Commit Graph

68 Commits

Author SHA1 Message Date
sthen
c05df36e0d update to asterisk 1.8.9.0, ok ajacoutot@
This release has many fixes including thread locking issues,
crashes, resource leaks and others.
2012-01-28 08:16:22 +00:00
sthen
f3ee3a920c update Asterisk to 1.8.8.0
- various fixes, including a range of possible deadlocks
2011-12-16 14:50:09 +00:00
sthen
9d14ebbfb3 update to asterisk 1.8.7.0 2011-09-24 13:47:42 +00:00
naddy
aabf2d2b28 honor CFLAGS and don't force -Os or -O; ok sthen@ 2011-09-16 12:49:21 +00:00
sthen
7ab1f5f5cf update to asterisk 1.8.6.0 2011-09-09 15:29:21 +00:00
sthen
12c1d6ee3a regen patch to avoid a cvs keyword 2011-07-20 07:06:00 +00:00
sthen
64aa216876 update to asterisk 1.8.5.0, chan_unistim parts from & ok ian@ 2011-07-12 19:54:39 +00:00
sthen
2219c0a40e Your regularly scheduled security update to asterisk-1.8.4.3
AST-2011-008: If a remote user sends a SIP packet containing a null,
Asterisk assumes available data extends past the null to the
end of the packet when the buffer is actually truncated when
copied. This causes SIP header parsing to modify data past
the end of the buffer altering unrelated memory structures.
This vulnerability does not affect TCP/TLS connections.
-- Resolved in 1.6.2.18.1 and 1.8.4.3

AST-2011-009: A remote user sending a SIP packet containing a Contact header
with a missing left angle bracket (<) causes Asterisk to
access a null pointer.
-- Resolved in 1.8.4.3

AST-2011-010: A memory address was inadvertently transmitted over the
network via IAX2 via an option control frame and the remote party would try
to access it.
-- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3
2011-06-24 13:50:09 +00:00
sthen
5cdba91893 update to 1.8.4 2011-05-11 15:07:14 +00:00
ian
0bc7d2e694 Unbreak chan_unistim, bump. OK sthen@ (maintainer) 2011-04-09 19:16:51 +00:00
sthen
31288ac0e2 bugfix update to 1.8.3 2011-03-02 13:28:24 +00:00
sthen
9412bacbc5 Cherrypicked diff from svn; fix the internal implementation of htonll/ntohll
which was incorrect and would cause IAX interoperation to break. ok jasper@
2011-01-20 16:26:26 +00:00
sthen
aef236cbb8 SECURITY update to asterisk 1.8.2.1, fixes AST-2011-001 "an issue
when forming an outgoing SIP request while in pedantic mode, which
can cause a stack buffer to be made to overflow if supplied with
carefully crafted caller ID information"

http://downloads.asterisk.org/pub/security/AST-2011-001.html

This is also a major version update to the long-term support
1.8 branch, previous versions of this diff have been tested by
various ports@ readers, thanks for testing.

Please review /usr/local/share/doc/asterisk/UPGRADE.txt
(also note that memory use has increased).

ok ajacoutot@ jasper@
2011-01-19 11:25:16 +00:00
sthen
462a21e673 update Asterisk to 1.6.2.14 2010-11-16 21:58:52 +00:00
sthen
858dc57b21 - update Asterisk to 1.6.2.13
- upstream have prevented chan_h323 from building with pwlib>=1.19.0
as it segfaults at startup; disable the h323 flavour for now.
2010-09-19 21:14:05 +00:00
sthen
e8e4be4765 readd missing _ from user/group names in sample config. spotted by Brad. 2010-08-27 00:48:19 +00:00
sthen
6017df3bbb update asterisk to 1.6.2.11, loads of pretty safe bug fixes 2010-08-17 19:53:01 +00:00
sthen
c49f9f900f update to 1.6.2.10, switch to new LIB_DEPENDS etc. 2010-07-25 10:08:03 +00:00
sthen
e2d09616d7 adapt to our new SO_PEERCRED 2010-07-05 22:03:22 +00:00
sthen
e4fd3edfac update to 1.6.2.9; various crash fixes (including one with dtmf detection) 2010-06-18 22:10:44 +00:00
sthen
43c83759da Don't ulimit -n $MAXFILES if $MAXFILES is undefined. Spotted by fgsch@ 2010-06-07 20:03:55 +00:00
sthen
0551c55946 update to 1.6.2.8 2010-06-02 13:18:56 +00:00
sthen
832d7dc996 Update to 1.6.2.7; various bugs fixed including some DTMF problems,
potential crashes in chan_sip, and a chan_local deadlock.
2010-05-04 23:02:58 +00:00
sthen
c16616608b Add to UPGRADE-1.6.txt telling people that insecure=very (deprecated for
>3 years and triggering a warning in the logs) has been removed in this
version.
2010-05-04 14:41:48 +00:00
sthen
725df891d8 Use -pthread when checking for pthread_rwlock_timedwrlock.
No change yet, but means that the function can be used when it's
added to pthread. From Brad.
2010-04-14 08:23:38 +00:00
sthen
82aee579ee fix issues with unitialized address family; one when outboundproxy
is used, reported by Alexey Suslikov, one with dnsmgr when the looked-up
IP address of a peer changes (bug 15827).
2010-04-09 11:05:55 +00:00
sthen
dd9ff6c628 Update Asterisk to 1.6.2.6, which will be the only of the 1.6.x branches
receiving most updates in the future; notably, compared to the in-tree
version, this adds a portable (pthread-based) clocking source rather
than relying on a non-portable zaptel timer.

Main functions tested and working well for myself and Diego Casati (thanks!)
Note that ConfBridge (added since 1.6.0) may need more work
2010-04-08 16:18:00 +00:00
sthen
622d335805 add a patch from upstream, fixing build with newer sqlite 2010-04-02 19:28:45 +00:00
sthen
796c7bf27e update to 1.6.0.26 + a patch from a ticket upstream. 2010-03-25 12:01:47 +00:00
ajacoutot
cd6c6dcd9c Move to using h323plus and ptlib. 2010-03-23 21:16:53 +00:00
sthen
cd70bb9611 Update to 1.6.0.21, various bugs (including some crashes) fixed.
This also has a small change in CDR generation, it's been well tested
upstream but still this can be a touchy area to change, so it's
going in now so the first OpenBSD release with Asterisk 1.6
packages has the change already made.

ok ajacoutot@
2010-01-17 13:18:36 +00:00
sthen
16b6df18f8 Major version update to 1.6.0.19. For more information about the
upgrade, see /usr/local/share/doc/asterisk/UPGRADE-1.6.txt

Particular thanks to fgsch@, ian@ and Michiel van Baak for help and testing.
2009-12-13 12:11:29 +00:00
sthen
c103ca4da3 update to 1.4.27, I'll soon be committing a 1.6.0 version but first let's
have the latest 1.4 for people who don't want to move yet.
2009-11-19 16:17:04 +00:00
sthen
e6279a7a86 Switch to using supplied bootstrap.sh (plus a patch to stop it
from overriding supplied AUTOfoo_VERSION variables) instead of the
custom Makefile target to run autoconf.

No package change -> no bump. Discussed with fgsch in relation
to 1.6, but it makes sense here too.
2009-11-04 21:51:49 +00:00
sthen
d6c17e0b16 bugfix update to 1.4.26; see http://www.asterisk.org/node/48610 2009-07-21 22:05:24 +00:00
sthen
c0d15916fc maintenance update to 1.4.25. disable building the speex plugin by default
for now, it causes a SIGBUS at startup (and also did in the previous version)
which hasn't been tracked down yet.
2009-05-22 09:05:10 +00:00
sthen
7f827346dd maintenance update to 1.4.24 2009-03-29 22:23:35 +00:00
sthen
8504e3d898 SECURITY; patch AST-2009-002, remote *unauthenticated* crash in SIP
where the "pedantic" option is enabled (disabled by default).

Backported rather than updated until I sort out the H323 autoconf
breakage in newer versions.
2009-03-10 21:12:37 +00:00
sthen
7dadcbac78 maintenance update to 1.4.22; many fixes. 2008-10-07 09:57:52 +00:00
sthen
d57b2a9a52 Update Asterisk to 1.4.21, lots of quality-control fixes
ok ian
2008-06-14 16:00:10 +00:00
sthen
e1ead9579e update to 1.4.20.1; thanks to Pedro la Peu for additional testing. 2008-05-27 22:14:34 +00:00
sthen
7c7f03755a update to 1.4.19
ok ian@
2008-04-02 23:18:11 +00:00
ajacoutot
4bebb7f3ca - make the h323 FLAVOR build correctly with new pwlib/h323
- add a pre-build target so that we can remove IS_INTERACTIVE
(from sthen@)

ok sthen@
2008-03-15 17:41:12 +00:00
sthen
5802de6f10 update asterisk to 1.4.18 (following testing during RC period)
ok jolan
2008-02-07 22:08:30 +00:00
sthen
50c645a69b update to the asterisk release-du-jour.
ok ian's asterisk-ok-bot
2007-12-21 10:22:19 +00:00
sthen
2d388aff89 SECURITY update to 1.4.17, fixes AST-2007-027 (passwordless sip/iax peers,
configured from "realtime" database rather than static .conf files, are not
subject to IP address restrictions).

ok ian
2007-12-19 21:07:27 +00:00
sthen
ff506d6ff4 update Asterisk to 1.4.14 (with many bug fixes), and h323 flavor
(for interactive builds only).

ok jolan, ian
2007-11-27 10:41:04 +00:00
sthen
b22c11a7a4 SECURITY update for 1.4 versions (doesn't affect OpenBSD before 4.2);
fixes an overflow in IMAP voicemail storage reachable by anyone who can
send email to a VM box accessed from the phone. AST-2007-022, found by
sprintf audit.

ok ian@
2007-10-11 08:05:18 +00:00
sthen
bb85f6fc39 bug-fix update to 1.4.12
ok ian@
2007-10-04 11:25:44 +00:00
sthen
9c5f5dcd0d major version update to 1.4.11, ok ian@ jolan@ 2007-09-05 22:42:52 +00:00