/asterisk10, The Asterisk Software PBX
10.12.4nb6, Package name:
asterisk-10.12.4nb6, Maintainer: jnemeth
Asterisk is a complete PBX in software. It provides all of the
features you would expect from a PBX and more. Asterisk does voice
over IP in three protocols, and can interoperate with almost all
standards-based telephony equipment using relatively inexpensive
Asterisk provides Voicemail services with Directory, Call Conferencing,
Interactive Voice Response, Call Queuing. It has support for
three-way calling, caller ID services, ADSI, SIP and H.323 (as both
client and gateway).
NOTE: This version does not work with the zaptel drivers. It
requires the newer DAHDI drivers which are still being ported.
So, there is no hardware support available at this moment.
Required to run:
] Package options
: jabber, ldap, speex
Master sites: (Expand)
Version history: (Expand)
- (2015-01-30) Updated to version: asterisk-10.12.4nb6
- (2014-10-08) Updated to version: asterisk-10.12.4nb5
- (2014-05-30) Updated to version: asterisk-10.12.4nb4
- (2014-05-05) Updated to version: asterisk-10.12.4nb3
- (2014-04-09) Updated to version: asterisk-10.12.4nb2
- (2014-02-12) Updated to version: asterisk-10.12.4nb1
CVS history: (Expand)
| 2015-01-29 22:52:28 by John Nemeth | Files touched by this commit (2) | |
Update to Asterisk 10.12.4rc6.
This update is just to accomodate the speex splitup.
Note that Asterisk 10.x is dead upstream and should not be used
anymore. This package will be removed at some point.
| 2014-10-07 18:47:38 by Adam Ciarcinski | Files touched by this commit (442) |
Revbump after updating libwebp and icu
| 2014-05-30 01:38:20 by Thomas Klausner | Files touched by this commit (3049) |
Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
| 2014-05-05 02:48:38 by Ryo ONODERA | Files touched by this commit (1155) |
Recursive revbump from x11/pixman
Fix PR pkg/48777
| 2014-04-09 09:27:19 by OBATA Akio | Files touched by this commit (452) |
recursive bump from icu shlib major bump.
| 2014-03-11 15:05:19 by Jonathan Perkin | Files touched by this commit (350) |
Remove example rc.d scripts from PLISTs.
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or
| 2014-02-13 00:18:57 by Matthias Scheler | Files touched by this commit (1568) |
Recursive PKGREVISION bump for OpenSSL API version bump.
| 2013-12-17 06:37:10 by John Nemeth | Files touched by this commit (2) | |
Update to Asterisk 10.12.4: this is a security fix update that fixes
AST-2013-006 and AST-2013-007.
The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security
releases are released as versions 1.8.15-cert4, 11.2-cert3, 18.104.22.168, 10.12.4,
10.12.4-digiumphones, and 11.6.1.
The release of these versions resolve the following issues:
* A buffer overflow when receiving odd length 16 bit messages in app_sms. An
infinite loop could occur which would overwrite memory when a message is
received into the unpacksms16() function and the length of the message is an
odd number of bytes.
* Prevent permissions escalation in the Asterisk Manager Interface. Asterisk
now marks certain individual dialplan functions as 'dangerous', which will
inhibit their execution from external sources.
A 'dangerous' function is one which results in a privilege escalation. For
example, if one were to read the channel variable SHELL(rm -rf /) Bad
Things(TM) could happen; even if the external source has only read
Execution from external sources may be enabled by setting 'live_dangerously'
to 'yes' in the [options] section of asterisk.conf. Although doing so is not
These issues and their resolutions are described in the security advisories.
For more information about the details of these vulnerabilities, please read
security advisories AST-2013-006 and AST-2013-007, which were
released at the same time as this announcement.
For a full list of changes in the current releases, please see the ChangeLogs:
http://downloads.asterisk.org/pub/telep … g-22.214.171.124
The security advisories are available at:
* http://downloads.asterisk.org/pub/secur … 13-006.pdf
* http://downloads.asterisk.org/pub/secur … 13-007.pdf
Thank you for your continued support of Asterisk!