| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
(cherry picked from commit c85cd9d8d6550540bea93baeba24f5f3d8bfeb04)
|
|
|
|
|
| |
AST-2015-003: TLS Certificate Common name NULL byte exploit
(cherry picked from commit cf3484ae75dddf7cd555d8594fdf613a89cff3fd)
|
|
|
|
| |
AST-2015-003: TLS Certificate Common name NULL byte exploit
|
|
|
|
|
|
|
|
|
|
| |
AST-2015-001: File descriptor leak when incompatible codecs are offered (chan_pjsip)
AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability
(cherry picked from commit e3128a9a5f09d6142974693a94c3274cd54cd1d1)
Conflicts:
main/asterisk/APKBUILD
|
|
|
|
| |
(cherry picked from commit a2463ed03b4578110ae177274c31ac948333e649)
|
|
|
|
|
| |
AST-2014-019: Remote Crash Vulnerability in WebSocket Server
(cherry picked from commit e2b55ba8a964029c7eb2341c43827235f1f5e65c)
|
|
|
|
|
|
|
|
|
|
|
| |
AST-2014-012: Unauthorized access in the presence of ACLs with
mixed IP address families
AST-2014-018: Permission Escalation through DB dialplan function
AST-2014-017: Permission Escalation via ConfBridge dialplan function
and AMI ConfbridgeStartRecord Action
AST-2014-013: Unauthorized access in the presence of ACLs in the PJSIP stack
AST-2014-015: Remote crash vulnerability in PJSIP channel driver
AST-2014-016: Remote crash vulnerability in PJSIP channel driver
|
| |
|
|
|
|
| |
rebase the conference 'deafen' patch
|
|
|
|
|
|
| |
AST-2014-009: Remote crash based on malformed SIP subscription requests
AST-2014-010: Remote crash when handling out of call message in certain
dialplan configurations
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
- remove unused uclibc patches
- fix libcap with musl
- enable iconv as it is built into musl
- import mp3 addon as patch instead of svn checkout
- update ASTERISK-23818 patch from upstream
|
| |
|
|
|
|
| |
and make sure things fail if make install did not work
|
|
|
|
| |
revert incorrect fix for ASTERISK-23818
|
|
|
|
|
|
| |
... the default type should not be assumed to be recursive as
it's not specified in any spec. And in musl it defaults to non-recursive
mutex.
|
| |
|
|
|
|
| |
libasteriskssl requires libssl, but only for dynamic symbol lookups.
|
| |
|
|
|
|
| |
Fixes a major regression in the fix to AST-2014-007
|
|
|
|
|
|
|
| |
AST-2014-005: Remote Crash in PJSIP Channel Driver's Pub/Sub Framework
AST-2014-006: Permission Escalation via Manager User Unauthorized Shell Access
AST-2014-007: DoS via Exhaustion of Allowed Concurrent HTTP Connections
AST-2014-008: Denial of Service in PJSIP Channel Driver Subscriptions
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
AST-2014-001, CVE-2014-2286: Stack Overflow in HTTP/Cookie Headers handling
AST-2014-002, CVE-2014-2287: DoS FD Exhaustion with chan_sip Session-Timers
AST-2014-003, CVE-2014-2288: DoS Vulnerability in PJSIP channel driver
AST-2014-004, CVE-2014-2289 was fixed before announcement already in 12.1.0
|
|
|
|
|
| |
ASTERISK-19109, rebased against 12.x (untested)
ASTERISK-19499, cherry picked from upstream
|
|
|
|
|
|
| |
app_meetme used to be there, but as it's deprecated it is no longer
built by default. add it back for the time being, but be prepared
for it to be removed in Asterisk 12.
|
|
|
|
| |
appears that busybox 1.22 requires it
|
| |
|
| |
|
|
|
|
|
| |
AST-2013-006 Buffer Overflow when receiving odd length 16 bit SMS message
AST-2013-007 Asterisk Manager User Dialplan Permission Escalation
|
| |
|
|
|
|
| |
remove upstreamed patches
|
|
|
|
|
| |
Picked from 11-stable branch, and is already in 11.6.0-rc1.
But I need it early for testing.
|
| |
|
| |
|
|
|
|
|
| |
AST-2013-004: Remote Crash From Late Arriving SIP ACK With SDP
AST-2013-005: Remote Crash when Invalid SDP is sent in SIP Request
|
| |
|
|
|
|
| |
it needs uuid from util-linux
|
| |
|
| |
|
|
|
|
|
| |
curl will be used when fetching the pkg so we need rename our split
function
|
| |
|
|
|
|
|
|
| |
the makefile checks for linux-gnu to detect flag for ldconfig to only
process given dirs. We set it hard since it fails to do the right thing
on uclibc.
|
|
|
|
| |
[Timo: Fixed few cosmetic issues]
|
| |
|
|
|
|
| |
duh.
|
| |
|
| |
|