STUNTMAN is an open source, high performance STUN server, implementation
of the STUN protocol as specified in RFCs 5389, 5769, and 5780. It also
includes backwards compatibility for RFC 3489.
a new libmysqlclient non-blocking API which utilizes co-routines. The X86
specific GCC ASM co-routine support hid the fact that there was an issue.
The only fallback code so far is POSIX user contexts which OpenBSD does not
support.
Input from and Ok sthen@ jasper@
(core)
- Italian language prompts for core sounds
- missing prompts for VoiceMailMain application in Russian
(extra)
- various fixed files in extra-sounds
- various new files in extra-sounds (some in French, many in English)
- many files duplicated from core-sounds have been removed
- note: "an-error-has-occured" has been renamed "an-error-has-occurred"
Additionally the packages now install the text files detailing changes
and a text description of the font files (renamed to avoid conflicts
between flavours).
sln16 versions have been dropped from packages for now to save a
few hundred MB per arch on the mirrors, g729 versions have been added
in their place.
REVISION doesn't change the stem of the package name. Came after some head
scratching after naddy@ reported a PLIST_DB change to telephony/asterisk's
@depend lines which happened after I bumped REVISION on the asterisk-sounds
ports when I tweaked CATEGORIES.
This module provides an interface to the Asterisk Manager Interface.
Its goal is to provide a flexible, powerful, and reliable way to
interact with Asterisk upon which other applications may be built.
It utilizes AnyEvent and therefore can integrate very easily into
event-based applications, but still provides blocking functions for use
with standard scripting.
* A possible buffer overflow during H.264 (video) format negotiation.
CVE-2013-2685
* A denial of service exists in Asterisk's HTTP server.
CVE-2013-2686
* A potential username disclosure exists in the SIP channel driver.
CVE-2013-2264
AST-2012-014: crashes due to large stack allocations in TCP;
affects remote unauthenticated SIP *over TCP* and remote authenticated
XMPP/HTTP connections.
AST-2012-015: DoS through resource consumption by exploiting device
state caching; exploitable if anonymous calls are permitted.
- while there, revise pbx_spool.c kevent timeout fix; rather than
clamping the timestamp, in the particular problem situation we hit
the loop (where dirlist is empty), pass in NULL rather than
INT_MAX-timenow similar to what's done in the inotify case.