211 Commits

Author SHA1 Message Date
sthen
89e200c164 update to asterisk 11.11.0
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.11.0
2014-07-12 01:32:13 +00:00
sthen
97d5a596bb add vmmeter.h, for struct vmtotal 2014-07-08 10:23:18 +00:00
sthen
d24707e85c SECURITY update to asterisk 11.10.1
- AST-2014-006: MixMonitor manager action allows arbitrary shell commands
to be called from AMI (management interface) users without having proper
permissions.

- AST-2014-007: add a timeout to mitigate possible DoS on http interface
(connecting but making no request ties up a connection)
2014-06-12 22:39:12 +00:00
sthen
aee91d4cf2 create default voicemail directory with same ownership as asterisk would
use itself if creating it from scratch; noted by brad@
2014-06-12 14:24:34 +00:00
sthen
4e12edae6c update to asterisk 11.10.0 2014-05-31 00:35:31 +00:00
sthen
a7824d30e5 Now that c-client no longer pulls in ssl/crypto itself via kerbV, patch
Asterisk's configure script so it can find these required libs. No bump
needed here as it didn't build previously since c-client's lib version
was last bumped.
2014-05-07 00:38:59 +00:00
sthen
393748577a update to asterisk 11.9.0 2014-04-26 11:59:51 +00:00
sthen
0e4c0113b5 remove configure.ac patching not needed since c-client no longer needs
kerb5 libs.

@comment autosupport file which is very linux-centric.
2014-04-21 22:54:50 +00:00
sthen
a627bd863b sync wantlib after gssapi removal in neon 2014-04-21 11:32:03 +00:00
sthen
724f30f519 sync WANTLIB following removal of tcp wrappers from net-snmp 2014-03-23 22:05:00 +00:00
sthen
ffff56ba29 SECURITY update to Asterisk 11.8.1, fixing:-
http://downloads.digium.com/pub/security/AST-2014-001.html
Stack Overflow in HTTP Processing of Cookie Headers.

http://downloads.digium.com/pub/security/AST-2014-002.html
Denial of Service Through File Descriptor Exhaustion with chan_sip
Session-Timers.
2014-03-11 19:30:44 +00:00
sthen
864e224cf3 update to asterisk 11.8.0 2014-03-09 20:51:43 +00:00
sthen
fab28290aa comment-out the right line in sample config 2013-12-30 23:04:49 +00:00
sthen
0faeb0f87c update to asterisk 11.7.0 2013-12-20 12:37:05 +00:00
sthen
7343704e28 SECURITY update to Asterisk 11.6.1
AST-2013-006: A buffer overflow when receiving odd length 16 bit
messages in app_sms. An infinite loop could occur which would overwrite
memory when a message is received into the unpacksms16() function and
the length of the message is an odd number of bytes.
http://downloads.asterisk.org/pub/security/AST-2013-006-10.diff
http://downloads.digium.com/pub/security/AST-2013-006.html

AST-2013-007: Adds an option to disable certain dangerous dialplan
functions from external sources (e.g. Asterisk management interface):
shell exec and file writes. N.B. to enable this protection, set
"live_dangerously=no" in asterisk.conf if upgrading. (Sample config
file is patched to set this, but upgraders should add it in most
cases).
http://downloads.asterisk.org/pub/security/AST-2013-007-10.diff
http://downloads.digium.com/pub/security/AST-2013-007.html
2013-12-16 23:16:01 +00:00
sthen
c477d718be enable chan_console 2013-12-11 16:00:43 +00:00
sthen
56a39231dc update to asterisk 11.6.0 2013-10-21 23:38:44 +00:00
ajacoutot
460f3ce7af Fix deps after re-alpine -> alpine. 2013-10-17 09:11:34 +00:00
sthen
2e860b2538 SECURITY update to Asterisk 11.5.1
AST-2013-005: Remote crash from invalid SDP

        If the SIP channel driver processes an invalid SDP that defines media
        descriptions before connection information, it may attempt to
        reference the socket address information even though that information
        has not yet been set. This will cause a crash.

AST-2013-004: Fix crash when handling ACK on dialog that has no channel

        A remotely exploitable crash vulnerability exists in the SIP channel
        driver if an ACK with SDP is received after the channel has been
        terminated. The handling code incorrectly assumed that the channel
        would always be present.
2013-08-28 09:46:15 +00:00
sthen
f1cbc9da27 update to Asterisk 11.5.0 (and enabled FreeTDS cel/cdr support) 2013-07-16 13:03:19 +00:00
sthen
786f73af49 c-client requires libssl for its own purposes, and gssapi libs. 2013-06-20 21:33:53 +00:00
ajacoutot
64a6588efb No need for pthread. 2013-06-20 08:26:13 +00:00
ajacoutot
25b3041f91 Unbreak after hx509 and ntlm removal from Kerberos. 2013-06-20 06:54:36 +00:00
ajacoutot
9920238d6f Unbreak with new Heimdal; get rid of self-cooked krb5-config since we
have it in base now.
2013-06-17 19:30:22 +00:00
brad
17833ea850 Revert back to using MySQL 5.1 for the time being. MariaDB 5.5 introduces
a new libmysqlclient non-blocking API which utilizes co-routines. The X86
specific GCC ASM co-routine support hid the fact that there was an issue.
The only fallback code so far is POSIX user contexts which OpenBSD does not
support.

Input from and Ok sthen@ jasper@
2013-06-12 20:36:33 +00:00
sthen
4fe81903b3 Fix cookie parsing in Asterisk's HTTP request parser if an RFC2965 Cookie2
header is present. Needed for AMI/HTTP logins with some http clients.
2013-06-05 00:57:18 +00:00
brad
0b77cf86a5 Switch from using MySQL to using MariaDB. MariaDB is a drop-in replacement.
ok sthen aja
2013-05-25 00:33:09 +00:00
sthen
96cd82bed7 @comment res_kqueue_timer.so for now so we fall back to res_pthread_timer
(it didn't used to be built on OpenBSD; 11.4.0 started building it but it's
not correctly functional yet).
2013-05-18 08:44:00 +00:00
sthen
b04dc5094d update to Asterisk 11.4.0, lots of fixes 2013-05-17 22:57:50 +00:00
sthen
11c49af0ad Add patches to resolve a T38 fax-related deadlock researched by chris@
https://issues.asterisk.org/jira/secure/attachment/46850/fax-deadlock-v2.patch-11.3.0
2013-03-28 21:25:17 +00:00
sthen
520bf86d60 update to Asterisk 11.3.0, various testing by myself and chris@
- this is a major version update to the new long-term support version
- please review UPGRADE.txt
2013-03-28 20:24:53 +00:00
sthen
ef32312f4a SECURITY update to Asterisk 10.12.2
* A possible buffer overflow during H.264 (video) format negotiation.
CVE-2013-2685

* A denial of service exists in Asterisk's HTTP server.
CVE-2013-2686

* A potential username disclosure exists in the SIP channel driver.
CVE-2013-2264
2013-03-27 22:48:22 +00:00
ajacoutot
58f1a6f9f6 USE_LIBTOOL=Yes is the default now. 2013-03-21 08:45:11 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
sthen
d26647bb9f don't use BUILD_PKGPATH to set RUN_DEPENDS for the packages holding
plugin modules, as these do not depend on the flavour of the main package.
reported by landry.
2013-01-30 20:59:41 +00:00
sthen
b4d2d32311 bugfix update to Asterisk 10.12.1, fix imap flavour while there (c-client moved) 2013-01-22 23:26:30 +00:00
sthen
038b7faefe bugfix update to Asterisk 10.12.0
- this is the last regular release in the 10.x series, future 10.x releases
will be security fixes only.
2013-01-15 01:38:34 +00:00
sthen
548c160f86 update to Asterisk 10.11.1, fixing:
AST-2012-014: crashes due to large stack allocations in TCP;
affects remote unauthenticated SIP *over TCP* and remote authenticated
XMPP/HTTP connections.

AST-2012-015: DoS through resource consumption by exploiting device
state caching; exploitable if anonymous calls are permitted.
2013-01-02 22:33:43 +00:00
sthen
c38a08495b bugfix update to Asterisk 10.11.0
- while there, revise pbx_spool.c kevent timeout fix; rather than
clamping the timestamp, in the particular problem situation we hit
the loop (where dirlist is empty), pass in NULL rather than
INT_MAX-timenow similar to what's done in the inotify case.
2012-12-11 14:46:41 +00:00
sthen
7dd4ec5ad2 Update to Asterisk 10.10.1; fix reference leak in chan_local (no other changes). 2012-12-07 12:20:27 +00:00
sthen
31baa5ad06 This wants share/aclocal/lt~obsolete.m4 from devel/libtool; add it
as BUILD_DEPENDS.
2012-11-28 17:29:30 +00:00
sthen
c406b7ed93 update to Asterisk 10.10.0 - various fixes including with confbridge,
dtmf and chan_local.
2012-11-08 09:34:31 +00:00
sthen
f428d9a1d1 update to Asterisk 10.9.0
- Fix channel reference leak in ChanSpy.
- dsp.c: Fix multiple issues when no-interdigit delay is present,
and fast DTMF 50ms/50ms.
- Fix bug where final queue member would not be removed from memory.
- Fix memory leak when CEL is successfully written to PostgreSQL database.
- Fix DUNDi message routing bug when neighboring peer is unreachable.
2012-10-08 21:28:06 +00:00
sthen
bb0dc52ad9 Update the asterisk port to 10.8.0 - This is a major update, notable changes:
- If using ConfBridge, note that the dialplan arguments have changed.

- If using the built-in HTTP server, note that a bindaddr must now be given,
previously the default was 0.0.0.0 but this must now be given explicitly.

- Internal database now uses SQLite3 not BDB, conversion tools are provided.

See share/doc/asterisk/UPGRADE.txt for more.
2012-09-28 00:03:57 +00:00
sthen
4ed66825f6 revamp asterisk sound-file packaging.
- strip core-sounds and moh out of the main asterisk package,
they change comparatively rarely.

- provide all available languages.

- provide multiple codecs for all files, replacing the asterisk-native-sounds
package which only provided ulaw versions of the asterisk 1.4 files, ports
laid out to permit parallel building.

- the old asterisk-sounds package providing additional sound files beyond
the core ones is now "extra-sounds" modelled after the filename of the
distributed files.
2012-09-25 21:58:46 +00:00
sthen
285f44538a update to Asterisk 1.8.16.0 2012-09-15 12:43:49 +00:00
sthen
c6bb5e98ae Security update to asterisk 1.8.15.1.
AST-2012-012: AMI User Unauthorized Shell Access through ExternalIVR
AST-2012-013: ACL rules being ignored during calls by some IAX2 peers
2012-08-30 22:45:40 +00:00
sthen
08158b1530 sync wantlib 2012-08-23 17:42:27 +00:00
sthen
c7d9442f3b Remove no_mono hack now it's done in gmime instead. Suggested by ajacoutot@ 2012-08-22 08:04:22 +00:00
sthen
0a8265dfe2 Depend on gmime,no_mono not just gmime. Asterisk doesn't need
gmime-sharp and this gets it built earlier in a broken-mono bulk build.
This is a pseudo flavour only so the plist doesn't change -> no bump.
2012-08-21 22:45:59 +00:00