2021-10-07 15:27:10 by Nia Alarie | Files touched by this commit (85) |
Log message:
comms: Remove SHA1 hashes for distfiles
|
2021-09-29 21:01:31 by Adam Ciarcinski | Files touched by this commit (872) |
Log message:
revbump for boost-libs
|
2021-08-01 04:57:12 by John Nemeth | Files touched by this commit (2) |
Log message:
asterisk13: Update to Asterisk 13.38.3.
The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16, 17 and 18, and Certified Asterisk 16.8. The available releases
are released as versions 13.38.3, 16.19.1, 17.9.4, 18.5.1 and 16.8-cert10.
These releases are available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk/releases
The following security vulnerabilities were resolved in these versions:
* AST-2021-007: Remote Crash Vulnerability in PJSIP channel driver
When Asterisk receives a re-INVITE without SDP after having sent
a BYE request a crash will occur. This occurs due to the Asterisk
channel no longer being present while code assumes it is.
* AST-2021-008: Remote crash when using IAX2 channel driver
If the IAX2 channel driver receives a packet that contains an
* AST-2021-009: pjproject/pjsip: crash when SSL socket destroyed during
handshake
Depending on the timing, it's possible for Asterisk to crash when
using a TLS connection if the underlying socket parent/listener
gets destroyed during the handshake.
For a full list of changes in the current releases, please see the ChangeLogs:
https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.38.3
The security advisories are available at:
https://downloads.asterisk.org/pub/security/AST-2021-007.pdf
https://downloads.asterisk.org/pub/security/AST-2021-008.pdf
https://downloads.asterisk.org/pub/security/AST-2021-009.pdf
Thank you for your continued support of Asterisk!
|
2021-05-24 21:56:06 by Thomas Klausner | Files touched by this commit (3575) |
Log message:
*: recursive bump for perl 5.34
|
2021-04-21 15:25:34 by Adam Ciarcinski | Files touched by this commit (864) |
Log message:
revbump for boost-libs
|
2021-04-21 13:43:04 by Adam Ciarcinski | Files touched by this commit (1822) |
Log message:
revbump for textproc/icu
|
2021-02-28 23:48:07 by John Nemeth | Files touched by this commit (2) |
Log message:
asterisk13: Update to Asterisk 13.38.2:
The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16, 17 and 18, and Certified Asterisk 16.8. The available releases
are released as versions 13.38.2, 16.16.1, 17.9.2, 18.2.1 and 16.8-cert6.
These releases are available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk/releases
https://downloads.asterisk.org/pub/telephony/certified-asterisk/releases
The following security vulnerabilities were resolved in these versions:
* AST-2021-001: Remote crash in res_pjsip_diversion
If a registered user is tricked into dialing a
* AST-2021-002: Remote crash possible when negotiating T.38
When
* AST-2021-003: Remote attacker could prematurely tear down SRTP calls
An unauthenticated remote attacker could replay SRTP packets which could cause
an Asterisk instance configured without strict RTP validation to tear down
calls prematurely.
* AST-2021-004: An unsuspecting user could crash Asterisk with multiple
hold/unhold requests
Due to a signedness comparison mismatch, an authenticated WebRTC client could
cause a stack overflow and Asterisk crash by sending multiple hold/unhold
requests in quick succession.
* AST-2021-005: Remote Crash Vulnerability in PJSIP channel driver
Given a scenario where an outgoing call is placed from Asterisk to a remote
SIP server it is possible for a crash to occur.
For a full list of changes in the current releases, please see the ChangeLogs:
https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.38.2
The security advisories are available at:
https://downloads.asterisk.org/pub/security/AST-2021-001.pdf
https://downloads.asterisk.org/pub/security/AST-2021-002.pdf
https://downloads.asterisk.org/pub/security/AST-2021-003.pdf
https://downloads.asterisk.org/pub/security/AST-2021-004.pdf
https://downloads.asterisk.org/pub/security/AST-2021-005.pdf
Thank you for your continued support of Asterisk!
|
2021-01-03 10:04:07 by John Nemeth | Files touched by this commit (2) |
Log message:
Disable -march=native default.
|
2020-11-05 10:09:30 by Ryo ONODERA | Files touched by this commit (1814) |
Log message:
*: Recursive revbump from textproc/icu-68.1
|
2020-08-31 20:13:29 by Thomas Klausner | Files touched by this commit (3631) |
Log message:
*: bump PKGREVISION for perl-5.32.
|