aboutsummaryrefslogtreecommitdiffstats
path: root/main/asterisk
Commit message (Collapse)AuthorAgeFilesLines
* main/asterisk: security upgrade to 15.6.2 and security fixesLeonardo Arena2019-09-175-2/+302
| | | | | | | | | | - CVE-2018-19278 (included in 15.6.2) - CVE-2019-7251 - CVE-2019-12827 - CVE-2019-13161 - CVE-2019-15297 Closes #10790
* main/asterisk: security upgrade to 15.6.1Timo Teräs2018-09-241-2/+2
| | | | | | AST-2018-009 (CVE-2018-17281): Remote crash in HTTP websocket upgrade (cherry picked from commit d5cca069111b327438185e1bf7507b292a3b931d)
* main/asterisk: security upgrade to 15.5.0Timo Teräs2018-07-181-2/+2
| | | | | | | AST-2018-007: Infinite loop when reading iostreams AST-2018-008: PJSIP endpoint presence disclosure when using ACL (cherry picked from commit 40fd8ce8d8419d7627964e69c29ea7c30b65a953) (cherry picked from commit 4c6b45d7a5f74edf465b9f41c36dbd96182c8592)
* main/asterisk: security upgrade to 15.2.2Timo Teräs2018-02-221-2/+2
| | | | | | | | | | | AST-2018-001 (CVE-2018-7285): Crash when receiving unnegotiated dynamic payload AST-2018-002: Crash when given an invalid SDP media format description AST-2018-003: Crash with an invalid SDP fmtp attribute AST-2018-004 (CVE-2018-7284): Crash when receiving SUBSCRIBE request AST-2018-005 (CVE-2018-7286): Crash when large numbers of TCP connections are closed suddenly AST-2018-006 (CVE-2018-7287): WebSocket frames with 0 sized payload causes DoS (cherry picked from commit f0ae460f0cc464900bdb9a9265254e00d0da42f1)
* main/asterisk: upgrade to 15.2.0Timo Teräs2018-02-221-3/+3
| | | | (cherry picked from commit b137d471e4ae63e37909accff94a30c4d4dfdc22)
* main/asterisk: add libtool to makedependsTimo Teräs2018-01-041-2/+2
| | | | | | This is a requirement to get res_odbc built. (cherry picked from commit bd3bc89b4abf4ea8817417f4d5594c8ebaf62749)
* main/asterisk: security upgrade to 15.1.5Timo Teräs2017-12-291-2/+2
| | | | | | fixes #8353 AST-2017-014 Crash in PJSIP resource when missing a contact header
* main/asterisk: upgrade to 15.1.4Timo Teräs2017-12-291-2/+2
| | | | | | ref #8353 AST-2017-012 Remote Crash Vulnerability in RTCP Stack
* main/asterisk: upgrade to 15.1.3Timo Teräs2017-12-291-2/+2
| | | | | | ref #8353 AST-2017-013 DOS Vulnerability in Asterisk chan_skinny
* main/asterisk: upgrade to 15.1.2Timo Teräs2017-11-131-3/+3
|
* main/asterisk: rebuild against libressl-2.6Natanael Copa2017-11-091-1/+1
|
* main/asterisk: upgrade to 15.1.1Timo Teräs2017-11-091-2/+2
| | | | | | AST-2017-009 Buffer overflow in pjproject header parsing can cause crash AST-2017-010 Buffer overflow in CDR's set user AST-2017-011 Memory leak in pjsip session resource
* main/asterisk: upgrade to 15.1.0Timo Teräs2017-10-313-3681/+12
|
* main/asterisk: security upgrade to 14.6.2 (CVE-2017-14099)Timo Teräs2017-09-201-2/+2
| | | | AST-2017-008 (CVE-2017-14099): RTP/RTCP information leak
* main/asterisk: security upgrade to 14.6.1Timo Teräs2017-09-011-3/+3
| | | | | | AST-2017-005: Media takeover in RTP stack AST-2017-006: Shell access command injection in app_minivm AST-2017-007: Remote Crash Vulerability in res_pjsip
* main/asterisk: fix init.d to enable core dumps when requestedTimo Teräs2017-08-142-2/+3
| | | | fixes #7583
* main/asterisk: upgrade to 14.6.0Timo Teräs2017-07-122-42/+42
|
* main/asterisk: upgrade to 14.5.0Timo Teräs2017-06-012-89/+322
| | | | rebase iostream patch
* main/asterisk: security upgrade to 14.4.1Timo Teräs2017-05-221-3/+3
| | | | | | AST-2017-002: Buffer Overrun in PJSIP transaction layer AST-2017-003: Crash in PJSIP multi-part body parser AST-2017-004: Memory exhaustion on short SCCP packets
* main/asterisk: fix imap supportNatanael Copa2017-05-171-1/+2
| | | | fixes #4840
* main/asterisk: rebuild against libressl 2.5Natanael Copa2017-04-181-1/+1
|
* main/asterisk: upgrade to 14.4.0Timo Teräs2017-04-122-113/+85
|
* main/asterisk: security upgrade to 14.3.1Timo Teräs2017-04-051-2/+2
| | | | AST-2017-001 Buffer overflow in CDR's set user
* main/asterisk: fix build under abuild 3.0William Pitcock2017-03-291-1/+1
|
* main/asterisk: upgrade to 14.3.0Timo Teräs2017-02-153-185/+108
| | | | | - rebase ASTERISK-24517 - remove upstreamed patch
* main/asterisk: fix checksumTimo Teräs2017-01-261-3/+3
|
* main/asterisk: fix pjsip module loadingTimo Teräs2017-01-262-17/+126
| | | | ref #6644
* main/asterisk: cherry-pick upstream follow-up fixes for ASTERISK-24517Timo Teräs2017-01-122-4/+230
|
* main/asterisk: security upgrade to 14.2.1 (CVE-2016-9937)Timo Teräs2016-12-211-4/+5
| | | | also disable -march=native to use proper alpine default arch target
* main/asterisk: upgrade to 14.2.0Timo Teräs2016-11-231-5/+5
|
* main/asterisk: add upstream submitted portability fixesTimo Teräs2016-11-183-2/+3182
| | | | | fixes #3503 fixes #6394
* main/asterisk: upgrade to 14.1.2Timo Teräs2016-11-111-4/+4
|
* main/asterisk: upgrade to 14.1.1Timo Teräs2016-11-011-4/+8
| | | | | - move libasteriskssl.so symlink back to main package - fixes #6393
* main/[various]: set proper archTimo Teräs2016-11-011-2/+2
| | | | fixes commit "main/[various]: dont set arch in split function"
* main/[various]: dont set arch in split functionNatanael Copa2016-10-261-3/+0
|
* main/asterisk: upgrade to 14.1.0Timo Teräs2016-10-261-4/+4
|
* main/asterisk: upgrade to 14.0.2Natanael Copa2016-10-105-522/+6
|
* main/asterisk: upgrade to 13.11.1Timo Teräs2016-09-095-905/+98
| | | | | | | | | AST-2016-006: Crash on ACK from unknown endpoint AST-2016-007: RTP Resource Exhaustion Remove our custom patch ASTERISK-19109 as unneeded since the administrative mute can be used for similar features. And remove musl-includes.patch as it was merged upstream.
* main/asterisk: disable imap on aarch64Carlo Landmeter2016-08-131-1/+3
|
* main/asterisk: upgrade to 13.9.1Timo Teräs2016-06-022-152/+182
| | | | | - rebased ASTERISK-19109 patch - add findutils as "find -printf" is now used in configure
* main/[various]: bump pkgrel for pre-install fixesPrzemyslaw Pawelczyk2016-04-251-1/+1
|
* Reorder arguments passed to addgroup/adduser in scripts.Przemyslaw Pawelczyk2016-04-252-2/+2
| | | | | | | Now all invocations have following order of arguments (if present): addgroup -S -g ... GROUP adduser -S -u ... -D -H -h ... -s ... -G ... -g ... USER
* Improve consistency of scripts using adduser/addgroup.Przemyslaw Pawelczyk2016-04-252-0/+2
| | | | | | | | | | | | Following rules have been applied: - script starts with shebang !#/bin/sh followed by blank line, - script ends with exit 0 prepended by blank line, - only stderr of adduser, addgroup or passwd is redirected to /dev/null, - getent passwd/group instances has been removed, - manual checking of file and group existence has been removed, - `|| true` instances has been removed. Comments and line wrapping have been preserved.
* Add -g option (GECOS/comment) to adduser in scripts.Przemyslaw Pawelczyk2016-04-252-2/+2
| | | | | | This way we can avoid ugly default: Linux user,,,
* main/asterisk: security upgrade to 13.7.2Timo Teräs2016-02-151-14/+5
| | | | | | | | | | AST-2016-001 TLS defaults to mitigate BEAST AST-2016-002 Fix fd leak with non-default timert1 AST-2016-003 Remote crash in UDPTL This also removes the security patch mechanism, upstream seems to change the format of these patches on every security release so just grab the tarball.
* main/asterisk: upgrade to 13.7.0Timo Teräs2016-01-191-5/+5
|
* main/asterisk: add imap supportNatanael Copa2015-11-191-2/+3
| | | | fixes #4840
* main/asterisk: upgrade to 13.6.0Timo Teräs2015-10-251-4/+4
|
* main/asterisk: upgrade to 13.5.0Timo Teräs2015-08-101-4/+4
|
* main/asterisk: upgrade to 13.4.0Timo Teräs2015-06-092-68/+6
|