summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authortron <tron>2013-04-11 22:12:55 +0000
committertron <tron>2013-04-11 22:12:55 +0000
commit39fe44a15c26b4b525a2dc266ed728ccb3320763 (patch)
tree514480d6efd83de38789fb7750ad7d67fc7306f3
parenta0d77afd9cde63ddce023c620d583bfd72a607c5 (diff)
downloadpkgsrc-39fe44a15c26b4b525a2dc266ed728ccb3320763.tar.gz
Pullup ticket #4116 - requested by jnemeth
comms/asterisk: security update comms/asterisk10: security update comms/asterisk18: security update Revisions pulled up: - comms/asterisk/Makefile 1.84 - comms/asterisk/distinfo 1.54 - comms/asterisk10/Makefile 1.43 - comms/asterisk10/distinfo 1.26 - comms/asterisk18/Makefile 1.61 - comms/asterisk18/distinfo 1.44 --- Module Name: pkgsrc Committed By: jnemeth Date: Wed Apr 10 05:24:39 UTC 2013 Modified Files: pkgsrc/comms/asterisk18: Makefile distinfo Log Message: Update to Asterisk 1.2.20.2: this is a security update which fixes AST-2013-001, AST-2013-002, and AST-2013-003. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert2, 1.8.20.2, 10.12.2, 10.12.2-digiumphones, and 11.2.2. The release of these versions resolve the following issues: * A denial of service exists in Asterisk's HTTP server. AST-2012-014, fixed in January of this year, contained a fix for Asterisk's HTTP server for a remotely-triggered crash. While the fix prevented the crash from being triggered, a denial of service vector still exists with that solution if an attacker sends one or more HTTP POST requests with very large Content-Length values. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 * A potential username disclosure exists in the SIP channel driver. When authenticating a SIP request with alwaysauthreject enabled, allowguest disabled, and autocreatepeer disabled, Asterisk discloses whether a user exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-001, AST-2013-002, and AST-2013-003, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.20.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-001.pdf * http://downloads.asterisk.org/pub/security/AST-2013-002.pdf * http://downloads.asterisk.org/pub/security/AST-2013-003.pdf Thank you for your continued support of Asterisk! --- Module Name: pkgsrc Committed By: jnemeth Date: Wed Apr 10 05:27:08 UTC 2013 Modified Files: pkgsrc/comms/asterisk10: Makefile distinfo Log Message: Update to Asterisk 10.12.2: this is a security update which fixes AST-2013-001, AST-2013-002, and AST-2013-003. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert2, 1.8.20.2, 10.12.2, 10.12.2-digiumphones, and 11.2.2. The release of these versions resolve the following issues: * A denial of service exists in Asterisk's HTTP server. AST-2012-014, fixed in January of this year, contained a fix for Asterisk's HTTP server for a remotely-triggered crash. While the fix prevented the crash from being triggered, a denial of service vector still exists with that solution if an attacker sends one or more HTTP POST requests with very large Content-Length values. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 * A potential username disclosure exists in the SIP channel driver. When authenticating a SIP request with alwaysauthreject enabled, allowguest disabled, and autocreatepeer disabled, Asterisk discloses whether a user exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-001, AST-2013-002, and AST-2013-003, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.12.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-001.pdf * http://downloads.asterisk.org/pub/security/AST-2013-002.pdf * http://downloads.asterisk.org/pub/security/AST-2013-003.pdf Thank you for your continued support of Asterisk! --- Module Name: pkgsrc Committed By: jnemeth Date: Wed Apr 10 05:28:56 UTC 2013 Modified Files: pkgsrc/comms/asterisk: Makefile distinfo Log Message: Update to Asterisk 11.2.2: this is a security update which fixes AST-2013-001, AST-2013-002, and AST-213-003. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert2, 1.8.20.2, 10.12.2, 10.12.2-digiumphones, and 11.2.2. The release of these versions resolve the following issues: * A possible buffer overflow during H.264 format negotiation. The format attribute resource for H.264 video performs an unsafe read against a media attribute when parsing the SDP. This vulnerability only affected Asterisk 11. * A denial of service exists in Asterisk's HTTP server. AST-2012-014, fixed in January of this year, contained a fix for Asterisk's HTTP server for a remotely-triggered crash. While the fix prevented the crash from being triggered, a denial of service vector still exists with that solution if an attacker sends one or more HTTP POST requests with very large Content-Length values. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 * A potential username disclosure exists in the SIP channel driver. When authenticating a SIP request with alwaysauthreject enabled, allowguest disabled, and autocreatepeer disabled, Asterisk discloses whether a user exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-001, AST-2013-002, and AST-2013-003, which were released at the same time as this announcement. For a full list of changes in the current releares, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.2.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-001.pdf * http://downloads.asterisk.org/pub/security/AST-2013-002.pdf * http://downloads.asterisk.org/pub/security/AST-2013-003.pdf Thank you for your continued support of Asterisk!
-rw-r--r--comms/asterisk/Makefile5
-rw-r--r--comms/asterisk/distinfo14
-rw-r--r--comms/asterisk10/Makefile5
-rw-r--r--comms/asterisk10/distinfo14
-rw-r--r--comms/asterisk18/Makefile5
-rw-r--r--comms/asterisk18/distinfo14
6 files changed, 27 insertions, 30 deletions
diff --git a/comms/asterisk/Makefile b/comms/asterisk/Makefile
index fea0b361b02..bbf0e0dbdf1 100644
--- a/comms/asterisk/Makefile
+++ b/comms/asterisk/Makefile
@@ -1,13 +1,12 @@
-# $NetBSD: Makefile,v 1.83 2013/02/16 11:20:35 wiz Exp $
+# $NetBSD: Makefile,v 1.83.2.1 2013/04/11 22:12:55 tron Exp $
#
# NOTE: when updating this package, there are two places that sound
# tarballs need to be checked
-DISTNAME= asterisk-11.2.1
+DISTNAME= asterisk-11.2.2
DIST_SUBDIR= ${PKGNAME_NOREV}
DISTFILES= ${DEFAULT_DISTFILES}
EXTRACT_ONLY= ${DISTNAME}.tar.gz
-PKGREVISION= 1
CATEGORIES= comms net audio
MASTER_SITES= http://downloads.asterisk.org/pub/telephony/asterisk/ \
http://downloads.asterisk.org/pub/telephony/asterisk/old-releases/ \
diff --git a/comms/asterisk/distinfo b/comms/asterisk/distinfo
index 091429b21ff..5f0d11a5293 100644
--- a/comms/asterisk/distinfo
+++ b/comms/asterisk/distinfo
@@ -1,11 +1,11 @@
-$NetBSD: distinfo,v 1.53 2013/02/10 20:18:50 jnemeth Exp $
+$NetBSD: distinfo,v 1.53.2.1 2013/04/11 22:12:55 tron Exp $
-SHA1 (asterisk-11.2.1/asterisk-11.2.1.tar.gz) = 54959f247d7c881507eb08a0d16ffd0f86eef536
-RMD160 (asterisk-11.2.1/asterisk-11.2.1.tar.gz) = f7deb43f7f49edbaa74e480ee4cf5c664d8a2816
-Size (asterisk-11.2.1/asterisk-11.2.1.tar.gz) = 30465933 bytes
-SHA1 (asterisk-11.2.1/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 8692fa61423b4769dc8bfa78faf9ed5ef7a259b9
-RMD160 (asterisk-11.2.1/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 68170c769d739d6b5b35b00f999ad6bbf876f9f6
-Size (asterisk-11.2.1/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 3349898 bytes
+SHA1 (asterisk-11.2.2/asterisk-11.2.2.tar.gz) = e23062d1ce4a75e1c464e9557e681d9d259a843a
+RMD160 (asterisk-11.2.2/asterisk-11.2.2.tar.gz) = f8f2d3dcba5294a4a4b2d8c5b768e4cc1aab1f76
+Size (asterisk-11.2.2/asterisk-11.2.2.tar.gz) = 30468125 bytes
+SHA1 (asterisk-11.2.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 8692fa61423b4769dc8bfa78faf9ed5ef7a259b9
+RMD160 (asterisk-11.2.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 68170c769d739d6b5b35b00f999ad6bbf876f9f6
+Size (asterisk-11.2.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 3349898 bytes
SHA1 (patch-Makefile) = cc52fad87c4007103e2b5b75acfd82935c112150
SHA1 (patch-apps_app__dial.c) = 0f78d2571af88384a2d472ece08bf4b06f9ad211
SHA1 (patch-apps_app__followme.c) = a54e08d0dd0b6ff12281d4b7b8447707c1cbe20a
diff --git a/comms/asterisk10/Makefile b/comms/asterisk10/Makefile
index 0eb3752ce8d..bcae2d7ff2d 100644
--- a/comms/asterisk10/Makefile
+++ b/comms/asterisk10/Makefile
@@ -1,13 +1,12 @@
-# $NetBSD: Makefile,v 1.42 2013/02/16 11:20:35 wiz Exp $
+# $NetBSD: Makefile,v 1.42.2.1 2013/04/11 22:12:55 tron Exp $
#
# NOTE: when updating this package, there are two places that sound
# tarballs need to be checked
-DISTNAME= asterisk-10.12.1
+DISTNAME= asterisk-10.12.2
DIST_SUBDIR= ${PKGNAME_NOREV}
DISTFILES= ${DEFAULT_DISTFILES}
EXTRACT_ONLY= ${DISTNAME}.tar.gz
-PKGREVISION= 1
CATEGORIES= comms net audio
MASTER_SITES= http://downloads.asterisk.org/pub/telephony/asterisk/ \
http://downloads.asterisk.org/pub/telephony/asterisk/old-releases/ \
diff --git a/comms/asterisk10/distinfo b/comms/asterisk10/distinfo
index a7743d4ecef..47dc1067f21 100644
--- a/comms/asterisk10/distinfo
+++ b/comms/asterisk10/distinfo
@@ -1,11 +1,11 @@
-$NetBSD: distinfo,v 1.25 2013/02/10 07:55:31 jnemeth Exp $
+$NetBSD: distinfo,v 1.25.2.1 2013/04/11 22:12:55 tron Exp $
-SHA1 (asterisk-10.12.1/asterisk-10.12.1.tar.gz) = 1d6f6aae3b596647e80993d1f90acd97d93baa99
-RMD160 (asterisk-10.12.1/asterisk-10.12.1.tar.gz) = 91512a37c5a5208e03e9b2f1f03bc09e56a5967d
-Size (asterisk-10.12.1/asterisk-10.12.1.tar.gz) = 25114264 bytes
-SHA1 (asterisk-10.12.1/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 8692fa61423b4769dc8bfa78faf9ed5ef7a259b9
-RMD160 (asterisk-10.12.1/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 68170c769d739d6b5b35b00f999ad6bbf876f9f6
-Size (asterisk-10.12.1/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 3349898 bytes
+SHA1 (asterisk-10.12.2/asterisk-10.12.2.tar.gz) = 4c1e681223b9e86a74d5c8a57dc4da87045a1656
+RMD160 (asterisk-10.12.2/asterisk-10.12.2.tar.gz) = ec365462b3f9668906b3d1bf5b7342fb39cc7e2c
+Size (asterisk-10.12.2/asterisk-10.12.2.tar.gz) = 25117561 bytes
+SHA1 (asterisk-10.12.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 8692fa61423b4769dc8bfa78faf9ed5ef7a259b9
+RMD160 (asterisk-10.12.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 68170c769d739d6b5b35b00f999ad6bbf876f9f6
+Size (asterisk-10.12.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 3349898 bytes
SHA1 (patch-Makefile) = ab740f84f9883980cb5d8e8d5ca301f172c76231
SHA1 (patch-apps_app__dial.c) = e6c9f559310acdb6574d0e034dcb55df7c2ba31f
SHA1 (patch-apps_app__followme.c) = cd34774a11b96269003d9f1b6fbdfddf5d9b9d4b
diff --git a/comms/asterisk18/Makefile b/comms/asterisk18/Makefile
index 519b64a8353..00b42f5377e 100644
--- a/comms/asterisk18/Makefile
+++ b/comms/asterisk18/Makefile
@@ -1,13 +1,12 @@
-# $NetBSD: Makefile,v 1.60 2013/02/16 11:20:35 wiz Exp $
+# $NetBSD: Makefile,v 1.60.2.1 2013/04/11 22:12:55 tron Exp $
#
# NOTE: when updating this package, there are two places that sound
# tarballs need to be checked
-DISTNAME= asterisk-1.8.20.1
+DISTNAME= asterisk-1.8.20.2
DIST_SUBDIR= ${PKGNAME_NOREV}
DISTFILES= ${DEFAULT_DISTFILES}
EXTRACT_ONLY= ${DISTNAME}.tar.gz
-PKGREVISION= 1
CATEGORIES= comms net audio
MASTER_SITES= http://downloads.asterisk.org/pub/telephony/asterisk/ \
http://downloads.asterisk.org/pub/telephony/asterisk/old-releases/ \
diff --git a/comms/asterisk18/distinfo b/comms/asterisk18/distinfo
index 8f80d55baf4..62ab9c8f4db 100644
--- a/comms/asterisk18/distinfo
+++ b/comms/asterisk18/distinfo
@@ -1,11 +1,11 @@
-$NetBSD: distinfo,v 1.43 2013/02/07 02:24:31 jnemeth Exp $
+$NetBSD: distinfo,v 1.43.2.1 2013/04/11 22:12:56 tron Exp $
-SHA1 (asterisk-1.8.20.1/asterisk-1.8.20.1.tar.gz) = ac1c2cd239b3e26a544db2a87dfcf34b4fb6695f
-RMD160 (asterisk-1.8.20.1/asterisk-1.8.20.1.tar.gz) = e6c641a0f4c76c7ac314b162ec00afdfaa1dce37
-Size (asterisk-1.8.20.1/asterisk-1.8.20.1.tar.gz) = 25176713 bytes
-SHA1 (asterisk-1.8.20.1/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 8692fa61423b4769dc8bfa78faf9ed5ef7a259b9
-RMD160 (asterisk-1.8.20.1/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 68170c769d739d6b5b35b00f999ad6bbf876f9f6
-Size (asterisk-1.8.20.1/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 3349898 bytes
+SHA1 (asterisk-1.8.20.2/asterisk-1.8.20.2.tar.gz) = 34da1378934fc7f36f7b5557dc13258f810e4671
+RMD160 (asterisk-1.8.20.2/asterisk-1.8.20.2.tar.gz) = 43de94899a3178e12f46326652edadf16bff9078
+Size (asterisk-1.8.20.2/asterisk-1.8.20.2.tar.gz) = 25180212 bytes
+SHA1 (asterisk-1.8.20.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 8692fa61423b4769dc8bfa78faf9ed5ef7a259b9
+RMD160 (asterisk-1.8.20.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 68170c769d739d6b5b35b00f999ad6bbf876f9f6
+Size (asterisk-1.8.20.2/asterisk-extra-sounds-en-gsm-1.4.11.tar.gz) = 3349898 bytes
SHA1 (patch-aa) = 832f1c043b15198e0a286094dd0cc1a251bcfed0
SHA1 (patch-af) = 19786616bb606c38f769ec85f2e4d118573659ab
SHA1 (patch-ai) = e92edab5c1ff323478f41d0b0783102ed527fe39