Commit Graph

177 Commits

Author SHA1 Message Date
sthen
12c1d6ee3a regen patch to avoid a cvs keyword 2011-07-20 07:06:00 +00:00
sthen
64aa216876 update to asterisk 1.8.5.0, chan_unistim parts from & ok ian@ 2011-07-12 19:54:39 +00:00
ajacoutot
422ec7e715 libiconv MODULE. 2011-07-07 01:19:02 +00:00
sthen
3e3639224e security update to asterisk 1.8.4.4: fix a case where invalid username
was distinguishable from incorrect password.
2011-06-29 01:15:04 +00:00
sthen
0de3a685c1 - add commented-out example settings for configuring a server behind nat
- be explicit in sample config that people should use strong secrets
2011-06-27 21:15:14 +00:00
sthen
2219c0a40e Your regularly scheduled security update to asterisk-1.8.4.3
AST-2011-008: If a remote user sends a SIP packet containing a null,
Asterisk assumes available data extends past the null to the
end of the packet when the buffer is actually truncated when
copied. This causes SIP header parsing to modify data past
the end of the buffer altering unrelated memory structures.
This vulnerability does not affect TCP/TLS connections.
-- Resolved in 1.6.2.18.1 and 1.8.4.3

AST-2011-009: A remote user sending a SIP packet containing a Contact header
with a missing left angle bracket (<) causes Asterisk to
access a null pointer.
-- Resolved in 1.8.4.3

AST-2011-010: A memory address was inadvertently transmitted over the
network via IAX2 via an option control frame and the remote party would try
to access it.
-- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3
2011-06-24 13:50:09 +00:00
sthen
bac6270c37 Fix asterisk build on a clean box; there is a bogus dependency on libltdl
recorded in asterisk's menuselect system, knocking out ODBC build if not
present (though this is only done, afaict, due to a missing dependency
in a unixodbc package on some linux version), so add libltdl as a
BUILD_DEPENDS.

Doesn't affect the packages, other than -odbc wasn't built before
unless you had libltdl installed, so no bump.
2011-06-03 16:08:01 +00:00
sthen
3dd23e0aae SECURITY update to asterisk-1.8.4.2; CVE-2011-2216:
Null pointer deref in SIP if malformed Contact headers are present.
2011-06-02 20:10:01 +00:00
ajacoutot
f982995f2b Add a consistent header that substitutes FULLPKGNAME for the READMEs.
ok jasper@ sthen@
2011-06-02 13:41:36 +00:00
sthen
365584e13e Bugfix update of Asterisk to 1.8.4.1
- Fix compliance with RFC 3261 section 18.2.2. (aka Cisco phone fix)
- Resolve a change in IPv6 header parsing due to the Cisco phone fix issue.
- Resolve potential crash when using SIP TLS support.
- Improve reliability when using SIP TLS.
2011-05-25 20:11:02 +00:00
sthen
5cdba91893 update to 1.8.4 2011-05-11 15:07:14 +00:00
sthen
562c2bd78d - switch to correct 1.8.3.3 tarball now it's available (vs. 1.8.3.2+patchset)
- bump -main as some rcs id's built into files changed
2011-04-27 17:42:02 +00:00
sthen
d575b9875b SECURITY update to 1.8.3.3
- AST-2011-006, shell access via remote authenticated manager
sessions (logged-in manager users can execute shell commands via
the manager interface without having the "system" privilege that
should be required)

- AST-2011-005, DoS with remote unauthenticated sessions (add limits
to prevent unauthenticated users from tying up all available FDs for
the manager interface, SIP-over-TCP, Skinny and the built in HTTP
server).

(updating by way of upstream patch file, the full tar.gz isn't
available yet).
2011-04-21 22:28:40 +00:00
ajacoutot
a2d7a47da4 Fix build after gnutls update.
ok jasper@ landry@
2011-04-15 16:13:23 +00:00
ian
0bc7d2e694 Unbreak chan_unistim, bump. OK sthen@ (maintainer) 2011-04-09 19:16:51 +00:00
sthen
9abb8cd3fa use correct autoconf 2011-03-24 22:40:51 +00:00
ajacoutot
4f1d224b85 Make use of rcexec in rc_start().
ok sthen@ (maintainer)
2011-03-20 15:37:06 +00:00
sthen
6ddd29dca2 update to 1.8.3.2, rerelease due to a problem with one of the fixes in 1.8.3.1. 2011-03-17 21:38:09 +00:00
sthen
0cd58fd2e9 update to 1.8.3.1; fixes AST-2011-003 and AST-2011-004:
unchecked return codes (fdopen, fwrite) causing null pointer
deref / resource exhaustion.

http://downloads.asterisk.org/pub/security/AST-2011-003.html
http://downloads.asterisk.org/pub/security/AST-2011-004.html
2011-03-16 23:27:11 +00:00
ajacoutot
564c909458 Remove now uneeded redirection. 2011-03-09 18:51:48 +00:00
sthen
31288ac0e2 bugfix update to 1.8.3 2011-03-02 13:28:24 +00:00
sthen
a75f35b7f4 SECURITY update to 1.8.2.4 fixes AST-2011-002 buffer overflow
Workaround: add "t38pt_udptl = no" to the general section in sip.conf
(chan_ooh323 is also affected but we don't build that).
2011-03-02 12:53:11 +00:00
sthen
9613b75ab6 SECURITY update (for real this time) to 1.8.2.2; no other changes.
"Due to a failed merge, Asterisk 1.8.2.1 which should have included
the security fix did not. Asterisk 1.8.2.2 contains the the changes
which should have been included in Asterisk 1.8.2.1."  ok ajacoutot@
2011-01-20 21:44:54 +00:00
sthen
9412bacbc5 Cherrypicked diff from svn; fix the internal implementation of htonll/ntohll
which was incorrect and would cause IAX interoperation to break. ok jasper@
2011-01-20 16:26:26 +00:00
sthen
aef236cbb8 SECURITY update to asterisk 1.8.2.1, fixes AST-2011-001 "an issue
when forming an outgoing SIP request while in pedantic mode, which
can cause a stack buffer to be made to overflow if supplied with
carefully crafted caller ID information"

http://downloads.asterisk.org/pub/security/AST-2011-001.html

This is also a major version update to the long-term support
1.8 branch, previous versions of this diff have been tested by
various ports@ readers, thanks for testing.

Please review /usr/local/share/doc/asterisk/UPGRADE.txt
(also note that memory use has increased).

ok ajacoutot@ jasper@
2011-01-19 11:25:16 +00:00
fgsch
e1d81e418e Add rc script taken from the 1.8 update diff sent to ports@ by sthen@.
sthen@ ok.
2011-01-04 22:35:46 +00:00
espie
811d94d9d6 new depends 2010-11-20 19:56:47 +00:00
sthen
462a21e673 update Asterisk to 1.6.2.14 2010-11-16 21:58:52 +00:00
espie
709b054ab9 USE_GROFF=Yes 2010-10-19 07:43:00 +00:00
sthen
858dc57b21 - update Asterisk to 1.6.2.13
- upstream have prevented chan_h323 from building with pwlib>=1.19.0
as it segfaults at startup; disable the h323 flavour for now.
2010-09-19 21:14:05 +00:00
sthen
e8e4be4765 readd missing _ from user/group names in sample config. spotted by Brad. 2010-08-27 00:48:19 +00:00
sthen
6017df3bbb update asterisk to 1.6.2.11, loads of pretty safe bug fixes 2010-08-17 19:53:01 +00:00
sthen
c49f9f900f update to 1.6.2.10, switch to new LIB_DEPENDS etc. 2010-07-25 10:08:03 +00:00
sthen
e2d09616d7 adapt to our new SO_PEERCRED 2010-07-05 22:03:22 +00:00
sthen
e4fd3edfac update to 1.6.2.9; various crash fixes (including one with dtmf detection) 2010-06-18 22:10:44 +00:00
sthen
43c83759da Don't ulimit -n $MAXFILES if $MAXFILES is undefined. Spotted by fgsch@ 2010-06-07 20:03:55 +00:00
sthen
0551c55946 update to 1.6.2.8 2010-06-02 13:18:56 +00:00
sthen
832d7dc996 Update to 1.6.2.7; various bugs fixed including some DTMF problems,
potential crashes in chan_sip, and a chan_local deadlock.
2010-05-04 23:02:58 +00:00
sthen
c16616608b Add to UPGRADE-1.6.txt telling people that insecure=very (deprecated for
>3 years and triggering a warning in the logs) has been removed in this
version.
2010-05-04 14:41:48 +00:00
sthen
10f83ce23c - s/autoconf/gnu in CONFIGURE_STYLE to prevent running autoconf twice
- remove stray ' in pre-configure target, oops
2010-05-04 12:42:33 +00:00
sthen
8bb9d1d01a - patch icon paths in the html docs (it won't help unless you have latex2html
installed, which I won't add as a dependency just for this, but for people who
already have it, it makes the docs look nicer).

- install the sample features.conf which was @comment'ed.
2010-05-03 21:00:34 +00:00
sthen
725df891d8 Use -pthread when checking for pthread_rwlock_timedwrlock.
No change yet, but means that the function can be used when it's
added to pthread. From Brad.
2010-04-14 08:23:38 +00:00
sthen
d9010697e4 Improve the sample dialplan;
- use ${FILTER(...)} to only permit digits; dialplan injection is bad, mmmkay
- ConfBridge sample based on information from Diego Casati
2010-04-10 12:45:35 +00:00
sthen
82aee579ee fix issues with unitialized address family; one when outboundproxy
is used, reported by Alexey Suslikov, one with dnsmgr when the looked-up
IP address of a peer changes (bug 15827).
2010-04-09 11:05:55 +00:00
sthen
dd9ff6c628 Update Asterisk to 1.6.2.6, which will be the only of the 1.6.x branches
receiving most updates in the future; notably, compared to the in-tree
version, this adds a portable (pthread-based) clocking source rather
than relying on a non-portable zaptel timer.

Main functions tested and working well for myself and Diego Casati (thanks!)
Note that ConfBridge (added since 1.6.0) may need more work
2010-04-08 16:18:00 +00:00
sthen
acb7670ef8 use autoconf 2.63 2010-04-02 23:18:53 +00:00
sthen
622d335805 add a patch from upstream, fixing build with newer sqlite 2010-04-02 19:28:45 +00:00
sthen
796c7bf27e update to 1.6.0.26 + a patch from a ticket upstream. 2010-03-25 12:01:47 +00:00
ajacoutot
cd6c6dcd9c Move to using h323plus and ptlib. 2010-03-23 21:16:53 +00:00
espie
6fdae71967 simplify: we can set PKGNAME-main here (avoid future warning for FULLPKGPATH) 2010-02-26 18:42:12 +00:00
sthen
bb6fa8ee6c - SECURITY update to 1.6.0.25, fixing AST-2010-003. if you use ACL rules
with something like 'deny 0.0.0.0/0' then this affects you. workaround:
'deny 0.0.0.0/0.0.0.0'

- fix fullpkgpath's for the subpackages, they were including the flavour
and shouldn't have - fixes problems with dpb3 found by naddy. add @pkgpath
markers relating to this fix.

ok naddy@
(reminder, ports is not fully open, do not commit without specific permission)
2010-02-26 12:44:14 +00:00
sthen
86862f6681 SECURITY update to 1.6.0.22, fixing CVE-2010-0441, an unauthenticated
crash in SIP (and only this, thanks to Asterisk developers for pushing
security fixes separately from other changes).

Does not affect Asterisk 1.4 in -stable (it's in the T.38 support,
which was added in 1.6).

ok ajacoutot@
2010-02-03 00:18:44 +00:00
sthen
cd70bb9611 Update to 1.6.0.21, various bugs (including some crashes) fixed.
This also has a small change in CDR generation, it's been well tested
upstream but still this can be a touchy area to change, so it's
going in now so the first OpenBSD release with Asterisk 1.6
packages has the change already made.

ok ajacoutot@
2010-01-17 13:18:36 +00:00
fgsch
f8eda496b9 Allow asterisk to change the vm password by tweaking the perms. Bump.
sthen@ ok.
2009-12-21 00:19:02 +00:00
sthen
b848cd9381 update to 1.6.0.20 2009-12-19 00:09:37 +00:00
fgsch
056c7fbd6d install chan_h323.so and put h323 fragment after confdir is created.
remove extraunexec and bump. sthen@ ok.
2009-12-14 04:49:24 +00:00
sthen
5738d5ec6f missing an app_conference @conflict 2009-12-13 12:23:57 +00:00
sthen
16b6df18f8 Major version update to 1.6.0.19. For more information about the
upgrade, see /usr/local/share/doc/asterisk/UPGRADE-1.6.txt

Particular thanks to fgsch@, ian@ and Michiel van Baak for help and testing.
2009-12-13 12:11:29 +00:00
sthen
e61f39e54c SECURITY update to 1.4.27.1 for unauthenticated remote crash in RTP.
http://downloads.digium.com/pub/security/AST-2009-010.html
2009-11-30 22:51:39 +00:00
sthen
c103ca4da3 update to 1.4.27, I'll soon be committing a 1.6.0 version but first let's
have the latest 1.4 for people who don't want to move yet.
2009-11-19 16:17:04 +00:00
sthen
e6279a7a86 Switch to using supplied bootstrap.sh (plus a patch to stop it
from overriding supplied AUTOfoo_VERSION variables) instead of the
custom Makefile target to run autoconf.

No package change -> no bump. Discussed with fgsch in relation
to 1.6, but it makes sense here too.
2009-11-04 21:51:49 +00:00
sthen
95fdcebf42 SECURITY update to 1.4.26.3;
AST-2009-008: SIP responses expose valid usernames
AST-2009-009: Cross-site AJAX request (ajamdemo.html/prototype.js)
2009-11-04 21:49:42 +00:00
sthen
7737a925e8 Update to 1.4.26.2; mitigates IAX2 denial of service AST-2009-006.
This makes an non-backwards-compatible change to the IAX2 protocol.
It can be disabled with various options, but is on by default.

IAX2 users, read http://downloads.digium.com/pub/security/AST-2009-006.html
and the new /usr/local/share/doc/asterisk/IAX2-security.pdf (available
online in http://svn.digium.com/svn/asterisk/tags/1.4.26.2/doc/).
2009-09-04 00:46:35 +00:00
sthen
755a20c358 Distfiles rerolled with different music-on-hold files.
See http://blogs.digium.com/2009/08/18/asterisk-music-on-hold-changes/
2009-08-18 22:09:40 +00:00
sthen
609d715116 SECURITY; http://downloads.asterisk.org/pub/security/AST-2009-005.html
Fixes sscanf without size bounds. The biggest problem affects SIP in
Asterisk 1.6.1+ (i.e. not OpenBSD ports/packages) but the update makes
sense anyway...
2009-08-10 23:22:31 +00:00
sthen
d6c17e0b16 bugfix update to 1.4.26; see http://www.asterisk.org/node/48610 2009-07-21 22:05:24 +00:00
sthen
235a65c343 - actually comment-out the (broken) speex subpackage rather than
just disable by setting the default FLAVOR; the asterisk,h323 entry
in ../Makefile picked it up. the unused pkg/*-speex files don't hurt,
so keep them around. bump PKGNAME (most likely gratuitous, but it's
cheap).
2009-06-15 23:33:57 +00:00
sthen
ab4bb91ad8 update to 1.4.25.1; revised fix for SECURITY issue CVE-2009-0041 2009-06-05 23:10:40 +00:00
sthen
c0d15916fc maintenance update to 1.4.25. disable building the speex plugin by default
for now, it causes a SIGBUS at startup (and also did in the previous version)
which hasn't been tracked down yet.
2009-05-22 09:05:10 +00:00
sthen
5b50a3c27b switch to external gsm library, bump package. 2009-04-05 22:37:35 +00:00
sthen
62883bdc32 Minor security update to 1.4.24.1 for AST-2009-003 "SIP responses
expose valid usernames". This update changes "alwaysauthreject" to
return the same response for invalid username as it does for invalid
password.
2009-04-02 19:37:25 +00:00
sthen
7f827346dd maintenance update to 1.4.24 2009-03-29 22:23:35 +00:00
sthen
8504e3d898 SECURITY; patch AST-2009-002, remote *unauthenticated* crash in SIP
where the "pedantic" option is enabled (disabled by default).

Backported rather than updated until I sort out the H323 autoconf
breakage in newer versions.
2009-03-10 21:12:37 +00:00
sthen
ca074f9466 SECURITY update to 1.4.22.2; updated fix for CVE-2009-0041 in IAX 2009-01-24 11:22:26 +00:00
sthen
3fc682ab7e better license marker; asterisk-core-sounds is now available under
CC-BY-SA. bump not necessary.
2009-01-10 00:58:15 +00:00
sthen
baaf3b97ba SECURITY update to 1.4.22.1, fixing CVE-2009-0041: remote unauthenticated
users with access to the IAX port can use it to verify validity of usernames.
No other code changes in this version.

While there, remove spurious @user from PLIST.
2009-01-08 21:04:02 +00:00
naddy
a57993cf08 Change "${SYSCONFDIR}" to "/etc" for files that are *always* in the
latter location.
2008-10-28 15:21:48 +00:00
sthen
7dadcbac78 maintenance update to 1.4.22; many fixes. 2008-10-07 09:57:52 +00:00
sthen
2861b10c40 SECURITY update fixing several problems in IAX, both remotely
exploitable without authentication.

AST-2008-010: Asterisk IAX 'POKE' resource exhaustion (DoS)
AST-2008-011: Traffic amplification in IAX2, 40->1040 bytes
2008-07-23 08:57:10 +00:00
sthen
cb6bf906d5 - bugfix update to 1.4.21.1, fixing a fairly major problem
introduced in 1.4.21 by correcting the order of lock and unlock
in a deadlock avoidance macro... No other changes. Not security,
but if you're running 1.4.21, you definitely want this.

- regen PLIST to remove @bin from a symlink.
2008-06-30 20:03:49 +00:00
sthen
d57b2a9a52 Update Asterisk to 1.4.21, lots of quality-control fixes
ok ian
2008-06-14 16:00:10 +00:00
sthen
fdf610d6d7 - speex needs to be at least 1.2beta3 since the library was
split in two: add pkgspec, bump -speex package version

- adjust FULLPKGNAME handling so overrides can be shown clearly
at the top of the Makefile

- add space before assignment operator "FULLPKGNAME$i=" to avoid
potential ambiguity with bad values of $i

speex problem reported by jolan@, thanks!
2008-06-02 23:33:51 +00:00
sthen
e1ead9579e update to 1.4.20.1; thanks to Pedro la Peu for additional testing. 2008-05-27 22:14:34 +00:00
sthen
f400d3023f clean whitespace (spaces->tabs); "cvs di -w" shows no change 2008-05-27 20:56:12 +00:00
ajacoutot
9b89accee8 - fix WANTLIB after pwlib FLAVORs merge
- bump
2008-05-22 19:27:04 +00:00
sthen
0074d5ea7d Update to 1.4.19.2, fixing an IAX performance problem introduced
by the security fix in the previous update. No change to other code.
Non-IAX users are unaffected.
2008-05-13 23:49:57 +00:00
sthen
03a107191f SECURITY update, fixes remote amplification attack in IAX.
http://downloads.digium.com/pub/security/AST-2008-006.html

ok ian@
2008-04-23 07:04:09 +00:00
sthen
7c7f03755a update to 1.4.19
ok ian@
2008-04-02 23:18:11 +00:00
sthen
b78d620076 SECURITY update to 1.4.18.1, fixes AST-2008-002 (buffer overflows
in RTP codec payload type handling) and AST-2008-003 (SIP channel
can make a call into the context specified in the general section
of sip.conf).  Affects all Asterisk users with SIP enabled.

This is a security update only, no changes other than these fixes.
2008-03-19 08:18:10 +00:00
ajacoutot
4bebb7f3ca - make the h323 FLAVOR build correctly with new pwlib/h323
- add a pre-build target so that we can remove IS_INTERACTIVE
(from sthen@)

ok sthen@
2008-03-15 17:41:12 +00:00
sthen
5802de6f10 update asterisk to 1.4.18 (following testing during RC period)
ok jolan
2008-02-07 22:08:30 +00:00
sthen
76825aff1b SECURITY update, AST-2008-001, fixes remote crash triggerable by anyone
permitted to transfer SIP calls (possibly unauthenticated, depending on
config).

ok ian
2008-01-03 02:23:30 +00:00
sthen
50c645a69b update to the asterisk release-du-jour.
ok ian's asterisk-ok-bot
2007-12-21 10:22:19 +00:00
sthen
9d7e6c2e89 Update to today's asterisk release. ok ian 2007-12-20 13:57:22 +00:00
sthen
2d388aff89 SECURITY update to 1.4.17, fixes AST-2007-027 (passwordless sip/iax peers,
configured from "realtime" database rather than static .conf files, are not
subject to IP address restrictions).

ok ian
2007-12-19 21:07:27 +00:00
sthen
0d8f4dba96 SECURITY update to Asterisk 1.4.15, fixes SQL problems with
PostgreSQL drivers. AST-2007-025 (pgsql realtime) and AST-2007-026
(pgsql CDR logging).

ok jolan@
2007-12-01 10:11:53 +00:00
sthen
ff506d6ff4 update Asterisk to 1.4.14 (with many bug fixes), and h323 flavor
(for interactive builds only).

ok jolan, ian
2007-11-27 10:41:04 +00:00
sthen
b22c11a7a4 SECURITY update for 1.4 versions (doesn't affect OpenBSD before 4.2);
fixes an overflow in IMAP voicemail storage reachable by anyone who can
send email to a VM box accessed from the phone. AST-2007-022, found by
sprintf audit.

ok ian@
2007-10-11 08:05:18 +00:00
sthen
bb85f6fc39 bug-fix update to 1.4.12
ok ian@
2007-10-04 11:25:44 +00:00
sthen
9c5f5dcd0d major version update to 1.4.11, ok ian@ jolan@ 2007-09-05 22:42:52 +00:00