Commit graph

120 commits

Author SHA1 Message Date
tron
73d05e2276 Recursive PKGREVISION bump for OpenSSL API version bump. 2014-02-12 23:17:32 +00:00
jnemeth
9bc962a13f Update to Asterisk 11.7.0: this is a minor bugfix update
The Asterisk Development Team has announced the release of Asterisk 11.7.0.

The release of Asterisk 11.7.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- app_confbridge: Can now set the language used for announcements
      to the conference.

* --- app_queue: Fix CLI "queue remove member" queue_log entry.

* --- chan_sip: Do not increment the SDP version between 183 and 200
      responses.

* --- chan_sip: Allow a sip peer to accept both AVP and AVPF calls

* --- chan_sip: Fix Realtime Peer Update Problem When Un-registering
      And Expires Header In 200ok

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.7.0

Thank you for your continued support of Asterisk!
2014-01-07 11:07:03 +00:00
jnemeth
dab9bdafe8 Update to Asterisk 11.6.1: this is a security fix update to fix
AST-2013-006 and AST-2013-007, and a minor bug fix update.

pkgsrc change: disable SRTP on NetBSD as it doesn't link

---- 11.6.1 ----

The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security
releases are released as versions 1.8.15-cert4, 11.2-cert3, 1.8.24.1, 10.12.4,
10.12.4-digiumphones, and 11.6.1.

The release of these versions resolve the following issues:

* A buffer overflow when receiving odd length 16 bit messages in app_sms. An
  infinite loop could occur which would overwrite memory when a message is
  received into the unpacksms16() function and the length of the message is an
  odd number of bytes.

* Prevent permissions escalation in the Asterisk Manager Interface. Asterisk
  now marks certain individual dialplan functions as 'dangerous', which will
  inhibit their execution from external sources.

  A 'dangerous' function is one which results in a privilege escalation. For
  example, if one were to read the channel variable SHELL(rm -rf /) Bad
  Things(TM) could happen; even if the external source has only read
  permissions.

  Execution from external sources may be enabled by setting 'live_dangerously'
  to 'yes' in the [options] section of asterisk.conf. Although doing so is not
  recommended.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2013-006 and AST-2013-007, which were
released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.6.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2013-006.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-007.pdf

Thank you for your continued support of Asterisk!

----- 11.6.0 -----

The Asterisk Development Team has announced the release of Asterisk 11.6.0.

The release of Asterisk 11.6.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Confbridge: empty conference not being torn down
  (Closes issue ASTERISK-21859. Reported by Chris Gentle)

* --- Let Queue wrap up time influence member availability
  (Closes issue ASTERISK-22189. Reported by Tony Lewis)

* --- Fix a longstanding issue with MFC-R2 configuration that
      prevented users
  (Closes issue ASTERISK-21117. Reported by Rafael Angulo)

* --- chan_iax2: Fix saving the wrong expiry time in astdb.
  (Closes issue ASTERISK-22504. Reported by Stefan Wachtler)

* --- Fix segfault for certain invalid WebSocket input.
  (Closes issue ASTERISK-21825. Reported by Alfred Farrugia)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.6.0

Thank you for your continued support of Asterisk!
2013-12-23 01:34:03 +00:00
adam
63c018902c Revbump after updating textproc/icu 2013-10-19 09:06:55 +00:00
ryoon
3fba1a52dd Recursive revbump from pango-1.36.0 2013-10-10 14:41:44 +00:00
adam
d2cb6dec32 Revbump after cairo update 2013-09-02 19:50:38 +00:00
jnemeth
4d63ddf359 Update to Asterisk 11.5.1: this is a security fix release to fix
AST-2013-004 and AST-2013-005.

The Asterisk Development Team has announced security releases for
Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The
available security rele ases are released as versions 1.8.15-cert2,
11.2-cert2, 1.8.23.1, 10.12.3, 10.12.3-di giumphones, and 11.5.1.

The release of these versions resolve the following issues:

* A remotely exploitable crash vulnerability exists in the SIP
  channel driver if an ACK with SDP is received after the channel
  has been terminated.  The handling code incorrectly assumes that
  the channel will always be present.

* A remotely exploitable crash vulnerability exists in the SIP
  channel driver if an invalid SDP is sent in a SIP request that
  defines media descriptions before connection information. The
  handling code incorrectly attempts to reference the socket address
  information even though that information has not yet been set.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2013-004 and AST-2013-005,
which were released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.5.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2013-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-005.pdf

Thank you for your continued support of Asterisk!
2013-08-30 05:49:51 +00:00
jnemeth
656c3403cb Add patches to convert RAII_VAR to a method that doesn't use nested
functions, thus making Asterisk portable to all C compilers.  The
patches from joerg@ (with one missing file added by myself).
2013-08-08 00:45:10 +00:00
jnemeth
15b1555d3a Upgrade to Asterisk 11.5.0: this is a general bug fix release
pkgsrc changes:
  - add dependency on libuuid
  - work around NetBSD's incompatible implementation of IP_PKTINFO

The Asterisk Development Team has announced the release of Asterisk 11.5.0.

The release of Asterisk 11.5.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Fix Segfault In app_queue When "persistentmembers" Is Enabled
      And Using Realtime

* --- IAX2: fix race condition with nativebridge transfers.

* --- Fix The Payload Being Set On CN Packets And Do Not Set Marker
      Bit

* --- Fix One-Way Audio With auto_* NAT Settings When SIP Calls
      Initiated By PBX

* --- chan_sip: NOTIFYs for BLF start queuing up and fail to be sent
      out after retries fail

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.5.0

Thank you for your continued support of Asterisk!
2013-07-21 06:55:53 +00:00
jperkin
b091c2f172 Bump PKGREVISION of all packages which create users, to pick up change of
sysutils/user_* packages.
2013-07-12 10:44:52 +00:00
jnemeth
651e0be0c1 Asterisk is known to fail on 32-bit systems, specifically i386. Mark it
as such until the bug is found and fixed.
2013-06-16 22:10:13 +00:00
jnemeth
cf3d9e8a32 - fix PLIST when jabber option is disabled
- fix compile problem on newer NetBSD systems that have newlocale support
- fix a couple of cases where ctype functions called with plain char
- last two items from joerg@
2013-06-14 04:26:55 +00:00
wiz
e0b49a2fed Bump PKGREVISION for libXft changes for NetBSD native X support on
NetBSD 6, requested by tron.
2013-06-06 12:53:40 +00:00
tron
a36fb86593 Try to fix the fallout caused by the fix for PR pkg/47882. Part 3:
Recursively bump package revisions again after the "freetype2" and
"fontconfig" handling was fixed.
2013-06-04 22:15:37 +00:00
wiz
c83ffb8583 Bump freetype2 and fontconfig dependencies to current pkgsrc versions,
to address issues with NetBSD-6(and earlier)'s fontconfig not being
new enough for pango.

While doing that, also bump freetype2 dependency to current pkgsrc
version.

Suggested by tron in PR 47882
2013-06-03 10:04:30 +00:00
wiz
98c3768c3a Bump all packages for perl-5.18, that
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package

Like last time, where this caused no complaints.
2013-05-31 12:39:35 +00:00
jnemeth
b215c2dfa2 Update to Asterisk 11.4.0: this is a general bugfix release.
The Asterisk Development Team has announced the release of Asterisk 11.4.0.

The release of Asterisk 11.4.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Fix Sorting Order For Parking Lots Stored In Static Realtime

* --- Fix StopMixMonitor Hanging Up When Unable To Stop MixMonitor On
      A Channel

* --- When a session timer expires during a T.38 call, re-invite with
      correct SDP

* --- Fix white noise on SRTP decryption

* --- Fix reload skinny with active devices.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.4.0

Thank you for your continued support of Asterisk!
2013-05-18 03:40:17 +00:00
jnemeth
184707bb03 Whoops missed updating sound tarball in 11.3.0 update. Fixed.
Thanks to joerg@ for pointing it out.
2013-05-12 18:14:21 +00:00
adam
1ab43a036f Massive revbump after updating graphics/ilmbase, graphics/openexr, textproc/icu. 2013-05-09 07:39:04 +00:00
jnemeth
c592fc7dfe Update to Asterisk 11.3.0: this is a bugfix release.
The Asterisk Development Team has announced the release of Asterisk 11.3.0.

The release of Asterisk 11.3.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Fix issue where chan_mobile fails to bind to first available port

* --- Fix Queue Log Reporting Every Call COMPLETECALLER With "h"
      Extension Present

* --- Retain XMPP filters across reconnections so external modules
      continue to function as expected.

* --- Ensure that a declined media stream is terminated with a '\r\n'

* --- Fix pjproject compilation in certain circumstances

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.3.0

Thank you for your continued support of Asterisk!
2013-05-05 01:32:34 +00:00
jnemeth
a5be729777 Update to Asterisk 11.2.2: this is a security update which fixes
AST-2013-001, AST-2013-002, and AST-2013-003.

The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.15 and Asterisk 1.8, 10, and 11. The available security releases
are released as versions 1.8.15-cert2, 1.8.20.2, 10.12.2, 10.12.2-digiumphones,
and 11.2.2.

The release of these versions resolve the following issues:

* A possible buffer overflow during H.264 format negotiation. The format
  attribute resource for H.264 video performs an unsafe read against a media
  attribute when parsing the SDP.

  This vulnerability only affected Asterisk 11.

* A denial of service exists in Asterisk's HTTP server. AST-2012-014, fixed
  in January of this year, contained a fix for Asterisk's HTTP server for a
  remotely-triggered crash. While the fix prevented the crash from being
  triggered, a denial of service vector still exists with that solution if an
  attacker sends one or more HTTP POST requests with very large Content-Length
  values.

  This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11

* A potential username disclosure exists in the SIP channel driver. When
  authenticating a SIP request with alwaysauthreject enabled, allowguest
  disabled, and autocreatepeer disabled, Asterisk discloses whether a user
  exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways.

  This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2013-001, AST-2013-002, and AST-2013-003, which were
released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.2.2

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2013-001.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-002.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-003.pdf

Thank you for your continued support of Asterisk!
2013-04-10 05:28:56 +00:00
wiz
d1b820f37b Recursive bump for png-1.6. 2013-02-16 11:18:58 +00:00
jnemeth
cb11a96e99 Update to Asterisk 11.2.1: this is a minor bug fix release.
----- 11.2.1:

The Asterisk Development Team has announced the release of Asterisk 11.2.1.

The release of Asterisk 11.2.1 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are the issues resolved in this release:

* --- Fix astcanary startup problem due to wrong pid value from before
      daemon call

* --- Update init.d scripts to handle stderr; readd splash screen for
      remote consoles

* --- Reset RTP timestamp; sequence number on SSRC change

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.2.1

Thank you for your continued support of Asterisk!

----- 11.2.0:

The Asterisk Development Team has announced the release of Asterisk 11.2.0.

The release of Asterisk 11.2.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- app_meetme: Fix channels lingering when hung up under certain
      conditions

* --- Fix stuck DTMF when bridge is broken.

* --- Add missing support for "who hung up" to chan_motif.

* --- Remove a fixed size limitation for producing SDP and change how
      ICE support is disabled by default.

* --- Fix chan_sip websocket payload handling

* --- Fix pjproject compilation in certain circumstances

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.2.0

Thank you for your continued support of Asterisk!
2013-02-10 20:18:50 +00:00
jperkin
becd113253 PKGREVISION bumps for the security/openssl 1.0.1d update. 2013-02-06 23:20:50 +00:00
adam
f4c3b89da7 Revbump after graphics/jpeg and textproc/icu 2013-01-26 21:36:13 +00:00
jnemeth
4b739a8368 Update to Asterisk 11.1.2: this is a security update for AST-2012-014
and AST-2012-015.  Apparently the last update didn't completely
fix the issues.

The Asterisk Development Team has announced a security release for
Asterisk 11, Asterisk 11.1.2. This release addresses the security
vulnerabilities reported in AST-2012-014 and AST-2012-015, and
replaces the previous version of Asterisk 11 released for these
security vulnerabilities. The prior release left open a vulnerability
in res_xmpp that exists only in Asterisk 11; as such, other versions
of Asterisk were resolved correctly by the previous releases.

The release of these versions resolve the following two issues:

* Stack overflows that occur in some portions of Asterisk that manage a TCP
  connection. In SIP, this is exploitable via a remote unauthenticated session;
  in XMPP and HTTP connections, this is exploitable via remote authenticated
  sessions. The vulnerabilities in SIP and HTTP were corrected in a prior
  release of Asterisk; the vulnerability in XMPP is resolved in this release.

* A denial of service vulnerability through exploitation of the device state
  cache. Anonymous calls had the capability to create devices in Asterisk that
  would never be disposed of. Handling the cachability of device states
  aggregated via XMPP is handled in this release.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2012-014 and AST-2012-015.

For a full list of changes in the current release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.2

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf

Thank you for your continued support of Asterisk - and we apologize for having
to do this twice!
2013-01-04 03:09:56 +00:00
jnemeth
bf4b089985 Upgrade to Asterisk 11.1.1; this is a security fix to fix AST-2012-14
and AST-2012-015.

Approved for commit during freeze by: agc

The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases
are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones,
and 11.1.1.

The release of these versions resolve the following two issues:

* Stack overflows that occur in some portions of Asterisk that manage a TCP
  connection. In SIP, this is exploitable via a remote unauthenticated session;
  in XMPP and HTTP connections, this is exploitable via remote authenticated
  sessions.

* A denial of service vulnerability through exploitation of the device state
  cache. Anonymous calls had the capability to create devices in Asterisk that
  would never be disposed of.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2012-014 and AST-2012-015, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf

Thank you for your continued support of Asterisk!
2013-01-03 02:11:19 +00:00
obache
64deda1dc9 recursive bump from cyrus-sasl libsasl2 shlib major bump. 2012-12-16 01:51:57 +00:00
jnemeth
1bbc663607 Update to Asterisk 11.1.0: this is a major new long term support release.
As this is a major release, you should read the information about updating:

https://wiki.asterisk.org/wiki/display/AST/Upgrading+to+Asterisk+11

You can also find documentation in:  /usr/pkg/share/doc/asterisk

----- 11.1.0:

The Asterisk Development Team has announced the release of Asterisk 11.1.0.

The release of Asterisk 11.1.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Fix execution of 'i' extension due to uninitialized variable.

* --- Prevent resetting of NATted realtime peer address on reload.

* --- Fix ConfBridge crash if no timing module loaded.

* --- Fix the Park 'r' option when a channel parks itself.

* --- Fix an issue where outgoing calls would fail to establish audio
      due to ICE negotiation failures.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.1.0

----- 11.0.1:

The Asterisk Development Team has announced the release of Asterisk 11.0.1.

The release of Asterisk 11.0.1 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are the issues resolved in this release:

* --- chan_sip: Fix a bug causing SIP reloads to remove all entries
      from the registry

* --- confbridge: Fix a bug which made conferences not record with
      AMI/CLI commands

* --- Fix an issue with res_http_websocket where the chan_sip
      WebSocket handler could not be registered.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.0.1

Thank you for your continued support of Asterisk!

----- 11.0.0:

The Asterisk Development Team is pleased to announce the release of
Asterisk 11.0.0.

Asterisk 11 is the next major release series of Asterisk.  It is a Long Term
Support (LTS) release, similar to Asterisk 1.8.  For more information about
support time lines for Asterisk releases, see the Asterisk versions page:
https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions

For important information regarding upgrading to Asterisk 11, please see the
Asterisk wiki:

https://wiki.asterisk.org/wiki/display/AST/Upgrading+to+Asterisk+11

A short list of new features includes:

* A new channel driver named chan_motif has been added which provides support
  for Google Talk and Jingle in a single channel driver.  This new channel
  driver includes support for both audio and video, RFC2833 DTMF, all codecs
  supported by Asterisk, hold, unhold, and ringing notification. It is also
  compliant with the current Jingle specification, current Google Jingle
  specification, and the original Google Talk protocol.

* Support for the WebSocket transport for chan_sip.

* SIP peers can now be configured to support negotiation of ICE candidates.

* The app_page application now no longer depends on DAHDI or app_meetme. It
  has been re-architected to use app_confbridge internally.

* Hangup handlers can be attached to channels using the CHANNEL() function.
  Hangup handlers will run when the channel is hung up similar to the h
  extension; however, unlike an h extension, a hangup handler is associated with
  the actual channel and will execute anytime that channel is hung up,
  regardless of where it is in the dialplan.

* Added pre-dial handlers for the Dial and Follow-Me applications.  Pre-dial
  allows you to execute a dialplan subroutine on a channel before a call is
  placed but after the application performing a dial action is invoked. This
  means that the handlers are executed after the creation of the callee
  channels, but before any actions have been taken to actually dial the callee
  channels.

* Log messages can now be easily associated with a certain call by looking at
  a new unique identifier, "Call Id".  Call ids are attached to log messages for
  just about any case where it can be determined that the message is related
  to a particular call.

* Introduced Named ACLs as a new way to define Access Control Lists (ACLs) in
  Asterisk. Unlike traditional ACLs defined in specific module configuration
  files, Named ACLs can be shared across multiple modules.

* The Hangup Cause family of functions and dialplan applications allow for
  inspection of the hangup cause codes for each channel involved in a call.
  This allows a dialplan writer to determine, for each channel, who hung up and
  for what reason(s).

* Two new functions have been added: FEATURE() and FEATUREMAP(). FEATURE()
  lets you set some of the configuration options from the general section
  of features.conf on a per-channel basis. FEATUREMAP() lets you customize
  the key sequence used to activate built-in features, such as blindxfer,
  and automon.

* Support for DTLS-SRTP in chan_sip.

* Support for named pickupgroups/callgroups, allowing any number of pickupgroups
  and callgroups to be defined for several channel drivers.

* IPv6 Support for AMI, AGI, ExternalIVR, and the SIP Security Event Framework.

More information about the new features can be found on the Asterisk wiki:

https://wiki.asterisk.org/wiki/display/AST/Asterisk+11+Documentation

A full list of all new features can also be found in the CHANGES file.

http://svnview.digium.com/svn/asterisk/branches/11/CHANGES

For a full list of changes in the current release, please see the ChangeLog.

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.0.0

Thank you for your continued support of Asterisk!
2012-12-11 08:22:48 +00:00
wiz
8b5d49eb78 Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.

I hope that's all of them.
2012-10-03 21:53:53 +00:00
asau
6b05a6f977 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-03 11:24:38 +00:00
dholland
1835d2fe04 Add missing rpath in curl plugin. 2012-06-09 18:44:51 +00:00
dholland
165d4a8120 With the latest curl, the output of curl-config --vernum contains
hex digits, so patching the makefile to compare it as decimal will
not work. Just patch out the test entirely, as pkgsrc guarantees
curl will always be present and the packaging is not equipped to
deal with this check failing anyhow.
2012-06-09 08:29:41 +00:00
joerg
7606657544 Don't override optimizer settings with absurd levels.
Fix inline definitions to work with C99 compiler.
2012-05-04 16:06:13 +00:00
hans
54c8799333 Fix build on SunOS. 2012-02-16 16:13:51 +00:00
wiz
78bf2cbc7e Remove zaptel option, zaptel-netbsd was removed. 2011-10-06 08:35:01 +00:00
jnemeth
7de85296ed Bump PKGREVISION for perl update. 2011-08-07 02:40:32 +00:00
obache
1d9df3258a recursive bump from gettext-lib shlib bump. 2011-04-22 13:41:54 +00:00
wiz
579796a3e5 Recursive PKGREVISION bump for jpeg update to 8. 2010-01-17 12:02:03 +00:00
jnemeth
f1928a0e2e Update to 1.2.37. This update is to fix two security issues.
1.2.36 fixed AST-2009-008, and 1.2.37 fixed AST-2009-010.  The
problem in AST-2009-008 is:

-----

It is possible to determine if a peer with a specific name is
configured in Asterisk by sending a specially crafted REGISTER
message twice. The username that is to be checked is put in the
user portion of the URI in the To header. A bogus non-matching
value is put into the username portion of the Digest in the
Authorization header. If the peer does exist the second REGISTER
will receive a response of "403 Authentication user name does not
match account name". If the peer does not exist the response will
be "404 Not Found" if alwaysauthreject is disabled and "401
Unauthorized" if alwaysauthreject is enabled.

-----

And, the problem in AST-2009-010 is:

-----

An attacker sending a valid RTP comfort noise payload containing
a data length of 24 bytes or greater can remotely crash Asterisk.

-----
2009-12-18 14:39:26 +00:00
jnemeth
9bd2514a3d update to asterisk 1.2.35 which fixes AST-2009-006 -- IAX2 DOS vulnerability 2009-09-05 01:44:18 +00:00
jnemeth
2fd0c5ce33 This update is just to fix a hypothetical security issue (AST-2009-005)
which is most likely not exploitable.
2009-08-23 09:22:23 +00:00
wiz
6153aa7dab regen (for DIST_SUBDIR change). 2009-08-21 08:46:16 +00:00
jnemeth
11077f2e1c Change DIST_SUBDIR to avoid people having to manually remove the old
distfile.  Requested by wiz@.
2009-08-21 08:34:25 +00:00
jnemeth
dd334c2803 bump PKGREVISION for previous 2009-08-20 22:33:47 +00:00
jnemeth
d157c1ba82 Digium in its infinite wisdom changed the Music-On-Hold sound files in all
release tarballs.  Update for that change.

While here, do some pkglint cleanup and add LICENSE=gplv2.
2009-08-20 22:31:41 +00:00
wiz
107da423dc Remove empty PLIST.common_end. 2009-07-22 09:23:47 +00:00
joerg
0268c554bd Remove @dirrm entries from PLISTs 2009-06-14 17:38:38 +00:00
jnemeth
45e6b2c144 Upgrade to 1.2.33. Provides a fix related to AST-2009-001. 2009-06-05 23:07:11 +00:00
jnemeth
29602c9ff9 new MASTER_SITES 2009-05-15 18:24:29 +00:00