--- - branch: MAIN date: Sun Aug 1 02:41:58 UTC 2021 files: - new: '1.128' old: '1.127' path: pkgsrc/comms/asterisk18/Makefile pathrev: pkgsrc/comms/asterisk18/Makefile@1.128 type: modified - new: '1.66' old: '1.65' path: pkgsrc/comms/asterisk18/distinfo pathrev: pkgsrc/comms/asterisk18/distinfo@1.66 type: modified id: 20210801T024158Z.24e81d38141301fc40ff161652bd6964f28f5865 log: | asterisk18: Update to 18.5.1 The Asterisk Development Team would like to announce security releases for Asterisk 13, 16, 17 and 18, and Certified Asterisk 16.8. The available releases are released as versions 13.38.3, 16.19.1, 17.9.4, 18.5.1 and 16.8-cert10. These releases are available for immediate download at https://downloads.asterisk.org/pub/telephony/asterisk/releases The following security vulnerabilities were resolved in these versions: * AST-2021-007: Remote Crash Vulnerability in PJSIP channel driver When Asterisk receives a re-INVITE without SDP after having sent a BYE request a crash will occur. This occurs due to the Asterisk channel no longer being present while code assumes it is. * AST-2021-008: Remote crash when using IAX2 channel driver If the IAX2 channel driver receives a packet that contains an * AST-2021-009: pjproject/pjsip: crash when SSL socket destroyed during handshake Depending on the timing, it's possible for Asterisk to crash when using a TLS connection if the underlying socket parent/listener gets destroyed during the handshake. For a full list of changes in the current releases, please see the ChangeLogs: https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-18.5.1 The security advisories are available at: https://downloads.asterisk.org/pub/security/AST-2021-007.pdf https://downloads.asterisk.org/pub/security/AST-2021-008.pdf https://downloads.asterisk.org/pub/security/AST-2021-009.pdf Thank you for your continued support of Asterisk! module: pkgsrc subject: 'CVS commit: pkgsrc/comms/asterisk18' unixtime: '1627785718' user: jnemeth