diff options
| author | Timo Teräs <timo.teras@iki.fi> | 2017-09-25 08:17:34 +0000 |
|---|---|---|
| committer | Timo Teräs <timo.teras@iki.fi> | 2017-09-25 08:26:46 +0000 |
| commit | 242bd51a0a23fba17ced6a6ba725474c68d56027 (patch) | |
| tree | 3a830b040b51d4a61e2e271e720c99bb1677a318 /main/asterisk/musl-libcap.patch | |
| parent | 177eb88fc8668b0fd560c1836cd05bb17c29cad7 (diff) | |
| download | aports-242bd51a0a23fba17ced6a6ba725474c68d56027.tar.bz2 aports-242bd51a0a23fba17ced6a6ba725474c68d56027.tar.xz | |
main/asterisk: security upgrade to 13.17.2
fixes #7795
AST-2017-005 (CVE-2017-14099): Media takeover in RTP stack
AST-2017-006 (CVE-2017-14100): Shell access command injection in app_minivm
AST-2017-008 (CVE-2017-14603): RTP/RTCP information leak
Diffstat (limited to 'main/asterisk/musl-libcap.patch')
| -rw-r--r-- | main/asterisk/musl-libcap.patch | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/main/asterisk/musl-libcap.patch b/main/asterisk/musl-libcap.patch index a414e05fd3..88a0949826 100644 --- a/main/asterisk/musl-libcap.patch +++ b/main/asterisk/musl-libcap.patch @@ -27,11 +27,11 @@ --- asterisk-13.3.2.orig/main/Makefile +++ asterisk-13.3.2/main/Makefile @@ -42,7 +42,7 @@ - AST_LIBS+=$(CRYPT_LIB) - AST_LIBS+=$(AST_CLANG_BLOCKS_LIBS) + AST_LIBS+=$(RT_LIB) + AST_LIBS+=$(SYSTEMD_LIB) -ifneq ($(findstring $(OSARCH), linux-gnu uclinux linux-uclibc kfreebsd-gnu),) +ifneq ($(findstring $(OSARCH), linux-gnu uclinux linux-uclibc linux-musl kfreebsd-gnu),) - ifneq ($(findstring LOADABLE_MODULES,$(MENUSELECT_CFLAGS)),) AST_LIBS+=-ldl - endif + ifneq (x$(CAP_LIB),x) + AST_LIBS+=$(CAP_LIB) |
