Commit Graph

107 Commits

Author SHA1 Message Date
sthen
b4d2d32311 bugfix update to Asterisk 10.12.1, fix imap flavour while there (c-client moved) 2013-01-22 23:26:30 +00:00
sthen
038b7faefe bugfix update to Asterisk 10.12.0
- this is the last regular release in the 10.x series, future 10.x releases
will be security fixes only.
2013-01-15 01:38:34 +00:00
sthen
548c160f86 update to Asterisk 10.11.1, fixing:
AST-2012-014: crashes due to large stack allocations in TCP;
affects remote unauthenticated SIP *over TCP* and remote authenticated
XMPP/HTTP connections.

AST-2012-015: DoS through resource consumption by exploiting device
state caching; exploitable if anonymous calls are permitted.
2013-01-02 22:33:43 +00:00
sthen
c38a08495b bugfix update to Asterisk 10.11.0
- while there, revise pbx_spool.c kevent timeout fix; rather than
clamping the timestamp, in the particular problem situation we hit
the loop (where dirlist is empty), pass in NULL rather than
INT_MAX-timenow similar to what's done in the inotify case.
2012-12-11 14:46:41 +00:00
sthen
7dd4ec5ad2 Update to Asterisk 10.10.1; fix reference leak in chan_local (no other changes). 2012-12-07 12:20:27 +00:00
sthen
c406b7ed93 update to Asterisk 10.10.0 - various fixes including with confbridge,
dtmf and chan_local.
2012-11-08 09:34:31 +00:00
sthen
f428d9a1d1 update to Asterisk 10.9.0
- Fix channel reference leak in ChanSpy.
- dsp.c: Fix multiple issues when no-interdigit delay is present,
and fast DTMF 50ms/50ms.
- Fix bug where final queue member would not be removed from memory.
- Fix memory leak when CEL is successfully written to PostgreSQL database.
- Fix DUNDi message routing bug when neighboring peer is unreachable.
2012-10-08 21:28:06 +00:00
sthen
bb0dc52ad9 Update the asterisk port to 10.8.0 - This is a major update, notable changes:
- If using ConfBridge, note that the dialplan arguments have changed.

- If using the built-in HTTP server, note that a bindaddr must now be given,
previously the default was 0.0.0.0 but this must now be given explicitly.

- Internal database now uses SQLite3 not BDB, conversion tools are provided.

See share/doc/asterisk/UPGRADE.txt for more.
2012-09-28 00:03:57 +00:00
sthen
285f44538a update to Asterisk 1.8.16.0 2012-09-15 12:43:49 +00:00
sthen
c6bb5e98ae Security update to asterisk 1.8.15.1.
AST-2012-012: AMI User Unauthorized Shell Access through ExternalIVR
AST-2012-013: ACL rules being ignored during calls by some IAX2 peers
2012-08-30 22:45:40 +00:00
sthen
0cc473cdde update to asterisk 1.8.15.0 2012-08-04 21:53:56 +00:00
sthen
ddb787543e update to asterisk 1.8.14.1, fixes a problem with tcptls SIP connections
where an SSL_CTX was freed where it shouldn't have been leading to a possible
crash.
2012-07-17 13:01:55 +00:00
sthen
a53a893bf9 bugfix update to Asterisk 1.8.14.0
- note that BLINDTRANSFER is no longer available in the 'h' extension,
if you were using this see the CHANGES file
2012-07-11 08:51:56 +00:00
sthen
c8a05ec47e SECURITY update to Asterisk 1.8.13.1 - fixes AST-2012-010, AST-2012-011
- RTP port exhaustion (DoS) if an endpoint responds to SIP INVITEs with
provisional responses but never sends a final response.

- double free with simultaneous access to a single voicemail account.
2012-07-05 22:01:22 +00:00
sthen
083b487e01 bugfix update to Asterisk 1.8.13.0 2012-06-07 10:39:25 +00:00
sthen
312710642c SECURITY update to Asterisk 1.8.12.2
AST-2012-007, AST-2012-008 fixed in the short-lived 1.8.12.1 release:

* A remotely exploitable crash vulnerability exists in the IAX2 channel
  driver if an established call is placed on hold without a suggested music
  class. Asterisk will attempt to use an invalid pointer to the music
  on hold class name, potentially causing a crash.

* A remotely exploitable crash vulnerability was found in the Skinny (SCCP)
  Channel driver. When an SCCP client closes its connection to the server,
  a pointer in a structure is set to NULL.  If the client was not in the
  on-hook state at the time the connection was closed, this pointer is later
  dereferenced. This allows remote authenticated connections the ability to
  cause a crash in the server, denying services to legitimate users.

Also from 1.8.12.2

* Resolve crash in subscribing for MWI notifications.

ASTOBJ_UNREF sets the variable to NULL after unreffing it, so the
variable should definitely not be used after that. To solve this in
the two cases that affect subscribing for MWI notifications, we
instead save the ref locally, and unref them in the error
conditions.
2012-05-30 22:45:26 +00:00
sthen
67d6b15dc9 Update to Asterisk 1.8.12.0, including lots of fixes for bad sizeof()
use and possible uninitialized var use, some memory leaks, a couple of
possible deadlocks and other issues.

While there, enable the http post module (done as a subpackage to
avoid pulling gmime/glib2 into the main package) and WANTLIB cleanup.

AEL dialplan users should see UPGRADE.txt for information about
changes to inheritance of the 'h' extension.
2012-05-03 11:25:27 +00:00
sthen
42dfce2326 SECURITY update to asterisk 1.8.11.1, fixing:
* A permission escalation vulnerability in Asterisk Manager Interface.  This
   would potentially allow remote authenticated users the ability to execute
   commands on the system shell with the privileges of the user running the
   Asterisk application.

 * A heap overflow vulnerability in the Skinny Channel driver.  The keypad
   button message event failed to check the length of a fixed length buffer
   before appending a received digit to the end of that buffer.  A remote
   authenticated user could send sufficient keypad button message events that
   the buffer would be overrun.

 * A remote crash vulnerability in the SIP channel driver when processing UPDATE
   requests.  If a SIP UPDATE request was received indicating a connected line
   update after a channel was terminated but before the final destruction of the
   associated SIP dialog, Asterisk would attempt a connected line update on a
   non-existing channel, causing a crash.
2012-04-23 21:35:58 +00:00
sthen
2c3f97d01a update to asterisk 1.8.11.0, including fixes for :
- crash in app_voicemail
- resource leak in SIP TCP/TLS
- ACK routing for non-2xx responses
- buffer overrun/memory leak in 'sip show peers' (race when adding peers whilst displaying)
- various locking problems
2012-04-08 22:34:51 +00:00
sthen
9e757c9c39 SECURITY update to asterisk 1.8.10.1
AST-2012-002: stack buffer overflow (remote unauthenticated sessions).
requires a dialplan using the Milliwatt application with the 'o' option,
and internal_timing off.  Affects all 1.4+ Asterisk versions.

AST-2012-003: stack buffer overflow (remote unauth'd sessions) in HTTP
manager interface; triggered by long digest authentication strings.
Code injection possibility.  Affects 1.8+.
2012-03-15 22:20:50 +00:00
sthen
6f8278e575 update to Asterisk 1.8.10.0
- includes the iLBC codec which now has a free copyright license; patent
licensing has a "no litigation" clause (see codecs/ilbc/LICENSE_ADDENDUM)
so mark as not permitted for CDs
2012-03-13 23:17:46 +00:00
sthen
4464cbf93d update to asterisk 1.8.9.3, fixes route-set regressions in SIP 2012-02-27 17:12:56 +00:00
sthen
bf263e5d77 update to asterisk 1.8.9.2
- fixes deadlock in chan_agent, crash in ParkAndAnnounce, and
SIP INFO DTMF handling for non-numeric codes
2012-02-16 21:25:08 +00:00
sthen
c05df36e0d update to asterisk 1.8.9.0, ok ajacoutot@
This release has many fixes including thread locking issues,
crashes, resource leaks and others.
2012-01-28 08:16:22 +00:00
sthen
88be277e07 Update to Asterisk 1.8.8.2. Fixes AST-2012-001, crash affecting
configurations with video disabled and the sRTP module loaded.

Funnily enough this didn't affect the port until about an hour
ago when sRTP was enabled.
2012-01-20 00:18:02 +00:00
sthen
2c805d3efc update to Asterisk 1.8.8.1; fixes a regression introduced in 1.8.8.0
with local bridged calls (various effects especially coming off hold or
with moh in some instances).
2011-12-30 22:24:35 +00:00
sthen
f3ee3a920c update Asterisk to 1.8.8.0
- various fixes, including a range of possible deadlocks
2011-12-16 14:50:09 +00:00
sthen
7656ea11a2 security update to asterisk 1.8.7.2; null pointer deref with crafted SIP
packets when "automon" is enabled in features.conf. AST-2011-014
2011-12-09 00:22:43 +00:00
sthen
e310870aa6 SECURITY update to Asterisk 1.8.7.1, trivial remote crash in SIP affecting
all previous 1.8.x versions (uninitialized variable).
2011-10-17 19:35:55 +00:00
sthen
9d14ebbfb3 update to asterisk 1.8.7.0 2011-09-24 13:47:42 +00:00
sthen
7ab1f5f5cf update to asterisk 1.8.6.0 2011-09-09 15:29:21 +00:00
sthen
64aa216876 update to asterisk 1.8.5.0, chan_unistim parts from & ok ian@ 2011-07-12 19:54:39 +00:00
sthen
3e3639224e security update to asterisk 1.8.4.4: fix a case where invalid username
was distinguishable from incorrect password.
2011-06-29 01:15:04 +00:00
sthen
2219c0a40e Your regularly scheduled security update to asterisk-1.8.4.3
AST-2011-008: If a remote user sends a SIP packet containing a null,
Asterisk assumes available data extends past the null to the
end of the packet when the buffer is actually truncated when
copied. This causes SIP header parsing to modify data past
the end of the buffer altering unrelated memory structures.
This vulnerability does not affect TCP/TLS connections.
-- Resolved in 1.6.2.18.1 and 1.8.4.3

AST-2011-009: A remote user sending a SIP packet containing a Contact header
with a missing left angle bracket (<) causes Asterisk to
access a null pointer.
-- Resolved in 1.8.4.3

AST-2011-010: A memory address was inadvertently transmitted over the
network via IAX2 via an option control frame and the remote party would try
to access it.
-- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3
2011-06-24 13:50:09 +00:00
sthen
3dd23e0aae SECURITY update to asterisk-1.8.4.2; CVE-2011-2216:
Null pointer deref in SIP if malformed Contact headers are present.
2011-06-02 20:10:01 +00:00
sthen
365584e13e Bugfix update of Asterisk to 1.8.4.1
- Fix compliance with RFC 3261 section 18.2.2. (aka Cisco phone fix)
- Resolve a change in IPv6 header parsing due to the Cisco phone fix issue.
- Resolve potential crash when using SIP TLS support.
- Improve reliability when using SIP TLS.
2011-05-25 20:11:02 +00:00
sthen
5cdba91893 update to 1.8.4 2011-05-11 15:07:14 +00:00
sthen
562c2bd78d - switch to correct 1.8.3.3 tarball now it's available (vs. 1.8.3.2+patchset)
- bump -main as some rcs id's built into files changed
2011-04-27 17:42:02 +00:00
sthen
d575b9875b SECURITY update to 1.8.3.3
- AST-2011-006, shell access via remote authenticated manager
sessions (logged-in manager users can execute shell commands via
the manager interface without having the "system" privilege that
should be required)

- AST-2011-005, DoS with remote unauthenticated sessions (add limits
to prevent unauthenticated users from tying up all available FDs for
the manager interface, SIP-over-TCP, Skinny and the built in HTTP
server).

(updating by way of upstream patch file, the full tar.gz isn't
available yet).
2011-04-21 22:28:40 +00:00
sthen
6ddd29dca2 update to 1.8.3.2, rerelease due to a problem with one of the fixes in 1.8.3.1. 2011-03-17 21:38:09 +00:00
sthen
0cd58fd2e9 update to 1.8.3.1; fixes AST-2011-003 and AST-2011-004:
unchecked return codes (fdopen, fwrite) causing null pointer
deref / resource exhaustion.

http://downloads.asterisk.org/pub/security/AST-2011-003.html
http://downloads.asterisk.org/pub/security/AST-2011-004.html
2011-03-16 23:27:11 +00:00
sthen
31288ac0e2 bugfix update to 1.8.3 2011-03-02 13:28:24 +00:00
sthen
a75f35b7f4 SECURITY update to 1.8.2.4 fixes AST-2011-002 buffer overflow
Workaround: add "t38pt_udptl = no" to the general section in sip.conf
(chan_ooh323 is also affected but we don't build that).
2011-03-02 12:53:11 +00:00
sthen
9613b75ab6 SECURITY update (for real this time) to 1.8.2.2; no other changes.
"Due to a failed merge, Asterisk 1.8.2.1 which should have included
the security fix did not. Asterisk 1.8.2.2 contains the the changes
which should have been included in Asterisk 1.8.2.1."  ok ajacoutot@
2011-01-20 21:44:54 +00:00
sthen
aef236cbb8 SECURITY update to asterisk 1.8.2.1, fixes AST-2011-001 "an issue
when forming an outgoing SIP request while in pedantic mode, which
can cause a stack buffer to be made to overflow if supplied with
carefully crafted caller ID information"

http://downloads.asterisk.org/pub/security/AST-2011-001.html

This is also a major version update to the long-term support
1.8 branch, previous versions of this diff have been tested by
various ports@ readers, thanks for testing.

Please review /usr/local/share/doc/asterisk/UPGRADE.txt
(also note that memory use has increased).

ok ajacoutot@ jasper@
2011-01-19 11:25:16 +00:00
sthen
462a21e673 update Asterisk to 1.6.2.14 2010-11-16 21:58:52 +00:00
sthen
858dc57b21 - update Asterisk to 1.6.2.13
- upstream have prevented chan_h323 from building with pwlib>=1.19.0
as it segfaults at startup; disable the h323 flavour for now.
2010-09-19 21:14:05 +00:00
sthen
6017df3bbb update asterisk to 1.6.2.11, loads of pretty safe bug fixes 2010-08-17 19:53:01 +00:00
sthen
c49f9f900f update to 1.6.2.10, switch to new LIB_DEPENDS etc. 2010-07-25 10:08:03 +00:00
sthen
e4fd3edfac update to 1.6.2.9; various crash fixes (including one with dtmf detection) 2010-06-18 22:10:44 +00:00