SECURITY update to 1.4.22.1, fixing CVE-2009-0041: remote unauthenticated

users with access to the IAX port can use it to verify validity of usernames.
No other code changes in this version.

While there, remove spurious @user from PLIST.
This commit is contained in:
sthen 2009-01-08 21:04:02 +00:00
parent 0c13c69eeb
commit baaf3b97ba
3 changed files with 9 additions and 11 deletions

View File

@ -1,11 +1,11 @@
# $OpenBSD: Makefile,v 1.46 2008/10/28 15:21:49 naddy Exp $
# $OpenBSD: Makefile,v 1.47 2009/01/08 21:04:02 sthen Exp $
SHARED_ONLY= Yes
COMMENT-main= open source multi-protocol PBX and telephony toolkit
V= 1.4.22
V= 1.4.22.1
DISTNAME= asterisk-$V
FULLPKGNAME-main= asterisk-$Vp0
FULLPKGNAME-main= asterisk-$V
CATEGORIES= telephony

View File

@ -1,5 +1,5 @@
MD5 (asterisk-1.4.22.tar.gz) = dib+vEoB4W4BLfzLnkq50g==
RMD160 (asterisk-1.4.22.tar.gz) = RpnGljCJ/RloNvf4b5gn7cE8Q5c=
SHA1 (asterisk-1.4.22.tar.gz) = WY1/3wdaTmFUvIkQ0+05lfOcnyM=
SHA256 (asterisk-1.4.22.tar.gz) = em2A7Y3job/X8sNELsXrHaPur/as4aPARXiEgYHu55o=
SIZE (asterisk-1.4.22.tar.gz) = 11598693
MD5 (asterisk-1.4.22.1.tar.gz) = AL+zm2OmFKywMsrgSU3oiA==
RMD160 (asterisk-1.4.22.1.tar.gz) = 4IXGURFL5yc+Dav11pUBK9jwwFs=
SHA1 (asterisk-1.4.22.1.tar.gz) = PRPN6sJ715fy6gOk1foSL1UYNDw=
SHA256 (asterisk-1.4.22.1.tar.gz) = rvj9bZ2/E1/NAlnXM4K/ikhfN4zGVyIU/ZLnGIBiCdY=
SIZE (asterisk-1.4.22.1.tar.gz) = 11602819

View File

@ -1,4 +1,4 @@
@comment $OpenBSD: PLIST-main,v 1.10 2008/10/07 09:57:52 sthen Exp $
@comment $OpenBSD: PLIST-main,v 1.11 2009/01/08 21:04:02 sthen Exp $
@conflict asterisk-sounds-<=1.2.1p2
@conflict app_conference-<=20070710
@newgroup _asterisk:545
@ -729,9 +729,7 @@ share/doc/asterisk/datastores.txt
share/doc/asterisk/digium-mib.txt
share/doc/asterisk/dundi.txt
share/doc/asterisk/enum.txt
@owner _asterisk
share/doc/asterisk/extconfig.txt
@owner
share/doc/asterisk/extensions.txt
share/doc/asterisk/externalivr.txt
share/doc/asterisk/freetds.txt