aboutsummaryrefslogtreecommitdiffstats
path: root/main/asterisk
Commit message (Collapse)AuthorAgeFilesLines
* main/asterisk: rebuild against libressl-2.7Natanael Copa2018-04-061-1/+1
|
* main/asterisk: rebuild against mariadb-connector-cNatanael Copa2018-03-262-2/+37
|
* main/asterisk: upgrade to 15.3.0Timo Teräs2018-03-161-2/+2
|
* main/asterisk: security upgrade to 15.2.2Timo Teräs2018-02-221-2/+2
| | | | | | | | | AST-2018-001 (CVE-2018-7285): Crash when receiving unnegotiated dynamic payload AST-2018-002: Crash when given an invalid SDP media format description AST-2018-003: Crash with an invalid SDP fmtp attribute AST-2018-004 (CVE-2018-7284): Crash when receiving SUBSCRIBE request AST-2018-005 (CVE-2018-7286): Crash when large numbers of TCP connections are closed suddenly AST-2018-006 (CVE-2018-7287): WebSocket frames with 0 sized payload causes DoS
* main/asterisk: upgrade to 15.2.0Timo Teräs2018-01-151-3/+3
|
* main/asterisk: add libtool to makedependsTimo Teräs2018-01-041-2/+2
| | | | This is a requirement to get res_odbc built.
* [various]: unify names of licenses according to SPDXJakub Jirutka2017-12-301-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates $license variable in all APKBUILDs to comply with short names specified by SPDX version 3.0 [1] where possible. It was done using find-and-replace method on substrings inside $license variables. Only license names were updated, not "expressions" specifying relation between the licenses (e.g. "X and Y", "X or Y", "X and (Y or Z)") or exceptions (e.g. "X with exceptions"). Many licenses have a version or multiple variants, e.g. MPL-2.0, BSD-2-Clause, BSD-3-Clause. However, $license in many aports do not contain license version or variant. Since there's no way how to infer this information just from abuild, it were left without the variant suffix or version, i.e. non SPDX compliant. GNU licenses (AGPL, GFDL, GPL, LGPL) are especially complicated. They exist in two variants: -only (formerly e.g. GPL-2.0) and -or-later (formerly e.g. GPL-2.0+). We did not systematically noted distinguish between these variants, so GPL-2.0, GPL2, GPLv2 etc. may mean GPL-2.0-only or GPL-2.0-or-later. Thus GNU licenses without "+" (e.g. GPL2+) were left without the variant suffix, i.e. non SPDX compliant. Note: This commit just fixes format of the license names, no verification has been done if the specified license information is actually correct! [1]: https://spdx.org/licenses/
* main/asterisk: security upgrade to 15.1.5Timo Teräs2017-12-281-2/+2
| | | | AST-2017-014 Crash in PJSIP resource when missing a contact header
* main/asterisk: upgrade to 15.1.4Timo Teräs2017-12-191-2/+2
| | | | AST-2017-012 Remote Crash Vulnerability in RTCP Stack
* main/asterisk: upgrade to 15.1.3Timo Teräs2017-12-151-2/+2
| | | | AST-2017-013 DOS Vulnerability in Asterisk chan_skinny
* main/asterisk: upgrade to 15.1.2Timo Teräs2017-11-131-3/+3
|
* main/asterisk: rebuild against libressl-2.6Natanael Copa2017-11-091-1/+1
|
* main/asterisk: upgrade to 15.1.1Timo Teräs2017-11-091-2/+2
| | | | | | AST-2017-009 Buffer overflow in pjproject header parsing can cause crash AST-2017-010 Buffer overflow in CDR's set user AST-2017-011 Memory leak in pjsip session resource
* main/asterisk: upgrade to 15.1.0Timo Teräs2017-10-313-3681/+12
|
* main/asterisk: security upgrade to 14.6.2 (CVE-2017-14099)Timo Teräs2017-09-201-2/+2
| | | | AST-2017-008 (CVE-2017-14099): RTP/RTCP information leak
* main/asterisk: security upgrade to 14.6.1Timo Teräs2017-09-011-3/+3
| | | | | | AST-2017-005: Media takeover in RTP stack AST-2017-006: Shell access command injection in app_minivm AST-2017-007: Remote Crash Vulerability in res_pjsip
* main/asterisk: fix init.d to enable core dumps when requestedTimo Teräs2017-08-142-2/+3
| | | | fixes #7583
* main/asterisk: upgrade to 14.6.0Timo Teräs2017-07-122-42/+42
|
* main/asterisk: upgrade to 14.5.0Timo Teräs2017-06-012-89/+322
| | | | rebase iostream patch
* main/asterisk: security upgrade to 14.4.1Timo Teräs2017-05-221-3/+3
| | | | | | AST-2017-002: Buffer Overrun in PJSIP transaction layer AST-2017-003: Crash in PJSIP multi-part body parser AST-2017-004: Memory exhaustion on short SCCP packets
* main/asterisk: fix imap supportNatanael Copa2017-05-171-1/+2
| | | | fixes #4840
* main/asterisk: rebuild against libressl 2.5Natanael Copa2017-04-181-1/+1
|
* main/asterisk: upgrade to 14.4.0Timo Teräs2017-04-122-113/+85
|
* main/asterisk: security upgrade to 14.3.1Timo Teräs2017-04-051-2/+2
| | | | AST-2017-001 Buffer overflow in CDR's set user
* main/asterisk: fix build under abuild 3.0William Pitcock2017-03-291-1/+1
|
* main/asterisk: upgrade to 14.3.0Timo Teräs2017-02-153-185/+108
| | | | | - rebase ASTERISK-24517 - remove upstreamed patch
* main/asterisk: fix checksumTimo Teräs2017-01-261-3/+3
|
* main/asterisk: fix pjsip module loadingTimo Teräs2017-01-262-17/+126
| | | | ref #6644
* main/asterisk: cherry-pick upstream follow-up fixes for ASTERISK-24517Timo Teräs2017-01-122-4/+230
|
* main/asterisk: security upgrade to 14.2.1 (CVE-2016-9937)Timo Teräs2016-12-211-4/+5
| | | | also disable -march=native to use proper alpine default arch target
* main/asterisk: upgrade to 14.2.0Timo Teräs2016-11-231-5/+5
|
* main/asterisk: add upstream submitted portability fixesTimo Teräs2016-11-183-2/+3182
| | | | | fixes #3503 fixes #6394
* main/asterisk: upgrade to 14.1.2Timo Teräs2016-11-111-4/+4
|
* main/asterisk: upgrade to 14.1.1Timo Teräs2016-11-011-4/+8
| | | | | - move libasteriskssl.so symlink back to main package - fixes #6393
* main/[various]: set proper archTimo Teräs2016-11-011-2/+2
| | | | fixes commit "main/[various]: dont set arch in split function"
* main/[various]: dont set arch in split functionNatanael Copa2016-10-261-3/+0
|
* main/asterisk: upgrade to 14.1.0Timo Teräs2016-10-261-4/+4
|
* main/asterisk: upgrade to 14.0.2Natanael Copa2016-10-105-522/+6
|
* main/asterisk: upgrade to 13.11.1Timo Teräs2016-09-095-905/+98
| | | | | | | | | AST-2016-006: Crash on ACK from unknown endpoint AST-2016-007: RTP Resource Exhaustion Remove our custom patch ASTERISK-19109 as unneeded since the administrative mute can be used for similar features. And remove musl-includes.patch as it was merged upstream.
* main/asterisk: disable imap on aarch64Carlo Landmeter2016-08-131-1/+3
|
* main/asterisk: upgrade to 13.9.1Timo Teräs2016-06-022-152/+182
| | | | | - rebased ASTERISK-19109 patch - add findutils as "find -printf" is now used in configure
* main/[various]: bump pkgrel for pre-install fixesPrzemyslaw Pawelczyk2016-04-251-1/+1
|
* Reorder arguments passed to addgroup/adduser in scripts.Przemyslaw Pawelczyk2016-04-252-2/+2
| | | | | | | Now all invocations have following order of arguments (if present): addgroup -S -g ... GROUP adduser -S -u ... -D -H -h ... -s ... -G ... -g ... USER
* Improve consistency of scripts using adduser/addgroup.Przemyslaw Pawelczyk2016-04-252-0/+2
| | | | | | | | | | | | Following rules have been applied: - script starts with shebang !#/bin/sh followed by blank line, - script ends with exit 0 prepended by blank line, - only stderr of adduser, addgroup or passwd is redirected to /dev/null, - getent passwd/group instances has been removed, - manual checking of file and group existence has been removed, - `|| true` instances has been removed. Comments and line wrapping have been preserved.
* Add -g option (GECOS/comment) to adduser in scripts.Przemyslaw Pawelczyk2016-04-252-2/+2
| | | | | | This way we can avoid ugly default: Linux user,,,
* main/asterisk: security upgrade to 13.7.2Timo Teräs2016-02-151-14/+5
| | | | | | | | | | AST-2016-001 TLS defaults to mitigate BEAST AST-2016-002 Fix fd leak with non-default timert1 AST-2016-003 Remote crash in UDPTL This also removes the security patch mechanism, upstream seems to change the format of these patches on every security release so just grab the tarball.
* main/asterisk: upgrade to 13.7.0Timo Teräs2016-01-191-5/+5
|
* main/asterisk: add imap supportNatanael Copa2015-11-191-2/+3
| | | | fixes #4840
* main/asterisk: upgrade to 13.6.0Timo Teräs2015-10-251-4/+4
|
* main/asterisk: upgrade to 13.5.0Timo Teräs2015-08-101-4/+4
|