Commit Graph

324 Commits

Author SHA1 Message Date
sthen
42dfce2326 SECURITY update to asterisk 1.8.11.1, fixing:
* A permission escalation vulnerability in Asterisk Manager Interface.  This
   would potentially allow remote authenticated users the ability to execute
   commands on the system shell with the privileges of the user running the
   Asterisk application.

 * A heap overflow vulnerability in the Skinny Channel driver.  The keypad
   button message event failed to check the length of a fixed length buffer
   before appending a received digit to the end of that buffer.  A remote
   authenticated user could send sufficient keypad button message events that
   the buffer would be overrun.

 * A remote crash vulnerability in the SIP channel driver when processing UPDATE
   requests.  If a SIP UPDATE request was received indicating a connected line
   update after a channel was terminated but before the final destruction of the
   associated SIP dialog, Asterisk would attempt a connected line update on a
   non-existing channel, causing a crash.
2012-04-23 21:35:58 +00:00
espie
4ed7caa04f first pass at handling sqlite3 move 2012-04-23 17:15:17 +00:00
sthen
831151a03f update to kamailio 3.2.3, mostly from Roman Kravchuk (taking maintainer,
previous maintainer ok).
2012-04-22 21:44:24 +00:00
ajacoutot
0691c69586 Use RCDIR instead of /etc/rc.d when refering to packages rc scripts.
discussed with espie and sthen
ok sthen@
2012-04-22 11:41:55 +00:00
sthen
2c3f97d01a update to asterisk 1.8.11.0, including fixes for :
- crash in app_voicemail
- resource leak in SIP TCP/TLS
- ACK routing for non-2xx responses
- buffer overrun/memory leak in 'sip show peers' (race when adding peers whilst displaying)
- various locking problems
2012-04-08 22:34:51 +00:00
landry
312d4fffb9 Mark as ONLY_FOR_ARCHS=i386/amd64, since it #errors out on others:
# konference/libwebrtc/typedefs.h
# error Please add support for your architecture in typedefs.h
2012-04-05 21:15:29 +00:00
sthen
ca5de90dc7 unbreak with installed pwlib, spotted by naddy@
zap stray whitespace
2012-03-27 19:48:03 +00:00
sthen
da91aa04ce tweaks to the asterisk port; currently no effective change to the packages.
- remove unused non-working patches and framework for chan_h323;
this driver is deprecated upstream anyway.

- add patches to let the alternative chan_ooh323 addon module build.
currently unused in the port, 'make configure; cd $WRKSRC; gmake menuselect'
and enable it there if you want to play.

- sync unistim patch.

- mention the IMAP flavour in DESCR (and thus bump REVISION-main).
2012-03-23 22:42:25 +00:00
sthen
2105518722 update to appkonference 2.1, from dhill with tweaks by me 2012-03-22 21:31:18 +00:00
sthen
620492f011 Avoid a tight loop in asterisk's pbx_spool thread reported by drahn@ under
rthread. kern_time.c:itimerfix() requires the kevent interval timer to be
<= 100M seconds otherwise it passes an EINVAL back up, giving an error
return from kevent(). The initial timestamp is (INT_MAX-cur time) i.e.
around 800M so we hit this. Workaround by clamping tv_sec to 100M sec.
2012-03-17 23:08:20 +00:00
sthen
9e757c9c39 SECURITY update to asterisk 1.8.10.1
AST-2012-002: stack buffer overflow (remote unauthenticated sessions).
requires a dialplan using the Milliwatt application with the 'o' option,
and internal_timing off.  Affects all 1.4+ Asterisk versions.

AST-2012-003: stack buffer overflow (remote unauth'd sessions) in HTTP
manager interface; triggered by long digest authentication strings.
Code injection possibility.  Affects 1.8+.
2012-03-15 22:20:50 +00:00
naddy
069c4ceb1f add 5.1 release song; ok ian@ 2012-03-15 20:25:33 +00:00
sthen
6f8278e575 update to Asterisk 1.8.10.0
- includes the iLBC codec which now has a free copyright license; patent
licensing has a "no litigation" clause (see codecs/ilbc/LICENSE_ADDENDUM)
so mark as not permitted for CDs
2012-03-13 23:17:46 +00:00
ajacoutot
a89a75cd04 Garbage collect the /dev/arandom patches.
from Brad
ok landry@ sthen@
2012-03-08 12:13:00 +00:00
dcoppa
b0fc72e831 Zap incorrect patch.
noticed by brad, thanks
2012-03-07 12:35:39 +00:00
sthen
4464cbf93d update to asterisk 1.8.9.3, fixes route-set regressions in SIP 2012-02-27 17:12:56 +00:00
sthen
bf263e5d77 update to asterisk 1.8.9.2
- fixes deadlock in chan_agent, crash in ParkAndAnnounce, and
SIP INFO DTMF handling for non-numeric codes
2012-02-16 21:25:08 +00:00
sthen
c05df36e0d update to asterisk 1.8.9.0, ok ajacoutot@
This release has many fixes including thread locking issues,
crashes, resource leaks and others.
2012-01-28 08:16:22 +00:00
sthen
ae58df5297 Fix typo in comments and update email address. From Lawrence Teo (maintainer). 2012-01-21 22:02:13 +00:00
sthen
88be277e07 Update to Asterisk 1.8.8.2. Fixes AST-2012-001, crash affecting
configurations with video disabled and the sRTP module loaded.

Funnily enough this didn't affect the port until about an hour
ago when sRTP was enabled.
2012-01-20 00:18:02 +00:00
sthen
71655c85d3 - Build Asterisk with sRTP support.
- Remove DESCR parts and PFRAG relating to currently-disabled H.323 support.
2012-01-19 21:49:56 +00:00
sthen
7d9eb67a08 Lawrence Teo takes maintainership
- while there, switch SHARED_LIBS lines to ones directly copied
from ${WRKSRC}/shared_libs.log
2012-01-18 13:45:25 +00:00
sthen
c3b45b5b14 Lawrence Teo takes maintainership 2012-01-18 13:44:43 +00:00
sthen
e09cd099ac oops; forgot to set rc_reload=NO 2012-01-17 17:32:12 +00:00
sthen
e7f3e698e4 Update to siproxd 0.8.1 and add rc script; from Lawrence Teo, based
on a diff from stephan@ with feedback from myself and Brad
2012-01-17 17:30:33 +00:00
sthen
01c01231f8 Update libosip2 to 3.5.0 needed for siproxd update; from Lawrence Teo,
based on a diff from stephan@.
2012-01-17 17:29:36 +00:00
bluhm
7bd2cbd7e9 - update p5-Net-SIP to 0.64
- no USE_GROFF
from gsoares@
2012-01-01 11:36:26 +00:00
sthen
2c805d3efc update to Asterisk 1.8.8.1; fixes a regression introduced in 1.8.8.0
with local bridged calls (various effects especially coming off hold or
with moh in some instances).
2011-12-30 22:24:35 +00:00
sthen
f3ee3a920c update Asterisk to 1.8.8.0
- various fixes, including a range of possible deadlocks
2011-12-16 14:50:09 +00:00
sthen
7656ea11a2 security update to asterisk 1.8.7.2; null pointer deref with crafted SIP
packets when "automon" is enabled in features.conf. AST-2011-014
2011-12-09 00:22:43 +00:00
dcoppa
fc7d6e4814 grrr, missed one :( 2011-11-29 12:31:25 +00:00
dcoppa
5a6836f5cf Proper fix for thread priority scheduling support 2011-11-29 12:18:11 +00:00
dcoppa
cf138c48e1 Bugfixing update to pjsua-1.12 2011-11-28 16:17:47 +00:00
naddy
088b2093ec add 5.0 release song (and actually package the 4.9 one); ok ian@ 2011-11-14 22:09:54 +00:00
jasper
2965adca24 sigh. 2011-11-03 07:40:20 +00:00
jasper
cee63e4c5f - regen WANTLIB 2011-11-02 08:32:17 +00:00
sthen
e310870aa6 SECURITY update to Asterisk 1.8.7.1, trivial remote crash in SIP affecting
all previous 1.8.x versions (uninitialized variable).
2011-10-17 19:35:55 +00:00
espie
f49ad17ddb use bsd.port.arch.mk 2011-10-17 10:03:51 +00:00
sthen
9d14ebbfb3 update to asterisk 1.8.7.0 2011-09-24 13:47:42 +00:00
naddy
aabf2d2b28 honor CFLAGS and don't force -Os or -O; ok sthen@ 2011-09-16 12:49:21 +00:00
espie
46d3548829 normalize pkgpath 2011-09-16 11:41:38 +00:00
naddy
1e2bbe8777 bump all (sub)packages that depend on db/v4; requested by and help from espie@ 2011-09-12 18:02:34 +00:00
sthen
7ab1f5f5cf update to asterisk 1.8.6.0 2011-09-09 15:29:21 +00:00
sthen
12c1d6ee3a regen patch to avoid a cvs keyword 2011-07-20 07:06:00 +00:00
sthen
64aa216876 update to asterisk 1.8.5.0, chan_unistim parts from & ok ian@ 2011-07-12 19:54:39 +00:00
ajacoutot
422ec7e715 libiconv MODULE. 2011-07-07 01:19:02 +00:00
ajacoutot
ebc307bb8c Use the devel/gettext MODULE. 2011-07-06 21:09:55 +00:00
sthen
3e3639224e security update to asterisk 1.8.4.4: fix a case where invalid username
was distinguishable from incorrect password.
2011-06-29 01:15:04 +00:00
dcoppa
0b66f8d674 Update to pjsua-1.10.
tested and ok'd by Christopher Zimmermann (maintainer)
ok landry@
2011-06-28 07:03:46 +00:00
sthen
0de3a685c1 - add commented-out example settings for configuring a server behind nat
- be explicit in sample config that people should use strong secrets
2011-06-27 21:15:14 +00:00