summaryrefslogtreecommitdiff
path: root/comms/asterisk16
AgeCommit message (Collapse)AuthorFilesLines
2012-09-14Remove Asterisk 1.6. This version series went end-of-line on Apriljnemeth35-4292/+0
21st, 2012. It most likely has multiple security issues. By this point, all users of this package should have migrated to comms/asterisk18 or comms/asterisk10 as this version has been marked as being deprecated for some time now. Note that this directory is likely to re-appear in late 2017 when Asterisk 16 comes out, assuming the current schedule is followed. However that will be a vastly different version as Asterisk 11 is only in the RC stage now (i.e. it will be five major versions after the one that is expected to be released later this year).
2012-07-15comms/asterisk16: Mark NOT-FOR-DRAGONFLYmarino1-1/+3
This package has not been patched for DragonFly. There are two newer packages, asterisk10 and asterisk18 According to commit messages, this package will be removed in "not too distant future" due to being EOL.
2012-06-14Recursive PKGREVISION bump for libxml2 buildlink addition.sbd1-1/+2
2012-05-04Don't override optimizer settings with absurd levels.joerg3-2/+21
Fix inline definitions to work with C99 compiler.
2012-04-30Update to Asterisk 1.6.2.24. This fixes AST-2012-004 and AST-2012-005.jnemeth2-16/+15
The 1.6.2 series went End of Life on April 21st 2012, so this was the last update. This package will be deleted in the not too distnat future. The Asterisk Development Team has announced security releases for Asterisk 1.6.2 , 1.8, and 10. The available security releases are released as versions 1.6.2.24, 1.8.11.1, and 10.3.1. The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the following two issues: * A permission escalation vulnerability in Asterisk Manager Interface. This would potentially allow remote authenticated users the ability to execute commands on the system shell with the privileges of the user running the Asterisk application. * A heap overflow vulnerability in the Skinny Channel driver. The keypad button message event failed to check the length of a fixed length buffer before appending a received digit to the end of that buffer. A remote authenticated user could send sufficient keypad button message events that th e buffer would be overrun. These issues and their resolution are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-004, AST-2012-005, and AST-2012-006, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.24 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf Thank you for your continued support of Asterisk!
2012-04-27Recursive bump from icu shlib major bumped to 49.obache1-1/+2
2012-03-25Update to 1.6.2.23:jnemeth2-16/+15
This is a security fix update. It fixes AST-2012-002. NOTE NOTE NOTE This is likely to be the last update to this package. This version of Asterisk will be EOLed on April 21st, 2012. It will probably be removed from pkgsrc not long after that. If you are still using this package, you should consider switching to comms/asterisk18, the Long Term Support version, or comms/asterisk10 in the near future. NOTE NOTE NOTE The Asterisk Development Team has announced security releases for Asterisk 1.4, 1.6.2, 1.8, and 10. The available security releases are released as versions 1.4.44, 1.6.2.23, 1.8.10.1, and 10.2.1. The release of Asterisk 1.4.44 and 1.6.2.23 resolve an issue wherein app_milliwatt can potentially overrun a buffer on the stack, causing Asterisk to crash. This does not have the potential for remote code execution. These issues and their resolution are described in the security advisory. For more information about the details of these vulnerabilities, please read the security advisories AST-2012-002 and AST-2012-003, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.23 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-002.pdf Thank you for your continued support of Asterisk!
2012-02-16Fix build on SunOS.hans5-5/+59
2012-01-17PR/35369 -- David Wetzel -- add support for speex codec (enabled by default)jnemeth3-6/+19
2012-01-14Update to Asterisk 1.6.2.22:jnemeth2-15/+15
The release of Asterisk 1.6.2.22 corrects two flaws in sip.conf.sample related to AST-2011-013: * The sample file listed *two* values for the 'nat' option as being the default. Only 'yes' is the default. * The warning about having differing 'nat' settings confusingly referred to both peers and users. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.22 Thank you for your continued support of Asterisk!
2011-12-12This update fixes AST-2011-013 and AST-2011-014. It also adapts to changesjnemeth3-22/+21
in the iLBC codec files. __________________________________________________________________ Asterisk Project Security Advisory - AST-2011-013 Product Asterisk Summary Possible remote enumeration of SIP endpoints with differing NAT settings Nature of Advisory Unauthorized data disclosure Susceptibility Remote unauthenticated sessions Severity Minor Exploits Known Yes Reported On 2011-07-18 Reported By Ben Williams Posted On Last Updated On December 7, 2011 Advisory Contact Terry Wilson <twilson at digium.com> CVE Name Description It is possible to enumerate SIP usernames when the general and user/peer NAT settings differ in whether to respond to the port a request is sent from or the port listed for responses in the Via header. In 1.4 and 1.6.2, this would mean if one setting was nat=yes or nat=route and the other was either nat=no or nat=never. In 1.8 and 10, this would mean when one was nat=force_rport or nat=yes and the other was nat=no or nat=comedia. Resolution Handling NAT for SIP over UDP requires the differing behavior introduced by these options. To lessen the frequency of unintended username disclosure, the default NAT setting was changed to always respond to the port from which we received the request-the most commonly used option. Warnings were added on startup to inform administrators of the risks of having a SIP peer configured with a different setting than that of the general setting. The documentation now strongly suggests that peers are no longer configured for NAT individually, but through the global setting in the "general" context. Affected Versions Product Release Series Asterisk Open Source All All versions Corrected In As this is more of an issue with SIP over UDP in general, there is no fix supplied other than documentation on how to avoid the problem. The default NAT setting has been changed to what we believe the most commonly used setting for the respective version in Asterisk 1.4.43, 1.6.2.21, and 1.8.7.2. Links Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2011-013.pdf and http://downloads.digium.com/pub/security/AST-2011-013.html Revision History Date Editor Revisions Made Asterisk Project Security Advisory - AST-2011-013 Copyright (c) 2011 Digium, Inc. All Rights Reserved. Permission is hereby granted to distribute and publish this advisory in its original, unaltered form. __________________________________________________________________ Asterisk Project Security Advisory - AST-2011-014 Product Asterisk Summary Remote crash possibility with SIP and the "automon" feature enabled Nature of Advisory Remote crash vulnerability in a feature that is disabled by default Susceptibility Remote unauthenticated sessions Severity Moderate Exploits Known Yes Reported On November 2, 2011 Reported By Kristijan Vrban Posted On 2011-11-03 Last Updated On December 7, 2011 Advisory Contact Terry Wilson <twilson at digium.com> CVE Name Description When the "automon" feature is enabled in features.conf, it is possible to send a sequence of SIP requests that cause Asterisk to dereference a NULL pointer and crash. Resolution Applying the referenced patches that check that the pointer is not NULL before accessing it will resolve the issue. The "automon" feature can be disabled in features.conf as a workaround. Affected Versions Product Release Series Asterisk Open Source 1.6.2.x All versions Asterisk Open Source 1.8.x All versions Corrected In Product Release Asterisk Open Source 1.6.2.21, 1.8.7.2 Patches Download URL Revision http://downloads.asterisk.org/pub/security/AST-2011-014-1.6.2.diff 1.6.2.20 http://downloads.asterisk.org/pub/security/AST-2011-014-1.8.diff 1.8.7.1 Links Asterisk Project Security Advisories are posted at http://www.asterisk.org/security This document may be superseded by later versions; if so, the latest version will be posted at http://downloads.digium.com/pub/security/AST-2011-014.pdf and http://downloads.digium.com/pub/security/AST-2011-014.html Revision History Date Editor Revisions Made Asterisk Project Security Advisory - AST-2011-014 Copyright (c) 2011 Digium, Inc. All Rights Reserved. Permission is hereby granted to distribute and publish this advisory in its original, unaltered form.
2011-12-05Now that -current has sqlite3 included in base, enable it here.jnemeth2-3/+5
2011-10-11Revert previous. This package was marked OWNER= for a reason!jnemeth1-3/+12
2011-10-08Remove zaptel option everywhere (zaptel-netbsd package was removed)shattered1-12/+3
2011-08-07Bump PKGREVISION for perl update.jnemeth1-1/+2
2011-07-05Update to 1.6.2.19 (fixes several security issues):jnemeth3-30/+159
Please note that Asterisk 1.6.2.19 is the final maintenance release from the 1.6.2 branch. Support for security related issues will continue until April 21, 2012. For more information about support of the various Asterisk branches, see https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions The release of Asterisk 1.6.2.19 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * Don't broadcast FullyBooted to every AMI connection The FullyBooted event should not be sent to every AMI connection every time someone connects via AMI. It should only be sent to the user who just connected. (Closes issue #18168. Reported, patched by FeyFre) * Fix thread blocking issue in the sip TCP/TLS implementation. (Closes issue #18497. Reported by vois. Tested by vois, rossbeer, kowalma, Freddi_Fonet. Patched by dvossel) * Don't delay DTMF in core bridge while listening for DTMF features. (Closes issue #15642, #16625. Reported by jasonshugart, sharvanek. Tested by globalnetinc, jde. Patched by oej, twilson) * Fix chan_local crashs in local_fixup() Thanks OEJ for tracking down the issue and submitting the patch. (Closes issue #19053. Reported, patched by oej) * Don't offer video to directmedia callee unless caller offered it as well (Closes issue #19195. Reported, patched by one47) Additionally security announcements AST-2011-008, AST-2011-010, and AST-2011-011 have been resolved in this release. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.19
2011-06-06Upgrade to 1.6.2.18. This fixes several security issues including:jnemeth4-158/+44
AST-2011-002, AST-2011-003, AST-2011-004, AST-2011-005, and AST-2011-006. =========================================================================== 1.6.2.18: The Asterisk Development Team has announced the release of Asterisk 1.6.2.18. The release of Asterisk 1.6.2.18 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * Only offer codecs both sides support for directmedia. * Resolution of several DTMF based attended transfer issues. NOTE: Be sure to read the ChangeLog for more information about these changes. * Resolve deadlocks related to device states in chan_sip * Fix channel redirect out of MeetMe() and other issues with channel softhangup * Fix voicemail sequencing for file based storage. * Guard against retransmitting BYEs indefinitely during attended transfers with chan_sip. In addition to the changes listed above, commits to resolve security issues AST-2011-005 and AST-2011-006 have been merged into this release. More information about AST-2011-005 and AST-2011-006 can be found at: http://downloads.asterisk.org/pub/security/AST-2011-005.pdf http://downloads.asterisk.org/pub/security/AST-2011-006.pdf For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.18 =========================================================================== 1.6.2.17.3 The Asterisk Development Team has announced security releases for Asterisk branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are released as versions 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3. The releases of Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3 resolve two issues: * File Descriptor Resource Exhaustion (AST-2011-005) * Asterisk Manager User Shell Access (AST-2011-006) The issues and resolutions are described in the AST-2011-005 and AST-2011-006 security advisories. For more information about the details of these vulnerabilities, please read the security advisories AST-2011-005 and AST-2011-006, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.3 Security advisory AST-2011-005 and AST-2011-006 are available at: http://downloads.asterisk.org/pub/security/AST-2011-005.pdf http://downloads.asterisk.org/pub/security/AST-2011-006.pdf =========================================================================== 1.6.2.17.2: The Asterisk Development Team has announced security releases for Asterisk branches 1.6.1, 1.6.2, and 1.8. The available security releases are released as versions 1.6.1.24, 1.6.2.17.2, and 1.8.3.2. ** This is a re-release of Asterisk 1.6.1.23, 1.6.2.17.1 and 1.8.3.1 which contained a bug which caused duplicate manager entries (issue #18987). The releases of Asterisk 1.6.1.24, 1.6.2.17.2, and 1.8.3.2 resolve two issues: * Resource exhaustion in Asterisk Manager Interface (AST-2011-003) * Remote crash vulnerability in TCP/TLS server (AST-2011-004) The issues and resolutions are described in the AST-2011-003 and AST-2011-004 security advisories. For more information about the details of these vulnerabilities, please read the security advisories AST-2011-003 and AST-2011-004, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.2 Security advisory AST-2011-003 and AST-2011-004 are available at: http://downloads.asterisk.org/pub/security/AST-2011-003.pdf http://downloads.asterisk.org/pub/security/AST-2011-004.pdf =========================================================================== 1.6.2.17.1: The Asterisk Development Team has announced security releases for Asterisk branches 1.6.1, 1.6.2, and 1.8. The available security releases are released as versions 1.6.1.23, 1.6.2.17.1, and 1.8.3.1. These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases The releases of Asterisk 1.6.1.23, 1.6.2.17.1, and 1.8.3.1 resolve two issues: * Resource exhaustion in Asterisk Manager Interface (AST-2011-003) * Remote crash vulnerability in TCP/TLS server (AST-2011-004) The issues and resolutions are described in the AST-2011-003 and AST-2011-004 security advisories. For more information about the details of these vulnerabilities, please read the security advisories AST-2011-003 and AST-2011-004, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.1 Security advisory AST-2011-003 and AST-2011-004 are available at: http://downloads.asterisk.org/pub/security/AST-2011-003.pdf http://downloads.asterisk.org/pub/security/AST-2011-004.pdf =========================================================================== 1.6.2.16.2: The Asterisk Development Team has announced security releases for Asterisk branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are released as versions 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4. The releases of Asterisk 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4 resolve an issue that when decoding UDPTL packets, multiple stack and heap based arrays can be made to overflow by specially crafted packets. Systems configured for T.38 pass through or termination are vulnerable. The issue and resolution are described in the AST-2011-002 security advisory. For more information about the details of this vulnerability, please read the security advisory AST-2011-002, which was released at the same time as this announcement. For a full list of changes in the current release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.16.2 Security advisory AST-2011-002 is available at: http://downloads.asterisk.org/pub/security/AST-2011-002.pdf
2011-06-06Upgrade to 1.6.2.18. This fixes several security issues including:jnemeth1-4/+2
AST-2011-002, AST-2011-003, AST-2011-004, AST-2011-005, and AST-2011-006. =========================================================================== 1.6.2.18: The Asterisk Development Team has announced the release of Asterisk 1.6.2.18. The release of Asterisk 1.6.2.18 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * Only offer codecs both sides support for directmedia. * Resolution of several DTMF based attended transfer issues. NOTE: Be sure to read the ChangeLog for more information about these changes. * Resolve deadlocks related to device states in chan_sip * Fix channel redirect out of MeetMe() and other issues with channel softhangup * Fix voicemail sequencing for file based storage. * Guard against retransmitting BYEs indefinitely during attended transfers with chan_sip. In addition to the changes listed above, commits to resolve security issues AST-2011-005 and AST-2011-006 have been merged into this release. More information about AST-2011-005 and AST-2011-006 can be found at: http://downloads.asterisk.org/pub/security/AST-2011-005.pdf http://downloads.asterisk.org/pub/security/AST-2011-006.pdf For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.18 =========================================================================== 1.6.2.17.3 The Asterisk Development Team has announced security releases for Asterisk branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are released as versions 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3. The releases of Asterisk 1.4.40.1, 1.6.1.25, 1.6.2.17.3, and 1.8.3.3 resolve two issues: * File Descriptor Resource Exhaustion (AST-2011-005) * Asterisk Manager User Shell Access (AST-2011-006) The issues and resolutions are described in the AST-2011-005 and AST-2011-006 security advisories. For more information about the details of these vulnerabilities, please read the security advisories AST-2011-005 and AST-2011-006, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.3 Security advisory AST-2011-005 and AST-2011-006 are available at: http://downloads.asterisk.org/pub/security/AST-2011-005.pdf http://downloads.asterisk.org/pub/security/AST-2011-006.pdf =========================================================================== 1.6.2.17.2: The Asterisk Development Team has announced security releases for Asterisk branches 1.6.1, 1.6.2, and 1.8. The available security releases are released as versions 1.6.1.24, 1.6.2.17.2, and 1.8.3.2. ** This is a re-release of Asterisk 1.6.1.23, 1.6.2.17.1 and 1.8.3.1 which contained a bug which caused duplicate manager entries (issue #18987). The releases of Asterisk 1.6.1.24, 1.6.2.17.2, and 1.8.3.2 resolve two issues: * Resource exhaustion in Asterisk Manager Interface (AST-2011-003) * Remote crash vulnerability in TCP/TLS server (AST-2011-004) The issues and resolutions are described in the AST-2011-003 and AST-2011-004 security advisories. For more information about the details of these vulnerabilities, please read the security advisories AST-2011-003 and AST-2011-004, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.2 Security advisory AST-2011-003 and AST-2011-004 are available at: http://downloads.asterisk.org/pub/security/AST-2011-003.pdf http://downloads.asterisk.org/pub/security/AST-2011-004.pdf =========================================================================== 1.6.2.17.1: The Asterisk Development Team has announced security releases for Asterisk branches 1.6.1, 1.6.2, and 1.8. The available security releases are released as versions 1.6.1.23, 1.6.2.17.1, and 1.8.3.1. These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases The releases of Asterisk 1.6.1.23, 1.6.2.17.1, and 1.8.3.1 resolve two issues: * Resource exhaustion in Asterisk Manager Interface (AST-2011-003) * Remote crash vulnerability in TCP/TLS server (AST-2011-004) The issues and resolutions are described in the AST-2011-003 and AST-2011-004 security advisories. For more information about the details of these vulnerabilities, please read the security advisories AST-2011-003 and AST-2011-004, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.17.1 Security advisory AST-2011-003 and AST-2011-004 are available at: http://downloads.asterisk.org/pub/security/AST-2011-003.pdf http://downloads.asterisk.org/pub/security/AST-2011-004.pdf =========================================================================== 1.6.2.17: The Asterisk Development Team has announced the release of Asterisk 1.6.2.17. The release of Asterisk 1.6.2.17 resolves several issues reported by the community and would have not been possible without your participation. The following is a sample of the issues resolved in this release: * Resolve duplicated data in the AstDB when using DIALGROUP() * Correct issue where res_config_odbc could populate fields with invalid data. * When using cdr_pgsql the billsec field was not populated correctly on unanswered calls. * Resolve issue where re-transmissions of SUBSCRIBE could break presence. * Fix regression causing forwarding voicemails to not work with file storage. * This version of Asterisk includes the new Compiler Flags option BETTER_BACKTRACES which uses libbfd to search for better symbol information within both the Asterisk binary, as well as loaded modules, to assist when using inline backtraces to track down problems. * Resolve several issues with DTMF based attended transfers. NOTE: Be sure to read the ChangeLog for more information about these changes. * Resolve issue where no Music On Hold may be triggered when using res_timing_dahdi. * Fix regression that changed behavior of queues when ringing a queue member. Additionally, this release has the changes related to security bulletin AST-2011-002 which can be found at http://downloads.asterisk.org/pub/security/AST-2011-002.pdf For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.17 =========================================================================== 1.6.2.16.2: The Asterisk Development Team has announced security releases for Asterisk branches 1.4, 1.6.1, 1.6.2, and 1.8. The available security releases are released as versions 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4. The releases of Asterisk 1.4.39.2, 1.6.1.22, 1.6.2.16.2, and 1.8.2.4 resolve an issue that when decoding UDPTL packets, multiple stack and heap based arrays can be made to overflow by specially crafted packets. Systems configured for T.38 pass through or termination are vulnerable. The issue and resolution are described in the AST-2011-002 security advisory. For more information about the details of this vulnerability, please read the security advisory AST-2011-002, which was released at the same time as this announcement. For a full list of changes in the current release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.16.2 Security advisory AST-2011-002 is available at: http://downloads.asterisk.org/pub/security/AST-2011-002.pdf =============================================================================
2011-04-22recursive bump from gettext-lib shlib bump.obache1-1/+2
2011-01-21Update to 1.6.2.16.1jnemeth2-15/+15
This is to fix AST-2011-001: Stack buffer overflow in SIP channel driver Asterisk Project Security Advisory - AST-2011-001 Product Asterisk Summary Stack buffer overflow in SIP channel driver Nature of Advisory Exploitable Stack Buffer Overflow Susceptibility Remote Authenticated Sessions Severity Moderate Exploits Known No Reported On January 11, 2011 Reported By Matthew Nicholson Posted On January 18, 2011 Last Updated On January 18, 2011 Advisory Contact Matthew Nicholson <mnicholson at digium.com> CVE Name Description When forming an outgoing SIP request while in pedantic mode, a stack buffer can be made to overflow if supplied with carefully crafted caller ID information. This vulnerability also affects the URIENCODE dialplan function and in some versions of asterisk, the AGI dialplan application as well. The ast_uri_encode function does not properly respect the size of its output buffer and can write past the end of it when encoding URIs. For full details, see: http://downloads.digium.com/pub/security/AST-2011-001.html
2011-01-16Update to 1.6.2.16:jnemeth3-30/+159
The release of Asterisk 1.6.2.16 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * Fix cache of device state changes for multiple servers. (Closes issue #18284, #18280. Reported, tested by klaus3000. Patched, tested by russellb) * Resolve issue where channel redirect function (CLI or AMI) hangs up the call instead of redirecting the call. (Closes issue #18171. Reported by: SantaFox) (Closes issue #18185. Reported by: kwemheuer) (Closes issue #18211. Reported by: zahir_koradia) (Closes issue #18230. Reported by: vmarrone) (Closes issue #18299. Reported by: mbrevda) (Closes issue #18322. Reported by: nerbos) * Linux and *BSD disagree on the elements within the ucred structure. Detect which one is in use on the system. (Closes issue #18384. Reported, patched, tested by bjm, tilghman) * app_followme: Don't create a Local channel if the target extension does not exist. (Closes issue #18126. Reported, patched by junky) * Revert code that changed SSRC for DTMF. (Closes issue #17404, #18189, #18352. Reported by sdolloff, marcbou. rsw686. Tested by cmbaker82) * Resolve issue where REGISTER request with a Call-ID matching an existing transaction is received it was possible that the REGISTER request would overwrite the initreq of the private structure. (Closes issue #18051. Reported by eeman. Patched, tested by twilson) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.16
2010-12-12Update to 1.6.2.15. This is primarily a bugfix release.jnemeth5-170/+45
- disable automatic Lua detection for now until lang/lua/builtin.mk exists The release of Asterisk 1.6.2.15 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * When using chan_skinny, don't crash when parking a non-bridged call. (Closes issue #17680. Reported, tested by jmhunter. Patched, tested by DEA) * Add ability for Asterisk to try both the encoded and unencoded subscription URI for a match in hints. (Closes issue #17785. Reported, tested by ramonpeek. Patched by tilghman) * Set the caller id on CDRs when it is set on the parent channel. (Closes issue #17569. Reported, patched by tbelder) * Ensure user portion of SIP URI matches dialplan when using encoded characters (Closes issue #17892. Reported by wdoekes. Patched by jpeeler) * Resolve issue where Party A in an analog 3-way call would continue to hear ringback after party C answers. (Patched by rmudgett) * Fix problem with qualify option packets for realtime peers never stopping. The option packets not only never stopped, but if a realtime peer was not in the peer list multiple options dialogs could accumulate over time. (Closes issue #16382. Reported by lftsy. Tested by zerohalo. Patched by jpeeler) * Multiple fixes related to Local channels. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.15
2010-11-29The stop and reload commands require the core prefix now.jnemeth2-4/+5
2010-11-15Update to 1.6.2.14jnemeth5-45/+170
The release of Asterisk 1.6.2.14 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * Fix issue where session timers would be advertised as supported even when session-timers=refuse was set in sip.conf. Also fix interoperability problems with session timer behavior in Asterisk. (Closes issue #17005. Reported by alexcarey. Patched by dvossel) * Parse all "Accept" headers for SIP SUBSCRIBE requests. (Closes issue #17758. Reported by ibc. Patched by dvossel) * Fix issue where queue stats would be reset on reload. (Closes issue #17535. Reported by raarts. Patched by tilghman) * Fix issue where MoH files were no longer rescanned on during a reload. (Closes issue #16744. Reported by pj. Patched by Qwell) * Fix issue with dialplan pattern matching where the specificity for pattern ranges and pattern characters was inconsistent. (Closes issue #16903. Reported, patched by Nick_Lewis) For a full list of changes in the current release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.14
2010-11-10Add -n to startup options, so starting Asterisk doesn't mess with screenjnemeth2-4/+4
colours.
2010-10-19Adjust rc.d script to disable colour when issuing commands to Asterisk.jnemeth2-4/+5
2010-10-06DISTFILES is now initialized in Makefile, don't re-initialize it here.jnemeth1-2/+1
2010-10-03Need to set DEFAULT_DISTFILES to DISTFILES before adding to it.obache1-1/+2
2010-09-23 Update to the 1.6.2 series (specifically 1.6.2.13). This isjnemeth11-298/+1503
a feature update, so users that are upgrading should read UPDATE.txt. pkgsrc changes: - update to 1.6.2.13 - bury the asterisk-sounds-extra inside this one to keep it in sync - handle sound tarballs directly (upstream had changed this to do a download during the install phase and dump files in $HOME) - add new documentation files: - asterisk.txt - building_queues.txt - database_transactions.txt - followme.txt ======== 1.6.2.13 ======== This release resolves an issue where the .version and ChangeLog files were not updated for 1.6.2.12. Asterisk 1.6.2.13 has no additional changes from 1.6.2.12 other than the .version, ChangeLog and summary files. For a full list of changes in the current release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.13 ======== 1.6.2.12 ======== The release of Asterisk 1.6.2.12 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * Fix issue where DNID does not get cleared on a new call when using immediate=yes with ISDN signaling. (Closes issue #17568. Reported by wuwu. Patched by rmudgett) * Several updates to res_config_ldap. (Closes issue #13573. Reported by navkumar. Patched by navkumar, bencer. Tested by suretec) * Prevent loss of Caller ID information set on local channel after masquerade. (Closes issue #17138. Reported by kobaz, patched by jpeeler) * Fix SIP peers memory leak. (Closes issue #17774. Reported, patched by kkm) * Add Danish support to say.conf.sample (Closes issue #17836. Reported, patched by RoadKill) * Ensure SSRC is changed when media source is changed to resolve audio delay. (Closes issue #17404. Reported, tested by sdolloff. Patched by jpeeler) * Only do magic pickup when notifycid is enabled. A new way of doing BLF pickup was introduced into 1.6.2. This feature adds a call-id value into the XML of a SIP_NOTIFY message sent to alert a subscriber that a device is ringing. This option should only be enabled when the new 'notifycid' option is set, but this was not the case. Instead the call-id value was included for every RINGING Notify message, which caused a regression for people who used other methods for call pickup. (Closes issue #17633. Reported, patched by urosh. Patched by dvossel. Tested by: dvossel, urosh, okrief, alecdavis) For a full list of changes in the current release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.12 ======== 1.6.2.11 ======== The release of Asterisk 1.6.2.11 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are a few of the issues resolved by community developers: * Send DialPlanComplete as a response, not as a separate event. Otherwise, it goes to all manager sessions and may exclude the current session, if the Events mask excludes it. (Closes issue #17504. Reported, patched by rrb3942) * Allow the "useragent" value to be restored into memory from the realtime backend. This value is purely informational. It does not alter configuration at all. (Closes issue #16029. Reported, patched by Guggemand) * Fix rt(c)p set debug ip taking wrong argument Also clean up some coding errors. (Closes issue #17469. Reported, patched by wdoekes) * Ensure channel placed in meetme in ringing state is properly hung up. An outgoing channel placed in meetme while still ringing which was then hung up would not exit meetme and the channel was not properly destroyed. (Closes issue #15871. Reported, patched by Ivan) * Correct how 100, 200, 300, etc. is said. Also add the crazy British numbers. (Closes issue #16102. Reported, patched by Delvar) * cdr_pgsql does not detect when a table is found. This change adds an ERROR message to let you know when a failure exists to get the columns from the pgsql database, which typically means that the table does not exist. (Closes issue #17478. Reported, patched by kobaz) * Avoid crashing when installing a duplicate translation path with a lower cost. (Closes issue #17092. Reported, patched by moy) * Add missing handling for ringing state for use with queue empty options. (Closes issue #17471. Reported, patched by jazzy) * Fix reporting estimated queue hold time. Just say the number of seconds (after minutes) rather than doing some incorrect calculation with respect to minutes. (Closes issue #17498. Reported, patched by corruptor) For a full list of changes in the current release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.11 ======== 1.6.2.10 ======== The release of Asterisk 1.6.2.10 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are a few of the issues resolved by community developers: * Allow users to specify a port for DUNDI peers. (Closes issue #17056. Reported, patched by klaus3000) * Decrease the module ref count in sip_hangup when SIP_DEFER_BYE_ON_TRANSFER is set. (Closes issue #16815. Reported, patched by rain) * If there is realtime configuration, it does not get re-read on reload unless the config file also changes. (Closes issue #16982. Reported, patched by dmitri) * Send AgentComplete manager event for attended transfers. (Closes issue #16819. Reported, patched by elbriga) * Correct manager variable 'EventList' case. (Closes issue #17520. Reported, patched by kobaz) In addition, changes to res_timing_pthread that should make it more stable have also been implemented. For a full list of changes in the current release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.10 ======= 1.6.2.9 ======= The release of Asterisk 1.6.2.9 resolves several issues reported by the community, and would have not been possible without your participation. Thank you! The following are a few of the issues resolved by community developers: * Fix the PickupChan() application (Closes issue #16863. Reported, patched by schern. Patched by cjacobsen. Tested by Graber, cjacobsen, lathama, rickead2000, dvossel) * Improve logging by displaying line number (Closes issue #16303. Reported by dant. Patched by pabelanger. Tested by dant, pabelanger, lmadsen) * Notify CLI when modules are loaded/unloaded (Closes issue #17308. Reported, patched by pabelanger. Tested by russell) * Make the Makefile logic more explicit and move the Snow Leopard logic down to where it's not executed on non-Darwin systems (Closes issue #17028. Reported by pabelanger. Patched by seanbright, tilghman. Tested by pabelanger) * Manager cookies are not compatible with RFC2109. Make that no longer true. (Closes issue #17231. Reported, patched by ecarruda) * With IMAP backend, messages in INBOX were counted twice for MWI (Closes issue #17135. Reported by edhorton. Patched by ebroad, tilghman) * Fix possible segfault when logging (Closes issue #17331. Reported, patched by under. Patched by dvossel) * Fix memory hogging behavior of app_queue (Closes issue #17081. Reported by wliegel. Patched by mmichelson) * Allow type=user SIP endpoints to be loaded properly from realtime (Closes issue #16021. Reported, patched by Guggemand) Additionally, the following issue may be of interest: * Fix transcode_via_sln option with SIP calls and improve PLC usage (Review: https://reviewboard.asterisk.org/r/622/) For a full list of changes in the current release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.9 ======= 1.6.2.8 ======= The release of Asterisk 1.6.2.8 resolves several issues reported by the community, and would have not been possible without your participation. Thank you! The following are a few of the issues resolved by community developers: * Enable auto complete for CLI command 'logger set level'. (Closes issue #17152. Reported, patched by pabelanger) * Make the mixmonitor thread process audio frames faster. (Closes issue #17078. Reported, tested by geoff2010. Patched by dhubbard) * Add missing 'useragent' field to sip-friends.sql file. (Closes issue #17171. Reported, patched by thehar) * Add example dialplan for dialing ISN numbers (http://www.freenum.org) (Closes issue #17058. Reported, patched by pprindeville) * Fix issue with double "sip:" in header field. (Closes issue #15847. Reported, patched by ebroad) * Add ability to generate ASCII documentation from the TeX files by running 'make asterisk.txt'. (Closes issue #17220. Reported by lmadsen. Tested, patched by pabelanger) * When StopMonitor() is called, ensure that it will not be restarted by a channel event. (Closes issue #16590. Reported, patched by kkm) * Small error in the T.140 RTP port verbose log. (Closes issue #16998. Reported, patched by frawd. Tested by russell) For a full list of changes in the current release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.8 ======= 1.6.2.7 ======= The release of Asterisk 1.6.2.7 resolves several issues reported by the community, and would have not been possible without your participation. Thank you! The following are a few of the issues resolved by community developers: * Fix building CDR and CEL SQLite3 modules. (Closes issue #17017. Reported by alephlg. Patched by seanbright) * Resolve crash in SLAtrunk when the specified trunk doesn't exist. (Reported in #asterisk-dev by philipp64. Patched by seanbright) * Include an extra newline after "Aliased CLI command" to get back the prompt. (Issue #16978. Reported by jw-asterisk. Tested, patched by seanbright) * Prevent segfault if bad magic number is encountered. (Issue #17037. Reported, patched by alecdavis) * Update code to reflect that handle_speechset has 4 arguments. (Closes issue #17093. Reported, patched by gpatri. Tested by pabelanger, mmichelson) * Resolve a deadlock in chan_local. (Closes issue #16840. Reported, patched by bzing2, russell. Tested by bzing2) For a full list of changes in this releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.7 ======= 1.6.2.6 ======= The release of Asterisk 1.6.2.6 resolves several issues reported by the community, and would have not been possible without your participation. Thank you! The following are a few of the issues resolved by community developers: * Make sure to clear red alarm after polarity reversal. (Closes issue #14163. Reported, patched by jedi98. Tested by mattbrown, Chainsaw, mikeeccleston) * Fix problem with duplicate TXREQ packets in chan_iax2 (Closes issue #16904. Reported, patched by rain. Tested by rain, dvossel) * Fix crash in app_voicemail related to message counting. (Closes issue #16921. Reported, tested by whardier. Patched by seanbright) * Overlap receiving: Automatically send CALL PROCEEDING when dialplan starts (Reported, Patched, and Tested by alecdavis) * For T.38 reINVITEs treat a 606 the same as a 488. (Closes issue #16792. Reported, patched by vrban) * Fix ConfBridge crash when no timing module is loaded. (Closes issue #16471. Reported, tested by kjotte. Patched, tested by junky) For a full list of changes in this releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.6 ======= 1.6.2.5 ======= The Asterisk Development Team has announced security releases for the following versions of Asterisk: * 1.6.2.5 The releases of Asterisk 1.6.0.25, 1.6.1.17, and 1.6.2.5 resolve an issue with invalid parsing of ACL (Access Control List) rules leading to a possible compromise in security. The issue and resolution are described in the AST-2010-003 security advisory. For more information about the details of this vulnerability, please read the security advisory AST-2010-003, which was released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.5 Security advisory AST-2010-003 is available at: http://downloads.asterisk.org/pub/security/AST-2010-003.pdf ======= 1.6.2.4 ======= The Asterisk Development Team has announced security releases for the following versions of Asterisk: * 1.6.2.4 The releases of Asterisk 1.2.40, 1.4.29.1, 1.6.0.24, 1.6.1.16, and 1.6.2.4 include documention describing a possible dialplan string injection with common usage of the ${EXTEN} (and other expansion variables). The issue and resolution are described in the AST-2010-002 security advisory. If you have a channel technology which can accept characters other than numbers and letters (such as SIP) it may be possible to craft an INVITE which sends data such as 300&Zap/g1/4165551212 which would create an additional outgoing channel leg that was not originally intended by the dialplan programmer. Please note that this is not limited to an specific protocol or the Dial() application. The expansion of variables into programmatically-interpreted strings is a common behavior in many script or script-like languages, Asterisk included. The ability for a variable to directly replace components of a command is a feature, not a bug - that is the entire point of string expansion. However, it is often the case due to expediency or design misunderstanding that a developer will not examine and filter string data from external sources before passing it into potentially harmful areas of their dialplan. With the flexibility of the design of Asterisk come these risks if the dialplan designer is not suitably cautious as to how foreign data is allowed to enter the system unchecked. This security release is intended to raise awareness of how it is possible to insert malicious strings into dialplans, and to advise developers to read the best practices documents so that they may easily avoid these dangers. For more information about the details of this vulnerability, please read the security advisory AST-2010-002, which was released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.4 Security advisory AST-2010-002 is available at: http://downloads.asterisk.org/pub/security/AST-2010-002.pdf The README-SERIOUSLY.bestpractices.txt document is available in the top-level directory of your Asterisk sources, or available in all Asterisk branches from 1.2 and up. http://svn.asterisk.org/svn/asterisk/trunk/README-SERIOUSLY.bestpractices.txt ======= 1.6.2.3 ======= Was never released. ======= 1.6.2.2 ======= The Asterisk Development Team has announced security releases for Asterisk as the following versions: * 1.6.2.2 The releases of Asterisk 1.6.0.22, 1.6.1.14, and 1.6.2.2 include the fix described in security advisory AST-2010-001. The issue is that an attacker attempting to negotiate T.38 over SIP can remotely crash Asterisk by modifying the FaxMaxDatagram field of the SDP to contain either a negative or exceptionally large value. The same crash will occur when the FaxMaxDatagram field is omitted from the SDP, as well. For more information about the details of this vulnerability, please read the security advisory AST-2009-009, which was released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.2 Security advisory AST-2010-001 is available at: http://downloads.asterisk.org/pub/security/AST-2010-001.pdf ======= 1.6.2.1 ======= The release of Asterisk 1.6.2.1 resolved several issues reported by the community, and would have not been possible without your participation. Thank you! * CLI 'queue show' formatting fix. (Closes issue #16078. Reported by RoadKill. Tested by dvossel. Patched by ppyy.) * Fix misreverting from 177158. (Closes issue #15725. Reported, Tested by shanermn. Patched by dimas.) * Fixes subscriptions being lost after 'module reload'. (Closes issue #16093. Reported by jlaroff. Patched by dvossel.) * app_queue segfaults if realtime field uniqueid is NULL (Closes issue #16385. Reported, Tested, Patched by haakon.) * Fix to Monitor which previously assumed the file to write to did not contain pathing. (Closes issue #16377, #16376. Reported by bcnit. Patched by dant. A summary of changes in this release can be found in the release summary: http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-1.6.2.1-summary.txt For a full list of changes in this releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.1 ======= 1.6.2.0 ======= The release of Asterisk 1.6.2.0 is the first feature release since Asterisk 1.6.1.0, which was released April 27, 2009. Many new features have been included in this release. For a complete list of changes, please see the CHANGES file. For those upgrading from a previous release, please see UPGRADE.txt It should be explicitly stated that Asterisk 1.6.2.0 is a major upgrade over any previous release, and special care should be taken when upgrading existing systems. Please see the UPGRADE.txt file for more information, available at: http://svn.asterisk.org/svn/asterisk/tags/1.6.2.0/UPGRADE.txt A detailed overview to the new features available in Asterisk 1.6.2.0 are forthcoming within the next few days. Please watch http://blogs.asterisk.org for further information! Below is a summary of several new features available in this release: * chan_dahdi now supports MFC/R2 signaling when Asterisk is compiled with support for LibOpenR2. http://www.libopenr2.org/ * Added a new 'faxdetect=yes|no' configuration option to sip.conf. When this option is enabled, Asterisk will watch for a CNG tone in the incoming audio for a received call. If it is detected, the channel will jump to the 'fax' extension in the dialplan. * A new application, Originate, has been introduced, that allows asynchronous call origination from the dialplan. * Added ConfBridge dialplan application which does conference bridges without DAHDI. For information on its use, please see the output of "core show application ConfBridge" from the CLI. * extensions.conf now allows you to use keyword "same" to define an extension without actually specifying an extension. It uses exactly the same pattern as previously used on the last "exten" line. For example: exten => 123,1,NoOp(something) same => n,SomethingElse() * Asterisk now provides the ability to define custom CLI aliases. For example, if you would like to define short form aliases for frequently used commands, such as "sh ch" for "core show channels", that is now possible. See the cli_aliases.conf configuration file for more information. * Asterisk now has support for subscribing to the state of remote voice mailboxes via SIP. * Asterisk now includes expanded HD codec support. G.722.1 and G.722.1C (Siren7/Siren14) passthrough, recording, and playback is now supported. Transcoding will be made available via add-on modules soon for this version of Asterisk. This is just a subset of the changes available in this release. Please see the CHANGES file for additional information, available at: http://svn.asterisk.org/svn/asterisk/tags/1.6.2.0/CHANGES A summary of changes in this release can be found in the release summary: http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-1.6.2.0-summary.txt For a full list of changes in this releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.0
2010-06-16Update patches/patch-bd as per upstream. No significant difference injnemeth3-7/+31
functionality.
2010-05-22Update to 1.6.1.20. Apparently they decided to do one final bug fix release:jnemeth4-40/+47
The Asterisk releases for 1.6.0.28 and 1.6.1.20 are the last maintenance releases for Asterisk branches 1.6.0 and 1.6.1 and have now moved to security maintenance only. The releases of Asterisk 1.6.0.28 and 1.6.1.20 resolves several issues reported by the community, and would have not been possible without your participation. Thank you! The following are a few of the issues resolved by community developers: * Fix issue where MixMonitor() recordings would be shorter than total duration . (Closes issue #17078. Reported,tested by geoff2010. Patched by dhubbard) * When StopMonitor() is called, ensure it will not be restarted by a channel event. (Closes issue #16590. Reported, patched by kkm) * Allow hidecalleridname feature to work. (Closes issue #17143. Reported, patched by djensen99) * Resolve deadlocks in chan_local. (Closes issue #17185. Reported, tested by schmoozecom, GameGamer43) * Ensure channel state is not incorrectly set in the case of a very early answer by chan_dahdi. (Closes issue #17067. Reported, patched by tzafrir) * Registration fix for SIP realtime. Make sure realtime fields are not empty. (Closes issue #17266. Reported, patched by Nick_Lewis. Tested by sberney) Information about the Asterisk maintenance schedule is available at: http://www.asterisk.org/asterisk-versions For a full list of changes in the current release candidates, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.1.20
2010-05-20Update to Asterisk 1.6.1.19. 1.6.1.18 and 1.6.1.19 are primarilyjnemeth7-55/+51
bug fix releases. At this point the 1.6.1 series is going to security fixes only. That means this package will be moving to the 1.6.2 series in the near future. ----- 1.6.1.18: The following are a few of the issues resolved by community developers: * Make sure to clear red alarm after polarity reversal. (Closes issue #14163. Reported, patched by jedi98. Tested by mattbrown, Chainsaw, mikeeccleston) * Fix problem with duplicate TXREQ packets in chan_iax2. (Closes issue #16904. Reported, patched by rain. Tested by rain, dvossel) * Update documentation to not imply we support overriding options. (Closes issue #16855. Reported by davidw) * Modify queued frames from Local channels to not set the other side to up. (Closes issue #16816. Reported, tested by jamhed) * For T.38 reINVITEs treat a 606 the same as a 488. (Closes issue #16792. Reported, patched by vrban) For a full list of changes in this releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.1.18 ----- 1.6.1.19: The following are a few of the issues resolved by community developers: * Fix building CDR and CEL SQLite3 modules. (Closes issue #17017. Reported by alephlg. Patched by seanbright) * Resolve crash in SLAtrunk when the specified trunk doesn't exist. (Reported in #asterisk-dev by philipp64. Patched by seanbright) * Update code to reflect that handle_speechset has 4 arguments. (Closes issue #17093. Reported, patched by gpatri. Tested by pabelanger, mmichelson) * Pass the PID of the Asterisk process, not the PID of the canary. (Closes issue #17065. Reported by globalnetinc. Patched by makoto. Tested by frawd, globalnetinc) * Resolve a deadlock in chan_local. (Closes issue #16840. Reported, patched by bzing2, russell. Tested by bzing2) For a full list of changes in this releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.1.19
2010-05-07Add an "ldap" option which defaults to enabled, since most modernjnemeth3-7/+15
systems come with LDAP support built-in. This has no effect on such systems. However, on older systems, it will pull in openldap-client. But, a builder may still disable the option if they wish. This fixes: PR pkg/41987 - Robert Elz -- comms/asterisk16 PLIST problem
2010-05-07Install various docs found in the tarball.jnemeth2-4/+112
README-SERIOUSLY.bestpractices.txt is the new README from 1.6.1.16 and AST-2010-002.
2010-05-07Add a dependency on p5-DBI for the webvmail option. Don't botherjnemeth1-1/+2
with a PKGREVISION bump since this doesn't affect the installed "binaries" and there have already been two bumps today.
2010-05-07Fix bug when reloading cdr_odbc.so.jnemeth3-3/+25
2010-05-06Add a webvmail option which installs the vmail.cgi script accessingjnemeth6-18/+228
voicemail using a browser.
2010-03-01 Update to Asterisk 1.6.1.17. This fixes AST-2010-001 andjnemeth6-38/+37
AST-2010-003. AST-2010-002 was just a warning about dialplan scripting errors that could lead to security issues. Asterisk 1.6.1.13: general bug fixes Asterisk 1.6.1.14: fix AST-2010-001 Asterisk 1.6.1.15: not released, skipped for security releases Asterisk 1.6.1.16: fix AST-2010-002 Asterisk 1.6.1.17: fix AST-2010-003 Note that the only change in Asterisk 1.6.1.16 was the addtion of a README file. However, the package doesn't install random docs. That is planned for a future update seperate from the upstream updates. ----- Asterisk 1.6.1.13: The release of Asterisk 1.6.1.13 resolved several issues reported by the community, and would have not been possible without your participation. Thank you! * Restarts busydetector (if enabled) when DTMF is received after call is bridged (Closes issue #16389. Reported, Tested, Patched by alecdavis.) * Send parking lot announcement to the channel which parked the call, not the park-ee. (Closes issue #16234. Reported, Tested by yeshuawatso. Patched by tilghman.) * When the field is blank, don't warn about the field being unable to be coerced just skip the column. (Closes http://lists.digium.com/pipermail/asterisk-dev/2009-December/041362.html) Reported by Nic Colledge on the -dev list.) * Don't queue frames to channels that have no means to process them. (Closes issue #15609. Reported, Tested by aragon. Patched by tilghman.) * Fixes holdtime playback issue in app_queue. (Closes issue #16168. Reported, Patched by nickilo. Tested by wonderg, nickilo.) A summary of changes in this release can be found in the release summary: http://downloads.asterisk.org/pub/telephony/asterisk/asterisk-1.6.1.13-summary.t xt For a full list of changes in this releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.1.13 ----- Asterisk 1.6.1.14: The releases of Asterisk 1.6.0.22, 1.6.1.14, and 1.6.2.2 include the fix described in security advisory AST-2010-001. The issue is that an attacker attempting to negotiate T.38 over SIP can remotely crash Asterisk by modifying the FaxMaxDatagram field of the SDP to contain either a negative or exceptionally large value. The same crash will occur when the FaxMaxDatagram field is omitted from the SDP, as well. For more information about the details of this vulnerability, please read the security advisory AST-2009-009, which was released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.1.14 Security advisory AST-2010-001 is available at: http://downloads.asterisk.org/pub/security/AST-2010-001.pdf ----- Asterisk 1.6.1.16: The releases of Asterisk 1.2.40, 1.4.29.1, 1.6.0.24, 1.6.1.16, and 1.6.2.4 include documention describing a possible dialplan string injection with common usage of the ${EXTEN} (and other expansion variables). The issue and resolution are described in the AST-2010-002 security advisory. If you have a channel technology which can accept characters other than numbers and letters (such as SIP) it may be possible to craft an INVITE which sends data such as 300&Zap/g1/4165551212 which would create an additional outgoing channel leg that was not originally intended by the dialplan programmer. Please note that this is not limited to an specific protocol or the Dial() application. The expansion of variables into programmatically-interpreted strings is a common behavior in many script or script-like languages, Asterisk included. The ability for a variable to directly replace components of a command is a feature, not a bug - that is the entire point of string expansion. However, it is often the case due to expediency or design misunderstanding that a developer will not examine and filter string data from external sources before passing it into potentially harmful areas of their dialplan. With the flexibility of the design of Asterisk come these risks if the dialplan designer is not suitably cautious as to how foreign data is allowed to enter the system unchecked. This security release is intended to raise awareness of how it is possible to insert malicious strings into dialplans, and to advise developers to read the best practices documents so that they may easily avoid these dangers. For more information about the details of this vulnerability, please read the security advisory AST-2010-002, which was released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.1.16 Security advisory AST-2010-002 is available at: http://downloads.asterisk.org/pub/security/AST-2010-002.pdf The README-SERIOUSLY.bestpractices.txt document is available in the top-level directory of your Asterisk sources, or available in all Asterisk branches from 1.2 and up. http://svn.asterisk.org/svn/asterisk/trunk/README-SERIOUSLY.bestpractices.txt ----- Asterisk 1.6.1.17: The releases of Asterisk 1.6.0.25, 1.6.1.17, and 1.6.2.5 resolve an issue with invalid parsing of ACL (Access Control List) rules leading to a possible compromise in security. The issue and resolution are described in the AST-2010-003 security advisory. For more information about the details of this vulnerability, please read the security advisory AST-2010-003, which was released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.1.17 Security advisory AST-2010-003 is available at: http://downloads.asterisk.org/pub/security/AST-2010-003.pdf -----
2010-01-17Recursive PKGREVISION bump for jpeg update to 8.wiz1-1/+2
2010-01-13PR/42612 - Dima Veselov -- build problem when no options specifiedjnemeth2-3/+3
2010-01-02 Fix build problem when no options are selected. Thanks to wiz@ forjnemeth1-2/+7
noticing the problem and seb@ for help with the Makefile contortions.
2009-12-30 Update to 1.6.1.12. 1.6.1.10 and 1.6.1.12 are general bugjnemeth6-64/+76
fix releases. For more information see: http://downloads.asterisk.org/pub/telephony/asterisk/old-releases/asterisk-1.6.1.10-summary.html or http://tinyurl.com/yzyr9tt and http://downloads.asterisk.org/pub/telephony/asterisk/old-releases/asterisk-1.6.1.12-summary.html or http://tinyurl.com/yfxlyjp . 1.6.1.11 fixes AST-2009-010 which allows people to remotely crash the server. The description of the issue is: An attacker sending a valid RTP comfort noise payload containing a data length of 24 bytes or greater can remotely crash Asterisk. Commit during freeze approved by wiz@.
2009-12-15Recursive bump for libltdljoerg1-1/+2
2009-11-20 Fix three security advisories by updating to Asterisk 1.6.1.9jnemeth3-16/+16
and update PLIST for new Music On Hold files. 1.6.1.8 fixes AST-2009-007. ----- A missing ACL check for handling SIP INVITEs allows a device to make calls on networks intended to be prohibited as defined by the "deny" and "permit" lines in sip.conf. The ACL check for handling SIP registrations was not affected. ----- 1.6.1.9 fixes AST-2009-008 and AST-2009-009. ----- It is possible to determine if a peer with a specific name is configured in Asterisk by sending a specially crafted REGISTER message twice. The username that is to be checked is put in the user portion of the URI in the To header. A bogus non-matching value is put into the username portion of the Digest in the Authorization header. If the peer does exist the second REGISTER will receive a response of 403 Authentication user name does not match account name. If the peer does not exist the response will be 404 Not Found if alwaysauthreject is disabled and 401 Unauthorized if alwaysauthreject is enabled. ----- Asterisk includes a demonstration AJAX based manager interface, ajamdemo.html which uses the prototype.js framework. An issue was uncovered in this framework which could allow someone to execute a cross-site AJAX request exploit.
2009-09-14 Update to Asterisk 1.6.1.6jnemeth6-70/+69
- 1.6.1.6 fixes AST-2009-006 which is an IAX2 DOS vulnerability - 1.6.1.5 contains a variety of bug fixes: Category: Applications/app_chanspy #15660: ChanSpy "whisper" is broken in 1.4.26 Category: Applications/app_fax #15606: app_fax.c is not compiling under OpenBSD #15610: T.38 re-INVITE received after T.38 already negotiated fails Category: Applications/app_milliwatt #15386: [patch] Milliwatt() is off by -11dbm Category: Applications/app_mixmonitor #15699: [patch] using ast_free instead of mixmonitor_free Category: Applications/app_queue #14536: [patch] After a caller is processed by app_queue the queue_log logs the hangup as TRANSFER #15664: [patch] QUEUE_MEMBER_LIST() returns member names instead of Category: Applications/app_stack #15557: [patch] Gosub() dequotes once more than Macro() #15617: [patch] crash in LOCAL() if Gosub stack is allocated but empty Category: Applications/app_voicemail #15717: MWI is not sent to a SIP phone upon registration, but is after the mailbox is updated/checked #15720: opendir() return code is not checked in last_message_index() Category: Applications/app_voicemail/IMAP #14496: [patch] IMAP crash multiple callers / callers hangup at beep #14597: greetings can not be retrieved from IMAP #14950: [patch] Greetings are stored as IMAP messages even when imapgreetings=no #15729: IMAP greetings not stored in dovecot Category: CDR/General #15751: [patch] Core dump in ast_bridge_call features.c line 2772 Category: Channels/chan_agent #15668: AGENTACCEPTDTMF is incorrectly spelled as AGENTACCEPTDMTF in code to recognize channel variables. Category: Channels/chan_dahdi #15655: [patch] Dialplan starts execution before call is accepted #15727: [patch] Message Waiting Indication(MWI) is randomly generated when FXO is set to DTMF Caller ID Category: Channels/chan_misdn #12113: [patch] asterisk crash at reload chan_misdn.so Category: Channels/chan_sip/General #12869: [patch] 'context' doesn't change when 'sip reload' issued when driven from realtime #15362: [patch] log message output is truncated #15596: [patch] all codecs allowed, but textsupport=no crashes on T140RED enabled call Category: Channels/chan_sip/Registration #14366: [patch] Registration expiry not compatible with some ITSP #15539: [patch] Register request line contains wrong address when domain and registrar host differ Category: Channels/chan_sip/T.38 #15182: [patch] T.38 invite does not always comply with RFC 2327 Category: Channels/chan_sip/Video #15121: [patch] Video support in SIP channel driver appears to be totally broken Category: Core/BuildSystem #15697: most cleaner alaw don't compile #15698: [patch] If enable DEBUG_FD_LEAKS - h323 can't start. #15714: [patch] Asterisk won't build with curl unless curl_config is present Category: Core/General #14730: [patch] Fix runlevels in Debian rc files #15273: [patch] german time (20:01:00 oh clock) is announced wrong #15649: T38 Faxing failing on 1.6.1 svn #15667: LOGGER WARNING : error executing after rotate Category: Core/ManagerInterface #15397: [patch] segfault in action_coreshowchannels() at manager.c #15730: [patch] manager keeps creating /tmp/ast-ami-XXXXXX files (without deleting) when a single manager client remains logged in Category: Core/PBX #15242: [patch] log does not indicate which function is missing closing parenthesis Category: Documentation #15755: Description in queues.conf on call recording is slightly misleading Category: Functions/func_iconv #15169: When building with uClibc, configure script mistakenly assumes iconv is always available Category: General #15571: [patch] 'received' typos in trunk, in 6 files #15595: [patch] fix spelling for typos, mainly in comments. Category: PBX/pbx_dundi #15322: [patch] DUNDILOOKUP() does not accept comma as argument separator Category: Resources/General #15624: res_ais, communication ok, but wrong state send and receive. Category: Resources/res_config_ldap #13725: [patch] ERROR[7387]: res_config_ldap.c:1292 update_ldap: Couldn't modify dn:cn=1001,dc=xxx,dc=xxx because Invalid syntax #15710: Typo in LDAP schema files on line 598 Category: Resources/res_musiconhold #15051: [patch] Moh class set in the dialplan is ignored with realtime moh ---------------------------------------------------------------------- Commits Not Associated with an Issue [Back to Top] This is a list of all changes that went into this release that did not directly close an issue from the issue tracker. The commits may have been marked as being related to an issue. If that is the case, the issue numbers are listed here, as well. +------------------------------------------------------------------------+ | Revision | Author | Summary | Issues | | | | | Referenced | |----------+------------+-----------------------------------+------------| | | | Restore explicit export of | | | 209058 | kpfleming | ASTCFLAGS/ASTLDFLAGS and | | | | | underscore-variants to sub-makes. | | |----------+------------+-----------------------------------+------------| | 209237 | mmichelson | Gracefully handle malformed RTP | | | | | text packets. | | |----------+------------+-----------------------------------+------------| | 209262 | kpfleming | Make T.38 switchover in | | | | | ReceiveFAX synchronous. | | |----------+------------+-----------------------------------+------------| | 209281 | kpfleming | Cleanup T.38 negotiation changes. | | |----------+------------+-----------------------------------+------------| | 209327 | tilghman | Publish French extra sounds | | |----------+------------+-----------------------------------+------------| | | | Fix some places where | | | 209714 | russell | ast_event_type was used instead | | | | | of ast_event_ie_type. | | |----------+------------+-----------------------------------+------------| | 209781 | kpfleming | Minor changes inspired by testing | | | | | with latest GCC. | | |----------+------------+-----------------------------------+------------| | 209900 | russell | Resolve a valgrind warning about | #15396 | | | | a read from uninitialized memory. | | |----------+------------+-----------------------------------+------------| | 211115 | russell | Resolve a deadlock involving | | | | | app_chanspy and masquerades. | | |----------+------------+-----------------------------------+------------| | 211277 | tilghman | Small oops. Clear the flags which | | | | | have been checked. | | |----------+------------+-----------------------------------+------------| | 211569 | tilghman | AST-2009-005 | | |----------+------------+-----------------------------------+------------| | 211586 | tilghman | Conversion specifiers, not format | | | | | specifiers | | |----------+------------+-----------------------------------+------------| | | | Check an actual populated | | | 212069 | file | variable when seeing if we need | | | | | to do video or not. | | |----------+------------+-----------------------------------+------------| | | | Ensure that T38FaxVersion is put | | | 212115 | kpfleming | into outgoing SDP in the proper | | | | | case. | | |----------+------------+-----------------------------------+------------| | 212386 | seanbright | Handle slin16 for extra sounds as | | | | | well. | | |----------+------------+-----------------------------------+------------| | 212768 | rmudgett | Removed some deadwood and added | | | | | some doxygen comments. | | |----------+------------+-----------------------------------+------------| | | | Make the default extconfig.conf | | | 212862 | tilghman | match entries with the sample | | | | | res_mysql.conf. | | |----------+------------+-----------------------------------+------------| | 212928 | kpfleming | Convert this branch to Opsound | | | | | music-on-hold. | | |----------+------------+-----------------------------------+------------| | | | Remove some | | | 212942 | kpfleming | accidentally-committed | | | | | properties. | | |----------+------------+-----------------------------------+------------| | 213449 | twilson | Make LOAD_ORDER actually work | | |----------+------------+-----------------------------------+------------| | 213452 | twilson | Oops, committed this first. Make | | | | | the merged property happy | | |----------+------------+-----------------------------------+------------| | | | Make autoheader descriptions | | | 214365 | tilghman | render correctly in our | #14906 | | | | autoconfig.h file. | | |----------+------------+-----------------------------------+------------| | | | One more build system change, to | | | 214496 | tilghman | make the descriptions look | | | | | better, if we have better | | | | | information. | | +------------------------------------------------------------------------+
2009-08-21regen (for DIST_SUBDIR change)wiz1-10/+10
2009-08-21Change DIST_SUBDIR to avoid problems with checksum failures on the oldjnemeth1-2/+4
distfile. Requested by wiz@.
2009-08-20Digium in their infinite wisdom decided to replace the Music-On-Holdjnemeth3-14/+16
sounds files in all release tarballs of Asterisk. This is just an update for the new sound files.
2009-08-12Update to 1.6.1.4. This fixes AST-2009-005, which is a DOS problem withjnemeth2-12/+12
chan_sip.
2009-08-10Update to 1.6.1.2.jnemeth2-6/+12
pkgsrc change: restore checksums for ilbc files. This release has been made to address one or more security vulnerabilities that have been identified. A security advisory document has been published for each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues. Security Advisories: AST-2009-004