314 Commits

Author SHA1 Message Date
sthen
b826c4558c update to Asterisk 16.5.0 2019-07-25 22:23:39 +00:00
sthen
b1a64774ed update to asterisk-16.4.1
AST-2019-002: Remote crash vulnerability with MESSAGE messages:
A specially crafted SIP in-dialog MESSAGE message can cause Asterisk to crash.

AST-2019-003: Remote Crash Vulnerability in chan_sip channel driver:
When T.38 faxing is done in Asterisk a T.38 reinvite may be sent to an
endpoint to switch it to T.38. If the endpoint responds with an improperly
formatted SDP answer including both a T.38 UDPTL stream and an audio or video
stream containing only codecs not allowed on the SIP peer or user a crash will
occur. The code incorrectly assumes that there will be at least one common
codec when T.38 is also in the SDP answer.
2019-07-12 15:56:20 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
b6eeb0b3c7 update to asterisk-16.4.0 2019-05-31 10:36:27 +00:00
naddy
ebf751b927 Update gettext to 0.20.1.
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext       -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new)                  devel/gettext,-textstyle
2019-05-20 22:15:00 +00:00
sthen
e8e4466b38 just set COMPILER=ports-gcc for asterisk/asterisk-g729 (dropping base-gcc). 2019-05-01 23:04:59 +00:00
sthen
42dc443195 Use ld.bfd to link math/py-scipy and telephony/asterisk on i386, like gcc/8
itself they fail with "has non-ABS relocation R_386_GOTOFF against symbol XXX"
with LLD.

Mention these ports in the comment in lang/gcc/8/Makefile.
2019-05-01 12:12:24 +00:00
naddy
3e042ba62d Bump all ports that depend on ports-gcc on the clang archs.
SYSTEM_VERSION didn't quite work out how we expected and it's
easier|safer to do it this way than fiddle with pkg_add now.
2019-04-28 21:08:26 +00:00
sthen
6d77c57cfb update to asterisk-16.3.0 2019-04-18 19:10:06 +00:00
sthen
b6fc1b19f7 update to asterisk-16.2.1
* AST-2019-001: Remote crash vulnerability with SDP protocol violation
When Asterisk makes an outgoing call, a very specific SDP protocol violation
by the remote party can cause Asterisk to crash.

https://issues.asterisk.org/jira/browse/ASTERISK-28260
2019-03-01 00:18:25 +00:00
sthen
9617b9623f update to asterisk-16.2.0 2019-02-15 22:52:15 +00:00
sthen
1defc17282 srtp is now a shared lib 2019-02-15 22:30:39 +00:00
sthen
8bbe7e680f sort LIB_DEPENDS-main. fix some 64-bit time_t issues on 32-bit arches. 2019-02-12 22:56:35 +00:00
sthen
6fb185fdc8 update to Asterisk 16.1.1 from the new 16.x LTS branch
changes aren't too extreme, but upgrading users should review upgrade notes
in /usr/local/share/doc/asterisk (UPGRADE-14.txt, UPGRADE-15.txt, UPGRADE.txt).
2019-01-29 23:40:02 +00:00
sthen
b9953e1497 update to asterisk-13.24.1
the backported patch is retained for now, the issue it's fixing won't be
fixed upstream until 13.25.0, thanks Mark Patruck for testing.
2019-01-01 23:00:29 +00:00
sthen
7cc71a17b5 Fix MWI for voicemail in asterisk; patch from upstream via Mark Patruck
https://issues.asterisk.org/jira/browse/ASTERISK-28215
2018-12-20 17:02:23 +00:00
sthen
440ebb3232 update to asterisk-13.24.0 2018-12-12 10:52:13 +00:00
sthen
906e611ee5 avoid 'asterisk: vfprintf %s NULL in "%.*s %.*s/%u%s%.*s"' noticed by landry@ 2018-11-10 16:57:43 +00:00
sthen
71e92fb0b1 most post-patch to do-gen 2018-11-05 17:24:32 +00:00
sthen
faba394441 update to asterisk-13.23.1
AST-2018-009: Fix crash processing websocket HTTP Upgrade requests
https://downloads.asterisk.org/pub/security/AST-2018-009.pdf
2018-09-20 22:19:09 +00:00
sthen
69961a77e1 update to asterisk-13.23.0
- update comments in pjlib's sock_ossl.c, we do now have
SSL_set1_curves/SSL_CTX_set1_curves but still not SSL_get_shared_curve,
SSL_set1_{client_,}sigalgs_list
2018-09-06 13:32:00 +00:00
espie
f4b7f81318 convert to PKGSTEM 2018-09-04 12:46:09 +00:00
sthen
aee6279ab9 update to asterisk-13.22.0 2018-07-18 08:47:28 +00:00
sthen
fd7f669da3 update to asterisk-13.21.1
AST-2018-007: Infinite loop when reading iostreams

When connected to Asterisk via TCP/TLS if the client abruptly
disconnects, or sends a specially crafted message then Asterisk
gets caught in an infinite loop while trying to read the data stream.
Thus rendering the system as unusable.

AST-2018-008: PJSIP endpoint presence disclosure when using ACL

When endpoint specific ACL rules block a SIP request they respond with
a 403 forbidden. However, if an endpoint is not identified then a 401
unauthorized response is sent. This vulnerability just discloses which
requests hit a defined endpoint. The ACL rules cannot be bypassed to
gain access to the disclosed endpoints.
2018-06-12 15:52:03 +00:00
sthen
248dbaa207 missed cvs add for some long long time_t fixes in pjsip 2018-05-03 21:11:41 +00:00
sthen
33c17030a7 update to asterisk-13.21.0 2018-05-03 21:10:49 +00:00
sthen
0dca8747e3 remove junk asterisk.conf.old file from plist, which caused clean builds to
fail, reported by naddy@.

set COMPILER_LANGS=c while there, the GNU compiler is only used for C nested
functions (because I still have no ideas about the BlocksRuntime with clang),
c++ is not needed.
2018-03-16 20:57:09 +00:00
sthen
fd223b54a2 bugfix update to Asterisk 13.20.0, some security-related
https://www.asterisk.org/downloads/asterisk-news/asterisk-13200-now-available
2018-03-15 23:00:19 +00:00
sthen
720878bd28 update to asterisk-13.19.2
AST-2018-002: Crash when given an invalid SDP media format description
AST-2018-003: Crash with an invalid SDP fmtp attribute
AST-2018-004: Crash when receiving SUBSCRIBE request
AST-2018-005: Crash when large numbers of TCP connections are closed suddenly
AST-2018-006: WebSocket frames with 0 sized payload causes DoS

(only 15.x reported as affected by AST-2018-001)
2018-02-21 22:37:41 +00:00
sthen
db6eb2c55b update to asterisk-13.19.1 2018-02-13 21:42:45 +00:00
sthen
228e7320e0 fix build on base-gcc architectures; it was failing there because /usr/local
is not in the header search path on base-gcc, whereas it is on ports-gcc.

thanks to Diana Eichert for the report (testing on octeon).
2018-02-08 22:23:02 +00:00
sthen
b2881b08d2 Fix a bad subst in the simplified sample of extensions.conf.
Fix #! line for bash in astversion. Not forced in RUN_DEPENDS because in all
the time this has been present only one person noticed, so the script doesn't
seem too popular. (Script also makes some assumptions about library versions
which don't apply here but I don't think it's worth poking at this too far).

Reported by landry@
2018-01-21 20:59:18 +00:00
sthen
7487cad718 use asterisk's github mirror of pjproject tarball as the primary download
site for that
2018-01-15 11:48:48 +00:00
sthen
98a2c2b056 don't pick up bcg729 if present, it breaks build of the internal copy of pjproject
(other codecs are already disabled in the pjproject build, it's only used for sip
signalling - asterisk has its own codec stack, this doesn't affect use of the
asterisk-g729 package).
2018-01-15 11:45:04 +00:00
sthen
dba14465bc Fix asterisk build on a clean system, reported by ajacoutot@.
Problem was due to an OPENSSL_VERSION_NUMBER 0x1010... check in a .so.
2018-01-15 09:43:45 +00:00
sthen
fe984140a9 update to asterisk-13.19.0 2018-01-14 13:11:48 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
sthen
5b1f08dc4c update to Asterisk 13.18.5
AST-2017-012: Remote Crash Vulnerability in RTCP Stack

If a compound RTCP packet is received containing more than one report
(for example a Receiver Report and a Sender Report) the RTCP stack
will incorrectly store report information outside of allocated memory
potentially causing a crash.

AST-2017-014: Crash in PJSIP resource when missing a contact header

A select set of SIP messages create a dialog in Asterisk. Those SIP
messages must contain a contact header. For those messages, if the
header was not present and using the PJSIP channel driver, it would
cause Asterisk to crash. The severity of this vulnerability is somewhat
mitigated if authentication is enabled. If authentication is enabled a
user would have to first be authorized before reaching the crash point.
2017-12-24 19:37:16 +00:00
sthen
767a3645bf update to Asterisk 13.18.3; fix problem with chan_skinny (SCCP protocol)
which missed a pthread_detach().
2017-12-06 14:22:39 +00:00
sthen
8c273f49e0 update to Asterisk 13.18.2 2017-11-11 15:19:10 +00:00
ajacoutot
bdca485ff0 Bump after libical pkgpath change. 2017-11-08 05:36:11 +00:00
sthen
9d473b4911 update to asterisk-13.17.2 - fix AST-2017-008 RTP/RTCP problems, followup
to AST-2017-005.

The RTP/RTCP stack will now validate RTCP packets before processing
them. Packets failing validation are discarded. RTP stream qualification
now requires the intended series of packets from the same address
without seeing packets from a different source address to accept a new
source address.
2017-09-21 10:11:16 +00:00
sthen
c0686bca82 - fix build when pjproject distfile is older than version.mak, breakage
reported by nigel@

- avoid hardcoded -O3 in pjsip build, honour CFLAGS instead
2017-09-01 09:55:28 +00:00
sthen
8a290e74b0 update to asterisk-13.17.1
AST-2017-005: Media takeover in RTP stack
AST-2017-006: Shell access command injection in app_minivm
AST-2017-007: Remote Crash Vulerability in res_pjsip

also install the basic-pbx sample configs
2017-08-31 21:34:05 +00:00
sthen
a7a5775b0f add comment noting that these two ports should keep COMPILER in sync 2017-08-22 22:51:04 +00:00
espie
7737872aef rework COMPILER yet again. new version should be easier to grasp 2017-08-22 10:27:33 +00:00
sthen
4a8a1b2bed Switch Asterisk to a gcc build (it requires either nested functions,
which are gcc-specific, or clang with -fblocks, which we don't have
working fully yet).

To avoid a C++ standard library conflict, switch to a stripped-down and
patched copy of pjsua/pjsip built as part of the Asterisk build.

Some slight patch gymnastics; Asterisk doesn't distribute pjsua itself
but rather normally downloads, untars and patches as part of the build,
which isn't compatible with the patches we need to apply in order to
fix it with libressl.
2017-08-05 12:29:21 +00:00
espie
8ac47fd9c6 use COMPILER_LIBCXX where applicable 2017-07-16 19:18:47 +00:00
sthen
dc5ed179ec update to asterisk-13.17.0 2017-07-12 19:55:29 +00:00
sthen
bdddc7a175 update to asterisk-13.15.1, fixing AST-2017-004: Memory exhaustion
on short SCCP packets. This only affects SCCP users (chan_skinny).

13.15.1 also added some fixes to the bundled copy of PJSIP
(used by chan_pjsip, *not* used by chan_sip) -
AST-2017-002: Buffer Overrun in PJSIP transaction layer,
AST-2017-003: Crash in PJSIP multi-part body parser
- however that copy is not used by this package and will need to
be fixed separately.
2017-05-26 15:42:45 +00:00