missing includes 2011-09-25 19:41:11 +00:00
joerg
b0d095d1a5 Add missing include 2011-09-25 19:40:28 +00:00
joerg
a724c46748 Uses chown during install phase, so ensure that the user/group exists
for destdir operation
2011-09-24 19:30:40 +00:00
obache
ef5b49b9ca Let to use new C++ style headers first for CXX runtime check,
taken from upstream.

Fixes PR pkg/45324.
2011-09-03 08:52:59 +00:00
jnemeth
bb963cae76 Add a patch for PR/44766. The issue was that older versions of gas
require you to use movd (instead of movq) when transferring data
between reg32/64 and an mmx register.  No PKGREVISION bump since it
failed to compile on amd64 meaning there was no binary package.
2011-09-01 09:22:30 +00:00
dsainty
d3ff4007f1 Update to Device-XBee-API version 0.4
Changes:

0.4, 20110831 - jeagle

Fix packet timeout bug reported by Dave S.

Replace call to die() in __data_to_int with return undef, update docs to
reflect this.
2011-09-01 02:29:38 +00:00
dsainty
f12417c22d +p5-Device-XBee-API 2011-08-28 06:46:56 +00:00
dsainty
875fb84fb9 Import Device::XBee::API version 0.3.
Device::XBee::API is a module designed to encapsulate the Digi XBee API in
object-oriented Perl.  This module expects to communicate with an XBee
module using the API firmware via a serial (or serial over USB) device.
2011-08-28 06:40:10 +00:00
hans
fd9449c295 Update to 9.0.302, see http://www.columbia.edu/kermit/ck90.html for more
information.

Tested on NetBSD-current and OpenIndiana.

Support for ssl and kerberos is now available through the options
framework.
2011-08-25 14:54:06 +00:00
hans
636c135078 FILE is a opaque data type on 64bit SunOS, its true definition is not
available in any headers.

Hack around this by adding the definition from the Illumos source in the
relevant place. Fixes 64bit build.
2011-08-25 13:46:28 +00:00
wiz
1143726d96 Update to 1.58:
1.58  Mon Mar  7 22:31:22 EST 2011
    - Fixed RT #48229, an uninitialized value when registering to the network
      but getting no answer from the phone.

1.57  Mon Mar  7 20:53:03 EST 2011
    - Fixed a bug in send_sms() that prevented it from working at all.
      The bug was introduced with the "assume_registered" option.
    - Fixed RT #57585. Thanks to Eric Kössldorfer for his patch and
      test case.
    - Added PDU<->latin1 conversion functions in Device::Gsm::Pdu
    - Note to self: first release from Australia!
2011-08-16 19:58:06 +00:00
wiz
d7340e20ea Update to 1.54:
1.54  Sun May 29 20:53:23 AEST 2011
    - Removed uninitialized warning on $obj->{'CONNECTED'}.
      Fixes RT #68504.
2011-08-16 19:56:56 +00:00
obache
f522927b16 Revision bump after updating perl5 to 5.14.1. 2011-08-14 07:38:55 +00:00
jnemeth
7ddb985de8 Bump PKGREVISION for perl update. 2011-08-07 02:40:32 +00:00
ryoon
d461a1e70a Fix MAINTAINER e-mail address. 2011-08-02 08:31:35 +00:00
adam
14ab841da9 Changes 2.5:
* Handle device reconnected more smoothly (USB-serial dongles)
* Translation updates: Danish
* Several fixes (see ChangeLog)

Changes 2.4:
* Add -D and -b options to specify device and baud rate on the command
   line.
* Do character conversion between local and remote side (-R option)
* Added indonesian translation
* Compatibility fixes for recent build environments
* Remove code that handled very old systems

Changes 2.3:
* Fix build on Mac OS X
* New version of the dial format to be little and big endian as well as
   32/64 bit safe
* Support more baud rates
* Handle device disappearances (e.g. serial-USB device unplug)
* Various build and other fixes

Changes 2.2:
* Vietnamese translation added
* Norwegian translation added
* Traditional chinese translation added
* Swedish translation added
* Romanian translation added
* default to 8bit mode if LANG or LC_ALL are set
* default baud rate set to 115200
* Various code cleanups and fixes
2011-08-01 09:30:33 +00:00
joerg
46d38d0ff9 Fix a bunch of real world bugs that clang warns about. Fix up fix for
ctype usage to actually do the right thing, not just stop the warning.
Bump revision.
2011-07-21 15:35:55 +00:00
obache
7f43353df0 recursive bump from gnome-vfs drop crypto dependency. 2011-07-21 13:05:46 +00:00
jnemeth
41a3f743d0 Update to Asterisk 1.8.5.0: this is a general bug fix release
The release of Asterisk 1.8.5.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* Fix Deadlock with attended transfer of SIP call

* Fixes thread blocking issue in the sip TCP/TLS implementation.

* Be more tolerant of what URI we accept for call completion PUBLISH requests.

* Fix a nasty chanspy bug which was causing a channel leak every time a spied on
  channel made a call.

* This patch fixes a bug with MeetMe behavior where the 'P' option for always
  prompting for a pin is ignored for the first caller.

* Fix issue where Asterisk does not hangup a channel after endpoint hangs up. If
  the call that the dialplan started an AGI script for is hungup while the AGI
  script is in the middle of a command then the AGI script is not notified of
  the hangup.

* Resolve issue where leaving a voicemail, the MWI message is never sent. The
  same thing happens when checking a voicemail and marking it as read.

* Resolve issue where wait for leader with Music On Hold allows crosstalk
  between participants. Parenthesis in the wrong position. Regression from issue
  #14365 when expanding conference flags to use 64 bits.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.5.0

Thank you for your continued support of Asterisk!
2011-07-16 21:35:11 +00:00
plunky
a56bb6e34e update to 1.4.15
minor fixes, contributed by me
  - handle 32-bit short alias uuid's
  - forward compat for openobex-2.0 (nearing release)
2011-07-13 20:51:41 +00:00
jnemeth
33d1422458 Update to Asterisk 1.8.4.4 (fixes AST-2011-011):
Asterisk Project Security Advisory - AST-2011-011

   +------------------------------------------------------------------------+
   |      Product       | Asterisk                                          |
   |--------------------+---------------------------------------------------|
   |      Summary       | Possible enumeration of SIP users due to          |
   |                    | differing authentication responses                |
   |--------------------+---------------------------------------------------|
   | Nature of Advisory | Unauthorized data disclosure                      |
   |--------------------+---------------------------------------------------|
   |   Susceptibility   | Remote unauthenticated sessions                   |
   |--------------------+---------------------------------------------------|
   |      Severity      | Moderate                                          |
   |--------------------+---------------------------------------------------|
   |   Exploits Known   | No                                                |
   |--------------------+---------------------------------------------------|
   |      CVE Name      | CVE-2011-2536                                     |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Description | Asterisk may respond differently to SIP requests from an |
   |             | invalid SIP user than it does to a user configured on    |
   |             | the system, even when the alwaysauthreject option is set |
   |             | in the configuration. This can leak information about    |
   |             | what SIP users are valid on the Asterisk system.         |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Resolution | Respond to SIP requests from invalid and valid SIP users  |
   |            | in the same way. Asterisk 1.4 and 1.6.2 do not respond    |
   |            | identically by default due to backward-compatibility      |
   |            | reasons, and must have alwaysauthreject=yes set in        |
   |            | sip.conf. Asterisk 1.8 defaults to alwaysauthreject=yes.  |
   |            |                                                           |
   |            | IT IS ABSOLUTELY IMPERATIVE that users of Asterisk 1.4    |
   |            | and 1.6.2 set alwaysauthreject=yes in the general section |
   |            | of sip.conf.                                              |
   +------------------------------------------------------------------------+
2011-07-05 08:42:56 +00:00
jnemeth
5b13bdee1f Update to 1.6.2.19 (fixes several security issues):
Please note that Asterisk 1.6.2.19 is the final maintenance release
from the 1.6.2 branch. Support for security related issues will
continue until April 21, 2012. For more information about support
of the various Asterisk branches, see
https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions

The release of Asterisk 1.6.2.19 resolves several issues reported
by the community and would have not been possible without your
participation.  Thank you!

The following is a sample of the issues resolved in this release:

* Don't broadcast FullyBooted to every AMI connection
   The FullyBooted event should not be sent to every AMI connection
   every time someone connects via AMI. It should only be sent to
   the user who just connected.
   (Closes issue #18168. Reported, patched by FeyFre)
* Fix thread blocking issue in the sip TCP/TLS implementation.
   (Closes issue #18497. Reported by vois. Tested by vois, rossbeer, kowalma,
   Freddi_Fonet. Patched by dvossel)
* Don't delay DTMF in core bridge while listening for DTMF features.
   (Closes issue #15642, #16625. Reported by jasonshugart, sharvanek. Tested by
   globalnetinc, jde. Patched by oej, twilson)
* Fix chan_local crashs in local_fixup()
   Thanks OEJ for tracking down the issue and submitting the patch.
   (Closes issue #19053. Reported, patched by oej)
* Don't offer video to directmedia callee unless caller offered it as well
   (Closes issue #19195. Reported, patched by one47)

Additionally security announcements AST-2011-008, AST-2011-010, and
AST-2011-011 have been resolved in this release.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.19
2011-07-05 08:34:47 +00:00
dholland
a9f32ec9ba Use more REPLACE_PERL, and use SUBST for handling the interpreter line of
a build product.
2011-06-19 18:37:38 +00:00
dholland
156de008c1 sort 2011-06-19 18:35:30 +00:00
obache
f38363508f recursive bump from textproc/icu shlib major bump. 2011-06-10 09:39:41 +00:00
jnemeth
9458c535e3 Upgrade to 1.8.4.2. This fixes several security issues including:
AST-2011-002, AST-2011-003, AST-2011-004, AST-2011-005, AST-2011-006,
and AST-2011-007.

pkgsrc changes:
- add patch for autosupport script; == -> =
- patch configure to not unconditionally set PBX_LAUNCHD=1
  - this allows res_timing_kqueue.so to build

This last change brings a timing source to NetBSD which allows IAX
trunking and allows the bridging modules to work, a rather major
piece that was missing.  Note that I haven't extensively tested
it.  But, have at it...

===========================================================================
1.8.4.2:

The Asterisk Development Team has announced the release of Asterisk
version 1.8.4.2, which is a security release for Asterisk 1.8.

The release of Asterisk 1.8.4.2 resolves an issue with SIP URI parsing
which can lead to a remotely exploitable crash:

     Remote Crash Vulnerability in SIP channel driver (AST-2011-007)

The issue and resolution is described in the AST-2011-007 security
advisory.

For more information about the details of this vulnerability, please
read the security advisory AST-2011-007, which was released at the same
time as this announcement.

For a full list of changes in the current release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.2

Security advisory AST-2011-007 is available at:

http://downloads.asterisk.org/pub/security/AST-2011-007.pdf

===========================================================================
1.8.4.1:

The Asterisk Development Team has announced the release of Asterisk 1.8.4.1.

The release of Asterisk 1.8.4.1 resolves several issues reported by the
community. Without your help this release would not have been possible.
Thank you!

Below is a list of issues resolved in this release:

 * Fix our compliance with RFC 3261 section 18.2.2. (aka Cisco phone fix)

 * Resolve a change in IPv6 header parsing due to the Cisco phone fix issue.
   This issue was found and reported by the Asterisk test suite.

 * Resolve potential crash when using SIP TLS support.

 * Improve reliability when using SIP TLS.

For a full list of changes in this release candidate, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4.1

===========================================================================
1.8.4:

The Asterisk Development Team has announced the release of Asterisk 1.8.4.

The release of Asterisk 1.8.4 resolves several issues reported by the community.
Without your help this release would not have been possible. Thank you!

Below is a sample of the issues resolved in this release:

 * Use SSLv23_client_method instead of old SSLv2 only.

 * Resolve crash in ast_mutex_init()

 * Resolution of several DTMF based attended transfer issues.

   NOTE: Be sure to read the ChangeLog for more information about these changes.

 * Resolve deadlocks related to device states in chan_sip

 * Resolve an issue with the Asterisk manager interface leaking memory when
   disabled.

 * Support greetingsfolder as documented in voicemail.conf.sample.

 * Fix channel redirect out of MeetMe() and other issues with channel softhangup

 * Fix voicemail sequencing for file based storage.

 * Set hangup cause in local_hangup so the proper return code of 486 instead of
   503 when using Local channels when the far sides returns a busy. Also affects
   CCSS in Asterisk 1.8+.

 * Fix issues with verbose messages not being output to the console.

 * Fix Deadlock with attended transfer of SIP call

Includes changes per AST-2011-005 and AST-2011-006
For a full list of changes in this release candidate, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4

Information about the security releases are available at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

===========================================================================
1.8.3.3:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3.

The releases of Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3 resolve two
issues:

* File Descriptor Resource Exhaustion (AST-2011-005)
* Asterisk Manager User Shell Access (AST-2011-006)

The issues and resolutions are described in the AST-2011-005 and AST-2011-006
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-005 and AST-2011-006, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.3.3

Security advisory AST-2011-005 and AST-2011-006 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

===========================================================================
1.8.3.2:

he Asterisk Development Team has announced security releases for Asterisk
branches 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.6.1.24, 1.6.2.17.2, and 1.8.3.2.

** This is a re-release of Asterisk 1.6.1.23, 1.6.2.17.1 and 1.8.3.1 which
    contained a bug which caused duplicate manager entries (issue #18987).

The releases of Asterisk 1.6.1.24, 1.6.2.17.2, and 1.8.3.2 resolve two issues:

  * Resource exhaustion in Asterisk Manager Interface (AST-2011-003)
  * Remote crash vulnerability in TCP/TLS server (AST-2011-004)

The issues and resolutions are described in the AST-2011-003 and AST-2011-004
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-003 and AST-2011-004, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.3.2

Security advisory AST-2011-003 and AST-2011-004 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-003.pdf
http://downloads.asterisk.org/pub/security/AST-2011-004.pdf

===========================================================================
1.8.3.1:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.6.1.23, 1.6.2.17.1, and 1.8.3.1.

The releases of Asterisk 1.6.1.23, 1.6.2.17.1, and 1.8.3.1 resolve two issues:

  * Resource exhaustion in Asterisk Manager Interface (AST-2011-003)
  * Remote crash vulnerability in TCP/TLS server (AST-2011-004)

The issues and resolutions are described in the AST-2011-003 and AST-2011-004
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-003 and AST-2011-004, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.3.1

Security advisory AST-2011-003 and AST-2011-004 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-003.pdf
http://downloads.asterisk.org/pub/security/AST-2011-004.pdf

===========================================================================
1.8.3:

The Asterisk Development Team has announced the release of Asterisk 1.8.3.

The release of Asterisk 1.8.3 resolves several issues reported by the community
and would have not been possible without your participation. Thank you!

The following is a sample of the issues resolved in this release:

* Resolve duplicated data in the AstDB when using DIALGROUP()

* Ensure the ipaddr field in realtime is large enough to handle IPv6 addresses.

* Reworking parsing of mwi => lines to resolve a segfault. Also add a set of
   unit tests for the function that does the parsing.

* When using cdr_pgsql the billsec field was not populated correctly on
   unanswered calls.

* Resolve memory leak in iCalendar and Exchange calendaring modules.

* This version of Asterisk includes the new Compiler Flags option
   BETTER_BACKTRACES which uses libbfd to search for better symbol information
   within both the Asterisk binary, as well as loaded modules, to assist when
   using inline backtraces to track down problems.

* Resolve issue where no Music On Hold may be triggered when using
   res_timing_dahdi.

* Resolve a memory leak when the Asterisk Manager Interface is disabled.

* Reimplemented fax session reservation to reverse the ABI breakage introduced
   in r297486.

* Fix regression that changed behavior of queues when ringing a queue member.

* Resolve deadlock involving REFER.

Additionally, this release has the changes related to security bulletin
AST-2011-002 which can be found at
http://downloads.asterisk.org/pub/security/AST-2011-002.pdf

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.3

===========================================================================
1.8.2.4:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4.

The releases of Asterisk 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4 resolve an
issue that when decoding UDPTL packets, multiple stack and heap based arrays can
be made to overflow by specially crafted packets. Systems configured for
T.38 pass through or termination are vulnerable. The issue and resolution are
described in the AST-2011-002 security advisory.

For more information about the details of this vulnerability, please read the
security advisory AST-2011-002, which was released at the same time as this
announcement.

For a full list of changes in the current release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.2.4

Security advisory AST-2011-002 is available at:

http://downloads.asterisk.org/pub/security/AST-2011-002.pdf
2011-06-09 09:17:27 +00:00
jnemeth
3337d89b3e Upgrade to 1.6.2.18. This fixes several security issues including:
AST-2011-002, AST-2011-003, AST-2011-004, AST-2011-005, and AST-2011-006.

===========================================================================
1.6.2.18:

The Asterisk Development Team has announced the release of Asterisk 1.6.2.18.

The release of Asterisk 1.6.2.18 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

 * Only offer codecs both sides support for directmedia.

 * Resolution of several DTMF based attended transfer issues.
   NOTE: Be sure to read the ChangeLog for more information about these changes.

 * Resolve deadlocks related to device states in chan_sip

 * Fix channel redirect out of MeetMe() and other issues with channel softhangup

 * Fix voicemail sequencing for file based storage.

 * Guard against retransmitting BYEs indefinitely during attended transfers with
   chan_sip.

In addition to the changes listed above, commits to resolve security issues
AST-2011-005 and AST-2011-006 have been merged into this release. More
information about AST-2011-005 and AST-2011-006 can be found at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.18

===========================================================================
1.6.2.17.3

The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3.

The releases of Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3 resolve two
issues:

* File Descriptor Resource Exhaustion (AST-2011-005)
* Asterisk Manager User Shell Access (AST-2011-006)

The issues and resolutions are described in the AST-2011-005 and AST-2011-006
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-005 and AST-2011-006, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.3

Security advisory AST-2011-005 and AST-2011-006 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

===========================================================================
1.6.2.17.2:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.6.1.24, 1.6.2.17.2, and 1.8.3.2.

** This is a re-release of Asterisk 1.6.1.23, 1.6.2.17.1 and 1.8.3.1 which
    contained a bug which caused duplicate manager entries (issue #18987).

The releases of Asterisk 1.6.1.24, 1.6.2.17.2, and 1.8.3.2 resolve two issues:

  * Resource exhaustion in Asterisk Manager Interface (AST-2011-003)
  * Remote crash vulnerability in TCP/TLS server (AST-2011-004)

The issues and resolutions are described in the AST-2011-003 and AST-2011-004
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-003 and AST-2011-004, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.2

Security advisory AST-2011-003 and AST-2011-004 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-003.pdf
http://downloads.asterisk.org/pub/security/AST-2011-004.pdf

===========================================================================
1.6.2.17.1:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.6.1.23, 1.6.2.17.1, and 1.8.3.1.

These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The releases of Asterisk 1.6.1.23, 1.6.2.17.1, and 1.8.3.1 resolve two issues:

  * Resource exhaustion in Asterisk Manager Interface (AST-2011-003)
  * Remote crash vulnerability in TCP/TLS server (AST-2011-004)

The issues and resolutions are described in the AST-2011-003 and AST-2011-004
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-003 and AST-2011-004, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.1

Security advisory AST-2011-003 and AST-2011-004 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-003.pdf
http://downloads.asterisk.org/pub/security/AST-2011-004.pdf

===========================================================================
1.6.2.16.2:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4.

The releases of Asterisk 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4 resolve an
issue that when decoding UDPTL packets, multiple stack and heap based arrays can
be made to overflow by specially crafted packets. Systems configured for
T.38 pass through or termination are vulnerable. The issue and resolution are
described in the AST-2011-002 security advisory.

For more information about the details of this vulnerability, please read the
security advisory AST-2011-002, which was released at the same time as this
announcement.

For a full list of changes in the current release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.16.2

Security advisory AST-2011-002 is available at:

http://downloads.asterisk.org/pub/security/AST-2011-002.pdf
2011-06-06 06:25:06 +00:00
jnemeth
935058d138 Upgrade to 1.6.2.18. This fixes several security issues including:
AST-2011-002, AST-2011-003, AST-2011-004, AST-2011-005, and AST-2011-006.

===========================================================================
1.6.2.18:

The Asterisk Development Team has announced the release of Asterisk 1.6.2.18.

The release of Asterisk 1.6.2.18 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

 * Only offer codecs both sides support for directmedia.

 * Resolution of several DTMF based attended transfer issues.
   NOTE: Be sure to read the ChangeLog for more information about these changes.

 * Resolve deadlocks related to device states in chan_sip

 * Fix channel redirect out of MeetMe() and other issues with channel softhangup

 * Fix voicemail sequencing for file based storage.

 * Guard against retransmitting BYEs indefinitely during attended transfers with
   chan_sip.

In addition to the changes listed above, commits to resolve security issues
AST-2011-005 and AST-2011-006 have been merged into this release. More
information about AST-2011-005 and AST-2011-006 can be found at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.18

===========================================================================
1.6.2.17.3

The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3.

The releases of Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3 resolve two
issues:

* File Descriptor Resource Exhaustion (AST-2011-005)
* Asterisk Manager User Shell Access (AST-2011-006)

The issues and resolutions are described in the AST-2011-005 and AST-2011-006
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-005 and AST-2011-006, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.3

Security advisory AST-2011-005 and AST-2011-006 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

===========================================================================
1.6.2.17.2:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.6.1.24, 1.6.2.17.2, and 1.8.3.2.

** This is a re-release of Asterisk 1.6.1.23, 1.6.2.17.1 and 1.8.3.1 which
    contained a bug which caused duplicate manager entries (issue #18987).

The releases of Asterisk 1.6.1.24, 1.6.2.17.2, and 1.8.3.2 resolve two issues:

  * Resource exhaustion in Asterisk Manager Interface (AST-2011-003)
  * Remote crash vulnerability in TCP/TLS server (AST-2011-004)

The issues and resolutions are described in the AST-2011-003 and AST-2011-004
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-003 and AST-2011-004, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.2

Security advisory AST-2011-003 and AST-2011-004 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-003.pdf
http://downloads.asterisk.org/pub/security/AST-2011-004.pdf

===========================================================================
1.6.2.17.1:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.6.1.23, 1.6.2.17.1, and 1.8.3.1.

These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The releases of Asterisk 1.6.1.23, 1.6.2.17.1, and 1.8.3.1 resolve two issues:

  * Resource exhaustion in Asterisk Manager Interface (AST-2011-003)
  * Remote crash vulnerability in TCP/TLS server (AST-2011-004)

The issues and resolutions are described in the AST-2011-003 and AST-2011-004
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-003 and AST-2011-004, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.1

Security advisory AST-2011-003 and AST-2011-004 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-003.pdf
http://downloads.asterisk.org/pub/security/AST-2011-004.pdf

===========================================================================
1.6.2.17:

The Asterisk Development Team has announced the release of Asterisk 1.6.2.17.

The release of Asterisk 1.6.2.17 resolves several issues reported by the
community and would have not been possible without your participation.

The following is a sample of the issues resolved in this release:

* Resolve duplicated data in the AstDB when using DIALGROUP()

* Correct issue where res_config_odbc could populate fields with invalid data.

* When using cdr_pgsql the billsec field was not populated correctly on
   unanswered calls.

* Resolve issue where re-transmissions of SUBSCRIBE could break presence.

* Fix regression causing forwarding voicemails to not work with file storage.

* This version of Asterisk includes the new Compiler Flags option
   BETTER_BACKTRACES which uses libbfd to search for better symbol information
   within both the Asterisk binary, as well as loaded modules, to assist when
   using inline backtraces to track down problems.

* Resolve several issues with DTMF based attended transfers.
   NOTE: Be sure to read the ChangeLog for more information about these changes.

* Resolve issue where no Music On Hold may be triggered when using
   res_timing_dahdi.

* Fix regression that changed behavior of queues when ringing a queue member.

Additionally, this release has the changes related to security bulletin
AST-2011-002 which can be found at
http://downloads.asterisk.org/pub/security/AST-2011-002.pdf

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.17

===========================================================================
1.6.2.16.2:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4.

The releases of Asterisk 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4 resolve an
issue that when decoding UDPTL packets, multiple stack and heap based arrays can
be made to overflow by specially crafted packets. Systems configured for
T.38 pass through or termination are vulnerable. The issue and resolution are
described in the AST-2011-002 security advisory.

For more information about the details of this vulnerability, please read the
security advisory AST-2011-002, which was released at the same time as this
announcement.

For a full list of changes in the current release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.16.2

Security advisory AST-2011-002 is available at:

http://downloads.asterisk.org/pub/security/AST-2011-002.pdf
=============================================================================
2011-06-06 06:25:05 +00:00
obache
9b6a06a840 * Change MASTER_SITES subdir to simple usual one.
* fix DEPENDS pattern, need to surround {} for multiple pkgname pattern.
2011-05-19 05:19:32 +00:00
dmcmahill
c4d4a477a7 add and enable several perl modules needed to support databases/koha. PR pkg/43929 2011-05-18 02:23:22 +00:00
dmcmahill
0685e38c69 Initial import of comms/p5-SMS-Send version 0.05
This package was submited as part of PR pkg/43929 which adds the Koha Integrated Library System
submitted by Edgar Fuß

-------------------------------------

SMS::Send is intended to provide a driver-based single API for sending SMS and
MMS messages. The intent is to provide a single API against which to write the
code to send an SMS message.

At the same time, the intent is to remove the limits of some of the previous
attempts at this sort of API, like "must be free internet-based SMS services".

SMS::Send drivers are installed seperately, and might use the web, email or
physical SMS hardware. It could be a free or paid. The details shouldn't matter.

You should not have to care how it is actually sent, only that it has been sent
(although some drivers may not be able to provide certainty).
2011-05-17 10:31:52 +00:00
hans
1f27876ca1 Fix build on SunOS. 2011-05-14 19:27:53 +00:00
obache
dae1f51999 Let not to change DIST_SUBDIR after bump PKGREVISION to 2.
PR#44914.
2011-04-28 02:30:11 +00:00
obache
0e2c97799a recursive bump from gettext-lib shlib bump. 2011-04-22 13:41:54 +00:00
obache
3cfcb96dff move PKG_DESTDIR_SUPPORT and LICENSE to usual location. 2011-04-16 11:16:34 +00:00
obache
57350df4f4 Remove unwanted empty PKGREVISION. 2011-04-16 11:14:31 +00:00
is
0c7d254bcb format police 2011-04-07 13:18:23 +00:00
is
944ae569e5 DESTDIRize. 2011-04-07 12:53:05 +00:00
is
1c4e4d528a Update to 1.1.37 2011-04-06 20:57:18 +00:00
is
a7eb295f93 License is GPL V2. Hinted in Readme.1st, verified with author. (COPYING
is missing in the top level directory, but available in ../x11/viewfax/ and
../tcl/faxview/. COPYING is available in 1.1.37 (TODO: upgrade).
2011-04-06 15:03:02 +00:00
is
f61ac748e9 PKG_DESTDIR_SUPPORT=destdir 2011-04-05 21:09:50 +00:00
is
3d87ee97b4 Bump revision. 2011-03-31 17:55:25 +00:00
is
ea087528a0 Point LICENSE to estic-license, remove RESTRICTIONS according to it, as
discussed with gdt@ and martin@.
2011-03-31 17:40:16 +00:00
zafer
a271826ba5 update master_sites. ftp service has been suspended. 2011-03-14 12:11:50 +00:00
zafer
5e15686189 revert. was temporary unavailable. 2011-03-14 12:08:53 +00:00
zafer
3798be2b88 service discontinued (> 2 years ago). prevent time out. fetch from master_sites_backup. 2011-03-11 10:45:49 +00:00
wiz
36ff915e97 Reset maintainer for retired developers. 2011-02-28 14:52:37 +00:00
taca
6d80a96612 Bump PKGREVISION due to ABI change of ruby18-base. 2011-02-21 16:01:10 +00:00
wiz
8a782021c9 + spandsp. 2011-02-10 16:26:40 +00:00
jnemeth
2a80b9c08a SpanDSP is a library of DSP functions for telephony, in the 8000
sample per second world of E1s, T1s, and higher order PCM channels.
It contains low level functions, such as basic filters. It also
contains higher level functions, such as cadenced supervisory tone
detection, and a complete software FAX machine.  The software has
been designed to avoid intellectual property issues, using mature
techniques where all relevant patents have expired. See the file
DueDiligence for important information about these intellectual
property issues.
2011-02-06 08:32:06 +00:00
jnemeth
2da05b13db Add a spandsp option which pulls in comms/spandsp and links against it
to enable res_fax_spandsp.so.  Don't bother with a PKGREVISION bump since
this doesn't change default builds and there is no need tobother people
that don't need the option.
2011-02-06 08:30:17 +00:00
jnemeth
4af9686ddf Added a comment that the issue these patches fix (mainly adding support
for NetBSD style atomic ops) has been reported upstream.  No change to
binary package, so no REVISION bump.
2011-01-29 22:50:32 +00:00
jnemeth
6a8a7e3143 Bah! Upstream changed a couple of text files in the distro tarball
without cranking the version number.
2011-01-28 01:50:38 +00:00
jnemeth
264f85dcbc Update to 1.8.2.3 -- bug fix release to fix a FAX issue
pkgsrc:  fix issue with patch for detecting sys/atomic.h

The Asterisk Development Team has announced the release of Asterisk 1.8.2.3.

The release of Asterisk 1.8.2.3 resolves the following issue:

  * Reimplemented fax session reservation to reverse the ABI breakage introduced
    in r297486.
    (Reported by Jeremy Kister on the asterisk-users mailing list. Patched by
    mnicholson)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.2.3
2011-01-27 04:03:17 +00:00
jnemeth
e22ff5c255 Update to 1.8.2.2
This is to fix AST-2011-001: Stack buffer overflow in SIP channel driver

               Asterisk Project Security Advisory - AST-2011-001

         Product        Asterisk
         Summary        Stack buffer overflow in SIP channel driver
    Nature of Advisory  Exploitable Stack Buffer Overflow
      Susceptibility    Remote Authenticated Sessions
         Severity       Moderate
      Exploits Known    No
       Reported On      January 11, 2011
       Reported By      Matthew Nicholson
        Posted On       January 18, 2011
     Last Updated On    January 18, 2011
     Advisory Contact   Matthew Nicholson <mnicholson at digium.com>
         CVE Name

   Description When forming an outgoing SIP request while in pedantic mode, a
               stack buffer can be made to overflow if supplied with
               carefully crafted caller ID information. This vulnerability
               also affects the URIENCODE dialplan function and in some
               versions of asterisk, the AGI dialplan application as well.
               The ast_uri_encode function does not properly respect the size
               of its output buffer and can write past the end of it when
               encoding URIs.

For full details, see:

http://downloads.digium.com/pub/security/AST-2011-001.html
2011-01-21 07:00:43 +00:00
jnemeth
1eefa3647d Update to 1.6.2.16.1
This is to fix AST-2011-001: Stack buffer overflow in SIP channel driver

               Asterisk Project Security Advisory - AST-2011-001

         Product        Asterisk
         Summary        Stack buffer overflow in SIP channel driver
    Nature of Advisory  Exploitable Stack Buffer Overflow
      Susceptibility    Remote Authenticated Sessions
         Severity       Moderate
      Exploits Known    No
       Reported On      January 11, 2011
       Reported By      Matthew Nicholson
        Posted On       January 18, 2011
     Last Updated On    January 18, 2011
     Advisory Contact   Matthew Nicholson <mnicholson at digium.com>
         CVE Name

   Description When forming an outgoing SIP request while in pedantic mode, a
               stack buffer can be made to overflow if supplied with
               carefully crafted caller ID information. This vulnerability
               also affects the URIENCODE dialplan function and in some
               versions of asterisk, the AGI dialplan application as well.
               The ast_uri_encode function does not properly respect the size
               of its output buffer and can write past the end of it when
               encoding URIs.

For full details, see:

http://downloads.digium.com/pub/security/AST-2011-001.html
2011-01-21 05:13:12 +00:00
jnemeth
39d0decc5d Update to 1.8.2:
The release of Asterisk 1.8.2 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* 'sip notify clear-mwi' needs terminating CRLF.
   (Closes issue #18275. Reported, patched by klaus3000)

* Patch for deadlock from ordering issue between channel/queue locks in
   app_queue (set_queue_variables).
   (Closes issue #18031. Reported by rain. Patched by bbryant)

* Fix cache of device state changes for multiple servers.
   (Closes issue #18284, #18280. Reported, tested by klaus3000. Patched, tested
   by russellb)

* Resolve issue where channel redirect function (CLI or AMI) hangs up the call
   instead of redirecting the call.
   (Closes issue #18171. Reported by: SantaFox)
   (Closes issue #18185. Reported by: kwemheuer)
   (Closes issue #18211. Reported by: zahir_koradia)
   (Closes issue #18230. Reported by: vmarrone)
   (Closes issue #18299. Reported by: mbrevda)
   (Closes issue #18322. Reported by: nerbos)

* Fix reloading of peer when a user is requested. Prevent peer reloading from
   causing multiple MWI subscriptions to be created when using realtime.
   (Closes issue #18342. Reported, patched by nivek.)

* Fix XMPP PubSub-based distributed device state. Initialize pubsubflags to 0
   so res_jabber doesn't think there is already an XMPP connection sending
   device state. Also clean up CLI commands a bit.
   (Closes issue #18272. Reported by klaus3000. Patched by Marquis42)

* Don't crash after Set(CDR(userfield)=...) in ast_bridge_call. Instead of
   setting peer->cdr = NULL, set it to not post.
   (Closes issue #18415. Reported by macbrody. Patched, tested by jsolares)

* Fixes issue with outbound google voice calls not working. Thanks to az1234
   and nevermind_quack for their input in helping debug the issue.
   (Closes issue #18412. Reported by nevermind_quack. Patched by dvossel)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.2
2011-01-16 17:52:42 +00:00
jnemeth
3bd1a0e6db Update to 1.6.2.16:
The release of Asterisk 1.6.2.16 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* Fix cache of device state changes for multiple servers.
   (Closes issue #18284, #18280. Reported, tested by klaus3000. Patched, tested
   by russellb)

* Resolve issue where channel redirect function (CLI or AMI) hangs up the call
   instead of redirecting the call.
   (Closes issue #18171. Reported by: SantaFox)
   (Closes issue #18185. Reported by: kwemheuer)
   (Closes issue #18211. Reported by: zahir_koradia)
   (Closes issue #18230. Reported by: vmarrone)
   (Closes issue #18299. Reported by: mbrevda)
   (Closes issue #18322. Reported by: nerbos)

* Linux and *BSD disagree on the elements within the ucred structure. Detect
   which one is in use on the system.
   (Closes issue #18384. Reported, patched, tested by bjm, tilghman)

* app_followme: Don't create a Local channel if the target extension does not
   exist.
   (Closes issue #18126. Reported, patched by junky)

* Revert code that changed SSRC for DTMF.
   (Closes issue #17404, #18189, #18352. Reported by sdolloff, marcbou. rsw686.
   Tested by cmbaker82)

* Resolve issue where REGISTER request with a Call-ID matching an existing
   transaction is received it was possible that the REGISTER request would
   overwrite the initreq of the private structure.
   (Closes issue #18051. Reported by eeman. Patched, tested by twilson)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.16
2011-01-16 06:30:56 +00:00
wiz
2f4126dc58 png shlib name changed for png>=1.5.0, so bump PKGREVISIONs. 2011-01-13 13:36:05 +00:00
obache
4ac39b9455 Update HOMEPAGE and MASTER_SITES. 2011-01-13 10:59:11 +00:00
obache
d1a9ad1cb5 treat DragonFly same as other *BSD. 2011-01-06 00:33:39 +00:00
obache
05784edea7 Add a workaround for DragonFly arpa/telnet.h. 2010-12-30 09:22:43 +00:00
obache
72c0910c0b Include <stdlib.h> not only NetBSD.
It already included unconditionally with other patches,
and fixes build failure on other platforms.
2010-12-30 09:02:51 +00:00
dsainty
ada744dc0a Mechanically replace references to graphics/jpeg with the suitable
alternative from mk/jpeg.buildlink3.mk

This allows selection of an alternative jpeg library (namely the x86 MMX,
SSE, SSE2 accelerated libjpeg-turbo) via JPEG_DEFAULT=libjpeg-turbo, and
follows the current standard model for alternatives (fam, motif, fuse etc).

The mechanical edits were applied via the following script:

#!/bin/sh
for d in */*; do
  [ -d "$d" ] || continue
  for i in "$d/"Makefile* "$d/"*.mk; do
    case "$i" in *.orig|*"*"*) continue;; esac
    out="$d/x"
    sed -e 's;graphics/jpeg/buildlink3\.mk;mk/jpeg.buildlink3.mk;g' \
        -e 's;BUILDLINK_PREFIX\.jpeg;JPEGBASE;g' \
        < "$i" > "$out"
    if cmp -s "$i" "$out"; then
      rm -f "$out"
    else
      echo "Edited $i"
      mv -f "$i" "$i.orig" && mv "$out" "$i"
    fi
  done
done
2010-12-23 11:44:24 +00:00
jnemeth
3bd8667948 fix pasto in a DragonFly BSD support patch 2010-12-22 08:25:58 +00:00
jnemeth
7e53d56e7b PR/44257 - Francois Tigeot -- build fixes for DragonFly BSD
Don't bother bumping the version since it didn't build on DFBSD
before there is no binary package that could have changed, and this
doesn't change the binary packages on other systems.
2010-12-22 04:28:52 +00:00
jnemeth
e6f1f9c278 flag cel_odbc.so as only being installed when unixodbc option is selected 2010-12-20 04:06:16 +00:00
jnemeth
b87c937c14 Update to 1.8.1.1. This is a minor bugfix update.
The release of Asterisk 1.8.1.1 resolves two issues reported by the community
since the release of Asterisk 1.8.1.

  * Don't crash after Set(CDR(userfield)=...) in ast_bridge_call. Instead of
    setting peer->cdr = NULL, set it to not post.
    (Closes issue #18415. Reported by macbrody. Patched, tested by jsolares)

  * Fixes issue with outbound google voice calls not working. Thanks to az1234
    and nevermind_quack for their input in helping debug the issue.
    (Closes issue #18412. Reported by nevermind_quack. Patched by dvossel)

For a full list of changes in this release candidate, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.1.1
2010-12-17 00:24:28 +00:00
jnemeth
136a8ef6de add and enable asterisk18 2010-12-15 03:27:39 +00:00
jnemeth
c8ba94232c Import Asterisk 1.8.1:
Asterisk is a complete PBX in software.  It provides all of the
features you would expect from a PBX and more. Asterisk does voice
over IP in three protocols, and can interoperate with almost all
standards-based telephony equipment using relatively inexpensive
hardware.

Asterisk 1.8 is a long term support version (i.e. it will be
supported for four years with an additional year of security only
fixes).  See:

https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions

     What's new:

Asterisk 1.8 is the next major release series of Asterisk.

The release of Asterisk 1.8.0 would not have been possible without the support
and contributions of the community. Since Asterisk 1.6.2, we've had over 500
reporters, more than 300 testers and greater than 200 developers contributed to
this release.

You can find a summary of the work involved with the 1.8.0 release in the
sumary:

http://svn.asterisk.org/svn/asterisk/tags/1.8.0/asterisk-1.8.0-summary.txt

A short list of available features includes:

     * Secure RTP
     * IPv6 Support in the SIP channel driver
     * Connected Party Identification Support
     * Calendaring Integration
     * A new call logging system, Channel Event Logging (CEL)
     * Distributed Device State using Jabber/XMPP PubSub
     * Call Completion Supplementary Services support
     * Advice of Charge support
     * Much, much more!

A full list of new features can be found in the CHANGES file.

http://svn.digium.com/view/asterisk/branches/1.8/CHANGES?view=markup

For a full list of changes in the current release candidate, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.0

-----

The Asterisk Development Team has announced the release of Asterisk 1.8.1.

The release of Asterisk 1.8.1 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* Fix issue when using directmedia. Asterisk needs to limit the codecs offered
   to just the ones that both sides recognize, otherwise they may end up sending
   audio that the other side doesn't understand.
   (Closes issue #17403. Reported, patched by one47. Tested by one47, falves11)

* Resolve issue where Party A in an analog 3-way call would continue to hear
   ringback after party C answers.
   (Patched by rmudgett)

* Fix playback failure when using IAX with the timerfd module.
   (Closes issue #18110. Reported, tested by tpanton. Patched by jpeeler)

* Fix problem with qualify option packets for realtime peers never stopping.
   The option packets not only never stopped, but if a realtime peer was not in
   the peer list multiple options dialogs could accumulate over time.
   (Closes issue #16382. Reported by lftsy. Tested by zerohalo. Patched by
   jpeeler)

* Fix issue where it is possible to crash Asterisk by feeding the curl engine
   invalid data.
   (Closes issue #18161. Reported by wdoekes. Patched by tilghman)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.1
2010-12-15 03:22:43 +00:00
jnemeth
9589b93d3b Update to 1.6.2.15. This is primarily a bugfix release.
- disable automatic Lua detection for now until lang/lua/builtin.mk exists

The release of Asterisk 1.6.2.15 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* When using chan_skinny, don't crash when parking a non-bridged call.
   (Closes issue #17680. Reported, tested by jmhunter. Patched, tested by DEA)

* Add ability for Asterisk to try both the encoded and unencoded subscription
   URI for a match in hints.
   (Closes issue #17785. Reported, tested by ramonpeek. Patched by tilghman)

* Set the caller id on CDRs when it is set on the parent channel.
   (Closes issue #17569. Reported, patched by tbelder)

* Ensure user portion of SIP URI matches dialplan when using encoded characters
   (Closes issue #17892. Reported by wdoekes. Patched by jpeeler)

* Resolve issue where Party A in an analog 3-way call would continue to hear
   ringback after party C answers.
   (Patched by rmudgett)

* Fix problem with qualify option packets for realtime peers never stopping.
   The option packets not only never stopped, but if a realtime peer was not in
   the peer list multiple options dialogs could accumulate over time.
   (Closes issue #16382. Reported by lftsy. Tested by zerohalo. Patched by
   jpeeler)

* Multiple fixes related to Local channels.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.15
2010-12-12 10:19:44 +00:00
hauke
7be5725063 ftp.conserver.com re-directs to a machine that does not run an ftp
server, so fetch the sources via http.

Sort out pkg version, while we are here.
2010-12-06 10:59:10 +00:00
hauke
677c597634 Updating conserver 8 to v8.18
version 8.1.18 (Nov 11, 2010):
        - install man pages read-only and improved the contributed redhat init
          script - patches by Eric Biederman <ebiederm@aristanetworks.com>
        - spec file improvements in contrib/redhat-rpm - patch by Jodok Ole
          Muellers <jodok.muellers@aschendorff.de>
        - GSS-API patch for client code - patch by Andras Horvath
          <Andras.Horvath@cern.ch>

version 8.1.17 (Sep 29, 2009):
        - fix for interface detection when HAVE_SA_LEN is defined - first
          detected on NetBSD 5.0 and patched by Chris Ross
          <cross+conserver@distal.com>
        - first person to connect to a console wanting read/write now gets it
          once the active user drops read/write - suggested by Thomas Gardner
          <tmg@pobox.com>
        - fix typo when setting nonblocking socket for client connections,
          fixing stall issues - patch by Eric Biederman
          <ebiederm@aristanetworks.com>
        - GSS-API patch (--with-gssapi) to help with Kerberos tokens - patch by
          Nate Straz <nstraz@redhat.com>
        - authenticate username without @REALM when using GSS-API
          (--with-striprealm) - based on patch by Andras Horvath
          <Andras.Horvath@cern.ch>
        - various contrib/redhat-rpm fixes - patch by Fabien Wernli
          <wernli@in2p3.fr>
        - fix handling of read(stdin) returning -1 in console client - patch by
          Ed Swierk <eswierk@arastra.com>

patch-ac has been included upstream.
2010-12-05 21:25:55 +00:00
wiz
6a9b75fb09 Update to 1.56:
1.56  Mon Nov 15 21:00:00 CET 2010
    - When sending messages in text mode, now we wait a bit
      between the +CMSG command and the actual text.
      Fixes RT #61729. Thanks to Boris Ivanov for the report.
    - Added clear example of logging to a custom file
    - Added a warning for not implemented _read_messages_text()
    - Added a "assume_registered" option to skip GSM network
      registration on buggy/problematic devices.
2010-12-02 12:07:59 +00:00
plunky
647b66f39c update rc.d script: it is now optional to specify the RFCOMM channel
(bump PKGREVISION)
2010-12-01 19:28:25 +00:00
jnemeth
d9bb9c1182 The stop and reload commands require the core prefix now. 2010-11-29 04:20:32 +00:00
plunky
eadf64c888 update to obexapp 1.4.14, with a clump of minor fixes submitted
by Iain Hibbert:

- use libexpat instead of FreeBSD internal libbsdxml

- fix off by one error with busy spinner, which sometimes
  resulted in a spurious backspace in the output

- fflush(stdout) for busy spinner

- print streaming statistics after transfers in client mode

- use HAVE_BT_DEVADDR rather than testing for __NetBSD__

- use bdaddr_any() functions instead of memcpy()

- allow server mode to bind to channel 0, indicating to the OS
  that the first available channel should be used

- prevent busy loop bug if the socket is remotely closed causing
  the read() to return 0 bytes

- fix some [unsigned comparison] compiler warnings

- provide connection ID for all get requests, improves compatibility
  with remote windows mobile devices
2010-11-17 19:14:33 +00:00
abs
93cde1a832 PKGREVISION bumps for changes to gtk2, librsvg, libbonobo and libgnome 2010-11-15 22:56:08 +00:00
jnemeth
c8221a07f9 Update to 1.6.2.14
The release of Asterisk 1.6.2.14 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

 * Fix issue where session timers would be advertised as supported even
   when session-timers=refuse was set in sip.conf. Also fix
   interoperability problems with session timer behavior in Asterisk.
   (Closes issue #17005. Reported by alexcarey. Patched by dvossel)

 * Parse all "Accept" headers for SIP SUBSCRIBE requests.
   (Closes issue #17758. Reported by ibc. Patched by dvossel)

 * Fix issue where queue stats would be reset on reload.
   (Closes issue #17535. Reported by raarts. Patched by tilghman)

 * Fix issue where MoH files were no longer rescanned on during a
   reload.
   (Closes issue #16744. Reported by pj. Patched by Qwell)

 * Fix issue with dialplan pattern matching where the specificity for
   pattern ranges and pattern characters was inconsistent.
   (Closes issue #16903. Reported, patched by Nick_Lewis)

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.14
2010-11-15 05:18:16 +00:00
shattered
309ff161ba Follow HTTP redirects to new HOMEPAGEs and/or MASTER_SITES. 2010-11-13 21:08:54 +00:00
jnemeth
06e91a89ab Add -n to startup options, so starting Asterisk doesn't mess with screen
colours.
2010-11-10 09:29:13 +00:00
jnemeth
b1f5095a8c Adjust rc.d script to disable colour when issuing commands to Asterisk. 2010-10-19 19:21:21 +00:00
jnemeth
90b126719a DISTFILES is now initialized in Makefile, don't re-initialize it here. 2010-10-06 22:39:41 +00:00
obache
644065836d Need to set DEFAULT_DISTFILES to DISTFILES before adding to it. 2010-10-03 07:18:24 +00:00
jnemeth
72fd43d3b5 Update to the 1.6.2 series (specifically 1.6.2.13). This is
a feature update, so users that are upgrading should read UPDATE.txt.

pkgsrc changes:

- update to 1.6.2.13
- bury the asterisk-sounds-extra inside this one to keep it in sync
- handle sound tarballs directly (upstream had changed this to do a
  download during the install phase and dump files in $HOME)
- add new documentation files:
  - asterisk.txt
  - building_queues.txt
  - database_transactions.txt
  - followme.txt

========
1.6.2.13
========

This release resolves an issue where the .version and ChangeLog files were not
updated for 1.6.2.12. Asterisk 1.6.2.13 has no additional changes from 1.6.2.12
other than the .version, ChangeLog and summary files.

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.13

========
1.6.2.12
========

The release of Asterisk 1.6.2.12 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

     * Fix issue where DNID does not get cleared on a new call when using
       immediate=yes with ISDN signaling.
       (Closes issue #17568. Reported by wuwu. Patched by rmudgett)
     * Several updates to res_config_ldap.
       (Closes issue #13573. Reported by navkumar. Patched by navkumar, bencer.
       Tested by suretec)
     * Prevent loss of Caller ID information set on local channel after masquerade.
       (Closes issue #17138. Reported by kobaz, patched by jpeeler)
     * Fix SIP peers memory leak.
       (Closes issue #17774. Reported, patched by kkm)
     * Add Danish support to say.conf.sample
       (Closes issue #17836. Reported, patched by RoadKill)
     * Ensure SSRC is changed when media source is changed to resolve audio delay.
       (Closes issue #17404. Reported, tested by sdolloff. Patched by jpeeler)
     * Only do magic pickup when notifycid is enabled.
       A new way of doing BLF pickup was introduced into 1.6.2. This feature adds a
       call-id value into the XML of a SIP_NOTIFY message sent to alert a subscriber
       that a device is ringing. This option should only be enabled when the new
       'notifycid' option is set, but this was not the case. Instead the call-id
       value was included for every RINGING Notify message, which caused a
       regression for people who used other methods for call pickup.
       (Closes issue #17633. Reported, patched by urosh. Patched by dvossel.
       Tested by: dvossel, urosh, okrief, alecdavis)

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.12

========
1.6.2.11
========

The release of Asterisk 1.6.2.11 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are a few of the issues resolved by community developers:

  * Send DialPlanComplete as a response, not as a separate event. Otherwise, it
    goes to all manager sessions and may exclude the current session, if the
    Events mask excludes it.
    (Closes issue #17504. Reported, patched by rrb3942)

  * Allow the "useragent" value to be restored into memory from the realtime
    backend. This value is purely informational. It does not alter configuration
    at all.
    (Closes issue #16029. Reported, patched by Guggemand)

  * Fix rt(c)p set debug ip taking wrong argument Also clean up some coding
    errors.
    (Closes issue #17469. Reported, patched by wdoekes)

  * Ensure channel placed in meetme in ringing state is properly hung up. An
    outgoing channel placed in meetme while still ringing which was then hung up
    would not exit meetme and the channel was not properly destroyed.
    (Closes issue #15871. Reported, patched by Ivan)

  * Correct how 100, 200, 300, etc. is said. Also add the crazy British numbers.
    (Closes issue #16102. Reported, patched by Delvar)

  * cdr_pgsql does not detect when a table is found. This change adds an ERROR
    message to let you know when a failure exists to get the columns from the
    pgsql database, which typically means that the table does not exist.
    (Closes issue #17478. Reported, patched by kobaz)

  * Avoid crashing when installing a duplicate translation path with a lower
    cost.
    (Closes issue #17092. Reported, patched by moy)

  * Add missing handling for ringing state for use with queue empty options.
    (Closes issue #17471. Reported, patched by jazzy)

  * Fix reporting estimated queue hold time. Just say the number of seconds
    (after minutes) rather than doing some incorrect calculation with respect to
    minutes.
    (Closes issue #17498. Reported, patched by corruptor)

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.11

========
1.6.2.10
========

The release of Asterisk 1.6.2.10 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are a few of the issues resolved by community developers:

  * Allow users to specify a port for DUNDI peers.
    (Closes issue #17056. Reported, patched by klaus3000)

  * Decrease the module ref count in sip_hangup when SIP_DEFER_BYE_ON_TRANSFER is
    set.
    (Closes issue #16815. Reported, patched by rain)

  * If there is realtime configuration, it does not get re-read on reload unless
    the config file also changes.
    (Closes issue #16982. Reported, patched by dmitri)

  * Send AgentComplete manager event for attended transfers.
    (Closes issue #16819. Reported, patched by elbriga)

  * Correct manager variable 'EventList' case.
    (Closes issue #17520. Reported, patched by kobaz)

In addition, changes to res_timing_pthread that should make it more stable have
also been implemented.

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.10

=======
1.6.2.9
=======

The release of Asterisk 1.6.2.9 resolves several issues reported by the
community, and would have not been possible without your participation.
Thank you!

The following are a few of the issues resolved by community developers:

  * Fix the PickupChan() application
    (Closes issue #16863. Reported, patched by schern. Patched by cjacobsen.
     Tested by Graber, cjacobsen, lathama, rickead2000, dvossel)

  * Improve logging by displaying line number
    (Closes issue #16303. Reported by dant. Patched by pabelanger. Tested by
     dant, pabelanger, lmadsen)

  * Notify CLI when modules are loaded/unloaded
    (Closes issue #17308. Reported, patched by pabelanger. Tested by russell)

  * Make the Makefile logic more explicit and move the Snow Leopard logic down to
    where it's not executed on non-Darwin systems
    (Closes issue #17028. Reported by pabelanger. Patched by seanbright,
     tilghman. Tested by pabelanger)

  * Manager cookies are not compatible with RFC2109. Make that no longer true.
    (Closes issue #17231. Reported, patched by ecarruda)

  * With IMAP backend, messages in INBOX were counted twice for MWI
    (Closes issue #17135. Reported by edhorton. Patched by ebroad, tilghman)

  * Fix possible segfault when logging
    (Closes issue #17331. Reported, patched by under. Patched by dvossel)

  * Fix memory hogging behavior of app_queue
    (Closes issue #17081. Reported by wliegel. Patched by mmichelson)

  * Allow type=user SIP endpoints to be loaded properly from realtime
    (Closes issue #16021. Reported, patched by Guggemand)

Additionally, the following issue may be of interest:

  * Fix transcode_via_sln option with SIP calls and improve PLC usage
    (Review: https://reviewboard.asterisk.org/r/622/)


For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.9

=======
1.6.2.8
=======

The release of Asterisk 1.6.2.8 resolves several issues reported by the
community, and would have not been possible without your participation.
Thank you!

The following are a few of the issues resolved by community developers:

   * Enable auto complete for CLI command 'logger set level'.
     (Closes issue #17152. Reported, patched by pabelanger)

   * Make the mixmonitor thread process audio frames faster.
     (Closes issue #17078. Reported, tested by geoff2010. Patched by dhubbard)

   * Add missing 'useragent' field to sip-friends.sql file.
     (Closes issue #17171. Reported, patched by thehar)

   * Add example dialplan for dialing ISN numbers (http://www.freenum.org)
     (Closes issue #17058. Reported, patched by pprindeville)

   * Fix issue with double "sip:" in header field.
     (Closes issue #15847. Reported, patched by ebroad)

   * Add ability to generate ASCII documentation from the TeX files by running
     'make asterisk.txt'.
     (Closes issue #17220. Reported by lmadsen. Tested, patched by pabelanger)

   * When StopMonitor() is called, ensure that it will not be restarted by a
     channel event.
     (Closes issue #16590. Reported, patched by kkm)

   * Small error in the T.140 RTP port verbose log.
     (Closes issue #16998. Reported, patched by frawd. Tested by russell)

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.8

=======
1.6.2.7
=======

The release of Asterisk 1.6.2.7 resolves several issues reported by the
community, and would have not been possible without your participation. Thank
you!

The following are a few of the issues resolved by community developers:

  * Fix building CDR and CEL SQLite3 modules.
    (Closes issue #17017. Reported by alephlg. Patched by seanbright)

  * Resolve crash in SLAtrunk when the specified trunk doesn't exist.
    (Reported in #asterisk-dev by philipp64. Patched by seanbright)

  * Include an extra newline after "Aliased CLI command" to get back the prompt.
    (Issue #16978. Reported by jw-asterisk. Tested, patched by seanbright)

  * Prevent segfault if bad magic number is encountered.
    (Issue #17037. Reported, patched by alecdavis)

  * Update code to reflect that handle_speechset has 4 arguments.
    (Closes issue #17093. Reported, patched by gpatri. Tested by pabelanger,
     mmichelson)

  * Resolve a deadlock in chan_local.
    (Closes issue #16840. Reported, patched by bzing2, russell. Tested by bzing2)

For a full list of changes in this releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.7

=======
1.6.2.6
=======

The release of Asterisk 1.6.2.6 resolves several issues reported by the
community, and would have not been possible without your participation. Thank
you!

The following are a few of the issues resolved by community developers:

  * Make sure to clear red alarm after polarity reversal.
    (Closes issue #14163. Reported, patched by jedi98. Tested by mattbrown,
     Chainsaw, mikeeccleston)

  * Fix problem with duplicate TXREQ packets in chan_iax2
    (Closes issue #16904. Reported, patched by rain. Tested by rain, dvossel)

  * Fix crash in app_voicemail related to message counting.
    (Closes issue #16921. Reported, tested by whardier. Patched by seanbright)

  * Overlap receiving: Automatically send CALL PROCEEDING when dialplan starts
    (Reported, Patched, and Tested by alecdavis)

  * For T.38 reINVITEs treat a 606 the same as a 488.
    (Closes issue #16792. Reported, patched by vrban)

  * Fix ConfBridge crash when no timing module is loaded.
    (Closes issue #16471. Reported, tested by kjotte. Patched, tested by junky)

For a full list of changes in this releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.6

=======
1.6.2.5
=======

The Asterisk Development Team has announced security releases for the following
versions of Asterisk:

* 1.6.2.5

The releases of Asterisk 1.6.0.25, 1.6.1.17, and 1.6.2.5 resolve an issue with
invalid parsing of ACL (Access Control List) rules leading to a possible
compromise in security. The issue and resolution are described in the
AST-2010-003 security advisory.

For more information about the details of this vulnerability, please read the
security advisory AST-2010-003, which was released at the same time as this
announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.5

Security advisory AST-2010-003 is available at:

http://downloads.asterisk.org/pub/security/AST-2010-003.pdf

=======
1.6.2.4
=======

The Asterisk Development Team has announced security releases for the following
versions of Asterisk:

* 1.6.2.4

The releases of Asterisk 1.2.40, 1.4.29.1, 1.6.0.24, 1.6.1.16, and 1.6.2.4
include documention describing a possible dialplan string injection with common
usage of the ${EXTEN} (and other expansion variables). The issue and resolution
are described in the AST-2010-002 security advisory.

If you have a channel technology which can accept characters other than numbers
and letters (such as SIP) it may be possible to craft an INVITE which sends data
such as 300&Zap/g1/4165551212 which would create an additional outgoing channel
leg that was not originally intended by the dialplan programmer.

Please note that this is not limited to an specific protocol or the Dial()
application.

The expansion of variables into programmatically-interpreted strings is a common
behavior in many script or script-like languages, Asterisk included. The ability
for a variable to directly replace components of a command is a feature, not a
bug - that is the entire point of string expansion.

However, it is often the case due to expediency or design misunderstanding that
a developer will not examine and filter string data from external sources before
passing it into potentially harmful areas of their dialplan.

With the flexibility of the design of Asterisk come these risks if the dialplan
designer is not suitably cautious as to how foreign data is allowed to enter the
system unchecked.

This security release is intended to raise awareness of how it is possible to
insert malicious strings into dialplans, and to advise developers to read the
best practices documents so that they may easily avoid these dangers.

For more information about the details of this vulnerability, please read the
security advisory AST-2010-002, which was released at the same time as this
announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.4

Security advisory AST-2010-002 is available at:

http://downloads.asterisk.org/pub/security/AST-2010-002.pdf

The README-SERIOUSLY.bestpractices.txt document is available in the top-level
directory of your Asterisk sources, or available in all Asterisk branches from
1.2 and up.

http://svn.asterisk.org/svn/asterisk/trunk/README-SERIOUSLY.bestpractices.txt

=======
1.6.2.3
=======

Was never released.

=======
1.6.2.2
=======

The Asterisk Development Team has announced security releases for Asterisk as
the following versions:

* 1.6.2.2

The releases of Asterisk 1.6.0.22, 1.6.1.14, and 1.6.2.2 include the fix
described in security advisory AST-2010-001.

The issue is that an attacker attempting to negotiate T.38 over SIP can remotely
crash Asterisk by modifying the FaxMaxDatagram field of the SDP to contain
either a negative or exceptionally large value.  The same crash will occur when
the FaxMaxDatagram field is omitted from the SDP, as well.

For more information about the details of this vulnerability, please read the
security advisory AST-2009-009, which was released at the same time as this
announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.2

Security advisory AST-2010-001 is available at:

http://downloads.asterisk.org/pub/security/AST-2010-001.pdf

=======
1.6.2.1
=======

The release of Asterisk 1.6.2.1 resolved several issues reported by the
community, and would have not been possible without your participation. Thank
you!

* CLI 'queue show' formatting fix.
   (Closes issue #16078. Reported by RoadKill. Tested by dvossel. Patched by
    ppyy.)

* Fix misreverting from 177158.
   (Closes issue #15725. Reported, Tested by shanermn. Patched by dimas.)

* Fixes subscriptions being lost after 'module reload'.
   (Closes issue #16093. Reported by jlaroff. Patched by dvossel.)

* app_queue segfaults if realtime field uniqueid is NULL
  (Closes issue #16385. Reported, Tested, Patched by haakon.)

* Fix to Monitor which previously assumed the file to write to did not contain
   pathing.
   (Closes issue #16377, #16376. Reported by bcnit. Patched by dant.


A summary of changes in this release can be found in the release summary:
http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-1.6.2.1-summary.txt

For a full list of changes in this releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.1

=======
1.6.2.0
=======

The release of Asterisk 1.6.2.0 is the first feature release since Asterisk
1.6.1.0, which was released April 27, 2009. Many new features have been included
in this release. For a complete list of changes, please see the CHANGES file.
For those upgrading from a previous release, please see UPGRADE.txt

It should be explicitly stated that Asterisk 1.6.2.0 is a major upgrade over any
previous release, and special care should be taken when upgrading existing
systems. Please see the UPGRADE.txt file for more information, available at:

http://svn.asterisk.org/svn/asterisk/tags/1.6.2.0/UPGRADE.txt

A detailed overview to the new features available in Asterisk 1.6.2.0 are
forthcoming within the next few days. Please watch http://blogs.asterisk.org for
further information!

Below is a summary of several new features available in this release:

  * chan_dahdi now supports MFC/R2 signaling when Asterisk is compiled with
    support for LibOpenR2.  http://www.libopenr2.org/

  * Added a new 'faxdetect=yes|no' configuration option to sip.conf.  When this
    option is enabled, Asterisk will watch for a CNG tone in the incoming audio
    for a received call.  If it is detected, the channel will jump to the
    'fax' extension in the dialplan.

  * A new application, Originate, has been introduced, that allows asynchronous
    call origination from the dialplan.

  * Added ConfBridge dialplan application which does conference bridges without
    DAHDI. For information on its use, please see the output of
    "core show application ConfBridge" from the CLI.

  * extensions.conf now allows you to use keyword "same" to define an extension
    without actually specifying an extension.  It uses exactly the same pattern
    as previously used on the last "exten" line.  For example:
      exten => 123,1,NoOp(something)
      same  =>     n,SomethingElse()

  * Asterisk now provides the ability to define custom CLI aliases.  For example,
    if you would like to define short form aliases for frequently used commands,
    such as "sh ch" for "core show channels", that is now possible.  See the
    cli_aliases.conf configuration file for more information.

  * Asterisk now has support for subscribing to the state of remote voice
    mailboxes via SIP.

  * Asterisk now includes expanded HD codec support.  G.722.1 and G.722.1C
    (Siren7/Siren14) passthrough, recording, and playback is now supported.
    Transcoding will be made available via add-on modules soon for this version of
    Asterisk.

This is just a subset of the changes available in this release. Please see the
CHANGES file for additional information, available at:
http://svn.asterisk.org/svn/asterisk/tags/1.6.2.0/CHANGES

A summary of changes in this release can be found in the release summary:
http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-1.6.2.0-summary.txt

For a full list of changes in this releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.0
2010-09-23 23:30:38 +00:00
jnemeth
1884af0019 add a conflict with asterisk >= 1.6.2 as that will include the extra sounds 2010-09-22 02:25:12 +00:00
wiz
2c6e8e30b0 Bump dependency on pixman to 0.18.4 because cairo-1.10 needs that
version, and bump all depends.

Per discussion on pkgsrc-changes.
2010-09-14 11:00:44 +00:00
taca
a64db62b7a Update comms/ruby-termios package to 0.9.6
* Use lang/ruby/gem.mk instead of misc/rubygems/rubygem.mk.
* Remove default value of GEM_BUILD.
* Add LICENSE.


2009-08-28  akira yamada  <akira@arika.org>

	* version 0.9.6.

2009-02-05  akira yamada  <akira@arika.org>

	* termios.c: added RDoc.

	* README: converted to RDoc.

	* ruby-termios.gemspec: added.

2008-10-23  akira yamada  <akira@arika.org>

	* termios.c: added IOCTL_COMMANDS, IOCTL_COMMAND_NAMES,
	  MODEM_SIGNALS, MODEM_SIGNAL_NAMES, PTY_PACKET_OPTIONS,
	  PTY_PACKET_OPTION_NAMES, LINE_DISCIPLINES and
	  LINE_DISCIPLINE_NAMES.

	  This change is contributed from Chris Hoffman
	  <chrishoffman_cardialife.com>.

	* termios.c, extconf.rb: included <sys/ioctl.h>.

2008-06-03  akira yamada  <akira@arika.org>

	* extconf.rb, termios.c: adjusted rb_io_t/OpenFile checks for Ruby
	  1.8.7.
2010-09-10 04:01:36 +00:00
wiz
11f9ecbed7 Update to 1.55:
1.55  Sun Jun 27 18:07:11 CEST 2010
	- Fixed RT #58869, incorrect decoding of text7 messages.
	  Thanks to Alexander Onokhov.
2010-09-06 10:52:27 +00:00
wiz
2513dee6c1 Update to 1.53:
1.53  Thu Apr 01 13:49:00 CET  2010
    - ***CHANGED*** default log file position
      from /var/log/modem.log to /tmp/modem.log.
      Too many failed tests and user reports made me
      reconsider my poor default choice.
    - Added voice dialing. Just dialing though.
      You can't perform real voice calls through Device::Modem (yet :)
      Thanks to Marek Jaros.
    - Added ';' (voice dialing) and 'p' (pause) as valid values
      for dial() number.

1.52  Sun Mar 28 15:50:00 CET  2010
	- Added automatic port reconnection in the port() method.
	  This should improve connection reliability and reduce risk
	  of "Can't call method XXXXXX on undefined value YYYYYY" errors.
2010-09-06 10:51:56 +00:00
seb
febfbb41f9 Bump the PKGREVISION for all packages which depend directly on perl,
to trigger/signal a rebuild for the transition 5.10.1 -> 5.12.1.

The list of packages is computed by finding all packages which end
up having either of PERL5_USE_PACKLIST, BUILDLINK_API_DEPENDS.perl,
or PERL5_PACKLIST defined in their make setup (tested via
"make show-vars VARNAMES=..."), minus the packages updated after
the perl package update.

sno@ was right after all, obache@ kindly asked and he@ led the
way. Thanks!
2010-08-21 16:32:42 +00:00
wiz
4f1e4e81f3 Add comment, using commit message. 2010-08-02 07:05:09 +00:00
rafal
71661ec22f Regen patch checksums for patch-ac. 2010-07-29 11:04:31 +00:00
rafal
4e4dddd58b Add patch from https://www.conserver.com/pipermail/users/2004-June/msg00001.html
to make network consoles work on LP64 platforms.
2010-07-29 11:02:38 +00:00
sbd
3f4b7dbd32 Recursive PKGREVISION bump for the net/mDNSResponder update 2010-07-14 11:11:13 +00:00
wiz
ac8a581336 Fix build with png-1.4.x. 2010-06-19 13:29:23 +00:00
joerg
4482d15167 Needs group early during installation 2010-06-19 12:18:51 +00:00
jnemeth
f042052dee Update patches/patch-bd as per upstream. No significant difference in
functionality.
2010-06-16 08:04:44 +00:00