Subject: CVS commit: pkgsrc/comms/asterisk10
From: John Nemeth
Date: 2012-07-06 23:10:11
Message id: 20120706211011.9EDD5175DD@cvs.netbsd.org

Log Message:
Update to Asterisk 10.5.2:  this fixes two security issues, AST-2012-010
and AST-2012-011

The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.11  nd Asterisk 1.8 and 10. The available security releases are
released as versions 1.8.11-cert4, 1.8.13.1, 10.5.2, and 10.5.2-digiumphones.

The release of Asterisk 1.8.11-cert4, 1.8.13.1, 10.5.2, and 10.5.2-digiumphones
resolve the following two issues:

* If Asterisk sends a re-invite and an endpoint responds to the re-invite with
  a provisional response but never sends a final response, then the SIP dialog
  structure is never freed and the RTP ports for the call are never released. If
  an attacker has the ability to place a call, they could create a denial of
  service by using all available RTP ports.

* If a single voicemail account is manipulated by two parties simultaneously,
  a condition can occur where memory is freed twice causing a crash.

These issues and their resolution are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2012-010 and AST-2012-011, which were released at the
same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.5.2

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-010.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-011.pdf

Thank you for your continued support of Asterisk!

Files:
RevisionActionfile
1.20modifypkgsrc/comms/asterisk10/Makefile
1.15modifypkgsrc/comms/asterisk10/distinfo