304 Commits

Author SHA1 Message Date
sthen
9617b9623f update to asterisk-16.2.0 2019-02-15 22:52:15 +00:00
sthen
1defc17282 srtp is now a shared lib 2019-02-15 22:30:39 +00:00
sthen
8bbe7e680f sort LIB_DEPENDS-main. fix some 64-bit time_t issues on 32-bit arches. 2019-02-12 22:56:35 +00:00
sthen
6fb185fdc8 update to Asterisk 16.1.1 from the new 16.x LTS branch
changes aren't too extreme, but upgrading users should review upgrade notes
in /usr/local/share/doc/asterisk (UPGRADE-14.txt, UPGRADE-15.txt, UPGRADE.txt).
2019-01-29 23:40:02 +00:00
sthen
b9953e1497 update to asterisk-13.24.1
the backported patch is retained for now, the issue it's fixing won't be
fixed upstream until 13.25.0, thanks Mark Patruck for testing.
2019-01-01 23:00:29 +00:00
sthen
7cc71a17b5 Fix MWI for voicemail in asterisk; patch from upstream via Mark Patruck
https://issues.asterisk.org/jira/browse/ASTERISK-28215
2018-12-20 17:02:23 +00:00
sthen
440ebb3232 update to asterisk-13.24.0 2018-12-12 10:52:13 +00:00
sthen
906e611ee5 avoid 'asterisk: vfprintf %s NULL in "%.*s %.*s/%u%s%.*s"' noticed by landry@ 2018-11-10 16:57:43 +00:00
sthen
71e92fb0b1 most post-patch to do-gen 2018-11-05 17:24:32 +00:00
sthen
faba394441 update to asterisk-13.23.1
AST-2018-009: Fix crash processing websocket HTTP Upgrade requests
https://downloads.asterisk.org/pub/security/AST-2018-009.pdf
2018-09-20 22:19:09 +00:00
sthen
69961a77e1 update to asterisk-13.23.0
- update comments in pjlib's sock_ossl.c, we do now have
SSL_set1_curves/SSL_CTX_set1_curves but still not SSL_get_shared_curve,
SSL_set1_{client_,}sigalgs_list
2018-09-06 13:32:00 +00:00
espie
f4b7f81318 convert to PKGSTEM 2018-09-04 12:46:09 +00:00
sthen
aee6279ab9 update to asterisk-13.22.0 2018-07-18 08:47:28 +00:00
sthen
fd7f669da3 update to asterisk-13.21.1
AST-2018-007: Infinite loop when reading iostreams

When connected to Asterisk via TCP/TLS if the client abruptly
disconnects, or sends a specially crafted message then Asterisk
gets caught in an infinite loop while trying to read the data stream.
Thus rendering the system as unusable.

AST-2018-008: PJSIP endpoint presence disclosure when using ACL

When endpoint specific ACL rules block a SIP request they respond with
a 403 forbidden. However, if an endpoint is not identified then a 401
unauthorized response is sent. This vulnerability just discloses which
requests hit a defined endpoint. The ACL rules cannot be bypassed to
gain access to the disclosed endpoints.
2018-06-12 15:52:03 +00:00
sthen
248dbaa207 missed cvs add for some long long time_t fixes in pjsip 2018-05-03 21:11:41 +00:00
sthen
33c17030a7 update to asterisk-13.21.0 2018-05-03 21:10:49 +00:00
sthen
0dca8747e3 remove junk asterisk.conf.old file from plist, which caused clean builds to
fail, reported by naddy@.

set COMPILER_LANGS=c while there, the GNU compiler is only used for C nested
functions (because I still have no ideas about the BlocksRuntime with clang),
c++ is not needed.
2018-03-16 20:57:09 +00:00
sthen
fd223b54a2 bugfix update to Asterisk 13.20.0, some security-related
https://www.asterisk.org/downloads/asterisk-news/asterisk-13200-now-available
2018-03-15 23:00:19 +00:00
sthen
720878bd28 update to asterisk-13.19.2
AST-2018-002: Crash when given an invalid SDP media format description
AST-2018-003: Crash with an invalid SDP fmtp attribute
AST-2018-004: Crash when receiving SUBSCRIBE request
AST-2018-005: Crash when large numbers of TCP connections are closed suddenly
AST-2018-006: WebSocket frames with 0 sized payload causes DoS

(only 15.x reported as affected by AST-2018-001)
2018-02-21 22:37:41 +00:00
sthen
db6eb2c55b update to asterisk-13.19.1 2018-02-13 21:42:45 +00:00
sthen
228e7320e0 fix build on base-gcc architectures; it was failing there because /usr/local
is not in the header search path on base-gcc, whereas it is on ports-gcc.

thanks to Diana Eichert for the report (testing on octeon).
2018-02-08 22:23:02 +00:00
sthen
b2881b08d2 Fix a bad subst in the simplified sample of extensions.conf.
Fix #! line for bash in astversion. Not forced in RUN_DEPENDS because in all
the time this has been present only one person noticed, so the script doesn't
seem too popular. (Script also makes some assumptions about library versions
which don't apply here but I don't think it's worth poking at this too far).

Reported by landry@
2018-01-21 20:59:18 +00:00
sthen
7487cad718 use asterisk's github mirror of pjproject tarball as the primary download
site for that
2018-01-15 11:48:48 +00:00
sthen
98a2c2b056 don't pick up bcg729 if present, it breaks build of the internal copy of pjproject
(other codecs are already disabled in the pjproject build, it's only used for sip
signalling - asterisk has its own codec stack, this doesn't affect use of the
asterisk-g729 package).
2018-01-15 11:45:04 +00:00
sthen
dba14465bc Fix asterisk build on a clean system, reported by ajacoutot@.
Problem was due to an OPENSSL_VERSION_NUMBER 0x1010... check in a .so.
2018-01-15 09:43:45 +00:00
sthen
fe984140a9 update to asterisk-13.19.0 2018-01-14 13:11:48 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
sthen
5b1f08dc4c update to Asterisk 13.18.5
AST-2017-012: Remote Crash Vulnerability in RTCP Stack

If a compound RTCP packet is received containing more than one report
(for example a Receiver Report and a Sender Report) the RTCP stack
will incorrectly store report information outside of allocated memory
potentially causing a crash.

AST-2017-014: Crash in PJSIP resource when missing a contact header

A select set of SIP messages create a dialog in Asterisk. Those SIP
messages must contain a contact header. For those messages, if the
header was not present and using the PJSIP channel driver, it would
cause Asterisk to crash. The severity of this vulnerability is somewhat
mitigated if authentication is enabled. If authentication is enabled a
user would have to first be authorized before reaching the crash point.
2017-12-24 19:37:16 +00:00
sthen
767a3645bf update to Asterisk 13.18.3; fix problem with chan_skinny (SCCP protocol)
which missed a pthread_detach().
2017-12-06 14:22:39 +00:00
sthen
8c273f49e0 update to Asterisk 13.18.2 2017-11-11 15:19:10 +00:00
ajacoutot
bdca485ff0 Bump after libical pkgpath change. 2017-11-08 05:36:11 +00:00
sthen
9d473b4911 update to asterisk-13.17.2 - fix AST-2017-008 RTP/RTCP problems, followup
to AST-2017-005.

The RTP/RTCP stack will now validate RTCP packets before processing
them. Packets failing validation are discarded. RTP stream qualification
now requires the intended series of packets from the same address
without seeing packets from a different source address to accept a new
source address.
2017-09-21 10:11:16 +00:00
sthen
c0686bca82 - fix build when pjproject distfile is older than version.mak, breakage
reported by nigel@

- avoid hardcoded -O3 in pjsip build, honour CFLAGS instead
2017-09-01 09:55:28 +00:00
sthen
8a290e74b0 update to asterisk-13.17.1
AST-2017-005: Media takeover in RTP stack
AST-2017-006: Shell access command injection in app_minivm
AST-2017-007: Remote Crash Vulerability in res_pjsip

also install the basic-pbx sample configs
2017-08-31 21:34:05 +00:00
sthen
a7a5775b0f add comment noting that these two ports should keep COMPILER in sync 2017-08-22 22:51:04 +00:00
espie
7737872aef rework COMPILER yet again. new version should be easier to grasp 2017-08-22 10:27:33 +00:00
sthen
4a8a1b2bed Switch Asterisk to a gcc build (it requires either nested functions,
which are gcc-specific, or clang with -fblocks, which we don't have
working fully yet).

To avoid a C++ standard library conflict, switch to a stripped-down and
patched copy of pjsua/pjsip built as part of the Asterisk build.

Some slight patch gymnastics; Asterisk doesn't distribute pjsua itself
but rather normally downloads, untars and patches as part of the build,
which isn't compatible with the patches we need to apply in order to
fix it with libressl.
2017-08-05 12:29:21 +00:00
espie
8ac47fd9c6 use COMPILER_LIBCXX where applicable 2017-07-16 19:18:47 +00:00
sthen
dc5ed179ec update to asterisk-13.17.0 2017-07-12 19:55:29 +00:00
sthen
bdddc7a175 update to asterisk-13.15.1, fixing AST-2017-004: Memory exhaustion
on short SCCP packets. This only affects SCCP users (chan_skinny).

13.15.1 also added some fixes to the bundled copy of PJSIP
(used by chan_pjsip, *not* used by chan_sip) -
AST-2017-002: Buffer Overrun in PJSIP transaction layer,
AST-2017-003: Crash in PJSIP multi-part body parser
- however that copy is not used by this package and will need to
be fixed separately.
2017-05-26 15:42:45 +00:00
sthen
9c8d475fe3 pass LDFLAGS to the autoconf test for clang -fblocks. still broken:
- clang + ld.bfd: link fails in autoconf test, undefined symbols.

- clang + ld.lld: package builds, dlopen()ing the .so modules that use -fblocks
fails at runtime.

because with clang + ld.lld it does build but results in unusable packages,
explicitly mark BROKEN-aarch64 for now.
2017-05-26 15:30:49 +00:00
sthen
073d25a37c use LIBCXX 2017-04-10 11:46:32 +00:00
sthen
76cc768287 update to asterisk-13.15.0.
add various OPENSSL_VERSION_NUMBER patches now that asterisk supports
openssl 1.1:

- we don't have openssl 1.1's SSL_is_server yet, so use the old check
for ssl->server instead

- we do still need the hack to avoid initing multiple times which is
no longer needed in openssl 1.1
2017-04-07 21:32:20 +00:00
sthen
93733b5c4f update to asterisk-13.14.1
http://downloads.digium.com/pub/security/AST-2017-001.html

CDR: Protect from data overflow in ast_cdr_setuserfield.
ast_cdr_setuserfield wrote to a fixed length field using strcpy.
This could result in a buffer overrun when called from chan_sip or
func_cdr. This patch adds a maximum bytes written to the field by using
ast_copy_string instead.
2017-04-05 10:27:36 +00:00
sthen
40792daef2 convert another getprotobyname() 2017-03-18 21:49:48 +00:00
sthen
721578dc23 Don't use thread-unsafe getprotobyname(), patch from jira ticket ASTERISK-26759.
Teach some helper scripts about common coredump paths in OpenBSD.
2017-03-18 21:42:04 +00:00
sthen
035ece38c3 update to asterisk-13.14.0 2017-02-14 12:31:38 +00:00
kili
513ae4b616 Revert the -kqueue subpackage changes that snucked in by accident.
ok sthen@
2017-02-07 21:09:10 +00:00
sthen
d0734edd19 raise debug level of other audiohook messages, even debug level 1 is unusable
on a busy system
2017-02-06 10:11:31 +00:00
sthen
7f2a39c127 Patch to raise level of Asterisk's "Read factory %p and write factory %p
both fail to provide %zu samples" debug message which is triggering very
frequently, so that it's possible to get debug level 5 messages without
flattening the box.
2017-02-02 14:04:07 +00:00