diff options
author | jnemeth <jnemeth@pkgsrc.org> | 2013-01-03 02:14:28 +0000 |
---|---|---|
committer | jnemeth <jnemeth@pkgsrc.org> | 2013-01-03 02:14:28 +0000 |
commit | dab863b8060b2e3146749a7c417c192000f60de8 (patch) | |
tree | 11d3c36c6ec569efae481a7409bbc18ef7a157cd /Makefile | |
parent | 34b6831b807e339f8cae7dd7c260ddb03f5b79df (diff) | |
download | pkgsrc-dab863b8060b2e3146749a7c417c192000f60de8.tar.gz |
Upgrade to Asterisk 10.11.1; this is a security fix to fix AST-2012-14
and AST-2012-015.
Approved for commit during freeze by: agc
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases
are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones,
and 11.1.1.
The release of these versions resolve the following two issues:
* Stack overflows that occur in some portions of Asterisk that manage a TCP
connection. In SIP, this is exploitable via a remote unauthenticated session;
in XMPP and HTTP connections, this is exploitable via remote authenticated
sessions.
* A denial of service vulnerability through exploitation of the device state
cache. Anonymous calls had the capability to create devices in Asterisk that
would never be disposed of.
These issues and their resolutions are described in the security advisories.
For more information about the details of these vulnerabilities, please read
security advisories AST-2012-014 and AST-2012-015, which were released at the
same time as this announcement.
For a full list of changes in the current releases, please see the ChangeLogs:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1
The security advisories are available at:
* http://downloads.asterisk.org/pub/security/AST-2012-014.pdf
* http://downloads.asterisk.org/pub/security/AST-2012-015.pdf
Thank you for your continued support of Asterisk!
Diffstat (limited to 'Makefile')
0 files changed, 0 insertions, 0 deletions