summaryrefslogtreecommitdiff
path: root/comms/asterisk18
AgeCommit message (Collapse)AuthorFilesLines
2015-04-12Update to Asterisk 1.8.32.3: this is a security fix update.jnemeth2-10/+9
The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.28, 11.6, and 13.1 and Asterisk 1.8, 11, 12, and 13. The available security releases are released as versions 1.8.28.cert-5, 1.8.32.3, 11.6-cert11, 11.17.1, 12.8.2, 13.1-cert2, and 13.3.2. The release of these versions resolves the following security vulnerability: * AST-2015-003: TLS Certificate Common name NULL byte exploit When Asterisk registers to a SIP TLS device and verifies the server, Asterisk will accept signed certificates that match a common name other than the one Asterisk is expecting if the signed certificate has a common name containing a null byte after the portion of the common name that Asterisk expected. This potentially allows for a man in the middle attack. For more information about the details of this vulnerability, please read security advisory AST-2015-003, which was released at the same time as this announcement. For a full list of changes in the current releases, please see the Change Logs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.32.3 The security advisory is available at: * http://downloads.asterisk.org/pub/security/AST-2015-003.pdf Thank you for your continued support of Asterisk!
2015-04-06Revbump after updating textproc/icuadam1-1/+2
2015-03-15NOT_FOR_PLATFORM->BROKEN_ON_PLATFORM as requested by dholland@jnemeth1-2/+2
2015-01-29Update to asterisk 1.8.32.2: this is a security fix.jnemeth3-10/+11
pkgsrc change: adapt to splitting up of speex The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available security releases are released as versions 1.8.28.cert-4, 1.8.32.2, 11.6-cert10, 11.15.1, 12.8.1, and 13.1.1. The release of these versions resolves the following security vulnerabilities: * AST-2015-001: File descriptor leak when incompatible codecs are offered Asterisk may be configured to only allow specific audio or video codecs to be used when communicating with a particular endpoint. When an endpoint sends an SDP offer that only lists codecs not allowed by Asterisk, the offer is rejected. However, in this case, RTP ports that are allocated in the process are not reclaimed. This issue only affects the PJSIP channel driver in Asterisk. Users of the chan_sip channel driver are not affected. * AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability CVE-2014-8150 reported an HTTP request injection vulnerability in libcURL. Asterisk uses libcURL in its func_curl.so module (the CURL() dialplan function), as well as its res_config_curl.so (cURL realtime backend) modules. Since Asterisk may be configured to allow for user-supplied URLs to be passed to libcURL, it is possible that an attacker could use Asterisk as an attack vector to inject unauthorized HTTP requests if the version of libcURL installed on the Asterisk server is affected by CVE-2014-8150. For more information about the details of these vulnerabilities, please read security advisory AST-2015-001 and AST-2015-002, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.32.2 http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.15.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2015-001.pdf * http://downloads.asterisk.org/pub/security/AST-2015-002.pdf Thank you for your continued support of Asterisk!
2014-12-03Update to Asterisk 1.8.32.1: this is a security fix release.jnemeth2-9/+9
The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available security releases are released as versions 1.8.28-cert3, 11.6-cert8, 1.8.32.1, 11.14.1, 12.7.1, and 13.0.1. The release of these versions resolves the following security vulnerabilities: * AST-2014-012: Unauthorized access in the presence of ACLs with mixed IP address families Many modules in Asterisk that service incoming IP traffic have ACL options ("permit" and "deny") that can be used to whitelist or blacklist address ranges. A bug has been discovered where the address family of incoming packets is only compared to the IP address family of the first entry in the list of access control rules. If the source IP address for an incoming packet is not of the same address as the first ACL entry, that packet bypasses all ACL rules. * AST-2014-018: Permission Escalation through DB dialplan function The DB dialplan function when executed from an external protocol, such as AMI, could result in a privilege escalation. Users with a lower class authorization in AMI can access the internal Asterisk database without the required SYSTEM class authorization. For more information about the details of these vulnerabilities, please read security advisories AST-2014-012, AST-2014-013, AST-2014-014, AST-2014-015, AST-2014-016, AST-2014-017, and AST-2014-018, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.32.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2014-012.pdf * http://downloads.asterisk.org/pub/security/AST-2014-018.pdf Thank you for your continued support of Asterisk!
2014-11-19Update to Asterisk 1.8.32.0: this is mostly a bug fix release.jnemeth2-9/+9
The Asterisk Development Team has announced the release of Asterisk 1.8.32.0. The release of Asterisk 1.8.32.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-24348 - Built-in editline tab complete segfault with MALLOC_DEBUG (Reported by Walter Doekes) * ASTERISK-24335 - [PATCH] Asterisk incorrectly responds 503 to INVITE retransmissions of rejected calls (Reported by Torrey Searle) * ASTERISK-23768 - [patch] Asterisk man page contains a (new) unquoted minus sign (Reported by Jeremy Lainé) * ASTERISK-24357 - [fax] Out of bounds error in update_modem_bits (Reported by Jeremy Lainé) * ASTERISK-22945 - [patch] Memory leaks in chan_sip.c with realtime peers (Reported by ibercom) * ASTERISK-24390 - astobj2: REF_DEBUG reports false leaks with ao2_callback with OBJ_MULTIPLE (Reported by Corey Farrell) * ASTERISK-24011 - [patch]safe_asterisk tries to set ulimit -n too high on linux systems with lots of RAM (Reported by Michael Myles) * ASTERISK-20784 - Failure to receive an ACK to a SIP Re-INVITE results in a SIP channel leak (Reported by NITESH BANSAL) * ASTERISK-15879 - [patch] Failure to receive an ACK to a SIP Re-INVITE results in a SIP channel leak (Reported by Torrey Searle) * ASTERISK-24406 - Some caller ID strings are parsed differently since 11.13.0 (Reported by Etienne Lessard) * ASTERISK-24325 - res_calendar_ews: cannot be used with neon 0.30 (Reported by Tzafrir Cohen) * ASTERISK-13797 - [patch] relax badshell tilde test (Reported by Tzafrir Cohen) * ASTERISK-22791 - asterisk sends Re-INVITE after receiving a BYE (Reported by Paolo Compagnini) * ASTERISK-18923 - res_fax_spandsp usage counter is wrong (Reported by Grigoriy Puzankin) * ASTERISK-24393 - rtptimeout=0 doesn't disable rtptimeout (Reported by Dmitry Melekhov) * ASTERISK-24063 - [patch]Asterisk does not respect outbound proxy when sending qualify requests (Reported by Damian Ivereigh) * ASTERISK-24425 - [patch] jabber/xmpp to use TLS instead of SSLv3, security fix POODLE (CVE-2014-3566) (Reported by abelbeck) * ASTERISK-24436 - Missing header in res/res_srtp.c when compiling against libsrtp-1.5.0 (Reported by Patrick Laimbock) * ASTERISK-21721 - SIP Failed to parse multiple Supported: headers (Reported by Olle Johansson) * ASTERISK-24190 - IMAP voicemail causes segfault (Reported by Nick Adams) * ASTERISK-24432 - Install refcounter.py when REF_DEBUG is enabled (Reported by Corey Farrell) * ASTERISK-24476 - main/app.c / app_voicemail: ast_writestream leaks (Reported by Corey Farrell) * ASTERISK-24307 - Unintentional memory retention in stringfields (Reported by Etienne Lessard) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.32.0 Thank you for your continued support of Asterisk!
2014-10-14Update Asterisk to 1.8.31.0. This is mostly a bugfix release:jnemeth3-21/+20
The Asterisk Development Team has announced the release of Asterisk 1.8.31.0. The release of Asterisk 1.8.31.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-24032 - Gentoo compilation emits warning: "_FORTIFY_SOURCE" redefined (Reported by Kilburn) * ASTERISK-24225 - Dial option z is broken (Reported by dimitripietro) * ASTERISK-24178 - [patch]fromdomainport used even if not set (Reported by Elazar Broad) * ASTERISK-24019 - When a Music On Hold stream starts it restarts at beginning of file. (Reported by Jason Richards) * ASTERISK-24211 - testsuite: Fix the dial_LS_options test (Reported by Matt Jordan) * ASTERISK-24249 - SIP debugs do not stop (Reported by Avinash Mohod) Improvements made in this release: ----------------------------------- * ASTERISK-24171 - [patch] Provide a manpage for the aelparse utility (Reported by Jeremy Lainé) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.31.0 Thank you for your continued support of Asterisk!
2014-10-07Revbump after updating libwebp and icuadam1-1/+2
2014-08-28Update to Asterisk 1.8.30.0: this is mainly a bugfix update.jnemeth2-9/+9
The Asterisk Development Team has announced the release of Asterisk 1.8.30.0. The release of Asterisk 1.8.30.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-23911 - URIENCODE/URIDECODE: WARNING about passing an empty string is a bit over zealous (Reported by Matt Jordan) * ASTERISK-23814 - No call started after peer dialed (Reported by Igor Goncharovsky) * ASTERISK-24087 - [patch]chan_sip: sip_subscribe_mwi_destroy should not call sip_destroy (Reported by Corey Farrell) * ASTERISK-23818 - PBX_Lua: after asterisk startup module is loaded, but dialplan not available (Reported by Dennis Guse) * ASTERISK-18345 - [patch] sips connection dropped by asterisk with a large INVITE (Reported by Stephane Chazelas) * ASTERISK-23508 - Memory Corruption in __ast_string_field_ptr_build_va (Reported by Arnd Schmitter) Improvements made in this release: ----------------------------------- * ASTERISK-21178 - Improve documentation for manager command Getvar, Setvar (Reported by Rusty Newton) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.30.0 Thank you for your continued support of Asterisk!
2014-07-26Update to Asterisk 1.8.29.0: this is a general bug fix release.jnemeth3-27/+36
The Asterisk Development Team has announced the release of Asterisk 1.8.29.0. The release of Asterisk 1.8.29.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-22551 - Session timer : UAS (Asterisk) starts counting at Invite, UAC starts counting at 200 OK. (Reported by i2045) * ASTERISK-23582 - [patch]Inconsistent column length in *odbc (Reported by Walter Doekes) * ASTERISK-23803 - AMI action UpdateConfig EmptyCat clears all categories but the requested one (Reported by zvision) * ASTERISK-23035 - ConfBridge with name longer than max (32 chars) results in several bridges with same conf_name (Reported by Iñaki Cívico) * ASTERISK-23683 - #includes - wildcard character in a path more than one directory deep - results in no config parsing on module reload (Reported by tootai) * ASTERISK-23827 - autoservice thread doesn't exit at shutdown (Reported by Corey Farrell) * ASTERISK-23814 - No call started after peer dialed (Reported by Igor Goncharovsky) * ASTERISK-23673 - Security: DOS by consuming the number of allowed HTTP connections. (Reported by Richard Mudgett) * ASTERISK-23246 - DEBUG messages in sdp_crypto.c display despite a DEBUG level of zero (Reported by Rusty Newton) * ASTERISK-23766 - [patch] Specify timeout for database write in SQLite (Reported by Igor Goncharovsky) * ASTERISK-23818 - PBX_Lua: after asterisk startup module is loaded, but dialplan not available (Reported by Dennis Guse) * ASTERISK-23667 - features.conf.sample is unclear as to which options can or cannot be set in the general section (Reported by David Brillert) * ASTERISK-23790 - [patch] - SIP From headers longer than 256 characters result in dropped call and 'No closing bracket' warnings. (Reported by uniken1) * ASTERISK-23908 - [patch]When using FEC error correction, asterisk tries considers negative sequence numbers as missing (Reported by Torrey Searle) * ASTERISK-23921 - refcounter.py uses excessive ram for large refs files (Reported by Corey Farrell) * ASTERISK-23948 - REF_DEBUG fails to record ao2_ref against objects that were already freed (Reported by Corey Farrell) * ASTERISK-23984 - Infinite loop possible in ast_careful_fwrite() (Reported by Steve Davies) * ASTERISK-23897 - [patch]Change in SETUP ACK handling (checking PI) in revision 413765 breaks working environments (Reported by Pavel Troller) Improvements made in this release: ----------------------------------- * ASTERISK-23564 - [patch]TLS/SRTP status of channel not currently available in a CLI command (Reported by Patrick Laimbock) * ASTERISK-23492 - Add option to safe_asterisk to disable backgrounding (Reported by Walter Doekes) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.29.0 Thank you for your continued support of Asterisk!
2014-07-02Update to Asterisk 1.8.28.2: this fixes multiple vulnerabilities andjnemeth4-31/+32
numerous general bugs. The vulnerabilities fixed are: AST-2014-001, AST-2014-002, and AST-2014-007. ----- The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.6, and Asterisk 1.8, 11, and 12. The available security releases are released as versions 1.8.15-cert7, 11.6-cert4, 1.8.28.2, 11.10.2, and 12.3.2. These releases resolve security vulnerabilities that were previously fixed in 1.8.15-cert6, 11.6-cert3, 1.8.28.1, 11.10.1, and 12.3.1. Unfortunately, the fix for AST-2014-007 inadvertently introduced a regression in Asterisk's TCP and TLS handling that prevented Asterisk from sending data over these transports. This regression and the security vulnerabilities have been fixed in the versions specified in this release announcement. The security patches for AST-2014-007 have been updated with the fix for the regression, and are available at http://downloads.asterisk.org/pub/security Please note that the release of these versions resolves the following security vulnerabilities: * AST-2014-007: Denial of Service via Exhaustion of Allowed Concurrent HTTP Connections For more information about the details of these vulnerabilities, please read security advisories AST-2014-005, AST-2014-006, AST-2014-007, and AST-2014-008, which were released with the previous versions that addressed these vulnerabilities. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.28.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2014-007.pdf Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.6, and Asterisk 1.8, 11, and 12. The available security releases are released as versions 1.8.15-cert6, 11.6-cert3, 1.8.28.1, 11.10.1, and 12.3.1. These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases The release of these versions resolves the following issue: * AST-2014-007: Denial of Service via Exhaustion of Allowed Concurrent HTTP Connections Establishing a TCP or TLS connection to the configured HTTP or HTTPS port respectively in http.conf and then not sending or completing a HTTP request will tie up a HTTP session. By doing this repeatedly until the maximum number of open HTTP sessions is reached, legitimate requests are blocked. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2014-005, AST-2014-006, AST-2014-007, and AST-2014-008, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.28.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2014-007.pdf Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced the release of Asterisk 1.8.28.0. The release of Asterisk 1.8.28.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-23547 - [patch] app_queue removing callers from queue when reloading (Reported by Italo Rossi) * ASTERISK-22846 - testsuite: masquerade super test fails on all branches (still) (Reported by Matt Jordan) * ASTERISK-23546 - CB_ADD_LEN does not do what you'd think (Reported by Walter Doekes) * ASTERISK-23620 - Code path in app_stack fails to unlock list (Reported by Bradley Watkins) * ASTERISK-18331 - app_sms failure (Reported by David Woodhouse) * ASTERISK-19465 - P-Asserted-Identity Privacy (Reported by Krzysztof Chmielewski) * ASTERISK-23707 - Realtime Contacts: Apparent mismatch between PGSQL database state and Asterisk state (Reported by Mark Michelson) * ASTERISK-23665 - Wrong mime type for codec H263-1998 (h263+) (Reported by Guillaume Maudoux) * ASTERISK-22977 - chan_sip+CEL: missing ANSWER and PICKUP event for INVITE/w/replaces pickup (Reported by Walter Doekes) * ASTERISK-23709 - Regression in Dahdi/Analog/waitfordialtone (Reported by Steve Davies) * ASTERISK-23650 - Intermittent segfault in string functions (Reported by Roel van Meer) Improvements made in this release: ----------------------------------- * ASTERISK-23754 - [patch] Use var/lib directory for log file configured in asterisk.conf (Reported by Igor Goncharovsky) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.28.0 Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced the release of Asterisk 1.8.27.0. The release of Asterisk 1.8.27.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-22790 - check_modem_rate() may return incorrect rate for V.27 (Reported by Paolo Compagnini) * ASTERISK-23061 - [Patch] 'textsupport' setting not mentioned in sip.conf.sample (Reported by Eugene) * ASTERISK-23028 - [patch] Asterisk man pages contains unquoted minus signs (Reported by Jeremy Lainé) * ASTERISK-23046 - Custom CDR fields set during a GoSUB called from app_queue are not inserted (Reported by Denis Pantsyrev) * ASTERISK-23027 - [patch] Spelling typo "transfered" instead of "transferred" (Reported by Jeremy Lainé) * ASTERISK-23008 - Local channels loose CALLERID name when DAHDI channel connects (Reported by Michael Cargile) * ASTERISK-23100 - [patch] In chan_mgcp the ident in transmitted request and request queue may differ - fix for locking (Reported by adomjan) * ASTERISK-22988 - [patch]T38 , SIP 488 after Rejecting image media offer due to invalid or unsupported syntax (Reported by adomjan) * ASTERISK-22861 - [patch]Specifying a null time as parameter to GotoIfTime or ExecIfTime causes segmentation fault (Reported by Sebastian Murray-Roberts) * ASTERISK-17837 - extconfig.conf - Maximum Include level (1) exceeded (Reported by pz) * ASTERISK-22662 - Documentation fix? - queues.conf says persistentmembers defaults to yes, it appears to lie (Reported by Rusty Newton) * ASTERISK-23134 - [patch] res_rtp_asterisk port selection cannot handle selinux port restrictions (Reported by Corey Farrell) * ASTERISK-23220 - STACK_PEEK function with no arguments causes crash/core dump (Reported by James Sharp) * ASTERISK-19773 - Asterisk crash on issuing Asterisk-CLI 'reload' command multiple times on cli_aliases (Reported by Joel Vandal) * ASTERISK-22757 - segfault in res_clialiases.so on reload when mapping "module reload" command (Reported by Gareth Blades) * ASTERISK-17727 - [patch] TLS doesn't get all certificate chain (Reported by LN) * ASTERISK-23178 - devicestate.h: device state setting functions are documented with the wrong return values (Reported by Jonathan Rose) * ASTERISK-23297 - Asterisk 12, pbx_config.so segfaults if res_parking.so is not loaded, or if res_parking.conf has no configuration (Reported by CJ Oster) * ASTERISK-23069 - Custom CDR variable not recorded when set in macro called from app_queue (Reported by Bryan Anderson) * ASTERISK-19499 - ConfBridge MOH is not working for transferee after attended transfer (Reported by Timo Teräs) * ASTERISK-23261 - [patch]Output mixup in ${CHANNEL(rtpqos,audio,all)} (Reported by rsw686) * ASTERISK-23260 - [patch]ForkCDR v option does not keep CDR variables for subsequent records (Reported by zvision) * ASTERISK-23141 - Asterisk crashes on Dial(), in pbx_find_extension at pbx.c (Reported by Maxim) * ASTERISK-23231 - Since 405693 If we have res_fax.conf file set to minrate=2400, then res_fax refuse to load (Reported by David Brillert) * ASTERISK-23135 - Crash - segfault in ast_channel_hangupcause_set - probably introduced in 11.7.0 (Reported by OK) * ASTERISK-23323 - [patch]chan_sip: missing p->owner checks in handle_response_invite (Reported by Walter Doekes) * ASTERISK-23382 - [patch]Build System: make -qp can corrupt menuselect-tree and related files (Reported by Corey Farrell) * ASTERISK-23406 - [patch]Fix typo in "sip show peer" (Reported by ibercom) * ASTERISK-23310 - bridged channel crashes in bridge_p2p_rtp_write (Reported by Jeremy Lainé) * ASTERISK-23104 - Specifying the SetVar AMI without a Channel cause Asterisk to crash (Reported by Joel Vandal) * ASTERISK-23383 - Wrong sense test on stat return code causes unchanged config check to break with include files. (Reported by David Woolley) * ASTERISK-17523 - Qualify for static realtime peers does not work (Reported by Maciej Krajewski) * ASTERISK-21406 - [patch] chan_sip deadlock on monlock between unload_module and do_monitor (Reported by Corey Farrell) * ASTERISK-23373 - [patch]Security: Open FD exhaustion with chan_sip Session-Timers (Reported by Corey Farrell) * ASTERISK-23340 - Security Vulnerability: stack allocation of cookie headers in loop allows for unauthenticated remote denial of service attack (Reported by Matt Jordan) * ASTERISK-23488 - Logic error in callerid checksum processing (Reported by Russ Meyerriecks) * ASTERISK-20841 - fromdomain not honored on outbound INVITE request (Reported by Kelly Goedert) * ASTERISK-22079 - Segfault: INTERNAL_OBJ (user_data=0x6374652f) at astobj2.c:120 (Reported by Jamuel Starkey) * ASTERISK-23509 - [patch]SayNumber for Polish language tries to play empty files for numbers divisible by 100 (Reported by zvision) * ASTERISK-23391 - Audit dialplan function usage of channel variable (Reported by Corey Farrell) * ASTERISK-23548 - POST to ARI sometimes returns no body on success (Reported by Scott Griepentrog) Improvements made in this release: ----------------------------------- * ASTERISK-22980 - [patch]Allow building cdr_radius and cel_radius against libfreeradius-client (Reported by Jeremy Lainé) * ASTERISK-22661 - Unable to exit ChanSpy if spied channel does not have a call in progress (Reported by Chris Hillman) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.27.0 Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.6, and Asterisk 1.8, 11, and 12. The available security releases are released as versions 1.8.15-cert5, 11.6-cert2, 1.8.26.1, 11.8.1, and 12.1.1. The release of these versions resolve the following issues: * AST-2014-001: Stack overflow in HTTP processing of Cookie headers. Sending a HTTP request that is handled by Asterisk with a large number of Cookie headers could overflow the stack. Another vulnerability along similar lines is any HTTP request with a ridiculous number of headers in the request could exhaust system memory. * AST-2014-002: chan_sip: Exit early on bad session timers request This change allows chan_sip to avoid creation of the channel and consumption of associated file descriptors altogether if the inbound request is going to be rejected anyway. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2014-001, AST-2014-002, AST-2014-003, and AST-2014-004, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.26.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2014-001.pdf * http://downloads.asterisk.org/pub/security/AST-2014-002.pdf Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced the release of Asterisk 1.8.26.0. This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk The release of Asterisk 1.8.26.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-22544 - Italian prompt vm-options has advertisement in it (Reported by Rusty Newton) * ASTERISK-12117 - chan_sip creates a new local tag (from-tag) for every register message (Reported by Pawel Pierscionek) * ASTERISK-20862 - Asterisk min and max member penalties not honored when set with 0 (Reported by Schmooze Com) * ASTERISK-22746 - [patch]Crash in chan_dahdi during caller id read (Reported by Michael Walton) * ASTERISK-22788 - [patch] main/translate.c: access to variable f after free in ast_translate() (Reported by Corey Farrell) * ASTERISK-21242 - Segfault when T.38 re-invite retransmission receives 200 OK (Reported by Ashley Winters) * ASTERISK-22590 - BufferOverflow in unpacksms16() when receiving 16 bit multipart SMS with app_sms (Reported by Jan Juergens) * ASTERISK-22905 - Prevent Asterisk functions that are 'dangerous' from being executed from external interfaces (Reported by Matt Jordan) * ASTERISK-23021 - Typos in code : "avaliable" instead of "available" (Reported by Jeremy Lainé) * ASTERISK-22970 - [patch]Documentation fix for QUOTE() (Reported by Gareth Palmer) * ASTERISK-22856 - [patch]SayUnixTime in polish reads minutes instead of seconds (Reported by Robert Mordec) * ASTERISK-22854 - [patch] - Deadlock between cel_pgsql unload and core_event_dispatcher taskprocessor thread (Reported by Etienne Lessard) * ASTERISK-22910 - [patch] - REPLACE() calls strcpy on overlapping memory when <replace-char> is empty (Reported by Gareth Palmer) * ASTERISK-22871 - cel_pgsql module not loading after "reload" or "reload cel_pgsql.so" command (Reported by Matteo) * ASTERISK-23084 - [patch]rasterisk needlessly prints the AST-2013-007 warning (Reported by Tzafrir Cohen) * ASTERISK-17138 - [patch] Asterisk not re-registering after it receives "Forbidden - wrong password on authentication" (Reported by Rudi) * ASTERISK-23011 - [patch]configure.ac and pbx_lua don't support lua 5.2 (Reported by George Joseph) * ASTERISK-22834 - Parking by blind transfer when lot full orphans channels (Reported by rsw686) * ASTERISK-23047 - Orphaned (stuck) channel occurs during a failed SIP transfer to parking space (Reported by Tommy Thompson) * ASTERISK-22946 - Local From tag regression with sipgate.de (Reported by Stephan Eisvogel) * ASTERISK-23010 - No BYE message sent when sip INVITE is received (Reported by Ryan Tilton) Improvements made in this release: ----------------------------------- * ASTERISK-22659 - Make a new core and extra sounds release (Reported by Rusty Newton) * ASTERISK-22918 - dahdi show channels slices PRI channel dnid on output (Reported by outtolunc) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.26.0 Thank you for your continued support of Asterisk!
2014-05-29Bump for perl-5.20.0.wiz1-2/+2
Do it for all packages that * mention perl, or * have a directory name starting with p5-*, or * depend on a package starting with p5- like last time, for 5.18, where this didn't lead to complaints. Let me know if you have any this time.
2014-05-05Recursive revbump from x11/pixmanryoon1-2/+2
Fix PR pkg/48777
2014-04-09recursive bump from icu shlib major bump.obache1-2/+2
2014-03-11Remove example rc.d scripts from PLISTs.jperkin1-2/+1
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or ignored otherwise.
2014-02-12Recursive PKGREVISION bump for OpenSSL API version bump.tron1-1/+2
2014-01-07Update to Asterisk 1.8.25.0: this is a minor bug fix updatejnemeth2-9/+9
The Asterisk Development Team has announced the release of Asterisk 1.8.25.0. The release of Asterisk 1.8.25.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- chan_sip: Fix an issue where an incompatible audio format may be added to SDP. * --- cdr_adaptive_odbc: Also apply a filter when the CDR value is empty. * --- app_queue: Fix Queuelog EXITWITHKEY only logging two of four fields * --- chan_sip: Do not increment the SDP version between 183 and 200 responses. * --- chan_sip: Fix Realtime Peer Update Problem When Un-registering And Expires Header In 200ok For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.25.0 Thank you for your continued support of Asterisk!
2013-12-17Update to Asterisk 1.8.24.1: this is a security update that fixesjnemeth2-9/+9
AST-2013-006 and AST-2013-007. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert4, 11.2-cert3, 1.8.24.1, 10.12.4, 10.12.4-digiumphones, and 11.6.1. The release of these versions resolve the following issues: * A buffer overflow when receiving odd length 16 bit messages in app_sms. An infinite loop could occur which would overwrite memory when a message is received into the unpacksms16() function and the length of the message is an odd number of bytes. * Prevent permissions escalation in the Asterisk Manager Interface. Asterisk now marks certain individual dialplan functions as 'dangerous', which will inhibit their execution from external sources. A 'dangerous' function is one which results in a privilege escalation. For example, if one were to read the channel variable SHELL(rm -rf /) Bad Things(TM) could happen; even if the external source has only read permissions. Execution from external sources may be enabled by setting 'live_dangerously' to 'yes' in the [options] section of asterisk.conf. Although doing so is not recommended. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-006 and AST-2013-007, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.24.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-006.pdf * http://downloads.asterisk.org/pub/security/AST-2013-007.pdf Thank you for your continued support of Asterisk!
2013-10-26Update to Asterisk 1.8.24.0: this is a general bugfix release:jnemeth2-10/+9
The Asterisk Development Team has announced the release of Asterisk 1.8.24.0. The release of Asterisk 1.8.24.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix a longstanding issue with MFC-R2 configuration that prevented users * --- Fix Not Storing Current Incoming Recv Address * --- Fix Segfault When Syntax Of A Line Under [applicationmap] Is Invalid * --- Tolerate presence of RFC2965 Cookie2 header by ignoring it For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.24.0 Thank you for your continued support of Asterisk!
2013-10-19Revbump after updating textproc/icuadam1-2/+2
2013-10-10Recursive revbump from pango-1.36.0ryoon1-2/+2
2013-09-02Revbump after cairo updateadam1-1/+2
2013-08-29Update to Asterisk 1.8.23.1: this is a security fix release to fixjnemeth2-9/+9
AST-2013-004 and AST-2013-005. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security rele ases are released as versions 1.8.15-cert2, 11.2-cert2, 1.8.23.1, 10.12.3, 10.12.3-di giumphones, and 11.5.1. The release of these versions resolve the following issues: * A remotely exploitable crash vulnerability exists in the SIP channel driver if an ACK with SDP is received after the channel has been terminated. The handling code incorrectly assumes that the channel will always be present. * A remotely exploitable crash vulnerability exists in the SIP channel driver if an invalid SDP is sent in a SIP request that defines media descriptions before connection information. The handling code incorrectly attempts to reference the socket address information even though that information has not yet been set. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-004 and AST-2013-005, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.23.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-004.pdf * http://downloads.asterisk.org/pub/security/AST-2013-005.pdf Thank you for your continued support of Asterisk!
2013-07-21Update to Asterisk 1.8.23.0: this is a bugfix releasejnemeth3-17/+22
pkgsrc changes: - add work around for NetBSD's incompatible implementation of IP_PKTINFO - core sounds package was updated to 1.4.24 The Asterisk Development Team has announced the release of Asterisk 1.8.23.0. The release of Asterisk 1.8.23.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix a memory copying bug in slinfactory which was causing mixmonitor issues. * --- IAX2: fix race condition with nativebridge transfers. * --- Fix crash in chan_sip when a core initiated op occurs at the same time as a BYE * --- Fix The Payload Being Set On CN Packets And Do Not Set Marker Bit * --- chan_sip: Session-Expires: Set timer to correctly expire at (~2/3) of the interval when not the refresher For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.23.0 Thank you for your continued support of Asterisk!
2013-07-12Bump PKGREVISION of all packages which create users, to pick up change ofjperkin1-2/+2
sysutils/user_* packages.
2013-06-16Asterisk is known to fail on 32-bit systems, specifically i386. Mark itjnemeth1-1/+4
as such until the bug is found and fixed.
2013-06-15- fix compile issue when newlocale support is detected, from joerg@jnemeth6-18/+142
2013-06-06Bump PKGREVISION for libXft changes for NetBSD native X support onwiz1-2/+2
NetBSD 6, requested by tron.
2013-06-04Try to fix the fallout caused by the fix for PR pkg/47882. Part 3:tron1-2/+2
Recursively bump package revisions again after the "freetype2" and "fontconfig" handling was fixed.
2013-06-03Bump freetype2 and fontconfig dependencies to current pkgsrc versions,wiz1-2/+2
to address issues with NetBSD-6(and earlier)'s fontconfig not being new enough for pango. While doing that, also bump freetype2 dependency to current pkgsrc version. Suggested by tron in PR 47882
2013-05-31Bump all packages for perl-5.18, thatwiz1-1/+2
a) refer 'perl' in their Makefile, or b) have a directory name of p5-*, or c) have any dependency on any p5-* package Like last time, where this caused no complaints.
2013-05-18Update to Asterisk 1.8.22.0: this is a bug fix update.jnemeth3-24/+11
The Asterisk Development Team has announced the release of Asterisk 1.8.22.0. The release of Asterisk 1.8.22.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix Sorting Order For Parking Lots Stored In Static Realtime * --- Make ParkAndAnnounce return to priority + 1 when return context is not defined * --- When a session timer expires during a T.38 call, re-invite with correct SDP * --- Fix several unreleased mutex locks that cause problem with processing calls * --- Fix crash when AMI redirect action redirects two channels out of a bridge. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.22.0 Thank you for your continued support of Asterisk!
2013-05-09Massive revbump after updating graphics/ilmbase, graphics/openexr, textproc/icu.adam1-1/+2
2013-04-18Update to Asterisk 1.8.21.0: this is a bug fix updatejnemeth5-50/+169
The Asterisk Development Team has announced the release of Asterisk 1.8.21.0. The release of Asterisk 1.8.21.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix issue where chan_mobile fails to bind to first available port * --- Fix station ringback; trunk hangup issues in SLA * --- Fix Queue Log Reporting Every Call COMPLETECALLER With "h" Extension Present * --- Fix Record-Route parsing for large headers. * --- Fix AMI redirect action with two channels failing to redirect both channels. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.21.0 Thank you for your continued support of Asterisk!
2013-04-10Update to Asterisk 1.2.20.2: this is a security update which fixesjnemeth2-10/+9
AST-2013-001, AST-2013-002, and AST-2013-003. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert2, 1.8.20.2, 10.12.2, 10.12.2-digiumphones, and 11.2.2. The release of these versions resolve the following issues: * A denial of service exists in Asterisk's HTTP server. AST-2012-014, fixed in January of this year, contained a fix for Asterisk's HTTP server for a remotely-triggered crash. While the fix prevented the crash from being triggered, a denial of service vector still exists with that solution if an attacker sends one or more HTTP POST requests with very large Content-Length values. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 * A potential username disclosure exists in the SIP channel driver. When authenticating a SIP request with alwaysauthreject enabled, allowguest disabled, and autocreatepeer disabled, Asterisk discloses whether a user exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-001, AST-2013-002, and AST-2013-003, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.20.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-001.pdf * http://downloads.asterisk.org/pub/security/AST-2013-002.pdf * http://downloads.asterisk.org/pub/security/AST-2013-003.pdf Thank you for your continued support of Asterisk!
2013-04-07Revert: these packages are marked OWNER= for a reason!jnemeth1-3/+2
pkglint warnings aren't gospel! They need to be verified in an intelligent manner. After variable substitution, the lines will be shorter then 80 characters, thus there was no need to shorten them.
2013-04-06"Line too long (should be no more than 80 characters)."rodent1-2/+3
2013-02-16Recursive bump for png-1.6.wiz1-1/+2
2013-02-07Update to Asterisk 1.8.20.1: this is a minor bugfix releasejnemeth2-10/+9
----- 1.8.20.1 The Asterisk Development Team has announced the release of Asterisk 1.8.20.1. The release of Asterisk 1.8.20.1 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: * --- Fix astcanary startup problem due to wrong pid value from before daemon call * --- Update init.d scripts to handle stderr; readd splash screen for remote consoles * --- Reset RTP timestamp; sequence number on SSRC change For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.20.1 Thank you for your continued support of Asterisk! ----- 1.8.20.0 The Asterisk Development Team has announced the release of Asterisk 1.8.20.0. The release of Asterisk 1.8.20.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- app_meetme: Fix channels lingering when hung up under certain conditions * --- Fix stuck DTMF when bridge is broken. * --- Improve Code Readability And Fix Setting natdetected Flag * --- Fix extension matching with the '-' char. * --- Fix call files when astspooldir is relative. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.20.0 Thank you for your continued support of Asterisk!
2013-02-06PKGREVISION bumps for the security/openssl 1.0.1d update.jperkin1-2/+2
2013-01-26Revbump after graphics/jpeg and textproc/icuadam1-1/+2
2013-01-03de to Asterisk 1.8.19.1; this is a security fix to fix AST-2012-14jnemeth2-10/+9
and AST-2012-015. Approved for commit during freeze by: agc The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones, and 11.1.1. The release of these versions resolve the following two issues: * Stack overflows that occur in some portions of Asterisk that manage a TCP connection. In SIP, this is exploitable via a remote unauthenticated session; in XMPP and HTTP connections, this is exploitable via remote authenticated sessions. * A denial of service vulnerability through exploitation of the device state cache. Anonymous calls had the capability to create devices in Asterisk that would never be disposed of. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-014 and AST-2012-015, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf Thank you for your continued support of Asterisk!
2012-12-16recursive bump from cyrus-sasl libsasl2 shlib major bump.obache1-1/+2
2012-12-14Update to Asterisk 1.8.19.0: this is a bugfix release.jnemeth3-32/+9
----- 1.8.19.0: The Asterisk Development Team has announced the release of Asterisk 1.8.19.0. The release of Asterisk 1.8.19.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Prevent resetting of NATted realtime peer address on reload. * --- Do not use a FILE handle when doing SIP TCP reads. * --- Fix execution of 'i' extension due to uninitialized variable. * --- Ensure that the Queue application tracks busy members in off nominal situations * --- Properly extract the Body information of an EWS calendar item For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.19.0 Thank you for your continued support of Asterisk! ----- 1.8.18.1: The Asterisk Development Team has announced the release of Asterisk 1.8.18.1. The release of Asterisk 1.8.18.1 resolves an issue reported by the community and would have not been possible without your participation. Thank you! The following is the issue resolved in this release: * --- chan_local: Fix local_pvt ref leak in local_devicestate(). For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.18.1 Thank you for your continued support of Asterisk!
2012-11-11 Update to Asterisk 1.8.18.0: this is a bug fix release:jnemeth2-9/+9
The Asterisk Development Team has announced the release of Asterisk 1.8.18.0. The release of Asterisk 1.8.18.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- dsp.c User Configurable DTMF_HITS_TO_BEGIN and DTMF_MISSES_TO_END * --- Fix error where improper IMAP greetings would be deleted. * --- iax2-provision: Fix improper return on failed cache retrieval * --- Fix T.38 support when used with chan_local in between. * --- Fix an issue where media would not flow for situations where the legacy STUN code is in use. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.18.0 Thank you for your continued support of Asterisk!
2012-10-08update to Asterisk 1.8.17.0: this is a bugfix release:jnemeth4-44/+43
The Asterisk Development Team has announced the release of Asterisk 1.8.17.0. The release of Asterisk 1.8.17.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix channel reference leak in ChanSpy. * --- dsp.c: Fix multiple issues when no-interdigit delay is present, and fast DTMF 50ms/50ms * --- Fix bug where final queue member would not be removed from memory. * --- Fix memory leak when CEL is successfully written to PostgreSQL database * --- Fix DUNDi message routing bug when neighboring peer is unreachable For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.17.0 Thank you for your continued support of Asterisk!
2012-10-08Revbump after updating graphics/pangoadam1-2/+2
2012-10-03Bump all packages that use perl, or depend on a p5-* package, orwiz1-2/+2
are called p5-*. I hope that's all of them.
2012-10-03Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.asau1-3/+1
2012-10-02Mass recursive bump after the dependence fix of the "cairo" packagetron1-2/+2
requested by Thomas Klausner.