summaryrefslogtreecommitdiff
path: root/comms/asterisk18/options.mk
diff options
context:
space:
mode:
authorjnemeth <jnemeth>2012-03-22 03:43:42 +0000
committerjnemeth <jnemeth>2012-03-22 03:43:42 +0000
commitc838cc080b74d1c9718c22e26cf933afb97a1b4a (patch)
tree398618292c975041c995db5087426ccabf0d70d7 /comms/asterisk18/options.mk
parent004fee737632156a0c40489f8b124e8a4db02147 (diff)
downloadpkgsrc-c838cc080b74d1c9718c22e26cf933afb97a1b4a.tar.gz
Update to 1.8.10.1: this fixes AST-2012-002 and AST-2012-003.
pkgsrc changes: adapt to having iLBC coded included in the asterisk tarball and newer version of sounds tarball. ----- 1.8.10.0 ----- The Asterisk Development Team has announced the release of Asterisk 1.8.10.0. The release of Asterisk 1.8.10.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Prevent outbound SIP NOTIFY packets from displaying a port of 0 --- * --- Include iLBC source code for distribution with Asterisk --- * --- Fix callerid of originated calls --- * --- Fix outbound DTMF for inband mode of chan_ooh323 --- * --- Create and initialize udptl only when dialog requests image media --- * --- Don't prematurely stop SIP session timer --- For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.10.0 Thank you for your continued support of Asterisk! ----- 1.8.10.1 ----- The Asterisk Development Team has announced security releases for Asterisk 1.4, 1.6.2, 1.8, and 10. The available security releases are released as versions 1.4.44, 1.6.2.23, 1.8.10.1, and 10.2.1. The release of Asterisk 1.8.10.1 and 10.2.1 resolve two issues. First, they resolve the issue in app_milliwatt, wherein a buffer can potentially be overrun on the stack, but no remote code execution is possible. Second, they resolve an issue in HTTP AMI where digest authentication information can be used to overrun a buffer on the stack, allowing for code injection and execution. These issues and their resolution are described in the security advisory. For more information about the details of these vulnerabilities, please read the security advisories AST-2012-002 and AST-2012-003, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.10.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-002.pdf * http://downloads.asterisk.org/pub/security/AST-2012-003.pdf Thank you for your continued support of Asterisk!
Diffstat (limited to 'comms/asterisk18/options.mk')
-rw-r--r--comms/asterisk18/options.mk14
1 files changed, 1 insertions, 13 deletions
diff --git a/comms/asterisk18/options.mk b/comms/asterisk18/options.mk
index 1be3ea6fd2a..ae2d71e9426 100644
--- a/comms/asterisk18/options.mk
+++ b/comms/asterisk18/options.mk
@@ -1,4 +1,4 @@
-# $NetBSD: options.mk,v 1.8 2012/01/17 06:29:41 jnemeth Exp $
+# $NetBSD: options.mk,v 1.9 2012/03/22 03:43:42 jnemeth Exp $
PKG_OPTIONS_VAR= PKG_OPTIONS.asterisk
PKG_SUPPORTED_OPTIONS= zaptel x11 unixodbc ilbc webvmail ldap spandsp
@@ -44,11 +44,6 @@ CONFIGURE_ARGS+= --without-unixodbc
.endif
.if !empty(PKG_OPTIONS:Milbc)
-DISTFILES+= rfc3951.txt
-SITES.rfc3951.txt= http://www.ietf.org/rfc/
-DISTFILES+= extract-cfile.txt
-SITES.extract-cfile.txt= http://www.ilbcfreeware.org/documentation/
-USE_TOOLS+= awk tr
PLIST.ilbc= yes
.endif
@@ -83,13 +78,6 @@ post-configure:
${ECHO} "MENUSELECT_AGIS=agi-test.agi eagi-test eagi-sphinx-test jukebox.agi" >> ${WRKSRC}/pkgsrc.makeopts
cd ${WRKSRC} && make menuselect.makeopts
-post-extract:
-.if !empty(PKG_OPTIONS:Milbc)
- cp ${DISTDIR}/${DIST_SUBDIR}/rfc3951.txt ${WRKSRC}/codecs/ilbc
- cp ${DISTDIR}/${DIST_SUBDIR}/extract-cfile.txt ${WRKSRC}/codecs/ilbc
- cd ${WRKSRC}/codecs/ilbc && ${TR} -d '\r' < extract-cfile.txt | ${AWK} -f - rfc3951.txt
-.endif
-
.if !empty(PKG_OPTIONS:Mwebvmail)
DEPENDS+= p5-DBI-[0-9]*:../../databases/p5-DBI
SUBST_CLASSES+= webvmail