Next | Query returned 98 messages, browsing 21 to 30 | Previous

History of commit frequency

CVS Commit History:


   2021-10-07 15:27:10 by Nia Alarie | Files touched by this commit (85)
Log message:
comms: Remove SHA1 hashes for distfiles
   2021-09-29 21:01:31 by Adam Ciarcinski | Files touched by this commit (872)
Log message:
revbump for boost-libs
   2021-08-01 04:57:12 by John Nemeth | Files touched by this commit (2)
Log message:
asterisk13: Update to Asterisk 13.38.3.

The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16, 17 and 18, and Certified Asterisk 16.8. The available releases
are released as versions 13.38.3, 16.19.1, 17.9.4, 18.5.1 and 16.8-cert10.

These releases are available for immediate download at

https://downloads.asterisk.org/pub/telephony/asterisk/releases

The following security vulnerabilities were resolved in these versions:

* AST-2021-007: Remote Crash Vulnerability in PJSIP channel driver
  When Asterisk receives a re-INVITE without SDP after having sent
  a BYE request a crash will occur. This occurs due to the Asterisk
  channel no longer being present while code assumes it is.

* AST-2021-008: Remote crash when using IAX2 channel driver
  If the IAX2 channel driver receives a packet that contains an

* AST-2021-009: pjproject/pjsip: crash when SSL socket destroyed during
                handshake
  Depending on the timing, it's possible for Asterisk to crash when
  using a TLS connection if the underlying socket parent/listener
  gets destroyed during the handshake.

For a full list of changes in the current releases, please see the ChangeLogs:

https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.38.3

The security advisories are available at:

https://downloads.asterisk.org/pub/security/AST-2021-007.pdf
https://downloads.asterisk.org/pub/security/AST-2021-008.pdf
https://downloads.asterisk.org/pub/security/AST-2021-009.pdf

Thank you for your continued support of Asterisk!
   2021-05-24 21:56:06 by Thomas Klausner | Files touched by this commit (3575)
Log message:
*: recursive bump for perl 5.34
   2021-04-21 15:25:34 by Adam Ciarcinski | Files touched by this commit (864)
Log message:
revbump for boost-libs
   2021-04-21 13:43:04 by Adam Ciarcinski | Files touched by this commit (1822)
Log message:
revbump for textproc/icu
   2021-02-28 23:48:07 by John Nemeth | Files touched by this commit (2)
Log message:
asterisk13:  Update to Asterisk 13.38.2:

The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16, 17 and 18, and Certified Asterisk 16.8. The available releases
are released as versions 13.38.2, 16.16.1, 17.9.2, 18.2.1 and 16.8-cert6.

These releases are available for immediate download at

https://downloads.asterisk.org/pub/telephony/asterisk/releases
https://downloads.asterisk.org/pub/telephony/certified-asterisk/releases

The following security vulnerabilities were resolved in these versions:

* AST-2021-001: Remote crash in res_pjsip_diversion
  If a registered user is tricked into dialing a

* AST-2021-002: Remote crash possible when negotiating T.38
  When

* AST-2021-003: Remote attacker could prematurely tear down SRTP calls
  An unauthenticated remote attacker could replay SRTP packets which could cause
  an Asterisk instance configured without strict RTP validation to tear down
  calls prematurely.

* AST-2021-004: An unsuspecting user could crash Asterisk with multiple
                hold/unhold requests
  Due to a signedness comparison mismatch, an authenticated WebRTC client could
  cause a stack overflow and Asterisk crash by sending multiple hold/unhold
  requests in quick succession.

* AST-2021-005: Remote Crash Vulnerability in PJSIP channel driver
  Given a scenario where an outgoing call is placed from Asterisk to a remote
  SIP server it is possible for a crash to occur.

For a full list of changes in the current releases, please see the ChangeLogs:

https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.38.2

The security advisories are available at:

https://downloads.asterisk.org/pub/security/AST-2021-001.pdf
https://downloads.asterisk.org/pub/security/AST-2021-002.pdf
https://downloads.asterisk.org/pub/security/AST-2021-003.pdf
https://downloads.asterisk.org/pub/security/AST-2021-004.pdf
https://downloads.asterisk.org/pub/security/AST-2021-005.pdf

Thank you for your continued support of Asterisk!
   2021-01-03 10:04:07 by John Nemeth | Files touched by this commit (2)
Log message:
Disable -march=native default.
   2020-11-05 10:09:30 by Ryo ONODERA | Files touched by this commit (1814)
Log message:
*: Recursive revbump from textproc/icu-68.1
   2020-08-31 20:13:29 by Thomas Klausner | Files touched by this commit (3631)
Log message:
*: bump PKGREVISION for perl-5.32.

Next | Query returned 98 messages, browsing 21 to 30 | Previous