aboutsummaryrefslogtreecommitdiffstats
path: root/main/asterisk
Commit message (Collapse)AuthorAgeFilesLines
* main/asterisk: upgrade to 15.1.2Timo Teräs2017-11-131-3/+3
|
* main/asterisk: rebuild against libressl-2.6Natanael Copa2017-11-091-1/+1
|
* main/asterisk: upgrade to 15.1.1Timo Teräs2017-11-091-2/+2
| | | | | | AST-2017-009 Buffer overflow in pjproject header parsing can cause crash AST-2017-010 Buffer overflow in CDR's set user AST-2017-011 Memory leak in pjsip session resource
* main/asterisk: upgrade to 15.1.0Timo Teräs2017-10-313-3681/+12
|
* main/asterisk: security upgrade to 14.6.2 (CVE-2017-14099)Timo Teräs2017-09-201-2/+2
| | | | AST-2017-008 (CVE-2017-14099): RTP/RTCP information leak
* main/asterisk: security upgrade to 14.6.1Timo Teräs2017-09-011-3/+3
| | | | | | AST-2017-005: Media takeover in RTP stack AST-2017-006: Shell access command injection in app_minivm AST-2017-007: Remote Crash Vulerability in res_pjsip
* main/asterisk: fix init.d to enable core dumps when requestedTimo Teräs2017-08-142-2/+3
| | | | fixes #7583
* main/asterisk: upgrade to 14.6.0Timo Teräs2017-07-122-42/+42
|
* main/asterisk: upgrade to 14.5.0Timo Teräs2017-06-012-89/+322
| | | | rebase iostream patch
* main/asterisk: security upgrade to 14.4.1Timo Teräs2017-05-221-3/+3
| | | | | | AST-2017-002: Buffer Overrun in PJSIP transaction layer AST-2017-003: Crash in PJSIP multi-part body parser AST-2017-004: Memory exhaustion on short SCCP packets
* main/asterisk: fix imap supportNatanael Copa2017-05-171-1/+2
| | | | fixes #4840
* main/asterisk: rebuild against libressl 2.5Natanael Copa2017-04-181-1/+1
|
* main/asterisk: upgrade to 14.4.0Timo Teräs2017-04-122-113/+85
|
* main/asterisk: security upgrade to 14.3.1Timo Teräs2017-04-051-2/+2
| | | | AST-2017-001 Buffer overflow in CDR's set user
* main/asterisk: fix build under abuild 3.0William Pitcock2017-03-291-1/+1
|
* main/asterisk: upgrade to 14.3.0Timo Teräs2017-02-153-185/+108
| | | | | - rebase ASTERISK-24517 - remove upstreamed patch
* main/asterisk: fix checksumTimo Teräs2017-01-261-3/+3
|
* main/asterisk: fix pjsip module loadingTimo Teräs2017-01-262-17/+126
| | | | ref #6644
* main/asterisk: cherry-pick upstream follow-up fixes for ASTERISK-24517Timo Teräs2017-01-122-4/+230
|
* main/asterisk: security upgrade to 14.2.1 (CVE-2016-9937)Timo Teräs2016-12-211-4/+5
| | | | also disable -march=native to use proper alpine default arch target
* main/asterisk: upgrade to 14.2.0Timo Teräs2016-11-231-5/+5
|
* main/asterisk: add upstream submitted portability fixesTimo Teräs2016-11-183-2/+3182
| | | | | fixes #3503 fixes #6394
* main/asterisk: upgrade to 14.1.2Timo Teräs2016-11-111-4/+4
|
* main/asterisk: upgrade to 14.1.1Timo Teräs2016-11-011-4/+8
| | | | | - move libasteriskssl.so symlink back to main package - fixes #6393
* main/[various]: set proper archTimo Teräs2016-11-011-2/+2
| | | | fixes commit "main/[various]: dont set arch in split function"
* main/[various]: dont set arch in split functionNatanael Copa2016-10-261-3/+0
|
* main/asterisk: upgrade to 14.1.0Timo Teräs2016-10-261-4/+4
|
* main/asterisk: upgrade to 14.0.2Natanael Copa2016-10-105-522/+6
|
* main/asterisk: upgrade to 13.11.1Timo Teräs2016-09-095-905/+98
| | | | | | | | | AST-2016-006: Crash on ACK from unknown endpoint AST-2016-007: RTP Resource Exhaustion Remove our custom patch ASTERISK-19109 as unneeded since the administrative mute can be used for similar features. And remove musl-includes.patch as it was merged upstream.
* main/asterisk: disable imap on aarch64Carlo Landmeter2016-08-131-1/+3
|
* main/asterisk: upgrade to 13.9.1Timo Teräs2016-06-022-152/+182
| | | | | - rebased ASTERISK-19109 patch - add findutils as "find -printf" is now used in configure
* main/[various]: bump pkgrel for pre-install fixesPrzemyslaw Pawelczyk2016-04-251-1/+1
|
* Reorder arguments passed to addgroup/adduser in scripts.Przemyslaw Pawelczyk2016-04-252-2/+2
| | | | | | | Now all invocations have following order of arguments (if present): addgroup -S -g ... GROUP adduser -S -u ... -D -H -h ... -s ... -G ... -g ... USER
* Improve consistency of scripts using adduser/addgroup.Przemyslaw Pawelczyk2016-04-252-0/+2
| | | | | | | | | | | | Following rules have been applied: - script starts with shebang !#/bin/sh followed by blank line, - script ends with exit 0 prepended by blank line, - only stderr of adduser, addgroup or passwd is redirected to /dev/null, - getent passwd/group instances has been removed, - manual checking of file and group existence has been removed, - `|| true` instances has been removed. Comments and line wrapping have been preserved.
* Add -g option (GECOS/comment) to adduser in scripts.Przemyslaw Pawelczyk2016-04-252-2/+2
| | | | | | This way we can avoid ugly default: Linux user,,,
* main/asterisk: security upgrade to 13.7.2Timo Teräs2016-02-151-14/+5
| | | | | | | | | | AST-2016-001 TLS defaults to mitigate BEAST AST-2016-002 Fix fd leak with non-default timert1 AST-2016-003 Remote crash in UDPTL This also removes the security patch mechanism, upstream seems to change the format of these patches on every security release so just grab the tarball.
* main/asterisk: upgrade to 13.7.0Timo Teräs2016-01-191-5/+5
|
* main/asterisk: add imap supportNatanael Copa2015-11-191-2/+3
| | | | fixes #4840
* main/asterisk: upgrade to 13.6.0Timo Teräs2015-10-251-4/+4
|
* main/asterisk: upgrade to 13.5.0Timo Teräs2015-08-101-4/+4
|
* main/asterisk: upgrade to 13.4.0Timo Teräs2015-06-092-68/+6
|
* main/*: replace all sbin/runscript with sbin/openrc-runNatanael Copa2015-04-282-5/+5
|
* main/asterisk: fix arm buildTimo Teräs2015-04-152-9/+18
|
* main/asterisk: security upgrade to 13.3.2Timo Teräs2015-04-091-1/+4
| | | | AST-2015-003: TLS Certificate Common name NULL byte exploit
* main/asterisk: upgrade to 13.3.1Timo Teräs2015-04-072-31/+23
| | | | | rebase libcap patch, and add speexdsp-dev dependency due to recent package split.
* main/asterisk: upgrade to 13.2.0Timo Teräs2015-02-072-22/+7
|
* main/asterisk: security upgrade to 13.1.1Timo Teräs2015-01-291-2/+5
| | | | | AST-2015-001: File descriptor leak when incompatible codecs are offered (chan_pjsip) AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability
* main/asterisk: rebuild against mariadbŁukasz Jendrysik2015-01-261-2/+3
|
* main/asterisk: upgrade to 13.1.0Timo Teräs2014-12-251-10/+4
|
* main/asterisk: security upgrade to 13.0.2Timo Teräs2014-12-121-2/+5
| | | | AST-2014-019: Remote Crash Vulnerability in WebSocket Server