Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | main/asterisk: upgrade to 15.1.2 | Timo Teräs | 2017-11-13 | 1 | -3/+3 |
| | |||||
* | main/asterisk: rebuild against libressl-2.6 | Natanael Copa | 2017-11-09 | 1 | -1/+1 |
| | |||||
* | main/asterisk: upgrade to 15.1.1 | Timo Teräs | 2017-11-09 | 1 | -2/+2 |
| | | | | | | AST-2017-009 Buffer overflow in pjproject header parsing can cause crash AST-2017-010 Buffer overflow in CDR's set user AST-2017-011 Memory leak in pjsip session resource | ||||
* | main/asterisk: upgrade to 15.1.0 | Timo Teräs | 2017-10-31 | 3 | -3681/+12 |
| | |||||
* | main/asterisk: security upgrade to 14.6.2 (CVE-2017-14099) | Timo Teräs | 2017-09-20 | 1 | -2/+2 |
| | | | | AST-2017-008 (CVE-2017-14099): RTP/RTCP information leak | ||||
* | main/asterisk: security upgrade to 14.6.1 | Timo Teräs | 2017-09-01 | 1 | -3/+3 |
| | | | | | | AST-2017-005: Media takeover in RTP stack AST-2017-006: Shell access command injection in app_minivm AST-2017-007: Remote Crash Vulerability in res_pjsip | ||||
* | main/asterisk: fix init.d to enable core dumps when requested | Timo Teräs | 2017-08-14 | 2 | -2/+3 |
| | | | | fixes #7583 | ||||
* | main/asterisk: upgrade to 14.6.0 | Timo Teräs | 2017-07-12 | 2 | -42/+42 |
| | |||||
* | main/asterisk: upgrade to 14.5.0 | Timo Teräs | 2017-06-01 | 2 | -89/+322 |
| | | | | rebase iostream patch | ||||
* | main/asterisk: security upgrade to 14.4.1 | Timo Teräs | 2017-05-22 | 1 | -3/+3 |
| | | | | | | AST-2017-002: Buffer Overrun in PJSIP transaction layer AST-2017-003: Crash in PJSIP multi-part body parser AST-2017-004: Memory exhaustion on short SCCP packets | ||||
* | main/asterisk: fix imap support | Natanael Copa | 2017-05-17 | 1 | -1/+2 |
| | | | | fixes #4840 | ||||
* | main/asterisk: rebuild against libressl 2.5 | Natanael Copa | 2017-04-18 | 1 | -1/+1 |
| | |||||
* | main/asterisk: upgrade to 14.4.0 | Timo Teräs | 2017-04-12 | 2 | -113/+85 |
| | |||||
* | main/asterisk: security upgrade to 14.3.1 | Timo Teräs | 2017-04-05 | 1 | -2/+2 |
| | | | | AST-2017-001 Buffer overflow in CDR's set user | ||||
* | main/asterisk: fix build under abuild 3.0 | William Pitcock | 2017-03-29 | 1 | -1/+1 |
| | |||||
* | main/asterisk: upgrade to 14.3.0 | Timo Teräs | 2017-02-15 | 3 | -185/+108 |
| | | | | | - rebase ASTERISK-24517 - remove upstreamed patch | ||||
* | main/asterisk: fix checksum | Timo Teräs | 2017-01-26 | 1 | -3/+3 |
| | |||||
* | main/asterisk: fix pjsip module loading | Timo Teräs | 2017-01-26 | 2 | -17/+126 |
| | | | | ref #6644 | ||||
* | main/asterisk: cherry-pick upstream follow-up fixes for ASTERISK-24517 | Timo Teräs | 2017-01-12 | 2 | -4/+230 |
| | |||||
* | main/asterisk: security upgrade to 14.2.1 (CVE-2016-9937) | Timo Teräs | 2016-12-21 | 1 | -4/+5 |
| | | | | also disable -march=native to use proper alpine default arch target | ||||
* | main/asterisk: upgrade to 14.2.0 | Timo Teräs | 2016-11-23 | 1 | -5/+5 |
| | |||||
* | main/asterisk: add upstream submitted portability fixes | Timo Teräs | 2016-11-18 | 3 | -2/+3182 |
| | | | | | fixes #3503 fixes #6394 | ||||
* | main/asterisk: upgrade to 14.1.2 | Timo Teräs | 2016-11-11 | 1 | -4/+4 |
| | |||||
* | main/asterisk: upgrade to 14.1.1 | Timo Teräs | 2016-11-01 | 1 | -4/+8 |
| | | | | | - move libasteriskssl.so symlink back to main package - fixes #6393 | ||||
* | main/[various]: set proper arch | Timo Teräs | 2016-11-01 | 1 | -2/+2 |
| | | | | fixes commit "main/[various]: dont set arch in split function" | ||||
* | main/[various]: dont set arch in split function | Natanael Copa | 2016-10-26 | 1 | -3/+0 |
| | |||||
* | main/asterisk: upgrade to 14.1.0 | Timo Teräs | 2016-10-26 | 1 | -4/+4 |
| | |||||
* | main/asterisk: upgrade to 14.0.2 | Natanael Copa | 2016-10-10 | 5 | -522/+6 |
| | |||||
* | main/asterisk: upgrade to 13.11.1 | Timo Teräs | 2016-09-09 | 5 | -905/+98 |
| | | | | | | | | | AST-2016-006: Crash on ACK from unknown endpoint AST-2016-007: RTP Resource Exhaustion Remove our custom patch ASTERISK-19109 as unneeded since the administrative mute can be used for similar features. And remove musl-includes.patch as it was merged upstream. | ||||
* | main/asterisk: disable imap on aarch64 | Carlo Landmeter | 2016-08-13 | 1 | -1/+3 |
| | |||||
* | main/asterisk: upgrade to 13.9.1 | Timo Teräs | 2016-06-02 | 2 | -152/+182 |
| | | | | | - rebased ASTERISK-19109 patch - add findutils as "find -printf" is now used in configure | ||||
* | main/[various]: bump pkgrel for pre-install fixes | Przemyslaw Pawelczyk | 2016-04-25 | 1 | -1/+1 |
| | |||||
* | Reorder arguments passed to addgroup/adduser in scripts. | Przemyslaw Pawelczyk | 2016-04-25 | 2 | -2/+2 |
| | | | | | | | Now all invocations have following order of arguments (if present): addgroup -S -g ... GROUP adduser -S -u ... -D -H -h ... -s ... -G ... -g ... USER | ||||
* | Improve consistency of scripts using adduser/addgroup. | Przemyslaw Pawelczyk | 2016-04-25 | 2 | -0/+2 |
| | | | | | | | | | | | | Following rules have been applied: - script starts with shebang !#/bin/sh followed by blank line, - script ends with exit 0 prepended by blank line, - only stderr of adduser, addgroup or passwd is redirected to /dev/null, - getent passwd/group instances has been removed, - manual checking of file and group existence has been removed, - `|| true` instances has been removed. Comments and line wrapping have been preserved. | ||||
* | Add -g option (GECOS/comment) to adduser in scripts. | Przemyslaw Pawelczyk | 2016-04-25 | 2 | -2/+2 |
| | | | | | | This way we can avoid ugly default: Linux user,,, | ||||
* | main/asterisk: security upgrade to 13.7.2 | Timo Teräs | 2016-02-15 | 1 | -14/+5 |
| | | | | | | | | | | AST-2016-001 TLS defaults to mitigate BEAST AST-2016-002 Fix fd leak with non-default timert1 AST-2016-003 Remote crash in UDPTL This also removes the security patch mechanism, upstream seems to change the format of these patches on every security release so just grab the tarball. | ||||
* | main/asterisk: upgrade to 13.7.0 | Timo Teräs | 2016-01-19 | 1 | -5/+5 |
| | |||||
* | main/asterisk: add imap support | Natanael Copa | 2015-11-19 | 1 | -2/+3 |
| | | | | fixes #4840 | ||||
* | main/asterisk: upgrade to 13.6.0 | Timo Teräs | 2015-10-25 | 1 | -4/+4 |
| | |||||
* | main/asterisk: upgrade to 13.5.0 | Timo Teräs | 2015-08-10 | 1 | -4/+4 |
| | |||||
* | main/asterisk: upgrade to 13.4.0 | Timo Teräs | 2015-06-09 | 2 | -68/+6 |
| | |||||
* | main/*: replace all sbin/runscript with sbin/openrc-run | Natanael Copa | 2015-04-28 | 2 | -5/+5 |
| | |||||
* | main/asterisk: fix arm build | Timo Teräs | 2015-04-15 | 2 | -9/+18 |
| | |||||
* | main/asterisk: security upgrade to 13.3.2 | Timo Teräs | 2015-04-09 | 1 | -1/+4 |
| | | | | AST-2015-003: TLS Certificate Common name NULL byte exploit | ||||
* | main/asterisk: upgrade to 13.3.1 | Timo Teräs | 2015-04-07 | 2 | -31/+23 |
| | | | | | rebase libcap patch, and add speexdsp-dev dependency due to recent package split. | ||||
* | main/asterisk: upgrade to 13.2.0 | Timo Teräs | 2015-02-07 | 2 | -22/+7 |
| | |||||
* | main/asterisk: security upgrade to 13.1.1 | Timo Teräs | 2015-01-29 | 1 | -2/+5 |
| | | | | | AST-2015-001: File descriptor leak when incompatible codecs are offered (chan_pjsip) AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability | ||||
* | main/asterisk: rebuild against mariadb | Łukasz Jendrysik | 2015-01-26 | 1 | -2/+3 |
| | |||||
* | main/asterisk: upgrade to 13.1.0 | Timo Teräs | 2014-12-25 | 1 | -10/+4 |
| | |||||
* | main/asterisk: security upgrade to 13.0.2 | Timo Teräs | 2014-12-12 | 1 | -2/+5 |
| | | | | AST-2014-019: Remote Crash Vulnerability in WebSocket Server |