summaryrefslogtreecommitdiff
path: root/Makefile
diff options
context:
space:
mode:
authorjnemeth <jnemeth@pkgsrc.org>2013-01-03 02:14:28 +0000
committerjnemeth <jnemeth@pkgsrc.org>2013-01-03 02:14:28 +0000
commitdab863b8060b2e3146749a7c417c192000f60de8 (patch)
tree11d3c36c6ec569efae481a7409bbc18ef7a157cd /Makefile
parent34b6831b807e339f8cae7dd7c260ddb03f5b79df (diff)
downloadpkgsrc-dab863b8060b2e3146749a7c417c192000f60de8.tar.gz
Upgrade to Asterisk 10.11.1; this is a security fix to fix AST-2012-14
and AST-2012-015. Approved for commit during freeze by: agc The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones, and 11.1.1. The release of these versions resolve the following two issues: * Stack overflows that occur in some portions of Asterisk that manage a TCP connection. In SIP, this is exploitable via a remote unauthenticated session; in XMPP and HTTP connections, this is exploitable via remote authenticated sessions. * A denial of service vulnerability through exploitation of the device state cache. Anonymous calls had the capability to create devices in Asterisk that would never be disposed of. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-014 and AST-2012-015, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf Thank you for your continued support of Asterisk!
Diffstat (limited to 'Makefile')
0 files changed, 0 insertions, 0 deletions