Commit graph

1788 commits

Author SHA1 Message Date
rodent
ef81bb35ee LDFLAGS.SunOS+= -lsocket -lnsl; Fixes build failure, ideally. 2013-12-31 15:41:17 +00:00
wiz
f5401a11ec Reset maintainer for resigned developers. 2013-12-23 11:57:02 +00:00
jnemeth
2e4eaaaab8 Update to Asterisk 11.6.1: this is a security fix update to fix
AST-2013-006 and AST-2013-007, and a minor bug fix update.

pkgsrc change: disable SRTP on NetBSD as it doesn't link

---- 11.6.1 ----

The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security
releases are released as versions 1.8.15-cert4, 11.2-cert3, 1.8.24.1, 10.12.4,
10.12.4-digiumphones, and 11.6.1.

The release of these versions resolve the following issues:

* A buffer overflow when receiving odd length 16 bit messages in app_sms. An
  infinite loop could occur which would overwrite memory when a message is
  received into the unpacksms16() function and the length of the message is an
  odd number of bytes.

* Prevent permissions escalation in the Asterisk Manager Interface. Asterisk
  now marks certain individual dialplan functions as 'dangerous', which will
  inhibit their execution from external sources.

  A 'dangerous' function is one which results in a privilege escalation. For
  example, if one were to read the channel variable SHELL(rm -rf /) Bad
  Things(TM) could happen; even if the external source has only read
  permissions.

  Execution from external sources may be enabled by setting 'live_dangerously'
  to 'yes' in the [options] section of asterisk.conf. Although doing so is not
  recommended.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2013-006 and AST-2013-007, which were
released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.6.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2013-006.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-007.pdf

Thank you for your continued support of Asterisk!

----- 11.6.0 -----

The Asterisk Development Team has announced the release of Asterisk 11.6.0.

The release of Asterisk 11.6.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Confbridge: empty conference not being torn down
  (Closes issue ASTERISK-21859. Reported by Chris Gentle)

* --- Let Queue wrap up time influence member availability
  (Closes issue ASTERISK-22189. Reported by Tony Lewis)

* --- Fix a longstanding issue with MFC-R2 configuration that
      prevented users
  (Closes issue ASTERISK-21117. Reported by Rafael Angulo)

* --- chan_iax2: Fix saving the wrong expiry time in astdb.
  (Closes issue ASTERISK-22504. Reported by Stefan Wachtler)

* --- Fix segfault for certain invalid WebSocket input.
  (Closes issue ASTERISK-21825. Reported by Alfred Farrugia)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.6.0

Thank you for your continued support of Asterisk!
2013-12-23 01:34:03 +00:00
jnemeth
59c7e7c336 Update to Asterisk 10.12.4: this is a security fix update that fixes
AST-2013-006 and AST-2013-007.

The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security
releases are released as versions 1.8.15-cert4, 11.2-cert3, 1.8.24.1, 10.12.4,
10.12.4-digiumphones, and 11.6.1.

The release of these versions resolve the following issues:

* A buffer overflow when receiving odd length 16 bit messages in app_sms. An
  infinite loop could occur which would overwrite memory when a message is
  received into the unpacksms16() function and the length of the message is an
  odd number of bytes.

* Prevent permissions escalation in the Asterisk Manager Interface. Asterisk
  now marks certain individual dialplan functions as 'dangerous', which will
  inhibit their execution from external sources.

  A 'dangerous' function is one which results in a privilege escalation. For
  example, if one were to read the channel variable SHELL(rm -rf /) Bad
  Things(TM) could happen; even if the external source has only read
  permissions.

  Execution from external sources may be enabled by setting 'live_dangerously'
  to 'yes' in the [options] section of asterisk.conf. Although doing so is not
  recommended.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2013-006 and AST-2013-007, which were
released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.24.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2013-006.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-007.pdf

Thank you for your continued support of Asterisk!
2013-12-17 05:37:10 +00:00
jnemeth
9ebdf0b01e Update to Asterisk 1.8.24.1: this is a security update that fixes
AST-2013-006 and AST-2013-007.

The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security
releases are released as versions 1.8.15-cert4, 11.2-cert3, 1.8.24.1, 10.12.4,
10.12.4-digiumphones, and 11.6.1.

The release of these versions resolve the following issues:

* A buffer overflow when receiving odd length 16 bit messages in app_sms. An
  infinite loop could occur which would overwrite memory when a message is
  received into the unpacksms16() function and the length of the message is an
  odd number of bytes.

* Prevent permissions escalation in the Asterisk Manager Interface. Asterisk
  now marks certain individual dialplan functions as 'dangerous', which will
  inhibit their execution from external sources.

  A 'dangerous' function is one which results in a privilege escalation. For
  example, if one were to read the channel variable SHELL(rm -rf /) Bad
  Things(TM) could happen; even if the external source has only read
  permissions.

  Execution from external sources may be enabled by setting 'live_dangerously'
  to 'yes' in the [options] section of asterisk.conf. Although doing so is not
  recommended.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2013-006 and AST-2013-007, which were
released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.24.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2013-006.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-007.pdf

Thank you for your continued support of Asterisk!
2013-12-17 02:29:11 +00:00
jperkin
9c3a82421e Add socket libraries on SunOS. Patch from Sebastian Wiedenroth. 2013-12-10 14:18:05 +00:00
obache
c1522519b6 Fix/Update DEPENDS paterns for perl CORE modules, with some trivial fixes.
Bump PKGREVISION for runtime dependency pattern changed packages.
2013-12-09 14:17:41 +00:00
wiz
fab9e14248 PKGREVISION bump for json-c shlib rename. 2013-11-25 12:00:45 +00:00
dholland
18f5d05700 Use SPECIAL_PERMS and don't set USERGROUP_PHASE. PKGREVISION -> 7 2013-11-24 04:01:07 +00:00
joerg
89b5df5be2 Fix attempt at detecting curses. 2013-11-05 17:38:41 +00:00
jnemeth
25f022d412 Update to Asterisk 1.8.24.0: this is a general bugfix release:
The Asterisk Development Team has announced the release of Asterisk 1.8.24.0.

The release of Asterisk 1.8.24.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Fix a longstanding issue with MFC-R2 configuration that
      prevented users

* --- Fix Not Storing Current Incoming Recv Address

* --- Fix Segfault When Syntax Of A Line Under [applicationmap] Is
      Invalid

* --- Tolerate presence of RFC2965 Cookie2 header by ignoring it

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.24.0

Thank you for your continued support of Asterisk!
2013-10-26 22:29:22 +00:00
adam
312fd39e71 Revbump after updating textproc/icu 2013-10-19 09:06:55 +00:00
roy
3f203dc752 bump for pilot-link-libs ncurses removal 2013-10-16 08:55:01 +00:00
roy
541dd42940 Does not use curses or even termcap 2013-10-16 08:49:43 +00:00
joerg
8313d28a9a Fix inline use. 2013-10-14 14:33:31 +00:00
roy
b5438c1fcc Depend on termcap as well as curses.
New homepage.
2013-10-10 16:58:03 +00:00
roy
255b26fddc tn3270 uses termcap as well as curses. 2013-10-10 16:31:28 +00:00
ryoon
eda5fb2e29 Recursive revbump from pango-1.36.0 2013-10-10 14:41:44 +00:00
bad
a5a78d12d0 Update jpilot to 1.8.1.
Changes since 1.8.0:
1.8.1 - 04/05/11
 Added a jpilot-merge utility for merging unsynced records into a pdb file
 Fixes Debian bug #574030: jpilot: can't delete appointments
 Resolve bug 2012 where small months in Postcript printout overlapped a calendar event.
 Fix multiple memory leaks all over code base
 Added a VCard export format optimized for GMail/Android import
 Correct iCal export for repeating events with an end date
 Add Category and Location fields to Calendar iCal export
 Add categories to left-hand side of Calendar application
 Add "cancel sync" button and icon to main jpilot window
 use CRLF for ToDo iCal export per RFC
 Add new "future" button to repeat appt. modification dialog so that changes only affect future occurrences
 Ability to install files directly to SDCARD, hardcoded to /PALM/Launcher/ directory
 Keyboard shortcuts to set priority of ToDo items with Alt+# where # is 1-5
 Add ability to launch external editor to quickly edit memo or note text.  Bound to Ctrl-E.
2013-10-10 10:58:38 +00:00
joerg
8c192b0999 Fix undefined and broken loop. Fix obviously broken format string.
Bump revision.
2013-10-10 00:02:17 +00:00
wiz
5592d1530c recursive bump for libmng-2.0.2 shlib major bump and dependency change 2013-10-09 17:39:01 +00:00
obache
15519e2f40 CMAKE_INSTALL_MANDIR is specified by pkgsrc framework now. 2013-10-09 11:50:36 +00:00
adam
2ed08e11a6 New for version 2.6.2:
- Alternative hex output (to be improved)
- Print creation date of serial device file (if < 20 hrs), useful for
  identifying just plugged in USB-Serial adapters
- Support ':' (colon) in device path names. Note, that this changes old
  behaviour which used ':' as a device path delimiter.
- Several language updates.
2013-10-09 10:53:24 +00:00
bad
a5f75a6a2b This requires libgcrypt to build the keyring plugin. Bump PKGREVISION. 2013-10-07 15:58:25 +00:00
joerg
9dcc862ac9 Forgotten patch to ensure presence of ioctl prototype. 2013-09-10 18:24:10 +00:00
joerg
a441c4c932 Fix operator precendence. Include missing header. Use socklen_t.
Don't pass formatted buffers as format string. Bump revision.
2013-09-10 14:15:11 +00:00
joerg
fa62d87b71 Continue on pointer sign warnings from clang. 2013-09-10 14:14:02 +00:00
joerg
876da4598e Fix printf argument type. Handle errors properly. Bump revision. 2013-09-10 14:13:40 +00:00
adam
30b15b560e Revbump after cairo update 2013-09-02 19:50:38 +00:00
joerg
6a0c5f9ed8 Requires jbigkit. Bump revision. 2013-08-30 16:57:35 +00:00
jnemeth
97c0efe3c2 Update to Asterisk 11.5.1: this is a security fix release to fix
AST-2013-004 and AST-2013-005.

The Asterisk Development Team has announced security releases for
Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The
available security rele ases are released as versions 1.8.15-cert2,
11.2-cert2, 1.8.23.1, 10.12.3, 10.12.3-di giumphones, and 11.5.1.

The release of these versions resolve the following issues:

* A remotely exploitable crash vulnerability exists in the SIP
  channel driver if an ACK with SDP is received after the channel
  has been terminated.  The handling code incorrectly assumes that
  the channel will always be present.

* A remotely exploitable crash vulnerability exists in the SIP
  channel driver if an invalid SDP is sent in a SIP request that
  defines media descriptions before connection information. The
  handling code incorrectly attempts to reference the socket address
  information even though that information has not yet been set.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2013-004 and AST-2013-005,
which were released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.5.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2013-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-005.pdf

Thank you for your continued support of Asterisk!
2013-08-30 05:49:51 +00:00
jnemeth
50fa3934ef Update to Asterisk 10.12.3: this is a security fix release to fix
AST-2013-004 and AST-2013-005.

pkgsrc change:  disable detection of broken IP_PKTINFO on NetBSD

The Asterisk Development Team has announced security releases for
Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The
available security rele ases are released as versions 1.8.15-cert2,
11.2-cert2, 1.8.23.1, 10.12.3, 10.12.3-di giumphones, and 11.5.1.

The release of these versions resolve the following issues:

* A remotely exploitable crash vulnerability exists in the SIP
  channel driver if an ACK with SDP is received after the channel
  has been terminated.  The handling code incorrectly assumes that
  the channel will always be present.

* A remotely exploitable crash vulnerability exists in the SIP
  channel driver if an invalid SDP is sent in a SIP request that
  defines media descriptions before connection information. The
  handling code incorrectly attempts to reference the socket address
  information even though that information has not yet been set.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2013-004 and AST-2013-005,
which were released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.12.3

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2013-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-005.pdf

Thank you for your continued support of Asterisk!
2013-08-29 23:14:38 +00:00
jnemeth
763721f318 Update to Asterisk 1.8.23.1: this is a security fix release to fix
AST-2013-004 and AST-2013-005.

The Asterisk Development Team has announced security releases for
Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The
available security rele ases are released as versions 1.8.15-cert2,
11.2-cert2, 1.8.23.1, 10.12.3, 10.12.3-di giumphones, and 11.5.1.

The release of these versions resolve the following issues:

* A remotely exploitable crash vulnerability exists in the SIP
  channel driver if an ACK with SDP is received after the channel
  has been terminated.  The handling code incorrectly assumes that
  the channel will always be present.

* A remotely exploitable crash vulnerability exists in the SIP
  channel driver if an invalid SDP is sent in a SIP request that
  defines media descriptions before connection information. The
  handling code incorrectly attempts to reference the socket address
  information even though that information has not yet been set.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2013-004 and AST-2013-005,
which were released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.23.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2013-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-005.pdf

Thank you for your continued support of Asterisk!
2013-08-29 03:00:47 +00:00
obache
1732e825c7 using hicolor-icon-theme.
Bump PKGREVISION.
2013-08-22 08:35:29 +00:00
jnemeth
949c8bdb53 Add patches to convert RAII_VAR to a method that doesn't use nested
functions, thus making Asterisk portable to all C compilers.  The
patches from joerg@ (with one missing file added by myself).
2013-08-08 00:45:10 +00:00
jnemeth
af72627fd5 Update to Asterisk 1.8.23.0: this is a bugfix release
pkgsrc changes:
- add work around for NetBSD's incompatible implementation of IP_PKTINFO
- core sounds package was updated to 1.4.24

The Asterisk Development Team has announced the release of Asterisk 1.8.23.0.

The release of Asterisk 1.8.23.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Fix a memory copying bug in slinfactory which was causing
      mixmonitor issues.

* --- IAX2: fix race condition with nativebridge transfers.

* --- Fix crash in chan_sip when a core initiated op occurs at the
      same time as a BYE

* --- Fix The Payload Being Set On CN Packets And Do Not Set Marker
      Bit

* --- chan_sip: Session-Expires: Set timer to correctly expire at
      (~2/3) of the interval when not the refresher

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.23.0

Thank you for your continued support of Asterisk!
2013-07-21 17:20:26 +00:00
jnemeth
29f2c3180c Upgrade to Asterisk 11.5.0: this is a general bug fix release
pkgsrc changes:
  - add dependency on libuuid
  - work around NetBSD's incompatible implementation of IP_PKTINFO

The Asterisk Development Team has announced the release of Asterisk 11.5.0.

The release of Asterisk 11.5.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Fix Segfault In app_queue When "persistentmembers" Is Enabled
      And Using Realtime

* --- IAX2: fix race condition with nativebridge transfers.

* --- Fix The Payload Being Set On CN Packets And Do Not Set Marker
      Bit

* --- Fix One-Way Audio With auto_* NAT Settings When SIP Calls
      Initiated By PBX

* --- chan_sip: NOTIFYs for BLF start queuing up and fail to be sent
      out after retries fail

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.5.0

Thank you for your continued support of Asterisk!
2013-07-21 06:55:53 +00:00
taca
b433d5d0bd Tweak GEM_CLEANBUILD for ruby200. 2013-07-21 02:38:24 +00:00
obache
a361bae20e catch up to changes in Makefile
(devel/readline/buildlink3.mk => mk/readline.buildlink3.mk)
2013-07-17 12:24:41 +00:00
ryoon
818a5e8745 * .include "../../devel/readline/buildlink3.mk" with USE_GNU_READLINE=yes
are replaced with .include "../../devel/readline/buildlink3.mk", and
  USE_GNU_READLINE are removed,

* .include "../../devel/readline/buildlink3.mk" without USE_GNU_READLINE
  are replaced with .include "../../mk/readline.buildlink3.mk".
2013-07-15 02:02:17 +00:00
jperkin
16bdf421be Bump PKGREVISION of all packages which create users, to pick up change of
sysutils/user_* packages.
2013-07-12 10:44:52 +00:00
jnemeth
f6240b10e8 Asterisk is known to fail on 32-bit systems, specifically i386. Mark it
as such until the bug is found and fixed.
2013-06-16 22:10:13 +00:00
jnemeth
971abaf852 - fix compile issue when newlocale support is detected, from joerg@ 2013-06-15 20:51:10 +00:00
khorben
141d994e85 Packaged DeforaOS Phone 0.3.12, with:
- improvements to the user interface
- better phone log support
- support for changing the SIM PIN code (via the new "password" plug-in)
- optional "pulseaudio" plug-in (instead of builtin to the "profiles" plug-in)
- fixes to the "video" plug-in
- new manual pages
- more portable Makefiles
2013-06-15 12:56:27 +00:00
jnemeth
764cc9c53d - fix PLIST when jabber option is disabled
- fix build when newlocale is detected, patch from joerg@
2013-06-14 23:53:03 +00:00
jnemeth
80ce56f277 - fix PLIST when jabber option is disabled
- fix compile problem on newer NetBSD systems that have newlocale support
- fix a couple of cases where ctype functions called with plain char
- last two items from joerg@
2013-06-14 04:26:55 +00:00
rodent
676853bc25 Remove fortran77 from USE_LANGUAGES as suggested by jnemeth@ 2013-06-09 23:29:34 +00:00
rodent
0dee721580 Updated to latest pre-release, 0.0.6pre21. No ChangeLog. pkgsrc changes:
Commented 2/3 patches. Added gsed to USE_TOOLS. Buildlink'd pthread. Added
fortran77 to USE_LANGUAGES. Included options.mk file to enable the user to
build with mmx, sse, and "tests" option, which uses pcap, X11, sndfile,
libxml2, fltk, and fftw to run some tests. All of these options are
disabled by default. Some of these changes were already present in
wip/spandsp and were merged into this package after its removal. All
PKG_OPTIONS are disabled by default. There are no noticeable changes to
the package from this update.
2013-06-09 22:36:12 +00:00
wiz
9857186f24 Bump PKGREVISION for libXft changes for NetBSD native X support on
NetBSD 6, requested by tron.
2013-06-06 12:53:40 +00:00
tron
e05e426ab4 Try to fix the fallout caused by the fix for PR pkg/47882. Part 3:
Recursively bump package revisions again after the "freetype2" and
"fontconfig" handling was fixed.
2013-06-04 22:15:37 +00:00