2022-06-28 13:38:00 by Thomas Klausner | Files touched by this commit (3952) |
Log message:
*: recursive bump for perl 5.36
|
2022-05-05 10:20:09 by Nia Alarie | Files touched by this commit (4) |
Log message:
asterisk*: Use OPSYS_VERSION to numerically compare NetBSD versions
|
2022-04-18 21:12:27 by Adam Ciarcinski | Files touched by this commit (1798) | |
Log message:
revbump for textproc/icu update
|
2021-12-08 17:07:18 by Adam Ciarcinski | Files touched by this commit (3063) |
Log message:
revbump for icu and libffi
|
2021-11-09 13:04:43 by Nia Alarie | Files touched by this commit (7) |
Log message:
mk: For consistency, rename PKG_HAS_ to OPSYS_HAVE_.
Requested by jperkin.
|
2021-11-09 12:11:08 by Nia Alarie | Files touched by this commit (4) |
Log message:
asterisk*: Detect kqueue/timerfd through pkgsrc infrastructure.
Fixes PLIST on NetBSD/current.
|
2021-10-26 12:06:07 by Nia Alarie | Files touched by this commit (85) |
Log message:
comms: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
|
2021-10-07 15:27:10 by Nia Alarie | Files touched by this commit (85) |
Log message:
comms: Remove SHA1 hashes for distfiles
|
2021-09-29 21:01:31 by Adam Ciarcinski | Files touched by this commit (872) |
Log message:
revbump for boost-libs
|
2021-08-01 04:57:12 by John Nemeth | Files touched by this commit (2) |
Log message:
asterisk13: Update to Asterisk 13.38.3.
The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16, 17 and 18, and Certified Asterisk 16.8. The available releases
are released as versions 13.38.3, 16.19.1, 17.9.4, 18.5.1 and 16.8-cert10.
These releases are available for immediate download at
https://downloads.asterisk.org/pub/telephony/asterisk/releases
The following security vulnerabilities were resolved in these versions:
* AST-2021-007: Remote Crash Vulnerability in PJSIP channel driver
When Asterisk receives a re-INVITE without SDP after having sent
a BYE request a crash will occur. This occurs due to the Asterisk
channel no longer being present while code assumes it is.
* AST-2021-008: Remote crash when using IAX2 channel driver
If the IAX2 channel driver receives a packet that contains an
* AST-2021-009: pjproject/pjsip: crash when SSL socket destroyed during
handshake
Depending on the timing, it's possible for Asterisk to crash when
using a TLS connection if the underlying socket parent/listener
gets destroyed during the handshake.
For a full list of changes in the current releases, please see the ChangeLogs:
https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.38.3
The security advisories are available at:
https://downloads.asterisk.org/pub/security/AST-2021-007.pdf
https://downloads.asterisk.org/pub/security/AST-2021-008.pdf
https://downloads.asterisk.org/pub/security/AST-2021-009.pdf
Thank you for your continued support of Asterisk!
|