./comms/asterisk13, The Asterisk Software PBX

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 13.38.3nb1, Package name: asterisk-13.38.3nb1, Maintainer: jnemeth

Asterisk is a complete PBX in software. It provides all of the
features you would expect from a PBX and more. Asterisk does voice
over IP in three protocols, and can interoperate with almost all
standards-based telephony equipment using relatively inexpensive
hardware.

Asterisk provides Voicemail services with Directory, Call Conferencing,
Interactive Voice Response, Call Queuing. It has support for
three-way calling, caller ID services, ADSI, SIP and H.323 (as both
client and gateway).

This is a long term support version. It is scheduled to go to
security fixes only on 2020-10-24, and EOL on 2021-10-24. For more
information about Asterisk versions, see
https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions

NOTE: This version does not work with the zaptel drivers. It
requires the newer DAHDI drivers which are still being ported.
So, there is no hardware support available at this moment.


Required to run:
[textproc/libxml2] [www/curl] [databases/openldap-client] [audio/speex] [lang/perl5] [shells/bash] [security/openssl] [devel/libuuid] [textproc/iksemel] [textproc/jansson] [audio/speexdsp] [comms/srtp]

Required to build:
[pkgtools/cwrappers]

Package options: asterisk-config, jabber, ldap, speex

Master sites: (Expand)


Version history: (Expand)


CVS history: (Expand)


   2021-10-26 12:06:07 by Nia Alarie | Files touched by this commit (85)
Log message:
comms: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes
   2021-10-07 15:27:10 by Nia Alarie | Files touched by this commit (85)
Log message:
comms: Remove SHA1 hashes for distfiles
   2021-09-29 21:01:31 by Adam Ciarcinski | Files touched by this commit (872)
Log message:
revbump for boost-libs
   2021-08-01 04:57:12 by John Nemeth | Files touched by this commit (2) | Package updated
Log message:
asterisk13: Update to Asterisk 13.38.3.

The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16, 17 and 18, and Certified Asterisk 16.8. The available releases
are released as versions 13.38.3, 16.19.1, 17.9.4, 18.5.1 and 16.8-cert10.

These releases are available for immediate download at

https://downloads.asterisk.org/pub/tele … k/releases

The following security vulnerabilities were resolved in these versions:

* AST-2021-007: Remote Crash Vulnerability in PJSIP channel driver
  When Asterisk receives a re-INVITE without SDP after having sent
  a BYE request a crash will occur. This occurs due to the Asterisk
  channel no longer being present while code assumes it is.

* AST-2021-008: Remote crash when using IAX2 channel driver
  If the IAX2 channel driver receives a packet that contains an

* AST-2021-009: pjproject/pjsip: crash when SSL socket destroyed during
                handshake
  Depending on the timing, it's possible for Asterisk to crash when
  using a TLS connection if the underlying socket parent/listener
  gets destroyed during the handshake.

For a full list of changes in the current releases, please see the ChangeLogs:

https://downloads.asterisk.org/pub/tele … og-13.38.3

The security advisories are available at:

https://downloads.asterisk.org/pub/secu … 21-007.pdf
https://downloads.asterisk.org/pub/secu … 21-008.pdf
https://downloads.asterisk.org/pub/secu … 21-009.pdf

Thank you for your continued support of Asterisk!
   2021-05-24 21:56:06 by Thomas Klausner | Files touched by this commit (3575)
Log message:
*: recursive bump for perl 5.34
   2021-04-21 15:25:34 by Adam Ciarcinski | Files touched by this commit (864)
Log message:
revbump for boost-libs
   2021-04-21 13:43:04 by Adam Ciarcinski | Files touched by this commit (1822)
Log message:
revbump for textproc/icu
   2021-02-28 23:48:07 by John Nemeth | Files touched by this commit (2) | Package updated
Log message:
asterisk13:  Update to Asterisk 13.38.2:

The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16, 17 and 18, and Certified Asterisk 16.8. The available releases
are released as versions 13.38.2, 16.16.1, 17.9.2, 18.2.1 and 16.8-cert6.

These releases are available for immediate download at

https://downloads.asterisk.org/pub/tele … k/releases
https://downloads.asterisk.org/pub/tele … k/releases

The following security vulnerabilities were resolved in these versions:

* AST-2021-001: Remote crash in res_pjsip_diversion
  If a registered user is tricked into dialing a

* AST-2021-002: Remote crash possible when negotiating T.38
  When

* AST-2021-003: Remote attacker could prematurely tear down SRTP calls
  An unauthenticated remote attacker could replay SRTP packets which could cause
  an Asterisk instance configured without strict RTP validation to tear down
  calls prematurely.

* AST-2021-004: An unsuspecting user could crash Asterisk with multiple
                hold/unhold requests
  Due to a signedness comparison mismatch, an authenticated WebRTC client could
  cause a stack overflow and Asterisk crash by sending multiple hold/unhold
  requests in quick succession.

* AST-2021-005: Remote Crash Vulnerability in PJSIP channel driver
  Given a scenario where an outgoing call is placed from Asterisk to a remote
  SIP server it is possible for a crash to occur.

For a full list of changes in the current releases, please see the ChangeLogs:

https://downloads.asterisk.org/pub/tele … og-13.38.2

The security advisories are available at:

https://downloads.asterisk.org/pub/secu … 21-001.pdf
https://downloads.asterisk.org/pub/secu … 21-002.pdf
https://downloads.asterisk.org/pub/secu … 21-003.pdf
https://downloads.asterisk.org/pub/secu … 21-004.pdf
https://downloads.asterisk.org/pub/secu … 21-005.pdf

Thank you for your continued support of Asterisk!