summaryrefslogtreecommitdiff
path: root/comms
AgeCommit message (Collapse)AuthorFilesLines
2014-07-02Update to Asterisk 1.8.28.2: this fixes multiple vulnerabilities andjnemeth4-31/+32
numerous general bugs. The vulnerabilities fixed are: AST-2014-001, AST-2014-002, and AST-2014-007. ----- The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.6, and Asterisk 1.8, 11, and 12. The available security releases are released as versions 1.8.15-cert7, 11.6-cert4, 1.8.28.2, 11.10.2, and 12.3.2. These releases resolve security vulnerabilities that were previously fixed in 1.8.15-cert6, 11.6-cert3, 1.8.28.1, 11.10.1, and 12.3.1. Unfortunately, the fix for AST-2014-007 inadvertently introduced a regression in Asterisk's TCP and TLS handling that prevented Asterisk from sending data over these transports. This regression and the security vulnerabilities have been fixed in the versions specified in this release announcement. The security patches for AST-2014-007 have been updated with the fix for the regression, and are available at http://downloads.asterisk.org/pub/security Please note that the release of these versions resolves the following security vulnerabilities: * AST-2014-007: Denial of Service via Exhaustion of Allowed Concurrent HTTP Connections For more information about the details of these vulnerabilities, please read security advisories AST-2014-005, AST-2014-006, AST-2014-007, and AST-2014-008, which were released with the previous versions that addressed these vulnerabilities. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.28.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2014-007.pdf Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.6, and Asterisk 1.8, 11, and 12. The available security releases are released as versions 1.8.15-cert6, 11.6-cert3, 1.8.28.1, 11.10.1, and 12.3.1. These releases are available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk/releases The release of these versions resolves the following issue: * AST-2014-007: Denial of Service via Exhaustion of Allowed Concurrent HTTP Connections Establishing a TCP or TLS connection to the configured HTTP or HTTPS port respectively in http.conf and then not sending or completing a HTTP request will tie up a HTTP session. By doing this repeatedly until the maximum number of open HTTP sessions is reached, legitimate requests are blocked. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2014-005, AST-2014-006, AST-2014-007, and AST-2014-008, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.28.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2014-007.pdf Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced the release of Asterisk 1.8.28.0. The release of Asterisk 1.8.28.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-23547 - [patch] app_queue removing callers from queue when reloading (Reported by Italo Rossi) * ASTERISK-22846 - testsuite: masquerade super test fails on all branches (still) (Reported by Matt Jordan) * ASTERISK-23546 - CB_ADD_LEN does not do what you'd think (Reported by Walter Doekes) * ASTERISK-23620 - Code path in app_stack fails to unlock list (Reported by Bradley Watkins) * ASTERISK-18331 - app_sms failure (Reported by David Woodhouse) * ASTERISK-19465 - P-Asserted-Identity Privacy (Reported by Krzysztof Chmielewski) * ASTERISK-23707 - Realtime Contacts: Apparent mismatch between PGSQL database state and Asterisk state (Reported by Mark Michelson) * ASTERISK-23665 - Wrong mime type for codec H263-1998 (h263+) (Reported by Guillaume Maudoux) * ASTERISK-22977 - chan_sip+CEL: missing ANSWER and PICKUP event for INVITE/w/replaces pickup (Reported by Walter Doekes) * ASTERISK-23709 - Regression in Dahdi/Analog/waitfordialtone (Reported by Steve Davies) * ASTERISK-23650 - Intermittent segfault in string functions (Reported by Roel van Meer) Improvements made in this release: ----------------------------------- * ASTERISK-23754 - [patch] Use var/lib directory for log file configured in asterisk.conf (Reported by Igor Goncharovsky) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.28.0 Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced the release of Asterisk 1.8.27.0. The release of Asterisk 1.8.27.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-22790 - check_modem_rate() may return incorrect rate for V.27 (Reported by Paolo Compagnini) * ASTERISK-23061 - [Patch] 'textsupport' setting not mentioned in sip.conf.sample (Reported by Eugene) * ASTERISK-23028 - [patch] Asterisk man pages contains unquoted minus signs (Reported by Jeremy Lainé) * ASTERISK-23046 - Custom CDR fields set during a GoSUB called from app_queue are not inserted (Reported by Denis Pantsyrev) * ASTERISK-23027 - [patch] Spelling typo "transfered" instead of "transferred" (Reported by Jeremy Lainé) * ASTERISK-23008 - Local channels loose CALLERID name when DAHDI channel connects (Reported by Michael Cargile) * ASTERISK-23100 - [patch] In chan_mgcp the ident in transmitted request and request queue may differ - fix for locking (Reported by adomjan) * ASTERISK-22988 - [patch]T38 , SIP 488 after Rejecting image media offer due to invalid or unsupported syntax (Reported by adomjan) * ASTERISK-22861 - [patch]Specifying a null time as parameter to GotoIfTime or ExecIfTime causes segmentation fault (Reported by Sebastian Murray-Roberts) * ASTERISK-17837 - extconfig.conf - Maximum Include level (1) exceeded (Reported by pz) * ASTERISK-22662 - Documentation fix? - queues.conf says persistentmembers defaults to yes, it appears to lie (Reported by Rusty Newton) * ASTERISK-23134 - [patch] res_rtp_asterisk port selection cannot handle selinux port restrictions (Reported by Corey Farrell) * ASTERISK-23220 - STACK_PEEK function with no arguments causes crash/core dump (Reported by James Sharp) * ASTERISK-19773 - Asterisk crash on issuing Asterisk-CLI 'reload' command multiple times on cli_aliases (Reported by Joel Vandal) * ASTERISK-22757 - segfault in res_clialiases.so on reload when mapping "module reload" command (Reported by Gareth Blades) * ASTERISK-17727 - [patch] TLS doesn't get all certificate chain (Reported by LN) * ASTERISK-23178 - devicestate.h: device state setting functions are documented with the wrong return values (Reported by Jonathan Rose) * ASTERISK-23297 - Asterisk 12, pbx_config.so segfaults if res_parking.so is not loaded, or if res_parking.conf has no configuration (Reported by CJ Oster) * ASTERISK-23069 - Custom CDR variable not recorded when set in macro called from app_queue (Reported by Bryan Anderson) * ASTERISK-19499 - ConfBridge MOH is not working for transferee after attended transfer (Reported by Timo Teräs) * ASTERISK-23261 - [patch]Output mixup in ${CHANNEL(rtpqos,audio,all)} (Reported by rsw686) * ASTERISK-23260 - [patch]ForkCDR v option does not keep CDR variables for subsequent records (Reported by zvision) * ASTERISK-23141 - Asterisk crashes on Dial(), in pbx_find_extension at pbx.c (Reported by Maxim) * ASTERISK-23231 - Since 405693 If we have res_fax.conf file set to minrate=2400, then res_fax refuse to load (Reported by David Brillert) * ASTERISK-23135 - Crash - segfault in ast_channel_hangupcause_set - probably introduced in 11.7.0 (Reported by OK) * ASTERISK-23323 - [patch]chan_sip: missing p->owner checks in handle_response_invite (Reported by Walter Doekes) * ASTERISK-23382 - [patch]Build System: make -qp can corrupt menuselect-tree and related files (Reported by Corey Farrell) * ASTERISK-23406 - [patch]Fix typo in "sip show peer" (Reported by ibercom) * ASTERISK-23310 - bridged channel crashes in bridge_p2p_rtp_write (Reported by Jeremy Lainé) * ASTERISK-23104 - Specifying the SetVar AMI without a Channel cause Asterisk to crash (Reported by Joel Vandal) * ASTERISK-23383 - Wrong sense test on stat return code causes unchanged config check to break with include files. (Reported by David Woolley) * ASTERISK-17523 - Qualify for static realtime peers does not work (Reported by Maciej Krajewski) * ASTERISK-21406 - [patch] chan_sip deadlock on monlock between unload_module and do_monitor (Reported by Corey Farrell) * ASTERISK-23373 - [patch]Security: Open FD exhaustion with chan_sip Session-Timers (Reported by Corey Farrell) * ASTERISK-23340 - Security Vulnerability: stack allocation of cookie headers in loop allows for unauthenticated remote denial of service attack (Reported by Matt Jordan) * ASTERISK-23488 - Logic error in callerid checksum processing (Reported by Russ Meyerriecks) * ASTERISK-20841 - fromdomain not honored on outbound INVITE request (Reported by Kelly Goedert) * ASTERISK-22079 - Segfault: INTERNAL_OBJ (user_data=0x6374652f) at astobj2.c:120 (Reported by Jamuel Starkey) * ASTERISK-23509 - [patch]SayNumber for Polish language tries to play empty files for numbers divisible by 100 (Reported by zvision) * ASTERISK-23391 - Audit dialplan function usage of channel variable (Reported by Corey Farrell) * ASTERISK-23548 - POST to ARI sometimes returns no body on success (Reported by Scott Griepentrog) Improvements made in this release: ----------------------------------- * ASTERISK-22980 - [patch]Allow building cdr_radius and cel_radius against libfreeradius-client (Reported by Jeremy Lainé) * ASTERISK-22661 - Unable to exit ChanSpy if spied channel does not have a call in progress (Reported by Chris Hillman) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.27.0 Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.6, and Asterisk 1.8, 11, and 12. The available security releases are released as versions 1.8.15-cert5, 11.6-cert2, 1.8.26.1, 11.8.1, and 12.1.1. The release of these versions resolve the following issues: * AST-2014-001: Stack overflow in HTTP processing of Cookie headers. Sending a HTTP request that is handled by Asterisk with a large number of Cookie headers could overflow the stack. Another vulnerability along similar lines is any HTTP request with a ridiculous number of headers in the request could exhaust system memory. * AST-2014-002: chan_sip: Exit early on bad session timers request This change allows chan_sip to avoid creation of the channel and consumption of associated file descriptors altogether if the inbound request is going to be rejected anyway. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2014-001, AST-2014-002, AST-2014-003, and AST-2014-004, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.26.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2014-001.pdf * http://downloads.asterisk.org/pub/security/AST-2014-002.pdf Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced the release of Asterisk 1.8.26.0. This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk The release of Asterisk 1.8.26.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-22544 - Italian prompt vm-options has advertisement in it (Reported by Rusty Newton) * ASTERISK-12117 - chan_sip creates a new local tag (from-tag) for every register message (Reported by Pawel Pierscionek) * ASTERISK-20862 - Asterisk min and max member penalties not honored when set with 0 (Reported by Schmooze Com) * ASTERISK-22746 - [patch]Crash in chan_dahdi during caller id read (Reported by Michael Walton) * ASTERISK-22788 - [patch] main/translate.c: access to variable f after free in ast_translate() (Reported by Corey Farrell) * ASTERISK-21242 - Segfault when T.38 re-invite retransmission receives 200 OK (Reported by Ashley Winters) * ASTERISK-22590 - BufferOverflow in unpacksms16() when receiving 16 bit multipart SMS with app_sms (Reported by Jan Juergens) * ASTERISK-22905 - Prevent Asterisk functions that are 'dangerous' from being executed from external interfaces (Reported by Matt Jordan) * ASTERISK-23021 - Typos in code : "avaliable" instead of "available" (Reported by Jeremy Lainé) * ASTERISK-22970 - [patch]Documentation fix for QUOTE() (Reported by Gareth Palmer) * ASTERISK-22856 - [patch]SayUnixTime in polish reads minutes instead of seconds (Reported by Robert Mordec) * ASTERISK-22854 - [patch] - Deadlock between cel_pgsql unload and core_event_dispatcher taskprocessor thread (Reported by Etienne Lessard) * ASTERISK-22910 - [patch] - REPLACE() calls strcpy on overlapping memory when <replace-char> is empty (Reported by Gareth Palmer) * ASTERISK-22871 - cel_pgsql module not loading after "reload" or "reload cel_pgsql.so" command (Reported by Matteo) * ASTERISK-23084 - [patch]rasterisk needlessly prints the AST-2013-007 warning (Reported by Tzafrir Cohen) * ASTERISK-17138 - [patch] Asterisk not re-registering after it receives "Forbidden - wrong password on authentication" (Reported by Rudi) * ASTERISK-23011 - [patch]configure.ac and pbx_lua don't support lua 5.2 (Reported by George Joseph) * ASTERISK-22834 - Parking by blind transfer when lot full orphans channels (Reported by rsw686) * ASTERISK-23047 - Orphaned (stuck) channel occurs during a failed SIP transfer to parking space (Reported by Tommy Thompson) * ASTERISK-22946 - Local From tag regression with sipgate.de (Reported by Stephan Eisvogel) * ASTERISK-23010 - No BYE message sent when sip INVITE is received (Reported by Ryan Tilton) Improvements made in this release: ----------------------------------- * ASTERISK-22659 - Make a new core and extra sounds release (Reported by Rusty Newton) * ASTERISK-22918 - dahdi show channels slices PRI channel dnid on output (Reported by outtolunc) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.26.0 Thank you for your continued support of Asterisk!
2014-07-02Update to Asterisk 11.10.2: this fixes multiple security issues alongjnemeth8-41/+193
with general bug fixes. The security issues fixed are: AST-2014-001, AST-2014-002, AST-2014-006, and AST-2014-007. ----- The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.6, and Asterisk 1.8, 11, and 12. The available security releases are released as versions 1.8.15-cert7, 11.6-cert4, 1.8.28.2, 11.10.2, and 12.3.2. These releases resolve security vulnerabilities that were previously fixed in 1.8.15-cert6, 11.6-cert3, 1.8.28.1, 11.10.1, and 12.3.1. Unfortunately, the fix for AST-2014-007 inadvertently introduced a regression in Asterisk's TCP and TLS handling that prevented Asterisk from sending data over these transports. This regression and the security vulnerabilities have been fixed in the versions specified in this release announcement. Please note that the release of these versions resolves the following security vulnerabilities: * AST-2014-006: Permission Escalation via Asterisk Manager User Unauthorized Shell Access * AST-2014-007: Denial of Service via Exhaustion of Allowed Concurrent HTTP Connections For more information about the details of these vulnerabilities, please read security advisories AST-2014-005, AST-2014-006, AST-2014-007, and AST-2014-008, which were released with the previous versions that addressed these vulnerabilities. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.10.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2014-006.pdf * http://downloads.asterisk.org/pub/security/AST-2014-007.pdf Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.6, and Asterisk 1.8, 11, and 12. The available security releases are released as versions 1.8.15-cert6, 11.6-cert3, 1.8.28.1, 11.10.1, and 12.3.1. The release of these versions resolves the following issue: * AST-2014-007: Denial of Service via Exhaustion of Allowed Concurrent HTTP Connections Establishing a TCP or TLS connection to the configured HTTP or HTTPS port respectively in http.conf and then not sending or completing a HTTP request will tie up a HTTP session. By doing this repeatedly until the maximum number of open HTTP sessions is reached, legitimate requests are blocked. Additionally, the release of 11.6-cert3, 11.10.1, and 12.3.1 resolves the following issue: * AST-2014-006: Permission Escalation via Asterisk Manager User Unauthorized Shell Access Manager users can execute arbitrary shell commands with the MixMonitor manager action. Asterisk does not require system class authorization for a manager user to use the MixMonitor action, so any manager user who is permitted to use manager commands can potentially execute shell commands as the user executing the Asterisk process. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2014-005, AST-2014-006, AST-2014-007, and AST-2014-008, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.10.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2014-006.pdf * http://downloads.asterisk.org/pub/security/AST-2014-007.pdf Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced the release of Asterisk 11.10.0. The release of Asterisk 11.10.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-23547 - [patch] app_queue removing callers from queue when reloading (Reported by Italo Rossi) * ASTERISK-23559 - app_voicemail fails to load after fix to dialplan functions (Reported by Corey Farrell) * ASTERISK-22846 - testsuite: masquerade super test fails on all branches (still) (Reported by Matt Jordan) * ASTERISK-23545 - Confbridge talker detection settings configuration load bug (Reported by John Knott) * ASTERISK-23546 - CB_ADD_LEN does not do what you'd think (Reported by Walter Doekes) * ASTERISK-23620 - Code path in app_stack fails to unlock list (Reported by Bradley Watkins) * ASTERISK-23616 - Big memory leak in logger.c (Reported by ibercom) * ASTERISK-23576 - Build failure on SmartOS / Illumos / SunOS (Reported by Sebastian Wiedenroth) * ASTERISK-23550 - Newer sound sets don't show up in menuselect (Reported by Rusty Newton) * ASTERISK-18331 - app_sms failure (Reported by David Woodhouse) * ASTERISK-19465 - P-Asserted-Identity Privacy (Reported by Krzysztof Chmielewski) * ASTERISK-23605 - res_http_websocket: Race condition in shutting down websocket causes crash (Reported by Matt Jordan) * ASTERISK-23707 - Realtime Contacts: Apparent mismatch between PGSQL database state and Asterisk state (Reported by Mark Michelson) * ASTERISK-23381 - [patch]ChanSpy- Barge only works on the initial 'spy', if the spied-on channel makes a new call, unable to barge. (Reported by Robert Moss) * ASTERISK-23665 - Wrong mime type for codec H263-1998 (h263+) (Reported by Guillaume Maudoux) * ASTERISK-23664 - Incorrect H264 specification in SDP. (Reported by Guillaume Maudoux) * ASTERISK-22977 - chan_sip+CEL: missing ANSWER and PICKUP event for INVITE/w/replaces pickup (Reported by Walter Doekes) * ASTERISK-23709 - Regression in Dahdi/Analog/waitfordialtone (Reported by Steve Davies) Improvements made in this release: ----------------------------------- * ASTERISK-23649 - [patch]Support for DTLS retransmission (Reported by NITESH BANSAL) * ASTERISK-23564 - [patch]TLS/SRTP status of channel not currently available in a CLI command (Reported by Patrick Laimbock) * ASTERISK-23754 - [patch] Use var/lib directory for log file configured in asterisk.conf (Reported by Igor Goncharovsky) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.10.0 Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced the release of Asterisk 11.9.0. The release of Asterisk 11.9.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-22790 - check_modem_rate() may return incorrect rate for V.27 (Reported by Paolo Compagnini) * ASTERISK-23034 - [patch] manager Originate doesn't abort on failed format_cap allocation (Reported by Corey Farrell) * ASTERISK-23061 - [Patch] 'textsupport' setting not mentioned in sip.conf.sample (Reported by Eugene) * ASTERISK-23028 - [patch] Asterisk man pages contains unquoted minus signs (Reported by Jeremy Lainé) * ASTERISK-23046 - Custom CDR fields set during a GoSUB called from app_queue are not inserted (Reported by Denis Pantsyrev) * ASTERISK-23027 - [patch] Spelling typo "transfered" instead of "transferred" (Reported by Jeremy Lainé) * ASTERISK-23008 - Local channels loose CALLERID name when DAHDI channel connects (Reported by Michael Cargile) * ASTERISK-23100 - [patch] In chan_mgcp the ident in transmitted request and request queue may differ - fix for locking (Reported by adomjan) * ASTERISK-22988 - [patch]T38 , SIP 488 after Rejecting image media offer due to invalid or unsupported syntax (Reported by adomjan) * ASTERISK-22861 - [patch]Specifying a null time as parameter to GotoIfTime or ExecIfTime causes segmentation fault (Reported by Sebastian Murray-Roberts) * ASTERISK-17837 - extconfig.conf - Maximum Include level (1) exceeded (Reported by pz) * ASTERISK-22662 - Documentation fix? - queues.conf says persistentmembers defaults to yes, it appears to lie (Reported by Rusty Newton) * ASTERISK-23134 - [patch] res_rtp_asterisk port selection cannot handle selinux port restrictions (Reported by Corey Farrell) * ASTERISK-23220 - STACK_PEEK function with no arguments causes crash/core dump (Reported by James Sharp) * ASTERISK-19773 - Asterisk crash on issuing Asterisk-CLI 'reload' command multiple times on cli_aliases (Reported by Joel Vandal) * ASTERISK-22757 - segfault in res_clialiases.so on reload when mapping "module reload" command (Reported by Gareth Blades) * ASTERISK-17727 - [patch] TLS doesn't get all certificate chain (Reported by LN) * ASTERISK-23178 - devicestate.h: device state setting functions are documented with the wrong return values (Reported by Jonathan Rose) * ASTERISK-23232 - LocalBridge AMI Event LocalOptimization value is opposite to what's expected (Reported by Leon Roy) * ASTERISK-23098 - [patch]possible null pointer dereference in format.c (Reported by Marcello Ceschia) * ASTERISK-23297 - Asterisk 12, pbx_config.so segfaults if res_parking.so is not loaded, or if res_parking.conf has no configuration (Reported by CJ Oster) * ASTERISK-23069 - Custom CDR variable not recorded when set in macro called from app_queue (Reported by Bryan Anderson) * ASTERISK-19499 - ConfBridge MOH is not working for transferee after attended transfer (Reported by Timo Teräs) * ASTERISK-23261 - [patch]Output mixup in ${CHANNEL(rtpqos,audio,all)} (Reported by rsw686) * ASTERISK-23279 - [patch]Asterisk doesn't support the dynamic payload change in rtp mapping in the 200 OK response (Reported by NITESH BANSAL) * ASTERISK-23255 - UUID included for Redhat, but missing for Debian distros in install_prereq script (Reported by Rusty Newton) * ASTERISK-23260 - [patch]ForkCDR v option does not keep CDR variables for subsequent records (Reported by zvision) * ASTERISK-23141 - Asterisk crashes on Dial(), in pbx_find_extension at pbx.c (Reported by Maxim) * ASTERISK-23336 - Asterisk warning "Don't know how to indicate condition 33 on ooh323c" on outgoing calls from H323 to SIP peer (Reported by Alexander Semych) * ASTERISK-23231 - Since 405693 If we have res_fax.conf file set to minrate=2400, then res_fax refuse to load (Reported by David Brillert) * ASTERISK-23135 - Crash - segfault in ast_channel_hangupcause_set - probably introduced in 11.7.0 (Reported by OK) * ASTERISK-23323 - [patch]chan_sip: missing p->owner checks in handle_response_invite (Reported by Walter Doekes) * ASTERISK-23406 - [patch]Fix typo in "sip show peer" (Reported by ibercom) * ASTERISK-23310 - bridged channel crashes in bridge_p2p_rtp_write (Reported by Jeremy Lainé) * ASTERISK-22911 - [patch]Asterisk fails to resume WebRTC call from hold (Reported by Vytis Valentinavičius) * ASTERISK-23104 - Specifying the SetVar AMI without a Channel cause Asterisk to crash (Reported by Joel Vandal) * ASTERISK-21930 - [patch]WebRTC over WSS is not working. (Reported by John) * ASTERISK-23383 - Wrong sense test on stat return code causes unchanged config check to break with include files. (Reported by David Woolley) * ASTERISK-20149 - Crash when faxing SIP to SIP with strictrtp set to yes (Reported by Alexandr Gordeev) * ASTERISK-17523 - Qualify for static realtime peers does not work (Reported by Maciej Krajewski) * ASTERISK-21406 - [patch] chan_sip deadlock on monlock between unload_module and do_monitor (Reported by Corey Farrell) * ASTERISK-23373 - [patch]Security: Open FD exhaustion with chan_sip Session-Timers (Reported by Corey Farrell) * ASTERISK-23340 - Security Vulnerability: stack allocation of cookie headers in loop allows for unauthenticated remote denial of service attack (Reported by Matt Jordan) * ASTERISK-23311 - Manager - MoH Stop Event fails to show up when leaving Conference (Reported by Benjamin Keith Ford) * ASTERISK-23420 - [patch]Memory leak in manager_add_filter function in manager.c (Reported by Etienne Lessard) * ASTERISK-23488 - Logic error in callerid checksum processing (Reported by Russ Meyerriecks) * ASTERISK-23461 - Only first user is muted when joining confbridge with 'startmuted=yes' (Reported by Chico Manobela) * ASTERISK-20841 - fromdomain not honored on outbound INVITE request (Reported by Kelly Goedert) * ASTERISK-22079 - Segfault: INTERNAL_OBJ (user_data=0x6374652f) at astobj2.c:120 (Reported by Jamuel Starkey) * ASTERISK-23509 - [patch]SayNumber for Polish language tries to play empty files for numbers divisible by 100 (Reported by zvision) * ASTERISK-23103 - [patch]Crash in ast_format_cmp, in ao2_find (Reported by JoshE) * ASTERISK-23391 - Audit dialplan function usage of channel variable (Reported by Corey Farrell) * ASTERISK-23548 - POST to ARI sometimes returns no body on success (Reported by Scott Griepentrog) * ASTERISK-23460 - ooh323 channel stuck if call is placed directly and gatekeeper is not available (Reported by Dmitry Melekhov) Improvements made in this release: ----------------------------------- * ASTERISK-22980 - [patch]Allow building cdr_radius and cel_radius against libfreeradius-client (Reported by Jeremy Lainé) * ASTERISK-22661 - Unable to exit ChanSpy if spied channel does not have a call in progress (Reported by Chris Hillman) * ASTERISK-23099 - [patch] WSS: enable ast_websocket_read() function to read the whole available data at first and then wait for any fragmented packets (Reported by Thava Iyer) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.9.0 Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.6, and Asterisk 1.8, 11, and 12. The available security releases are released as versions 1.8.15-cert5, 11.6-cert2, 1.8.26.1, 11.8.1, and 12.1.1. The release of these versions resolve the following issues: * AST-2014-001: Stack overflow in HTTP processing of Cookie headers. Sending a HTTP request that is handled by Asterisk with a large number of Cookie headers could overflow the stack. Another vulnerability along similar lines is any HTTP request with a ridiculous number of headers in the request could exhaust system memory. * AST-2014-002: chan_sip: Exit early on bad session timers request This change allows chan_sip to avoid creation of the channel and consumption of associated file descriptors altogether if the inbound request is going to be rejected anyway. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2014-001, AST-2014-002, AST-2014-003, and AST-2014-004, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.8.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2014-001.pdf * http://downloads.asterisk.org/pub/security/AST-2014-002.pdf Thank you for your continued support of Asterisk! ----- The Asterisk Development Team has announced the release of Asterisk 11.8.0. The release of Asterisk 11.8.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following are the issues resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-22544 - Italian prompt vm-options has advertisement in it (Reported by Rusty Newton) * ASTERISK-21383 - STUN Binding Requests Not Being Sent Back from Asterisk to Chrome (Reported by Shaun Clark) * ASTERISK-22478 - [patch]Can't use pound(hash) symbol for custom DTMF menus in ConfBridge (processed as directive) (Reported by Nicolas Tanski) * ASTERISK-12117 - chan_sip creates a new local tag (from-tag) for every register message (Reported by Pawel Pierscionek) * ASTERISK-20862 - Asterisk min and max member penalties not honored when set with 0 (Reported by Schmooze Com) * ASTERISK-22746 - [patch]Crash in chan_dahdi during caller id read (Reported by Michael Walton) * ASTERISK-22788 - [patch] main/translate.c: access to variable f after free in ast_translate() (Reported by Corey Farrell) * ASTERISK-21242 - Segfault when T.38 re-invite retransmission receives 200 OK (Reported by Ashley Winters) * ASTERISK-22590 - BufferOverflow in unpacksms16() when receiving 16 bit multipart SMS with app_sms (Reported by Jan Juergens) * ASTERISK-22905 - Prevent Asterisk functions that are 'dangerous' from being executed from external interfaces (Reported by Matt Jordan) * ASTERISK-23021 - Typos in code : "avaliable" instead of "available" (Reported by Jeremy Lainé) * ASTERISK-22970 - [patch]Documentation fix for QUOTE() (Reported by Gareth Palmer) * ASTERISK-21960 - ooh323 channels stuck (Reported by Dmitry Melekhov) * ASTERISK-22350 - DUNDI - core dump on shutdown - segfault in sqlite3_reset from /usr/lib/libsqlite3.so.0 (Reported by Birger "WIMPy" Harzenetter) * ASTERISK-22942 - [patch] - Asterisk crashed after Set(FAXOPT(faxdetect)=t38) (Reported by adomjan) * ASTERISK-22856 - [patch]SayUnixTime in polish reads minutes instead of seconds (Reported by Robert Mordec) * ASTERISK-22854 - [patch] - Deadlock between cel_pgsql unload and core_event_dispatcher taskprocessor thread (Reported by Etienne Lessard) * ASTERISK-22910 - [patch] - REPLACE() calls strcpy on overlapping memory when <replace-char> is empty (Reported by Gareth Palmer) * ASTERISK-22871 - cel_pgsql module not loading after "reload" or "reload cel_pgsql.so" command (Reported by Matteo) * ASTERISK-23084 - [patch]rasterisk needlessly prints the AST-2013-007 warning (Reported by Tzafrir Cohen) * ASTERISK-17138 - [patch] Asterisk not re-registering after it receives "Forbidden - wrong password on authentication" (Reported by Rudi) * ASTERISK-23011 - [patch]configure.ac and pbx_lua don't support lua 5.2 (Reported by George Joseph) * ASTERISK-22834 - Parking by blind transfer when lot full orphans channels (Reported by rsw686) * ASTERISK-23047 - Orphaned (stuck) channel occurs during a failed SIP transfer to parking space (Reported by Tommy Thompson) * ASTERISK-22946 - Local From tag regression with sipgate.de (Reported by Stephan Eisvogel) * ASTERISK-23010 - No BYE message sent when sip INVITE is received (Reported by Ryan Tilton) * ASTERISK-23135 - Crash - segfault in ast_channel_hangupcause_set - probably introduced in 11.7.0 (Reported by OK) Improvements made in this release: ----------------------------------- * ASTERISK-22728 - [patch] Improve Understanding Of 'Forcerport' When Running "sip show peers" (Reported by Michael L. Young) * ASTERISK-22659 - Make a new core and extra sounds release (Reported by Rusty Newton) * ASTERISK-22919 - core show channeltypes slicing (Reported by outtolunc) * ASTERISK-22918 - dahdi show channels slices PRI channel dnid on output (Reported by outtolunc) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.8.0 Thank you for your continued support of Asterisk!
2014-06-23A standard unused Makefile in case we need itchristos1-0/+45
2014-06-23Add patches to fix the crypto build (we still don't build with crypto butchristos4-14/+408
now we could).
2014-06-15Update p5-Device-XBee-API to version 0.7.dsainty2-7/+6
Changes since version 0.4: 0.7, 20130330 - jeagle Add ability to allow users to specify their own frame allocation routines. Update API mode 2 with latest version from jdodgen 0.6, 20120624 - jeagle Update documentation. Add support for API mode 2 escapes. Needs testing. Add constant for the "BD" baud rate table. 0.5, 20120401 - jeagle Add support for Win32::SerialPort to enable Windows support. (Thanks Jerry) Fix issue with tx() in async mode. (Thanks Vicente) Add support for "explicit rx indicator" packets. (Thanks Vicente)
2014-06-09Recursive revbump from pulseaudio-5.0ryoon1-2/+2
2014-06-01Install fonts into default font path. Bump PKGREVISION.wiz2-26/+25
2014-05-31Don't expect perl to provide p5-Module-Pluggable (removed in 5.20).wiz1-3/+3
Bump PKGREVISION.
2014-05-29Bump for perl-5.20.0.wiz17-33/+34
Do it for all packages that * mention perl, or * have a directory name starting with p5-*, or * depend on a package starting with p5- like last time, for 5.18, where this didn't lead to complaints. Let me know if you have any this time.
2014-05-22spacesobache1-2/+2
2014-05-21Haiku also missing catgets support.obache1-2/+2
Patch from diger in pkgsrc-users@.
2014-05-09Mark packages that are not ready for python-3.3 also not ready for 3.4,wiz3-6/+6
until proven otherwise.
2014-05-05Recursive revbump from x11/pixmanryoon12-24/+24
Fix PR pkg/48777
2014-04-28Dance the doxygen!joerg2-7/+4
2014-04-20Recursive revbump from json-c 0.12 updateryoon1-2/+2
2014-04-16Bump PKGREVISION for libatomic_ops PKGNAME change.wiz1-2/+2
2014-04-10recursive bump from ilmbase shlib version change.obache1-2/+2
2014-04-09recursive bump from icu shlib major bump.obache13-26/+26
2014-03-14Changes 6.0.6:adam19-325/+396
These releases are maintenance releases, and do not contain any new features or functionality, but only contain bugfixes: * Re-order library files in fchmod() configure check * faxalter: Wire up the nissing page range -Z options * man: JobReqError/JobRetryError were missing in hylafax-config.4 * typerules: adding missing comma to typeNames array * Do not warn about one of the Fontpath directories not existing * Reworked how faxsetup looks for Fontmap * Use a private Fontmap.HylaFAX file of .pfb files * Combine all Fontmap files in memory, including new Fontmap.HylaFAX * Bug 934: We need to avoid a 0-index in playList * hfaxd: Eliminte extraneous debug logging * hfaxd: Make source port for active connections be ctrl port - 1 * hfaxd: Release old accept fd * Support libtiff 4.0 * faxsend: JobRetryOther/JobRequeueOther weren't actually being used * Make sure not to cut faxq FIFO messages in two when reaching end of buffer * hfaxd: Port is network byte order, correct logging of it
2014-03-13Add GEM_EXTSDIR support.taca2-2/+4
No functional change for current versions of Rubys.
2014-03-11Remove example rc.d scripts from PLISTs.jperkin10-20/+10
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or ignored otherwise.
2014-03-02Insert $(DESTDIR) in "rm -f" commands in src/Makefile.in::install-exec-local.apb2-1/+23
This fixes abuild failure when a version of the package is already installed. Not bumping PKGREVISION because the resulting package should be unchanged.
2014-02-24Also needs groffwiedi1-2/+2
2014-02-12Recursive PKGREVISION bump for OpenSSL API version bump.tron11-19/+22
2014-02-06Updated comms/p5-Device-Modem to 1.57abs2-8/+6
Revision history for Perl extension Device::Modem. 1.57 Sun Jan 26 11:36:11 CET 2014 - Added a "handshake" option to the connect() method. Allowed values are "xoff", "rts" or "none" (default). Thanks to Ezio Bonsi for suggesting the idea.
2014-01-25Mark packages as not ready for python-3.x where applicable;wiz2-3/+5
either because they themselves are not ready or because a dependency isn't. This is annotated by PYTHON_VERSIONS_INCOMPATIBLE= 33 # not yet ported as of x.y.z or PYTHON_VERSIONS_INCOMPATIBLE= 33 # py-foo, py-bar respectively, please use the same style for other packages, and check during updates. Use versioned_dependencies.mk where applicable. Use REPLACE_PYTHON instead of handcoded alternatives, where applicable. Reorder Makefile sections into standard order, where applicable. Remove PYTHON_VERSIONS_INCLUDE_3X lines since that will be default with the next commit. Whitespace cleanups and other nits corrected, where necessary.
2014-01-19Update to 2.7. Fix PKGNAME.wiz3-9/+20
Version 2.7 2013-10-17 --------------------------- - Win32: setRTS and setDTR can be called before the port is opened and it will set the initial state on port open. - Posix: add platform specific method: outWaiting (already present for Win32) - Posix: rename flowControl to setXON to match name on Win32, add flowControlOut function - rfc2217: zero polls value (baudrate, data size, stop bits, parity) (Erik Lundh) - Posix: [Patch pyserial:28] Accept any speed on Linux [update] - Posix: [Patch pyserial:29] PosixSerial.read() should "ignore" errno.EINTR - OSX: [Patch pyserial:27] Scan by VendorID/Product ID for USB Serial devices - Ensure working with bytes in write() calls Bugfixes: - [Bug 3540332] SerialException not returned - [Bug pyserial:145] Error in socket_connection.py - [Bug pyserial:135] reading from socket with timeout=None causes TypeError - [Bug pyserial:130] setup.py should not append py3k to package name - [Bug pyserial:117] no error on lost conn w/socket:// Bugfixes (posix): - [Patch 3462364] Fix: NameError: global name 'base' is not defined - list_ports and device() for BSD updated (Anders Langworthy) - [Bug 3518380] python3.2 -m serial.tools.list_ports error - [Bug pyserial:137] Patch to add non-standard baudrates to Cygwin - [Bug pyserial:141] open: Pass errno from IOError to SerialException - [Bug pyserial:125] Undefined 'base' on list_ports_posix.py, function usb_lsusb - [Bug pyserial:151] Serial.write() without a timeout uses 100% CPU on POSIX - [Patch pyserial:30] [PATCH 1/1] serial.Serial() should not raise IOError. Bugfixes (win32): - [Bug 3444941] ctypes.WinError() unicode error - [Bug 3550043] on Windows in tools global name 'GetLastError' is not defined - [Bug pyserial:146] flush() does nothing in windows (despite docs) - [Bug pyserial:144] com0com ports ignored due to missing "friendly name" - [Bug pyserial:152] Cannot configure port, some setting was wrong. Can leave port handle open but port not accessible
2014-01-07Update to Asterisk 1.8.25.0: this is a minor bug fix updatejnemeth2-9/+9
The Asterisk Development Team has announced the release of Asterisk 1.8.25.0. The release of Asterisk 1.8.25.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- chan_sip: Fix an issue where an incompatible audio format may be added to SDP. * --- cdr_adaptive_odbc: Also apply a filter when the CDR value is empty. * --- app_queue: Fix Queuelog EXITWITHKEY only logging two of four fields * --- chan_sip: Do not increment the SDP version between 183 and 200 responses. * --- chan_sip: Fix Realtime Peer Update Problem When Un-registering And Expires Header In 200ok For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.25.0 Thank you for your continued support of Asterisk!
2014-01-07Update to Asterisk 11.7.0: this is a minor bugfix updatejnemeth3-10/+12
The Asterisk Development Team has announced the release of Asterisk 11.7.0. The release of Asterisk 11.7.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- app_confbridge: Can now set the language used for announcements to the conference. * --- app_queue: Fix CLI "queue remove member" queue_log entry. * --- chan_sip: Do not increment the SDP version between 183 and 200 responses. * --- chan_sip: Allow a sip peer to accept both AVP and AVPF calls * --- chan_sip: Fix Realtime Peer Update Problem When Un-registering And Expires Header In 200ok For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.7.0 Thank you for your continued support of Asterisk!
2014-01-05Fix package with doxygen-1.8.6 and depend on it. Bump PKGREVISION.wiz2-8/+8
2014-01-04Fix interpreter paths in installed files. Bump PKGREVISION.wiz1-3/+24
2014-01-02Include bsd.prefs.mk before testing things. Should fix build on non-NetBSDdholland1-1/+3
64-bit platforms.
2014-01-01Recursive PKGREVISION bump for libgcrypt-1.6.0 shlib major bump.wiz5-10/+10
2013-12-31LDFLAGS.SunOS+= -lsocket -lnsl; Fixes build failure, ideally.rodent1-1/+3
2013-12-23Reset maintainer for resigned developers.wiz1-3/+2
2013-12-23Update to Asterisk 11.6.1: this is a security fix update to fixjnemeth8-67/+262
AST-2013-006 and AST-2013-007, and a minor bug fix update. pkgsrc change: disable SRTP on NetBSD as it doesn't link ---- 11.6.1 ---- The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert4, 11.2-cert3, 1.8.24.1, 10.12.4, 10.12.4-digiumphones, and 11.6.1. The release of these versions resolve the following issues: * A buffer overflow when receiving odd length 16 bit messages in app_sms. An infinite loop could occur which would overwrite memory when a message is received into the unpacksms16() function and the length of the message is an odd number of bytes. * Prevent permissions escalation in the Asterisk Manager Interface. Asterisk now marks certain individual dialplan functions as 'dangerous', which will inhibit their execution from external sources. A 'dangerous' function is one which results in a privilege escalation. For example, if one were to read the channel variable SHELL(rm -rf /) Bad Things(TM) could happen; even if the external source has only read permissions. Execution from external sources may be enabled by setting 'live_dangerously' to 'yes' in the [options] section of asterisk.conf. Although doing so is not recommended. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-006 and AST-2013-007, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.6.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-006.pdf * http://downloads.asterisk.org/pub/security/AST-2013-007.pdf Thank you for your continued support of Asterisk! ----- 11.6.0 ----- The Asterisk Development Team has announced the release of Asterisk 11.6.0. The release of Asterisk 11.6.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Confbridge: empty conference not being torn down (Closes issue ASTERISK-21859. Reported by Chris Gentle) * --- Let Queue wrap up time influence member availability (Closes issue ASTERISK-22189. Reported by Tony Lewis) * --- Fix a longstanding issue with MFC-R2 configuration that prevented users (Closes issue ASTERISK-21117. Reported by Rafael Angulo) * --- chan_iax2: Fix saving the wrong expiry time in astdb. (Closes issue ASTERISK-22504. Reported by Stefan Wachtler) * --- Fix segfault for certain invalid WebSocket input. (Closes issue ASTERISK-21825. Reported by Alfred Farrugia) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.6.0 Thank you for your continued support of Asterisk!
2013-12-17Update to Asterisk 10.12.4: this is a security fix update that fixesjnemeth2-10/+9
AST-2013-006 and AST-2013-007. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert4, 11.2-cert3, 1.8.24.1, 10.12.4, 10.12.4-digiumphones, and 11.6.1. The release of these versions resolve the following issues: * A buffer overflow when receiving odd length 16 bit messages in app_sms. An infinite loop could occur which would overwrite memory when a message is received into the unpacksms16() function and the length of the message is an odd number of bytes. * Prevent permissions escalation in the Asterisk Manager Interface. Asterisk now marks certain individual dialplan functions as 'dangerous', which will inhibit their execution from external sources. A 'dangerous' function is one which results in a privilege escalation. For example, if one were to read the channel variable SHELL(rm -rf /) Bad Things(TM) could happen; even if the external source has only read permissions. Execution from external sources may be enabled by setting 'live_dangerously' to 'yes' in the [options] section of asterisk.conf. Although doing so is not recommended. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-006 and AST-2013-007, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.24.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-006.pdf * http://downloads.asterisk.org/pub/security/AST-2013-007.pdf Thank you for your continued support of Asterisk!
2013-12-17Update to Asterisk 1.8.24.1: this is a security update that fixesjnemeth2-9/+9
AST-2013-006 and AST-2013-007. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert4, 11.2-cert3, 1.8.24.1, 10.12.4, 10.12.4-digiumphones, and 11.6.1. The release of these versions resolve the following issues: * A buffer overflow when receiving odd length 16 bit messages in app_sms. An infinite loop could occur which would overwrite memory when a message is received into the unpacksms16() function and the length of the message is an odd number of bytes. * Prevent permissions escalation in the Asterisk Manager Interface. Asterisk now marks certain individual dialplan functions as 'dangerous', which will inhibit their execution from external sources. A 'dangerous' function is one which results in a privilege escalation. For example, if one were to read the channel variable SHELL(rm -rf /) Bad Things(TM) could happen; even if the external source has only read permissions. Execution from external sources may be enabled by setting 'live_dangerously' to 'yes' in the [options] section of asterisk.conf. Although doing so is not recommended. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-006 and AST-2013-007, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.24.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-006.pdf * http://downloads.asterisk.org/pub/security/AST-2013-007.pdf Thank you for your continued support of Asterisk!
2013-12-10Add socket libraries on SunOS. Patch from Sebastian Wiedenroth.jperkin1-1/+3
2013-12-09Fix/Update DEPENDS paterns for perl CORE modules, with some trivial fixes.obache2-6/+6
Bump PKGREVISION for runtime dependency pattern changed packages.
2013-11-25PKGREVISION bump for json-c shlib rename.wiz1-2/+2
2013-11-24Use SPECIAL_PERMS and don't set USERGROUP_PHASE. PKGREVISION -> 7dholland3-10/+23
2013-11-05Fix attempt at detecting curses.joerg2-1/+15
2013-10-26Update to Asterisk 1.8.24.0: this is a general bugfix release:jnemeth2-10/+9
The Asterisk Development Team has announced the release of Asterisk 1.8.24.0. The release of Asterisk 1.8.24.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix a longstanding issue with MFC-R2 configuration that prevented users * --- Fix Not Storing Current Incoming Recv Address * --- Fix Segfault When Syntax Of A Line Under [applicationmap] Is Invalid * --- Tolerate presence of RFC2965 Cookie2 header by ignoring it For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.24.0 Thank you for your continued support of Asterisk!
2013-10-19Revbump after updating textproc/icuadam13-26/+26
2013-10-16bump for pilot-link-libs ncurses removalroy2-4/+4
2013-10-16Does not use curses or even termcaproy2-4/+3
2013-10-14Fix inline use.joerg3-1/+29
2013-10-10Depend on termcap as well as curses.roy1-9/+7
New homepage.
2013-10-10tn3270 uses termcap as well as curses.roy1-2/+7