--- - branch: MAIN date: Thu Jan 3 02:14:28 UTC 2013 files: - new: '1.38' old: '1.37' path: pkgsrc/comms/asterisk10/Makefile pathrev: pkgsrc/comms/asterisk10/Makefile@1.38 type: modified - new: '1.24' old: '1.23' path: pkgsrc/comms/asterisk10/distinfo pathrev: pkgsrc/comms/asterisk10/distinfo@1.24 type: modified id: 20130103T021428Z.5dc2f3430f144d4201531f718440df6a6ee647c5 log: | Upgrade to Asterisk 10.11.1; this is a security fix to fix AST-2012-14 and AST-2012-015. Approved for commit during freeze by: agc The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones, and 11.1.1. The release of these versions resolve the following two issues: * Stack overflows that occur in some portions of Asterisk that manage a TCP connection. In SIP, this is exploitable via a remote unauthenticated session; in XMPP and HTTP connections, this is exploitable via remote authenticated sessions. * A denial of service vulnerability through exploitation of the device state cache. Anonymous calls had the capability to create devices in Asterisk that would never be disposed of. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-014 and AST-2012-015, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf Thank you for your continued support of Asterisk! module: pkgsrc subject: 'CVS commit: pkgsrc/comms/asterisk10' unixtime: '1357179268' user: jnemeth