Commit graph

95 commits

Author SHA1 Message Date
jnemeth
4b739a8368 Update to Asterisk 11.1.2: this is a security update for AST-2012-014
and AST-2012-015.  Apparently the last update didn't completely
fix the issues.

The Asterisk Development Team has announced a security release for
Asterisk 11, Asterisk 11.1.2. This release addresses the security
vulnerabilities reported in AST-2012-014 and AST-2012-015, and
replaces the previous version of Asterisk 11 released for these
security vulnerabilities. The prior release left open a vulnerability
in res_xmpp that exists only in Asterisk 11; as such, other versions
of Asterisk were resolved correctly by the previous releases.

The release of these versions resolve the following two issues:

* Stack overflows that occur in some portions of Asterisk that manage a TCP
  connection. In SIP, this is exploitable via a remote unauthenticated session;
  in XMPP and HTTP connections, this is exploitable via remote authenticated
  sessions. The vulnerabilities in SIP and HTTP were corrected in a prior
  release of Asterisk; the vulnerability in XMPP is resolved in this release.

* A denial of service vulnerability through exploitation of the device state
  cache. Anonymous calls had the capability to create devices in Asterisk that
  would never be disposed of. Handling the cachability of device states
  aggregated via XMPP is handled in this release.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2012-014 and AST-2012-015.

For a full list of changes in the current release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.2

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf

Thank you for your continued support of Asterisk - and we apologize for having
to do this twice!
2013-01-04 03:09:56 +00:00
jnemeth
bf4b089985 Upgrade to Asterisk 11.1.1; this is a security fix to fix AST-2012-14
and AST-2012-015.

Approved for commit during freeze by: agc

The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases
are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones,
and 11.1.1.

The release of these versions resolve the following two issues:

* Stack overflows that occur in some portions of Asterisk that manage a TCP
  connection. In SIP, this is exploitable via a remote unauthenticated session;
  in XMPP and HTTP connections, this is exploitable via remote authenticated
  sessions.

* A denial of service vulnerability through exploitation of the device state
  cache. Anonymous calls had the capability to create devices in Asterisk that
  would never be disposed of.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2012-014 and AST-2012-015, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf

Thank you for your continued support of Asterisk!
2013-01-03 02:11:19 +00:00
obache
64deda1dc9 recursive bump from cyrus-sasl libsasl2 shlib major bump. 2012-12-16 01:51:57 +00:00
jnemeth
1bbc663607 Update to Asterisk 11.1.0: this is a major new long term support release.
As this is a major release, you should read the information about updating:

https://wiki.asterisk.org/wiki/display/AST/Upgrading+to+Asterisk+11

You can also find documentation in:  /usr/pkg/share/doc/asterisk

----- 11.1.0:

The Asterisk Development Team has announced the release of Asterisk 11.1.0.

The release of Asterisk 11.1.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Fix execution of 'i' extension due to uninitialized variable.

* --- Prevent resetting of NATted realtime peer address on reload.

* --- Fix ConfBridge crash if no timing module loaded.

* --- Fix the Park 'r' option when a channel parks itself.

* --- Fix an issue where outgoing calls would fail to establish audio
      due to ICE negotiation failures.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.1.0

----- 11.0.1:

The Asterisk Development Team has announced the release of Asterisk 11.0.1.

The release of Asterisk 11.0.1 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are the issues resolved in this release:

* --- chan_sip: Fix a bug causing SIP reloads to remove all entries
      from the registry

* --- confbridge: Fix a bug which made conferences not record with
      AMI/CLI commands

* --- Fix an issue with res_http_websocket where the chan_sip
      WebSocket handler could not be registered.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.0.1

Thank you for your continued support of Asterisk!

----- 11.0.0:

The Asterisk Development Team is pleased to announce the release of
Asterisk 11.0.0.

Asterisk 11 is the next major release series of Asterisk.  It is a Long Term
Support (LTS) release, similar to Asterisk 1.8.  For more information about
support time lines for Asterisk releases, see the Asterisk versions page:
https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions

For important information regarding upgrading to Asterisk 11, please see the
Asterisk wiki:

https://wiki.asterisk.org/wiki/display/AST/Upgrading+to+Asterisk+11

A short list of new features includes:

* A new channel driver named chan_motif has been added which provides support
  for Google Talk and Jingle in a single channel driver.  This new channel
  driver includes support for both audio and video, RFC2833 DTMF, all codecs
  supported by Asterisk, hold, unhold, and ringing notification. It is also
  compliant with the current Jingle specification, current Google Jingle
  specification, and the original Google Talk protocol.

* Support for the WebSocket transport for chan_sip.

* SIP peers can now be configured to support negotiation of ICE candidates.

* The app_page application now no longer depends on DAHDI or app_meetme. It
  has been re-architected to use app_confbridge internally.

* Hangup handlers can be attached to channels using the CHANNEL() function.
  Hangup handlers will run when the channel is hung up similar to the h
  extension; however, unlike an h extension, a hangup handler is associated with
  the actual channel and will execute anytime that channel is hung up,
  regardless of where it is in the dialplan.

* Added pre-dial handlers for the Dial and Follow-Me applications.  Pre-dial
  allows you to execute a dialplan subroutine on a channel before a call is
  placed but after the application performing a dial action is invoked. This
  means that the handlers are executed after the creation of the callee
  channels, but before any actions have been taken to actually dial the callee
  channels.

* Log messages can now be easily associated with a certain call by looking at
  a new unique identifier, "Call Id".  Call ids are attached to log messages for
  just about any case where it can be determined that the message is related
  to a particular call.

* Introduced Named ACLs as a new way to define Access Control Lists (ACLs) in
  Asterisk. Unlike traditional ACLs defined in specific module configuration
  files, Named ACLs can be shared across multiple modules.

* The Hangup Cause family of functions and dialplan applications allow for
  inspection of the hangup cause codes for each channel involved in a call.
  This allows a dialplan writer to determine, for each channel, who hung up and
  for what reason(s).

* Two new functions have been added: FEATURE() and FEATUREMAP(). FEATURE()
  lets you set some of the configuration options from the general section
  of features.conf on a per-channel basis. FEATUREMAP() lets you customize
  the key sequence used to activate built-in features, such as blindxfer,
  and automon.

* Support for DTLS-SRTP in chan_sip.

* Support for named pickupgroups/callgroups, allowing any number of pickupgroups
  and callgroups to be defined for several channel drivers.

* IPv6 Support for AMI, AGI, ExternalIVR, and the SIP Security Event Framework.

More information about the new features can be found on the Asterisk wiki:

https://wiki.asterisk.org/wiki/display/AST/Asterisk+11+Documentation

A full list of all new features can also be found in the CHANGES file.

http://svnview.digium.com/svn/asterisk/branches/11/CHANGES

For a full list of changes in the current release, please see the ChangeLog.

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.0.0

Thank you for your continued support of Asterisk!
2012-12-11 08:22:48 +00:00
wiz
8b5d49eb78 Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.

I hope that's all of them.
2012-10-03 21:53:53 +00:00
asau
6b05a6f977 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-03 11:24:38 +00:00
dholland
1835d2fe04 Add missing rpath in curl plugin. 2012-06-09 18:44:51 +00:00
dholland
165d4a8120 With the latest curl, the output of curl-config --vernum contains
hex digits, so patching the makefile to compare it as decimal will
not work. Just patch out the test entirely, as pkgsrc guarantees
curl will always be present and the packaging is not equipped to
deal with this check failing anyhow.
2012-06-09 08:29:41 +00:00
joerg
7606657544 Don't override optimizer settings with absurd levels.
Fix inline definitions to work with C99 compiler.
2012-05-04 16:06:13 +00:00
hans
54c8799333 Fix build on SunOS. 2012-02-16 16:13:51 +00:00
wiz
78bf2cbc7e Remove zaptel option, zaptel-netbsd was removed. 2011-10-06 08:35:01 +00:00
jnemeth
7de85296ed Bump PKGREVISION for perl update. 2011-08-07 02:40:32 +00:00
obache
1d9df3258a recursive bump from gettext-lib shlib bump. 2011-04-22 13:41:54 +00:00
wiz
579796a3e5 Recursive PKGREVISION bump for jpeg update to 8. 2010-01-17 12:02:03 +00:00
jnemeth
f1928a0e2e Update to 1.2.37. This update is to fix two security issues.
1.2.36 fixed AST-2009-008, and 1.2.37 fixed AST-2009-010.  The
problem in AST-2009-008 is:

-----

It is possible to determine if a peer with a specific name is
configured in Asterisk by sending a specially crafted REGISTER
message twice. The username that is to be checked is put in the
user portion of the URI in the To header. A bogus non-matching
value is put into the username portion of the Digest in the
Authorization header. If the peer does exist the second REGISTER
will receive a response of "403 Authentication user name does not
match account name". If the peer does not exist the response will
be "404 Not Found" if alwaysauthreject is disabled and "401
Unauthorized" if alwaysauthreject is enabled.

-----

And, the problem in AST-2009-010 is:

-----

An attacker sending a valid RTP comfort noise payload containing
a data length of 24 bytes or greater can remotely crash Asterisk.

-----
2009-12-18 14:39:26 +00:00
jnemeth
9bd2514a3d update to asterisk 1.2.35 which fixes AST-2009-006 -- IAX2 DOS vulnerability 2009-09-05 01:44:18 +00:00
jnemeth
2fd0c5ce33 This update is just to fix a hypothetical security issue (AST-2009-005)
which is most likely not exploitable.
2009-08-23 09:22:23 +00:00
wiz
6153aa7dab regen (for DIST_SUBDIR change). 2009-08-21 08:46:16 +00:00
jnemeth
11077f2e1c Change DIST_SUBDIR to avoid people having to manually remove the old
distfile.  Requested by wiz@.
2009-08-21 08:34:25 +00:00
jnemeth
dd334c2803 bump PKGREVISION for previous 2009-08-20 22:33:47 +00:00
jnemeth
d157c1ba82 Digium in its infinite wisdom changed the Music-On-Hold sound files in all
release tarballs.  Update for that change.

While here, do some pkglint cleanup and add LICENSE=gplv2.
2009-08-20 22:31:41 +00:00
wiz
107da423dc Remove empty PLIST.common_end. 2009-07-22 09:23:47 +00:00
joerg
0268c554bd Remove @dirrm entries from PLISTs 2009-06-14 17:38:38 +00:00
jnemeth
45e6b2c144 Upgrade to 1.2.33. Provides a fix related to AST-2009-001. 2009-06-05 23:07:11 +00:00
jnemeth
29602c9ff9 new MASTER_SITES 2009-05-15 18:24:29 +00:00
hasso
ffaa59cfe2 Make it build on DragonFly master and recent versions of FreeBSD (probably). 2009-04-07 19:34:10 +00:00
jnemeth
6057bb9da2 PR/38351 - Miro Voutilainen -- app_curl does not build 2009-01-26 13:15:49 +00:00
obache
12078f931c Need to care ${ASTVARLIBDIR}/sounds/priv-callerintros.
XXX: it should be in ${VARBASE}, not ${PREFIX}/libdata.
2009-01-22 12:19:49 +00:00
obache
4e588ff893 Update asterisk to 1.2.31.
While here, update MASTER_SITES and honor PKGMANDIR.

ChangeLog-1.2.31:
2009-01-06  Leif Madsen <lmadsen@digium.com>

	* Asterisk 1.2.31 released

2009-01-06 20:44 +0000 [r167259]  Tilghman Lesher <tlesher@digium.com>

	* channels/chan_iax2.c: Security fix AST-2009-001.

2008-12-10  Tilghman Lesher <tlesher@digium.com>

	* Asterisk 1.2.30.4 released

2008-12-10 21:06 +0000 [r162868]  Tilghman Lesher <tlesher@digium.com>

	* channels/chan_iax2.c: Fix for AST-2008-012

2008-12-05 20:50 +0000 [r161421]  Sean Bright <sean.bright@gmail.com>

	* include/asterisk/astobj2.h, astobj2.c: Fix build errors on
	  FreeBSD (uint -> unsigned int). (closes issue #14006) Reported
	  by: alphaque Patches: astobj2.h-patch uploaded by alphaque
	  (license 259) (Slightly modified by seanbright)

2008-12-01  Tilghman Lesher <tlesher@digium.com>

	* Asterisk 1.2.30.3 released

2008-11-25 21:37 +0000 [r159245]  Tilghman Lesher <tlesher@digium.com>

	* channels/chan_iax2.c: Regression fix for last security fix. Set
	  the iseqno correctly. (closes issue #13918) Reported by:
	  ffloimair Patches: 20081119__bug13918.diff.txt uploaded by
	  Corydon76 (license 14) Tested by: ffloimair

2008-08-09  Tilghman Lesher <tlesher@digium.com>

	* Asterisk 1.2.30.2 released

2008-08-09 15:24 +0000 [r136945]  Tilghman Lesher <tlesher@digium.com>

	* include/asterisk/compat.h, include/asterisk/astobj2.h: Regression
	  fixes for Solaris

2008-07-25 15:00 +0000 [r133577]  Russell Bryant <russell@digium.com>

	* LICENSE: Fix the IAX2 URI for calling Digium

2008-07-23  Tilghman Lesher <tlesher@digium.com>

	* Asterisk 1.2.30.1 released

2008-07-24 03:46 +0000 [r133360]  Tilghman Lesher <tlesher@digium.com>

	* channels/chan_iax2.c: This part was not correctly patched for
	  AST-2008-010.
2009-01-21 05:35:07 +00:00
jnemeth
3944b24d27 - make sure rc.d script can find asterisk when it isn't in the path
- pkglint
2008-11-24 09:27:29 +00:00
tonnerre
2584cefb89 Update Asterisk to version 1.2.30, fixing two Denial of Service
vulnerabilities (CVE-2008-3263 and CVE-2008-3264).
cvs: ----------------------------------------------------------------------
2008-07-24 00:10:50 +00:00
sborrill
459999bf0a Add reload command to rc.d script.
Remove sudo from rc.d - it should not be a requirement to stop your VoIP
server.
2008-07-10 08:23:20 +00:00
wiz
f0e85b41ce Add missing file to PLIST. Bump PKGREVISION. 2008-06-19 08:14:29 +00:00
wiz
35f9ffa755 pkgsrc-users, not packages (hi riz!) 2008-06-18 11:12:53 +00:00
mjl
31c7e00215 Update to 1.2.29. Security update.
* channels/chan_sip.c: Copy the From header into a variable so that
          pedantic SIP handling does not try to mess with a NULL pointer.
          (AST-2008-008)
* channels/chan_iax2.c: When we receive a full frame that is
          supposed to contain our call number, ensure that it has the
          correct one. (closes issue #10078) (AST-2008-006)
2008-06-13 10:10:33 +00:00
joerg
ba171a91fa Add DESTDIR support. 2008-06-12 02:14:13 +00:00
riz
0940c02f91 Stop pretending like I have time to maintain packages that I don't
even really use anymore.
2008-06-07 17:28:11 +00:00
wiz
eff6f440a2 Add INSTALLATION_DIRS so that installation is successful even in a bulk
build.
2008-05-26 12:29:24 +00:00
wiz
acc3a4bb42 Another try at fixing installation of the pkgconfig file under pbulk. 2008-04-24 09:04:55 +00:00
jlam
841dfa0e7a Convert to use PLIST_VARS instead of manually passing "@comment "
through PLIST_SUBST to the plist module.
2008-04-12 22:42:57 +00:00
mjl
4fefd9c6d3 Update asterisk to 1.2.27
Update for several critical security issues:

   * astobj.h: Fix character string being treated as format string
   * chan_sip.c: Do not return with a successful
     authentication if the From header ends up empty. (AST-2008-003)
   * chan_iax2.c: Fix another potential seg fault (closes issue #11606)
   * chan_iax2.c: Fix a couple of places where it's possible
     to dereference a NULL pointer.
   * chan_sip.c, channels/chan_iax2.c: Fixing AST-2007-027
   * cdr_pgsql.c: Properly escape src and dst fields (Fixes AST-2007-026)
2008-03-19 10:32:02 +00:00
wiz
913964248d Use REPLACE_BASH to make sure right bash is found for mkpkgconfig. 2008-02-28 08:53:31 +00:00
wiz
5d077f8e34 Add bash to tools for mkpkgconfig. 2008-02-27 12:31:12 +00:00
wiz
d1a422fd46 Create pkgconfig file in correct location. Add it to PLIST.
Bump PKGREVISION.
2008-02-20 10:14:19 +00:00
tnn
ad6ceadd25 Per the process outlined in revbump(1), perform a recursive revbump
on packages that are affected by the switch from the openssl 0.9.7
branch to the 0.9.8 branch. ok jlam@
2008-01-18 05:06:18 +00:00
mjl
dcad3941ff Update asterisk to 1.2.24.
Version 1.2.24 is the final 1.2 release that contains normal bug fixes.
The 1.2 branch will only be maintained with security fix releases from
now until it is completely deprecated.
2007-08-10 00:03:27 +00:00
mjl
3b7c6e9d8f Update asterisk to 1.2.23
* channels/chan_iax2.c: Don't create the Asterisk channel until we
          are starting the PBX on it. (ASA-2007-018)
        * channels/chan_agent.c: (closes issue #5866) Reported by: tyler Do
          not force channel format changes when a generator is present. The
          generator may have changed the formats itself and changing them
          back would cause issues.
        * channels/chan_sip.c: (closes issue #10236) Reported by: homesick
          Patches: rpid_1.4_75840.patch uploaded by homesick (license 91)
          Accept Remote Party ID on guest calls.
        * include/asterisk/app.h: We should not use C++ reserved words in
          API headers (closes issue #10266)
        * channels/chan_sip.c: Backport a fix for a memory leak that was
          fixed in trunk in reivision 76221 by rizzo. The memory used for
          the localaddr list was not freed during a configuration reload.
        * channels/chan_sip.c: (closes issue #10247) Reported by:
          fkasumovic Patches: chan_sip.patch uploaded by fkasumovic
          (license #101) Drop any peer realm authentication entries when
          reloading so multiple entries do not get added to the peer.
        * channels/chan_iax2.c: When processing full frames, take sequence
          number wraparound into account when deciding whether or not we
          need to request retransmissions by sending a VNAK. This code
          could cause VNAKs to be sent erroneously in some cases, and to
          not be sent in other cases when it should have been. (closes
          issue #10237, reported and patched by mihai)
        * channels/chan_iax2.c: When traversing the queue of frames for
          possible retransmission after receiving a VNAK, handle sequence
          number wraparound so that all frames that should be retransmitted
          actually do get retransmitted. (issue #10227, reported and
          patched by mihai)
        * apps/app_voicemail.c: Store prior to copy (closes issue #10193)
        * apps/app_queue.c: removed the word 'pissed' from ast_log(...)
2007-08-03 22:40:00 +00:00
mjl
b4f03815b0 Update to 1.2.22
* channels/chan_skinny.c: Properly check for the length in the
	  skinny packet to prevent an invalid memcpy. (ASA-2007-016)

	* channels/iax2-parser.h, channels/chan_iax2.c,
	  channels/iax2-parser.c: Ensure that when encoding the contents of
	  an ast_frame into an iax_frame, that the size of the destination
	  buffer is known in the iax_frame so that code won't write past
	  the end of the allocated buffer when sending outgoing frames.
	  (ASA-2007-014)

	* channels/chan_iax2.c: After parsing information elements in IAX
	  frames, set the data length to zero, so that code later on does
	  not think it has data to copy. (ASA-2007-015)

	* res/res_musiconhold.c: Fix a couple potential minor memory leaks.
	  load_moh_classes() could return without destroying the loaded
	  configuration.

	* apps/app_chanspy.c: Fixed an issue where chanspy flags were
	  uninitialized if no options were passed.

	* res/res_musiconhold.c: Ensure that adding a user to the list of
	  users of a specific music on hold class is not done at the same
	  time as any of the other operations on this list to prevent list
	  corruption.

	* channels/chan_iax2.c: The function make_trunk() can fail and
	  return -1 instead of a valid new call number. Fix the uses of
	  this function to handle this instead of treating it as the new
	  call number. This would cause a deadlock and memory corruption.

	* channels/chan_agent.c: The cli command "agent logoff Agent/x
	  soft" did not work...at all. Now it does.

	* res/res_config_odbc.c: Make sure that the ESCAPE immediately
	  follows the condition that uses LIKE. This fixes realtime
	  extensions with ODBC.

	* apps/app_queue.c: Fix an issue where it was possible to have a
	  service level of over 100% Between the time recalc_holdtime and
	  update_queue was called, it was possible that the call could have
	  been hungup.

	* dns.c: Use res_ndestroy on systems that have it. Otherwise, use
	  res_nclose. This prevents a memleak on NetBSD - and possibly
	  others.
2007-07-19 09:39:57 +00:00
mjl
4c7740d821 Update asterisk to 1.2.21.1. 2007-07-11 14:28:46 +00:00
mjl
e3b7ca68cc Updated asterisk to 1.2.20
This release is a regular maintenance release. It has been made just
a couple of weeks after the previous set of releases because the
development team has been working especially hard on fixing bugs
lately. There has been a large volume of issues fixed in just two weeks.
2007-07-08 12:02:18 +00:00