Commit graph

68 commits

Author SHA1 Message Date
wiz
4e3b1b97c2 librsvg: update bl3.mk to remove libcroco in rust case
recursive bump for the dependency change
2020-03-10 22:08:37 +00:00
wiz
f669fda471 *: recursive bump for libffi 2020-03-08 16:47:24 +00:00
gdt
5f35153040 comms/asterisk16: Check for clang correctly
(This is a simple pkglint autofix, testing for clang being in
PKGSRC_COMPILER, rather than equal to, avoiding failure with
ccache/distcc.)
2020-01-27 20:43:07 +00:00
rillig
9637f7852e all: migrate homepages from http to https
pkglint -r --network --only "migrate"

As a side-effect of migrating the homepages, pkglint also fixed a few
indentations in unrelated lines. These and the new homepages have been
checked manually.
2020-01-26 17:30:40 +00:00
jperkin
26c1bffc9f *: Recursive revision bump for openssl 1.1.1. 2020-01-18 21:48:19 +00:00
ryoon
eedd1e806f *: Recursive revbump from devel/boost-libs 2020-01-12 20:19:52 +00:00
ryoon
8300e7e451 asterisk16: Update to 16.7.0
Changelog:
16.7.0
Security bugs fixed in this release:
-----------------------------------
    [ASTERISK-28589] - chan_sip: Depending on configuration an INVITE can alter Addr of a peer (Reported by Andrey V. T.)
    [ASTERISK-28580] - Bypass SYSTEM write permission in manager action allows system commands execution (Reported by Eliel Sardañons)

Improvements made in this release:
-----------------------------------
    [ASTERISK-28602] - res_pjsip_outbound_registration: Maximum retries reached (Reported by Daniel)
    [ASTERISK-28586] - Typo in README-SERIOUSLY.bestpractices.md (Reported by Sam Banks)
    [ASTERISK-22192] - [patch] Allow voicemail forwards with ODBC backend when format differs from attachfmt column (Reported by cmaj)
    [ASTERISK-28567] - Problem with ASTERISK-20207: Asterisk should clear out any .lock files in the voice mail directory on startup.  (Reported by Michael)
    [ASTERISK-28542] - [patch] add the ability for asterisk to generate on-hold re-invites (Reported by Torrey Searle)
    [ASTERISK-28512] - Add pass-through support for H.265 (HEVC) codec (Reported by Florian Floimair)

Bugs fixed in this release:
-----------------------------------
    [ASTERISK-28609] - Memory Leak in res_rtp_asterisk.c (Reported by Ted G)
    [ASTERISK-28604] - app_meetme, chan_ooh323 and cdr_mysql don't build on 17.0.0 (Reported by George Joseph)
    [ASTERISK-28659] - res_pjsip_sdp_rtp: Bundle includes non-existent media stream if codecs create additional streams and offer does not have them (Reported by nappsoft)
    [ASTERISK-28641] - res_pjsip Segfaults when realtime configuration to an AOR points to a not existent AOR (Reported by Ross Beer)
    [ASTERISK-28644] - Stale comment in app_queue about ring_entry exception (Reported by Walter Doekes)
    [ASTERISK-28445] - res_pjsip_session: ast_json_vpack: Invalid UTF-8 string on hangup when TEST_FRAMEWORK enabled (Reported by Bernhard Schmidt)
    [ASTERISK-28637] - chan_sip+native_bridge_rtp: directmedia compatibility check failure when negociated ptime is not default ptime.  (Reported by Frederic LE FOLL)
    [ASTERISK-28631] - res_parking: Doesn't park when parkee and parker are the same (Reported by Ross Beer)
    [ASTERISK-28621] - Enforce T.38 error correction mode at 200 ok received (Reported by Salah Ahmed)
    [ASTERISK-28624] - res_pjsip_outbound_registration: add SRV failover (Reported by Kevin Harwell)
    [ASTERISK-28608] - app_amd: Use time calculation to calculate timeout (Reported by Michael Cargile)
    [ASTERISK-28615] - chan_dahdi: PRI span status may stay "Down, Active" after a short alarm (Reported by Frederic LE FOLL)
    [ASTERISK-28576] - res_rtp_asterisk: ICE Completion Crash when sent packet length doesn't match (Reported by Joshua Elson)
    [ASTERISK-26481] - FILE function grabs garbage along with read data when target line has no newline (Reported by Jonathan Harris)
    [ASTERISK-28618] - bridge_softmix: hold not cleared when joining a softmix bridge (Reported by Kevin Harwell)
    [ASTERISK-28616] - parking: Deadlock when multi call parking (Reported by Joshua C. Colp)
    [ASTERISK-28423] - ARI causes STASIS Deadlock (Reported by Ross Beer)
    [ASTERISK-28572] - Memory leaks in res_calendar_exchange and res_calendar_icalendar (Reported by Yoooooo Ha)
    [ASTERISK-28585] - ari/resource_events: Crash in event session cleanup (Reported by Kevin Harwell)
    [ASTERISK-28590] - utils.c throws repeated warnings; "pthread_attr_setstacksize: Invalid argument" (Reported by Speed Dial Dave)
    [ASTERISK-28578] - race condition on pjsip channelstats command (Reported by Salah Ahmed)
    [ASTERISK-28571] - cdr_pgsql: accesses obsolete (and finally removed) column (Reported by Christoph Moench-Tegeder)
    [ASTERISK-28575] - MWI Send Notify Crash on 16.6 (Reported by Joshua Elson)
    [ASTERISK-28574] - pjproject fails to build on 16.6.0, works on 16.5 (Reported by Niklas Larsson)
    [ASTERISK-28561] - Asterisk Deadlocks (Reported by Aheliotech)
    [ASTERISK-28552] - res_pjsip_mwi: Frack during unload on unsolicited_mwi container (Reported by Kevin Harwell)
    [ASTERISK-28566] - CDR backend unload problem during active call(s) (Reported by Marian Piater)
    [ASTERISK-28553] - stasis.c: Crash during unload (Reported by Kevin Harwell)
    [ASTERISK-28086] - chan_pjsip: Crash when initiating PlayDTMF over AMI (Reported by Jeremiah Gadd)
    [ASTERISK-28544] - Wrong contact representation in ipv6 mode (Reported by Jørgen H)
    [ASTERISK-28534] - Segmentation fault when there is no priority for an extension (Reported by Timothy Vanderaerden)
    [ASTERISK-28463] - res_pjsip_path: Crash when invalid contact is configured (Reported by Juan Martin)
    [ASTERISK-28521] - pjsip: Memory Leak (Reported by Mark)
    [ASTERISK-28523] - Asterisk 16.5.0 Memory leak (Reported by Cyril Ramière)
    [ASTERISK-28538] - chan_pjsip: Deadlock on fax detection (Reported by Joshua C. Colp)
    [ASTERISK-28536] - Asterisk release candidates fail to build on FreeBSD (Reported by Guido Falsi)
    [ASTERISK-23756] - setvar directive when used in template and a child of said template, results in duplicate variable names (Reported by Michael Goryainov)

New Features made in this release:
-----------------------------------
    [ASTERISK-28614] - app_senddtmf: Allow "receiving" DTMF with PlayDTMF instead of only "sending" (Reported by lvl)
    [ASTERISK-28613] - func_curl: CURLOPT cannot set Content-Type header (Reported by Martin Tomec)
    [ASTERISK-28553] - stasis.c: Crash during unload (Reported by Kevin Harwell)
    [ASTERISK-28086] - chan_pjsip: Crash when initiating PlayDTMF over AMI (Reported by Jeremiah Gadd)
    [ASTERISK-28544] - Wrong contact representation in ipv6 mode (Reported by Jørgen H)
    [ASTERISK-28534] - Segmentation fault when there is no priority for an extension (Reported by Timothy Vanderaerden)
    [ASTERISK-28463] - res_pjsip_path: Crash when invalid contact is configured (Reported by Juan Martin)
    [ASTERISK-28521] - pjsip: Memory Leak (Reported by Mark)
    [ASTERISK-28523] - Asterisk 16.5.0 Memory leak (Reported by Cyril Ramière)
    [ASTERISK-28538] - chan_pjsip: Deadlock on fax detection (Reported by Joshua C. Colp)
    [ASTERISK-28536] - Asterisk release candidates fail to build on FreeBSD (Reported by Guido Falsi)
    [ASTERISK-23756] - setvar directive when used in template and a child of said template, results in duplicate variable names (Reported by Michael Goryainov)

New Features made in this release:
-----------------------------------
    [ASTERISK-28614] - app_senddtmf: Allow "receiving" DTMF with PlayDTMF instead of only "sending" (Reported by lvl)
    [ASTERISK-28613] - func_curl: CURLOPT cannot set Content-Type header (Reported by Martin Tomec)
    [ASTERISK-28533] - func_jitterbuffer: Add support for video synchronization (Reported by Joshua C. Colp)

16.6.0
Security bugs fixed in this release:
-----------------------------------
[ASTERISK-28495] - res_pjsip_t38: 200 OK with SDP answer with declined stream causes crash (Reported by Alexei Gradinari)

Bugs fixed in this release:
-----------------------------------
[ASTERISK-28521] - pjsip: Memory Leak (Reported by Mark)
[ASTERISK-28523] - Asterisk 16.5.0 Memory leak (Reported by Cyril Ramière)
[ASTERISK-28538] - chan_pjsip: Deadlock on fax detection (Reported by Joshua C. Colp)
[ASTERISK-28536] - Asterisk release candidates fail to build on FreeBSD (Reported by Guido Falsi)
[ASTERISK-28511] - codec_resample: Bad sound quality when up sampling from SLIN16 to SLIN32 (Reported by Ruddy G)
[ASTERISK-28525] - chan_dahdi: set CHANNEL(hangupsource) when a PRI channel hangs up (Reported by Frederic LE FOLL)
[ASTERISK-28527] - ChanIsAvail() creates a CDR if unanswered=yes is set in cdr.conf (Reported by Frederic LE FOLL)
[ASTERISK-28499] - translate: Crash when frame does not have a "src" field set (Reported by Gregory Massel)
[ASTERISK-25592] - chan_unistim: Clang Warning: variable sized type not at end of a struct (Reported by Alexander Traud)
[ASTERISK-28488] - pjsip mwi: n+1 sip notify's sent on re-register (Reported by Chris Savinovich)
[ASTERISK-28509] - PJSIP cnonce generated on Linux contains 36 characters, NEC only supports up to 32 characters (Reported by Dan Cropp)
[ASTERISK-28505] - app_voicemail/IMAP: segfault in leave_voicemail because not checking mailstream (Reported by Alexei Gradinari)
[ASTERISK-28487] - compile menuselect on gentoo (Reported by Kilburn)
[ASTERISK-28472] - Asterisk occasionally passes a NULL as srtp->session to srtp_protect/unprotect causing SEGV (Reported by Jonas Swiatek)
[ASTERISK-28498] - cel / cdr: Event times may be incorrect (Reported by Joshua C. Colp)
[ASTERISK-28480] - json integer overflow in ssrc and timestamp (Reported by Salah Ahmed)
[ASTERISK-28228] - res_pjsip: pjsip show contacts prints double entries (Reported by Ian Jones)
[ASTERISK-28483] - packet lost on UDPTL wrap around (Reported by Torrey Searle)
[ASTERISK-28477] - Crash when not specifying "dbfile" in res_config_sqlite3.conf (Reported by Dennis)
[ASTERISK-28478] - Crash performing "core reload" with modified res_config_sqlite3.conf (Reported by Dennis)
[ASTERISK-26968] - chan_pjsip: Transfer() does not result in TRANSFERSTATUS reflecting SIP response to transfer (Reported by Dan Cropp)
[ASTERISK-28282] - AST_SCHED_REPLACE_UNREF causes wait-on-self deadlocks (in chan_sip) (Reported by Walter Doekes)

New Features made in this release:
-----------------------------------
[ASTERISK-17808] - [patch] Unregister a realtime moh class (Reported by Byron Clark)
[ASTERISK-28489] - Channel variable SIPFROMDOMAIN for chan_pjsip to setup From header URI domain (Reported by Stas Kobzar)
2020-01-11 08:36:13 +00:00
joerg
150a0e06ca Look into ${PREFIX}/lib when checking for libBlocksRuntime. 2019-12-21 23:29:04 +00:00
gdt
028999b85c comms/asterisk16: Fix compiler check via pkglint
AUTOFIX: Makefile:290: Replacing "${PKGSRC_COMPILER} == \"clang\"" with "${PKGSRC_COMPILER:Mclang}".

The PKGSRC_COMPILER can be a list of chained compilers, e.g. "ccache
distcc clang". Therefore, comparing it using == or != leads to wrong
results in these cases.
2019-11-24 01:14:10 +00:00
rillig
fc42239139 comms: align variable assignments
pkglint -Wall -F --only aligned --only indent -r

Manually adjusted the indentation in asterisk15 and asterisk16 to avoid
too deep indentation.
2019-11-03 12:04:12 +00:00
gdt
d71c096042 comms/asterisk: Update EOL info in DESCR
asterisk 13's EOL dates have been extended, and asterisk 16 is also an LTS.
2019-10-28 17:32:35 +00:00
ryoon
edacf2bbcb Recursive revbump from boost-1.71.0 2019-08-22 12:22:48 +00:00
ryoon
f65096e8f5 Fix build on NetBSD 8 2019-08-20 21:16:20 +00:00
ryoon
abe7b0a4eb comms/asterisk16: import asterisk-16.5.0
Asterisk is a complete PBX in software.  It provides all of the
features you would expect from a PBX and more. Asterisk does voice
over IP in three protocols, and can interoperate with almost all
standards-based telephony equipment using relatively inexpensive
hardware.

Asterisk provides Voicemail services with Directory, Call Conferencing,
Interactive Voice Response, Call Queuing. It has support for
three-way calling, caller ID services, ADSI, SIP and H.323 (as both
client and gateway).
2019-08-20 13:47:42 +00:00
jnemeth
9c7d3994ef Remove Asterisk 1.6. This version series went end-of-line on April
21st, 2012.  It most likely has multiple security issues.  By this
point, all users of this package should have migrated to comms/asterisk18
or comms/asterisk10 as this version has been marked as being
deprecated for some time now.

Note that this directory is likely to re-appear in late 2017 when
Asterisk 16 comes out, assuming the current schedule is followed.
However that will be a vastly different version as Asterisk 11 is
only in the RC stage now (i.e. it will be five major versions after
the one that is expected to be released later this year).
2012-09-14 02:41:04 +00:00
marino
ef99fff6f0 comms/asterisk16: Mark NOT-FOR-DRAGONFLY
This package has not been patched for DragonFly.
There are two newer packages, asterisk10 and asterisk18
According to commit messages, this package will be removed in
"not too distant future" due to being EOL.
2012-07-15 16:26:11 +00:00
sbd
21792a9296 Recursive PKGREVISION bump for libxml2 buildlink addition. 2012-06-14 07:43:06 +00:00
joerg
7606657544 Don't override optimizer settings with absurd levels.
Fix inline definitions to work with C99 compiler.
2012-05-04 16:06:13 +00:00
jnemeth
38c2539a3f Update to Asterisk 1.6.2.24. This fixes AST-2012-004 and AST-2012-005.
The 1.6.2 series went End of Life on April 21st 2012, so this was
the last update.  This package will be deleted in the not too
distnat future.

The Asterisk Development Team has announced security releases for
Asterisk 1.6.2 , 1.8, and 10. The available security releases are
released as versions 1.6.2.24, 1.8.11.1, and 10.3.1.

The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the
following two issues:

 * A permission escalation vulnerability in Asterisk Manager
   Interface.  This would potentially allow remote authenticated
   users the ability to execute commands on the system shell with
   the privileges of the user running the Asterisk application.

 * A heap overflow vulnerability in the Skinny Channel driver.
   The keypad button message event failed to check the length of
   a fixed length buffer before appending a received digit to the
   end of that buffer.  A remote authenticated user could send
   sufficient keypad button message events that th e buffer would
   be overrun.

These issues and their resolution are described in the security
advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2012-004, AST-2012-005, and
AST-2012-006, which were released at the same time as this
announcement.

For a full list of changes in the current releases, please see the
ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.24

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf

Thank you for your continued support of Asterisk!
2012-04-30 03:19:40 +00:00
obache
a6d5ad9edc Recursive bump from icu shlib major bumped to 49. 2012-04-27 12:31:32 +00:00
jnemeth
08d53e3071 Update to 1.6.2.23:
This is a security fix update.  It fixes AST-2012-002.

NOTE NOTE NOTE

This is likely to be the last update to this package.  This version
of Asterisk will be EOLed on April 21st, 2012.  It will probably
be removed from pkgsrc not long after that.  If you are still using
this package, you should consider switching to comms/asterisk18,
the Long Term Support version, or comms/asterisk10 in the near
future.

NOTE NOTE NOTE

The Asterisk Development Team has announced security releases for
Asterisk 1.4, 1.6.2, 1.8, and 10. The available security releases
are released as versions 1.4.44, 1.6.2.23, 1.8.10.1, and 10.2.1.

The release of Asterisk 1.4.44 and 1.6.2.23 resolve an issue wherein
app_milliwatt can potentially overrun a buffer on the stack, causing
Asterisk to crash.  This does not have the potential for remote
code execution.

These issues and their resolution are described in the security
advisory.

For more information about the details of these vulnerabilities,
please read the security advisories AST-2012-002 and AST-2012-003,
which were released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.23

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-002.pdf

Thank you for your continued support of Asterisk!
2012-03-25 02:59:53 +00:00
hans
c0dfa2c444 Fix build on SunOS. 2012-02-16 16:30:03 +00:00
jnemeth
592d3fdf30 PR/35369 -- David Wetzel -- add support for speex codec (enabled by default) 2012-01-17 02:12:52 +00:00
jnemeth
4695ae4a75 Update to Asterisk 1.6.2.22:
The release of Asterisk 1.6.2.22 corrects two flaws in sip.conf.sample
related to AST-2011-013:

* The sample file listed *two* values for the 'nat' option as being the default.
   Only 'yes' is the default.

* The warning about having differing 'nat' settings confusingly referred to both
   peers and users.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.22

Thank you for your continued support of Asterisk!
2012-01-14 08:30:15 +00:00
jnemeth
2e4af05973 This update fixes AST-2011-013 and AST-2011-014. It also adapts to changes
in the iLBC codec files.

     __________________________________________________________________

               Asterisk Project Security Advisory - AST-2011-013

         Product        Asterisk
         Summary        Possible remote enumeration of SIP endpoints with
                        differing NAT settings
    Nature of Advisory  Unauthorized data disclosure
      Susceptibility    Remote unauthenticated sessions
         Severity       Minor
      Exploits Known    Yes
       Reported On      2011-07-18
       Reported By      Ben Williams
        Posted On
     Last Updated On    December 7, 2011
     Advisory Contact   Terry Wilson <twilson at digium.com>

         CVE Name

    Description  It is possible to enumerate SIP usernames when the general
                 and user/peer NAT settings differ in whether to respond to
                 the port a request is sent from or the port listed for
                 responses in the Via header. In 1.4 and 1.6.2, this would
                 mean if one setting was nat=yes or nat=route and the other
                 was either nat=no or nat=never. In 1.8 and 10, this would
                 mean when one was nat=force_rport or nat=yes and the other
                 was nat=no or nat=comedia.

    Resolution  Handling NAT for SIP over UDP requires the differing
                behavior introduced by these options.

                To lessen the frequency of unintended username disclosure,
                the default NAT setting was changed to always respond to the
                port from which we received the request-the most commonly
                used option.

                Warnings were added on startup to inform administrators of
                the risks of having a SIP peer configured with a different
                setting than that of the general setting. The documentation
                now strongly suggests that peers are no longer configured
                for NAT individually, but through the global setting in the
                "general" context.

                               Affected Versions
                Product              Release Series
         Asterisk Open Source             All        All versions

                                  Corrected In
     As this is more of an issue with SIP over UDP in general, there is no
     fix supplied other than documentation on how to avoid the problem. The
        default NAT setting has been changed to what we believe the most
      commonly used setting for the respective version in Asterisk 1.4.43,
                             1.6.2.21, and 1.8.7.2.

            Links

    Asterisk Project Security Advisories are posted at
    http://www.asterisk.org/security

    This document may be superseded by later versions; if so, the latest
    version will be posted at
    http://downloads.digium.com/pub/security/AST-2011-013.pdf and
    http://downloads.digium.com/pub/security/AST-2011-013.html

                                Revision History
           Date                 Editor                 Revisions Made

               Asterisk Project Security Advisory - AST-2011-013
              Copyright (c) 2011 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.

     __________________________________________________________________

               Asterisk Project Security Advisory - AST-2011-014

         Product        Asterisk
         Summary        Remote crash possibility with SIP and the "automon"
                        feature enabled
    Nature of Advisory  Remote crash vulnerability in a feature that is
                        disabled by default
      Susceptibility    Remote unauthenticated sessions
         Severity       Moderate
      Exploits Known    Yes
       Reported On      November 2, 2011
       Reported By      Kristijan Vrban
        Posted On       2011-11-03
     Last Updated On    December 7, 2011
     Advisory Contact   Terry Wilson <twilson at digium.com>

         CVE Name

    Description  When the "automon" feature is enabled in features.conf, it
                 is possible to send a sequence of SIP requests that cause
                 Asterisk to dereference a NULL pointer and crash.

    Resolution  Applying the referenced patches that check that the pointer
                is not NULL before accessing it will resolve the issue. The
                "automon" feature can be disabled in features.conf as a
                workaround.

                               Affected Versions
                Product              Release Series
         Asterisk Open Source           1.6.2.x      All versions
         Asterisk Open Source            1.8.x       All versions

                                  Corrected In
                   Product                              Release
            Asterisk Open Source                   1.6.2.21, 1.8.7.2

                                     Patches
                              Download URL                            Revision
   http://downloads.asterisk.org/pub/security/AST-2011-014-1.6.2.diff 1.6.2.20
   http://downloads.asterisk.org/pub/security/AST-2011-014-1.8.diff   1.8.7.1

            Links

    Asterisk Project Security Advisories are posted at
    http://www.asterisk.org/security

    This document may be superseded by later versions; if so, the latest
    version will be posted at
    http://downloads.digium.com/pub/security/AST-2011-014.pdf and
    http://downloads.digium.com/pub/security/AST-2011-014.html

                                Revision History
           Date                 Editor                 Revisions Made

               Asterisk Project Security Advisory - AST-2011-014
              Copyright (c) 2011 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
                           original, unaltered form.
2011-12-12 05:05:33 +00:00
jnemeth
d97e887bf9 Now that -current has sqlite3 included in base, enable it here. 2011-12-05 04:18:32 +00:00
jnemeth
12cc353a8e Revert previous. This package was marked OWNER= for a reason! 2011-10-11 03:15:50 +00:00
shattered
1f8d6d58ff Remove zaptel option everywhere (zaptel-netbsd package was removed) 2011-10-08 13:49:08 +00:00
jnemeth
7de85296ed Bump PKGREVISION for perl update. 2011-08-07 02:40:32 +00:00
jnemeth
a30622e2dd Update to 1.6.2.19 (fixes several security issues):
Please note that Asterisk 1.6.2.19 is the final maintenance release
from the 1.6.2 branch. Support for security related issues will
continue until April 21, 2012. For more information about support
of the various Asterisk branches, see
https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions

The release of Asterisk 1.6.2.19 resolves several issues reported
by the community and would have not been possible without your
participation.  Thank you!

The following is a sample of the issues resolved in this release:

* Don't broadcast FullyBooted to every AMI connection
   The FullyBooted event should not be sent to every AMI connection
   every time someone connects via AMI. It should only be sent to
   the user who just connected.
   (Closes issue #18168. Reported, patched by FeyFre)
* Fix thread blocking issue in the sip TCP/TLS implementation.
   (Closes issue #18497. Reported by vois. Tested by vois, rossbeer, kowalma,
   Freddi_Fonet. Patched by dvossel)
* Don't delay DTMF in core bridge while listening for DTMF features.
   (Closes issue #15642, #16625. Reported by jasonshugart, sharvanek. Tested by
   globalnetinc, jde. Patched by oej, twilson)
* Fix chan_local crashs in local_fixup()
   Thanks OEJ for tracking down the issue and submitting the patch.
   (Closes issue #19053. Reported, patched by oej)
* Don't offer video to directmedia callee unless caller offered it as well
   (Closes issue #19195. Reported, patched by one47)

Additionally security announcements AST-2011-008, AST-2011-010, and
AST-2011-011 have been resolved in this release.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.19
2011-07-05 08:34:47 +00:00
jnemeth
64c6665036 Upgrade to 1.6.2.18. This fixes several security issues including:
AST-2011-002, AST-2011-003, AST-2011-004, AST-2011-005, and AST-2011-006.

===========================================================================
1.6.2.18:

The Asterisk Development Team has announced the release of Asterisk 1.6.2.18.

The release of Asterisk 1.6.2.18 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

 * Only offer codecs both sides support for directmedia.

 * Resolution of several DTMF based attended transfer issues.
   NOTE: Be sure to read the ChangeLog for more information about these changes.

 * Resolve deadlocks related to device states in chan_sip

 * Fix channel redirect out of MeetMe() and other issues with channel softhangup

 * Fix voicemail sequencing for file based storage.

 * Guard against retransmitting BYEs indefinitely during attended transfers with
   chan_sip.

In addition to the changes listed above, commits to resolve security issues
AST-2011-005 and AST-2011-006 have been merged into this release. More
information about AST-2011-005 and AST-2011-006 can be found at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.18

===========================================================================
1.6.2.17.3

The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3.

The releases of Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3 resolve two
issues:

* File Descriptor Resource Exhaustion (AST-2011-005)
* Asterisk Manager User Shell Access (AST-2011-006)

The issues and resolutions are described in the AST-2011-005 and AST-2011-006
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-005 and AST-2011-006, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.3

Security advisory AST-2011-005 and AST-2011-006 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

===========================================================================
1.6.2.17.2:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.6.1.24, 1.6.2.17.2, and 1.8.3.2.

** This is a re-release of Asterisk 1.6.1.23, 1.6.2.17.1 and 1.8.3.1 which
    contained a bug which caused duplicate manager entries (issue #18987).

The releases of Asterisk 1.6.1.24, 1.6.2.17.2, and 1.8.3.2 resolve two issues:

  * Resource exhaustion in Asterisk Manager Interface (AST-2011-003)
  * Remote crash vulnerability in TCP/TLS server (AST-2011-004)

The issues and resolutions are described in the AST-2011-003 and AST-2011-004
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-003 and AST-2011-004, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.2

Security advisory AST-2011-003 and AST-2011-004 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-003.pdf
http://downloads.asterisk.org/pub/security/AST-2011-004.pdf

===========================================================================
1.6.2.17.1:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.6.1.23, 1.6.2.17.1, and 1.8.3.1.

These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The releases of Asterisk 1.6.1.23, 1.6.2.17.1, and 1.8.3.1 resolve two issues:

  * Resource exhaustion in Asterisk Manager Interface (AST-2011-003)
  * Remote crash vulnerability in TCP/TLS server (AST-2011-004)

The issues and resolutions are described in the AST-2011-003 and AST-2011-004
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-003 and AST-2011-004, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.1

Security advisory AST-2011-003 and AST-2011-004 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-003.pdf
http://downloads.asterisk.org/pub/security/AST-2011-004.pdf

===========================================================================
1.6.2.16.2:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4.

The releases of Asterisk 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4 resolve an
issue that when decoding UDPTL packets, multiple stack and heap based arrays can
be made to overflow by specially crafted packets. Systems configured for
T.38 pass through or termination are vulnerable. The issue and resolution are
described in the AST-2011-002 security advisory.

For more information about the details of this vulnerability, please read the
security advisory AST-2011-002, which was released at the same time as this
announcement.

For a full list of changes in the current release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.16.2

Security advisory AST-2011-002 is available at:

http://downloads.asterisk.org/pub/security/AST-2011-002.pdf
2011-06-06 06:25:06 +00:00
jnemeth
9d54e1f831 Upgrade to 1.6.2.18. This fixes several security issues including:
AST-2011-002, AST-2011-003, AST-2011-004, AST-2011-005, and AST-2011-006.

===========================================================================
1.6.2.18:

The Asterisk Development Team has announced the release of Asterisk 1.6.2.18.

The release of Asterisk 1.6.2.18 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

 * Only offer codecs both sides support for directmedia.

 * Resolution of several DTMF based attended transfer issues.
   NOTE: Be sure to read the ChangeLog for more information about these changes.

 * Resolve deadlocks related to device states in chan_sip

 * Fix channel redirect out of MeetMe() and other issues with channel softhangup

 * Fix voicemail sequencing for file based storage.

 * Guard against retransmitting BYEs indefinitely during attended transfers with
   chan_sip.

In addition to the changes listed above, commits to resolve security issues
AST-2011-005 and AST-2011-006 have been merged into this release. More
information about AST-2011-005 and AST-2011-006 can be found at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.18

===========================================================================
1.6.2.17.3

The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3.

The releases of Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3 resolve two
issues:

* File Descriptor Resource Exhaustion (AST-2011-005)
* Asterisk Manager User Shell Access (AST-2011-006)

The issues and resolutions are described in the AST-2011-005 and AST-2011-006
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-005 and AST-2011-006, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.3

Security advisory AST-2011-005 and AST-2011-006 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

===========================================================================
1.6.2.17.2:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.6.1.24, 1.6.2.17.2, and 1.8.3.2.

** This is a re-release of Asterisk 1.6.1.23, 1.6.2.17.1 and 1.8.3.1 which
    contained a bug which caused duplicate manager entries (issue #18987).

The releases of Asterisk 1.6.1.24, 1.6.2.17.2, and 1.8.3.2 resolve two issues:

  * Resource exhaustion in Asterisk Manager Interface (AST-2011-003)
  * Remote crash vulnerability in TCP/TLS server (AST-2011-004)

The issues and resolutions are described in the AST-2011-003 and AST-2011-004
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-003 and AST-2011-004, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.2

Security advisory AST-2011-003 and AST-2011-004 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-003.pdf
http://downloads.asterisk.org/pub/security/AST-2011-004.pdf

===========================================================================
1.6.2.17.1:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.6.1.23, 1.6.2.17.1, and 1.8.3.1.

These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The releases of Asterisk 1.6.1.23, 1.6.2.17.1, and 1.8.3.1 resolve two issues:

  * Resource exhaustion in Asterisk Manager Interface (AST-2011-003)
  * Remote crash vulnerability in TCP/TLS server (AST-2011-004)

The issues and resolutions are described in the AST-2011-003 and AST-2011-004
security advisories.

For more information about the details of these vulnerabilities, please read the
security advisories AST-2011-003 and AST-2011-004, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.1

Security advisory AST-2011-003 and AST-2011-004 are available at:

http://downloads.asterisk.org/pub/security/AST-2011-003.pdf
http://downloads.asterisk.org/pub/security/AST-2011-004.pdf

===========================================================================
1.6.2.17:

The Asterisk Development Team has announced the release of Asterisk 1.6.2.17.

The release of Asterisk 1.6.2.17 resolves several issues reported by the
community and would have not been possible without your participation.

The following is a sample of the issues resolved in this release:

* Resolve duplicated data in the AstDB when using DIALGROUP()

* Correct issue where res_config_odbc could populate fields with invalid data.

* When using cdr_pgsql the billsec field was not populated correctly on
   unanswered calls.

* Resolve issue where re-transmissions of SUBSCRIBE could break presence.

* Fix regression causing forwarding voicemails to not work with file storage.

* This version of Asterisk includes the new Compiler Flags option
   BETTER_BACKTRACES which uses libbfd to search for better symbol information
   within both the Asterisk binary, as well as loaded modules, to assist when
   using inline backtraces to track down problems.

* Resolve several issues with DTMF based attended transfers.
   NOTE: Be sure to read the ChangeLog for more information about these changes.

* Resolve issue where no Music On Hold may be triggered when using
   res_timing_dahdi.

* Fix regression that changed behavior of queues when ringing a queue member.

Additionally, this release has the changes related to security bulletin
AST-2011-002 which can be found at
http://downloads.asterisk.org/pub/security/AST-2011-002.pdf

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.17

===========================================================================
1.6.2.16.2:

The Asterisk Development Team has announced security releases for Asterisk
branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are
released as versions 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4.

The releases of Asterisk 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4 resolve an
issue that when decoding UDPTL packets, multiple stack and heap based arrays can
be made to overflow by specially crafted packets. Systems configured for
T.38 pass through or termination are vulnerable. The issue and resolution are
described in the AST-2011-002 security advisory.

For more information about the details of this vulnerability, please read the
security advisory AST-2011-002, which was released at the same time as this
announcement.

For a full list of changes in the current release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.16.2

Security advisory AST-2011-002 is available at:

http://downloads.asterisk.org/pub/security/AST-2011-002.pdf
=============================================================================
2011-06-06 06:25:05 +00:00
obache
1d9df3258a recursive bump from gettext-lib shlib bump. 2011-04-22 13:41:54 +00:00
jnemeth
a41223dfd0 Update to 1.6.2.16.1
This is to fix AST-2011-001: Stack buffer overflow in SIP channel driver

               Asterisk Project Security Advisory - AST-2011-001

         Product        Asterisk
         Summary        Stack buffer overflow in SIP channel driver
    Nature of Advisory  Exploitable Stack Buffer Overflow
      Susceptibility    Remote Authenticated Sessions
         Severity       Moderate
      Exploits Known    No
       Reported On      January 11, 2011
       Reported By      Matthew Nicholson
        Posted On       January 18, 2011
     Last Updated On    January 18, 2011
     Advisory Contact   Matthew Nicholson <mnicholson at digium.com>
         CVE Name

   Description When forming an outgoing SIP request while in pedantic mode, a
               stack buffer can be made to overflow if supplied with
               carefully crafted caller ID information. This vulnerability
               also affects the URIENCODE dialplan function and in some
               versions of asterisk, the AGI dialplan application as well.
               The ast_uri_encode function does not properly respect the size
               of its output buffer and can write past the end of it when
               encoding URIs.

For full details, see:

http://downloads.digium.com/pub/security/AST-2011-001.html
2011-01-21 05:13:12 +00:00
jnemeth
2de8371ff4 Update to 1.6.2.16:
The release of Asterisk 1.6.2.16 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* Fix cache of device state changes for multiple servers.
   (Closes issue #18284, #18280. Reported, tested by klaus3000. Patched, tested
   by russellb)

* Resolve issue where channel redirect function (CLI or AMI) hangs up the call
   instead of redirecting the call.
   (Closes issue #18171. Reported by: SantaFox)
   (Closes issue #18185. Reported by: kwemheuer)
   (Closes issue #18211. Reported by: zahir_koradia)
   (Closes issue #18230. Reported by: vmarrone)
   (Closes issue #18299. Reported by: mbrevda)
   (Closes issue #18322. Reported by: nerbos)

* Linux and *BSD disagree on the elements within the ucred structure. Detect
   which one is in use on the system.
   (Closes issue #18384. Reported, patched, tested by bjm, tilghman)

* app_followme: Don't create a Local channel if the target extension does not
   exist.
   (Closes issue #18126. Reported, patched by junky)

* Revert code that changed SSRC for DTMF.
   (Closes issue #17404, #18189, #18352. Reported by sdolloff, marcbou. rsw686.
   Tested by cmbaker82)

* Resolve issue where REGISTER request with a Call-ID matching an existing
   transaction is received it was possible that the REGISTER request would
   overwrite the initreq of the private structure.
   (Closes issue #18051. Reported by eeman. Patched, tested by twilson)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.16
2011-01-16 06:30:56 +00:00
jnemeth
88d3c0bef3 Update to 1.6.2.15. This is primarily a bugfix release.
- disable automatic Lua detection for now until lang/lua/builtin.mk exists

The release of Asterisk 1.6.2.15 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* When using chan_skinny, don't crash when parking a non-bridged call.
   (Closes issue #17680. Reported, tested by jmhunter. Patched, tested by DEA)

* Add ability for Asterisk to try both the encoded and unencoded subscription
   URI for a match in hints.
   (Closes issue #17785. Reported, tested by ramonpeek. Patched by tilghman)

* Set the caller id on CDRs when it is set on the parent channel.
   (Closes issue #17569. Reported, patched by tbelder)

* Ensure user portion of SIP URI matches dialplan when using encoded characters
   (Closes issue #17892. Reported by wdoekes. Patched by jpeeler)

* Resolve issue where Party A in an analog 3-way call would continue to hear
   ringback after party C answers.
   (Patched by rmudgett)

* Fix problem with qualify option packets for realtime peers never stopping.
   The option packets not only never stopped, but if a realtime peer was not in
   the peer list multiple options dialogs could accumulate over time.
   (Closes issue #16382. Reported by lftsy. Tested by zerohalo. Patched by
   jpeeler)

* Multiple fixes related to Local channels.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.15
2010-12-12 10:19:44 +00:00
jnemeth
923c5319fb The stop and reload commands require the core prefix now. 2010-11-29 04:20:32 +00:00
jnemeth
7f6c35253a Update to 1.6.2.14
The release of Asterisk 1.6.2.14 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

 * Fix issue where session timers would be advertised as supported even
   when session-timers=refuse was set in sip.conf. Also fix
   interoperability problems with session timer behavior in Asterisk.
   (Closes issue #17005. Reported by alexcarey. Patched by dvossel)

 * Parse all "Accept" headers for SIP SUBSCRIBE requests.
   (Closes issue #17758. Reported by ibc. Patched by dvossel)

 * Fix issue where queue stats would be reset on reload.
   (Closes issue #17535. Reported by raarts. Patched by tilghman)

 * Fix issue where MoH files were no longer rescanned on during a
   reload.
   (Closes issue #16744. Reported by pj. Patched by Qwell)

 * Fix issue with dialplan pattern matching where the specificity for
   pattern ranges and pattern characters was inconsistent.
   (Closes issue #16903. Reported, patched by Nick_Lewis)

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.14
2010-11-15 05:18:16 +00:00
jnemeth
854b067c06 Add -n to startup options, so starting Asterisk doesn't mess with screen
colours.
2010-11-10 09:29:13 +00:00
jnemeth
626b913ef5 Adjust rc.d script to disable colour when issuing commands to Asterisk. 2010-10-19 19:21:21 +00:00
jnemeth
02dccf6a6c DISTFILES is now initialized in Makefile, don't re-initialize it here. 2010-10-06 22:39:41 +00:00
obache
b87d4ea00e Need to set DEFAULT_DISTFILES to DISTFILES before adding to it. 2010-10-03 07:18:24 +00:00
jnemeth
cc284725ab Update to the 1.6.2 series (specifically 1.6.2.13). This is
a feature update, so users that are upgrading should read UPDATE.txt.

pkgsrc changes:

- update to 1.6.2.13
- bury the asterisk-sounds-extra inside this one to keep it in sync
- handle sound tarballs directly (upstream had changed this to do a
  download during the install phase and dump files in $HOME)
- add new documentation files:
  - asterisk.txt
  - building_queues.txt
  - database_transactions.txt
  - followme.txt

========
1.6.2.13
========

This release resolves an issue where the .version and ChangeLog files were not
updated for 1.6.2.12. Asterisk 1.6.2.13 has no additional changes from 1.6.2.12
other than the .version, ChangeLog and summary files.

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.13

========
1.6.2.12
========

The release of Asterisk 1.6.2.12 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

     * Fix issue where DNID does not get cleared on a new call when using
       immediate=yes with ISDN signaling.
       (Closes issue #17568. Reported by wuwu. Patched by rmudgett)
     * Several updates to res_config_ldap.
       (Closes issue #13573. Reported by navkumar. Patched by navkumar, bencer.
       Tested by suretec)
     * Prevent loss of Caller ID information set on local channel after masquerade.
       (Closes issue #17138. Reported by kobaz, patched by jpeeler)
     * Fix SIP peers memory leak.
       (Closes issue #17774. Reported, patched by kkm)
     * Add Danish support to say.conf.sample
       (Closes issue #17836. Reported, patched by RoadKill)
     * Ensure SSRC is changed when media source is changed to resolve audio delay.
       (Closes issue #17404. Reported, tested by sdolloff. Patched by jpeeler)
     * Only do magic pickup when notifycid is enabled.
       A new way of doing BLF pickup was introduced into 1.6.2. This feature adds a
       call-id value into the XML of a SIP_NOTIFY message sent to alert a subscriber
       that a device is ringing. This option should only be enabled when the new
       'notifycid' option is set, but this was not the case. Instead the call-id
       value was included for every RINGING Notify message, which caused a
       regression for people who used other methods for call pickup.
       (Closes issue #17633. Reported, patched by urosh. Patched by dvossel.
       Tested by: dvossel, urosh, okrief, alecdavis)

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.12

========
1.6.2.11
========

The release of Asterisk 1.6.2.11 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are a few of the issues resolved by community developers:

  * Send DialPlanComplete as a response, not as a separate event. Otherwise, it
    goes to all manager sessions and may exclude the current session, if the
    Events mask excludes it.
    (Closes issue #17504. Reported, patched by rrb3942)

  * Allow the "useragent" value to be restored into memory from the realtime
    backend. This value is purely informational. It does not alter configuration
    at all.
    (Closes issue #16029. Reported, patched by Guggemand)

  * Fix rt(c)p set debug ip taking wrong argument Also clean up some coding
    errors.
    (Closes issue #17469. Reported, patched by wdoekes)

  * Ensure channel placed in meetme in ringing state is properly hung up. An
    outgoing channel placed in meetme while still ringing which was then hung up
    would not exit meetme and the channel was not properly destroyed.
    (Closes issue #15871. Reported, patched by Ivan)

  * Correct how 100, 200, 300, etc. is said. Also add the crazy British numbers.
    (Closes issue #16102. Reported, patched by Delvar)

  * cdr_pgsql does not detect when a table is found. This change adds an ERROR
    message to let you know when a failure exists to get the columns from the
    pgsql database, which typically means that the table does not exist.
    (Closes issue #17478. Reported, patched by kobaz)

  * Avoid crashing when installing a duplicate translation path with a lower
    cost.
    (Closes issue #17092. Reported, patched by moy)

  * Add missing handling for ringing state for use with queue empty options.
    (Closes issue #17471. Reported, patched by jazzy)

  * Fix reporting estimated queue hold time. Just say the number of seconds
    (after minutes) rather than doing some incorrect calculation with respect to
    minutes.
    (Closes issue #17498. Reported, patched by corruptor)

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.11

========
1.6.2.10
========

The release of Asterisk 1.6.2.10 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following are a few of the issues resolved by community developers:

  * Allow users to specify a port for DUNDI peers.
    (Closes issue #17056. Reported, patched by klaus3000)

  * Decrease the module ref count in sip_hangup when SIP_DEFER_BYE_ON_TRANSFER is
    set.
    (Closes issue #16815. Reported, patched by rain)

  * If there is realtime configuration, it does not get re-read on reload unless
    the config file also changes.
    (Closes issue #16982. Reported, patched by dmitri)

  * Send AgentComplete manager event for attended transfers.
    (Closes issue #16819. Reported, patched by elbriga)

  * Correct manager variable 'EventList' case.
    (Closes issue #17520. Reported, patched by kobaz)

In addition, changes to res_timing_pthread that should make it more stable have
also been implemented.

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.10

=======
1.6.2.9
=======

The release of Asterisk 1.6.2.9 resolves several issues reported by the
community, and would have not been possible without your participation.
Thank you!

The following are a few of the issues resolved by community developers:

  * Fix the PickupChan() application
    (Closes issue #16863. Reported, patched by schern. Patched by cjacobsen.
     Tested by Graber, cjacobsen, lathama, rickead2000, dvossel)

  * Improve logging by displaying line number
    (Closes issue #16303. Reported by dant. Patched by pabelanger. Tested by
     dant, pabelanger, lmadsen)

  * Notify CLI when modules are loaded/unloaded
    (Closes issue #17308. Reported, patched by pabelanger. Tested by russell)

  * Make the Makefile logic more explicit and move the Snow Leopard logic down to
    where it's not executed on non-Darwin systems
    (Closes issue #17028. Reported by pabelanger. Patched by seanbright,
     tilghman. Tested by pabelanger)

  * Manager cookies are not compatible with RFC2109. Make that no longer true.
    (Closes issue #17231. Reported, patched by ecarruda)

  * With IMAP backend, messages in INBOX were counted twice for MWI
    (Closes issue #17135. Reported by edhorton. Patched by ebroad, tilghman)

  * Fix possible segfault when logging
    (Closes issue #17331. Reported, patched by under. Patched by dvossel)

  * Fix memory hogging behavior of app_queue
    (Closes issue #17081. Reported by wliegel. Patched by mmichelson)

  * Allow type=user SIP endpoints to be loaded properly from realtime
    (Closes issue #16021. Reported, patched by Guggemand)

Additionally, the following issue may be of interest:

  * Fix transcode_via_sln option with SIP calls and improve PLC usage
    (Review: https://reviewboard.asterisk.org/r/622/)


For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.9

=======
1.6.2.8
=======

The release of Asterisk 1.6.2.8 resolves several issues reported by the
community, and would have not been possible without your participation.
Thank you!

The following are a few of the issues resolved by community developers:

   * Enable auto complete for CLI command 'logger set level'.
     (Closes issue #17152. Reported, patched by pabelanger)

   * Make the mixmonitor thread process audio frames faster.
     (Closes issue #17078. Reported, tested by geoff2010. Patched by dhubbard)

   * Add missing 'useragent' field to sip-friends.sql file.
     (Closes issue #17171. Reported, patched by thehar)

   * Add example dialplan for dialing ISN numbers (http://www.freenum.org)
     (Closes issue #17058. Reported, patched by pprindeville)

   * Fix issue with double "sip:" in header field.
     (Closes issue #15847. Reported, patched by ebroad)

   * Add ability to generate ASCII documentation from the TeX files by running
     'make asterisk.txt'.
     (Closes issue #17220. Reported by lmadsen. Tested, patched by pabelanger)

   * When StopMonitor() is called, ensure that it will not be restarted by a
     channel event.
     (Closes issue #16590. Reported, patched by kkm)

   * Small error in the T.140 RTP port verbose log.
     (Closes issue #16998. Reported, patched by frawd. Tested by russell)

For a full list of changes in the current release, please see the
ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.8

=======
1.6.2.7
=======

The release of Asterisk 1.6.2.7 resolves several issues reported by the
community, and would have not been possible without your participation. Thank
you!

The following are a few of the issues resolved by community developers:

  * Fix building CDR and CEL SQLite3 modules.
    (Closes issue #17017. Reported by alephlg. Patched by seanbright)

  * Resolve crash in SLAtrunk when the specified trunk doesn't exist.
    (Reported in #asterisk-dev by philipp64. Patched by seanbright)

  * Include an extra newline after "Aliased CLI command" to get back the prompt.
    (Issue #16978. Reported by jw-asterisk. Tested, patched by seanbright)

  * Prevent segfault if bad magic number is encountered.
    (Issue #17037. Reported, patched by alecdavis)

  * Update code to reflect that handle_speechset has 4 arguments.
    (Closes issue #17093. Reported, patched by gpatri. Tested by pabelanger,
     mmichelson)

  * Resolve a deadlock in chan_local.
    (Closes issue #16840. Reported, patched by bzing2, russell. Tested by bzing2)

For a full list of changes in this releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.7

=======
1.6.2.6
=======

The release of Asterisk 1.6.2.6 resolves several issues reported by the
community, and would have not been possible without your participation. Thank
you!

The following are a few of the issues resolved by community developers:

  * Make sure to clear red alarm after polarity reversal.
    (Closes issue #14163. Reported, patched by jedi98. Tested by mattbrown,
     Chainsaw, mikeeccleston)

  * Fix problem with duplicate TXREQ packets in chan_iax2
    (Closes issue #16904. Reported, patched by rain. Tested by rain, dvossel)

  * Fix crash in app_voicemail related to message counting.
    (Closes issue #16921. Reported, tested by whardier. Patched by seanbright)

  * Overlap receiving: Automatically send CALL PROCEEDING when dialplan starts
    (Reported, Patched, and Tested by alecdavis)

  * For T.38 reINVITEs treat a 606 the same as a 488.
    (Closes issue #16792. Reported, patched by vrban)

  * Fix ConfBridge crash when no timing module is loaded.
    (Closes issue #16471. Reported, tested by kjotte. Patched, tested by junky)

For a full list of changes in this releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.6

=======
1.6.2.5
=======

The Asterisk Development Team has announced security releases for the following
versions of Asterisk:

* 1.6.2.5

The releases of Asterisk 1.6.0.25, 1.6.1.17, and 1.6.2.5 resolve an issue with
invalid parsing of ACL (Access Control List) rules leading to a possible
compromise in security. The issue and resolution are described in the
AST-2010-003 security advisory.

For more information about the details of this vulnerability, please read the
security advisory AST-2010-003, which was released at the same time as this
announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.5

Security advisory AST-2010-003 is available at:

http://downloads.asterisk.org/pub/security/AST-2010-003.pdf

=======
1.6.2.4
=======

The Asterisk Development Team has announced security releases for the following
versions of Asterisk:

* 1.6.2.4

The releases of Asterisk 1.2.40, 1.4.29.1, 1.6.0.24, 1.6.1.16, and 1.6.2.4
include documention describing a possible dialplan string injection with common
usage of the ${EXTEN} (and other expansion variables). The issue and resolution
are described in the AST-2010-002 security advisory.

If you have a channel technology which can accept characters other than numbers
and letters (such as SIP) it may be possible to craft an INVITE which sends data
such as 300&Zap/g1/4165551212 which would create an additional outgoing channel
leg that was not originally intended by the dialplan programmer.

Please note that this is not limited to an specific protocol or the Dial()
application.

The expansion of variables into programmatically-interpreted strings is a common
behavior in many script or script-like languages, Asterisk included. The ability
for a variable to directly replace components of a command is a feature, not a
bug - that is the entire point of string expansion.

However, it is often the case due to expediency or design misunderstanding that
a developer will not examine and filter string data from external sources before
passing it into potentially harmful areas of their dialplan.

With the flexibility of the design of Asterisk come these risks if the dialplan
designer is not suitably cautious as to how foreign data is allowed to enter the
system unchecked.

This security release is intended to raise awareness of how it is possible to
insert malicious strings into dialplans, and to advise developers to read the
best practices documents so that they may easily avoid these dangers.

For more information about the details of this vulnerability, please read the
security advisory AST-2010-002, which was released at the same time as this
announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.4

Security advisory AST-2010-002 is available at:

http://downloads.asterisk.org/pub/security/AST-2010-002.pdf

The README-SERIOUSLY.bestpractices.txt document is available in the top-level
directory of your Asterisk sources, or available in all Asterisk branches from
1.2 and up.

http://svn.asterisk.org/svn/asterisk/trunk/README-SERIOUSLY.bestpractices.txt

=======
1.6.2.3
=======

Was never released.

=======
1.6.2.2
=======

The Asterisk Development Team has announced security releases for Asterisk as
the following versions:

* 1.6.2.2

The releases of Asterisk 1.6.0.22, 1.6.1.14, and 1.6.2.2 include the fix
described in security advisory AST-2010-001.

The issue is that an attacker attempting to negotiate T.38 over SIP can remotely
crash Asterisk by modifying the FaxMaxDatagram field of the SDP to contain
either a negative or exceptionally large value.  The same crash will occur when
the FaxMaxDatagram field is omitted from the SDP, as well.

For more information about the details of this vulnerability, please read the
security advisory AST-2009-009, which was released at the same time as this
announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.2

Security advisory AST-2010-001 is available at:

http://downloads.asterisk.org/pub/security/AST-2010-001.pdf

=======
1.6.2.1
=======

The release of Asterisk 1.6.2.1 resolved several issues reported by the
community, and would have not been possible without your participation. Thank
you!

* CLI 'queue show' formatting fix.
   (Closes issue #16078. Reported by RoadKill. Tested by dvossel. Patched by
    ppyy.)

* Fix misreverting from 177158.
   (Closes issue #15725. Reported, Tested by shanermn. Patched by dimas.)

* Fixes subscriptions being lost after 'module reload'.
   (Closes issue #16093. Reported by jlaroff. Patched by dvossel.)

* app_queue segfaults if realtime field uniqueid is NULL
  (Closes issue #16385. Reported, Tested, Patched by haakon.)

* Fix to Monitor which previously assumed the file to write to did not contain
   pathing.
   (Closes issue #16377, #16376. Reported by bcnit. Patched by dant.


A summary of changes in this release can be found in the release summary:
http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-1.6.2.1-summary.txt

For a full list of changes in this releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.1

=======
1.6.2.0
=======

The release of Asterisk 1.6.2.0 is the first feature release since Asterisk
1.6.1.0, which was released April 27, 2009. Many new features have been included
in this release. For a complete list of changes, please see the CHANGES file.
For those upgrading from a previous release, please see UPGRADE.txt

It should be explicitly stated that Asterisk 1.6.2.0 is a major upgrade over any
previous release, and special care should be taken when upgrading existing
systems. Please see the UPGRADE.txt file for more information, available at:

http://svn.asterisk.org/svn/asterisk/tags/1.6.2.0/UPGRADE.txt

A detailed overview to the new features available in Asterisk 1.6.2.0 are
forthcoming within the next few days. Please watch http://blogs.asterisk.org for
further information!

Below is a summary of several new features available in this release:

  * chan_dahdi now supports MFC/R2 signaling when Asterisk is compiled with
    support for LibOpenR2.  http://www.libopenr2.org/

  * Added a new 'faxdetect=yes|no' configuration option to sip.conf.  When this
    option is enabled, Asterisk will watch for a CNG tone in the incoming audio
    for a received call.  If it is detected, the channel will jump to the
    'fax' extension in the dialplan.

  * A new application, Originate, has been introduced, that allows asynchronous
    call origination from the dialplan.

  * Added ConfBridge dialplan application which does conference bridges without
    DAHDI. For information on its use, please see the output of
    "core show application ConfBridge" from the CLI.

  * extensions.conf now allows you to use keyword "same" to define an extension
    without actually specifying an extension.  It uses exactly the same pattern
    as previously used on the last "exten" line.  For example:
      exten => 123,1,NoOp(something)
      same  =>     n,SomethingElse()

  * Asterisk now provides the ability to define custom CLI aliases.  For example,
    if you would like to define short form aliases for frequently used commands,
    such as "sh ch" for "core show channels", that is now possible.  See the
    cli_aliases.conf configuration file for more information.

  * Asterisk now has support for subscribing to the state of remote voice
    mailboxes via SIP.

  * Asterisk now includes expanded HD codec support.  G.722.1 and G.722.1C
    (Siren7/Siren14) passthrough, recording, and playback is now supported.
    Transcoding will be made available via add-on modules soon for this version of
    Asterisk.

This is just a subset of the changes available in this release. Please see the
CHANGES file for additional information, available at:
http://svn.asterisk.org/svn/asterisk/tags/1.6.2.0/CHANGES

A summary of changes in this release can be found in the release summary:
http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-1.6.2.0-summary.txt

For a full list of changes in this releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.0
2010-09-23 23:30:38 +00:00
jnemeth
5ca5e06c6d Update patches/patch-bd as per upstream. No significant difference in
functionality.
2010-06-16 08:04:44 +00:00
jnemeth
a353362732 Update to 1.6.1.20. Apparently they decided to do one final bug fix release:
The Asterisk releases for 1.6.0.28 and 1.6.1.20 are the last maintenance
releases for Asterisk branches 1.6.0 and 1.6.1 and have now moved to security
maintenance only.

The releases of Asterisk 1.6.0.28 and 1.6.1.20 resolves several issues reported
by the community, and would have not been possible without your participation.
Thank you!

The following are a few of the issues resolved by community developers:

  * Fix issue where MixMonitor() recordings would be shorter than total duration
.
    (Closes issue #17078. Reported,tested by geoff2010. Patched by dhubbard)

  * When StopMonitor() is called, ensure it will not be restarted by a channel
    event.
    (Closes issue #16590. Reported, patched by kkm)

  * Allow hidecalleridname feature to work.
    (Closes issue #17143. Reported, patched by djensen99)

  * Resolve deadlocks in chan_local.
    (Closes issue #17185. Reported, tested by schmoozecom, GameGamer43)

  * Ensure channel state is not incorrectly set in the case of a very early
    answer by chan_dahdi.
    (Closes issue #17067. Reported, patched by tzafrir)

  * Registration fix for SIP realtime. Make sure realtime fields are not empty.
    (Closes issue #17266. Reported, patched by Nick_Lewis. Tested by sberney)

Information about the Asterisk maintenance schedule is available at:
http://www.asterisk.org/asterisk-versions

For a full list of changes in the current release candidates, please see the
ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.1.20
2010-05-22 22:21:45 +00:00
jnemeth
7f2e45671d Update to Asterisk 1.6.1.19. 1.6.1.18 and 1.6.1.19 are primarily
bug fix releases.  At this point the 1.6.1 series is going to
security fixes only.  That means this package will be moving to
the 1.6.2 series in the near future.

-----
1.6.1.18:

The following are a few of the issues resolved by community developers:

  * Make sure to clear red alarm after polarity reversal.
    (Closes issue #14163. Reported, patched by jedi98. Tested by mattbrown,
     Chainsaw, mikeeccleston)

  * Fix problem with duplicate TXREQ packets in chan_iax2.
    (Closes issue #16904. Reported, patched by rain. Tested by rain, dvossel)

  *  Update documentation to not imply we support overriding options.
     (Closes issue #16855. Reported by davidw)

  * Modify queued frames from Local channels to not set the other side to up.
    (Closes issue #16816. Reported, tested by jamhed)

  *  For T.38 reINVITEs treat a 606 the same as a 488.
     (Closes issue #16792. Reported, patched by vrban)

For a full list of changes in this releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.1.18

-----
1.6.1.19:

The following are a few of the issues resolved by community developers:

  * Fix building CDR and CEL SQLite3 modules.
    (Closes issue #17017. Reported by alephlg. Patched by seanbright)

  * Resolve crash in SLAtrunk when the specified trunk doesn't exist.
    (Reported in #asterisk-dev by philipp64. Patched by seanbright)

  * Update code to reflect that handle_speechset has 4 arguments.
    (Closes issue #17093. Reported, patched by gpatri. Tested by pabelanger,
     mmichelson)

  * Pass the PID of the Asterisk process, not the PID of the canary.
    (Closes issue #17065. Reported by globalnetinc. Patched by makoto. Tested by
     frawd, globalnetinc)

  * Resolve a deadlock in chan_local.
    (Closes issue #16840. Reported, patched by bzing2, russell. Tested by bzing2)

For a full list of changes in this releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.1.19
2010-05-20 17:14:45 +00:00
jnemeth
be5e9e33be Add an "ldap" option which defaults to enabled, since most modern
systems come with LDAP support built-in.  This has no effect on
such systems.  However, on older systems, it will pull in
openldap-client.  But, a builder may still disable the option if
they wish.  This fixes:

PR pkg/41987 - Robert Elz -- comms/asterisk16 PLIST problem
2010-05-07 23:57:56 +00:00
jnemeth
01732ea22e Install various docs found in the tarball.
README-SERIOUSLY.bestpractices.txt is the new README from 1.6.1.16
and AST-2010-002.
2010-05-07 07:20:55 +00:00
jnemeth
bd14932638 Add a dependency on p5-DBI for the webvmail option. Don't bother
with a PKGREVISION bump since this doesn't affect the installed
"binaries" and there have already been two bumps today.
2010-05-07 03:49:07 +00:00
jnemeth
17b337a4d4 Fix bug when reloading cdr_odbc.so. 2010-05-07 03:40:24 +00:00