pkgsrc/comms/asterisk18/distinfo
jnemeth 3666bcaa9e Update to Asterisk 1.8.12.2: this update fixes fixes AST-2012-007
and AST-2012-008 along with some general bug fixes.

----- 1.8.12.1 -----

The Asterisk Development Team has announced security releases for
Certified Asterisk 1.8.11 and Asterisk 1.8 and 10. The available
security releases are released as versions 1.8.11-cert2, 1.8.12.1,
and 10.4.1.

The release of Asterisk 1.8.11-cert2, 1.8.12.1, and 10.4.1 resolve
the following two issues:

* A remotely exploitable crash vulnerability exists in the IAX2
  channel driver if an established call is placed on hold without
  a suggested music class. Asterisk will attempt to use an invalid
  pointer to the music on hold class name, potentially causing a
  crash.

* A remotely exploitable crash vulnerability was found in the Skinny
  (SCCP) Channel driver. When an SCCP client closes its connection
  to the server, a pointer in a structure is set to NULL.  If the
  client was not in the on-hook state at the time the connection
  was closed, this pointer is later dereferenced. This allows remote
  authenticated connections the ability to cause a crash in the
  server, denying services to legitimate users.

These issues and their resolution are described in the security
advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2012-007 and AST-2012-008,
which were released at the same time as this announcement.

For a full list of changes in the current releases, please see the
ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.12.1
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.4.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-007.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-008.pdf

Thank you for your continued support of Asterisk!

----- 1.8.12.2 -----

The Asterisk Development Team has announced the release of Asterisk
1.8.12.2.

The release of Asterisk 1.8.12.2 resolves an issue reported by the
community and would have not been possible without your participation.
Thank you!

The following is the issue resolved in this release:

* --- Resolve crash in subscribing for MWI notifications
  (Closes issue ASTERISK-19827. Reported by B. R)

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.12.2

Thank you for your continued support of Asterisk!
2012-06-03 22:58:50 +00:00

42 lines
2.6 KiB
Text

$NetBSD: distinfo,v 1.30 2012/06/03 22:58:51 jnemeth Exp $
SHA1 (asterisk-1.8.12.2/asterisk-1.8.12.2.tar.gz) = 90e43dcd7e8543e56cad03e8020f4df825c51f32
RMD160 (asterisk-1.8.12.2/asterisk-1.8.12.2.tar.gz) = 346b67918bcc27199044168d683028cb8f81ff3b
Size (asterisk-1.8.12.2/asterisk-1.8.12.2.tar.gz) = 25089098 bytes
SHA1 (asterisk-1.8.12.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 8692fa61423b4769dc8bfa78faf9ed5ef7a259b9
RMD160 (asterisk-1.8.12.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 68170c769d739d6b5b35b00f999ad6bbf876f9f6
Size (asterisk-1.8.12.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 3349898 bytes
SHA1 (patch-aa) = 496565e1e567c42ab6ba8f996c506f52cb9c8cfe
SHA1 (patch-af) = 19786616bb606c38f769ec85f2e4d118573659ab
SHA1 (patch-ag) = c71c61350cefbbe53eefa99245ca7712753f22d5
SHA1 (patch-ai) = e92edab5c1ff323478f41d0b0783102ed527fe39
SHA1 (patch-ak) = f8d5de733807bc6c0701886a3095901d6815a8bd
SHA1 (patch-al) = b2a1134786d7c3b118ee8c47892f91dd2a4c783a
SHA1 (patch-am) = 5f9cbf47ec1cb66758492a5ed1bf843006eae9b7
SHA1 (patch-an) = 93a5df66fd6459fb76e9191dc3bf37b9ee5483b5
SHA1 (patch-ao) = aa95464a8bd4a417f313541b465142d2e4c3ee47
SHA1 (patch-ap) = ed22f6483191f429389c0d3198d30c63b96d4df6
SHA1 (patch-aq) = 4b7a13e605fc5933d5d87b797a40479e206f42d3
SHA1 (patch-ar) = da8e614e68e476ce32c66fed5ee9dcb8c5f9a060
SHA1 (patch-as) = b2e1aadf49f20506243ab40796f15aab12d95bad
SHA1 (patch-at) = df318d7b492121ff6f766b0e6ea73415293e96f0
SHA1 (patch-au) = 773398e719dca34640dcdc190857872da1ad7b4f
SHA1 (patch-av) = 3424013b5bf22624aa664e972e2b495ab3296cbe
SHA1 (patch-aw) = 0534acd67ea5da1eee8cf282035ebf4c559278ab
SHA1 (patch-ax) = 0136483807024ac10f2abb9a9c0e3679b0043add
SHA1 (patch-ay) = b2e2203037c0d5434f22de8a808f002b61ef8886
SHA1 (patch-az) = 64365b12cb47ec0fba358e4326eda172f96068cf
SHA1 (patch-ba) = ffb20f4788f2f253e822fb48c68fec04c31b0619
SHA1 (patch-bb) = bf1a2bb2ba1eb2ba44a9b26fa9ae0468510a1575
SHA1 (patch-bc) = 0efc99595d1ef82a879361e8bf3b2ef7fd84af62
SHA1 (patch-be) = a3d416c097c6aeb0e49dec67a9fc22027d936773
SHA1 (patch-bf) = 67b506d235fabaa73f492d08858407dd9a85fd6e
SHA1 (patch-bg) = e6dc4b3affdf634efc2b3ee83e81f7ec51ee2e86
SHA1 (patch-bh) = 9203ea97daab8c64ea47f236b4961763e76eafe6
SHA1 (patch-bi) = d71662f618a10c3ca4277feb7ad0d659935dee1e
SHA1 (patch-bj) = a184452adf2c883695e3819c13c584a3db9608d7
SHA1 (patch-bk) = 93679dfb04d26c99ac9c2822e0d74d869d16369f
SHA1 (patch-bl) = 35cede8f5c253baed3d3983f58986c7c662e35e2
SHA1 (patch-bm) = 284b34e20091b3427cd67b835fc7aa62c9d92a6c
SHA1 (patch-bn) = 51d14bde5591bd4a68c8074838196e05ac86f2f2
SHA1 (patch-bo) = ff43d14e2608dd08d7d03799dfe9847f9f7f5666