Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66]) by www.NetBSD.org (Postfix) with ESMTP id 56B1363B86B for ; Mon, 30 Apr 2012 03:19:26 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id CA64F14A305; Mon, 30 Apr 2012 03:19:43 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id C61DD14A303 for ; Mon, 30 Apr 2012 03:19:40 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id TgVPHTw59peY for ; Mon, 30 Apr 2012 03:19:40 +0000 (UTC) Received: from cvs.netbsd.org (cvs.NetBSD.org [IPv6:2001:4f8:3:7:2e0:81ff:fe30:95bd]) by mail.netbsd.org (Postfix) with ESMTP id EDC2614A302 for ; Mon, 30 Apr 2012 03:19:39 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id 0B090175DD; Mon, 30 Apr 2012 03:19:41 +0000 (UTC) MIME-Version: 1.0 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Date: Mon, 30 Apr 2012 03:19:40 +0000 From: "John Nemeth" Subject: CVS commit: pkgsrc/comms/asterisk16 To: pkgsrc-changes@NetBSD.org Reply-To: jnemeth@netbsd.org X-Mailer: log_accum Message-Id: <20120430031941.0B090175DD@cvs.netbsd.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: jnemeth Date: Mon Apr 30 03:19:40 UTC 2012 Modified Files: pkgsrc/comms/asterisk16: Makefile distinfo Log Message: Update to Asterisk 1.6.2.24. This fixes AST-2012-004 and AST-2012-005. The 1.6.2 series went End of Life on April 21st 2012, so this was the last update. This package will be deleted in the not too distnat future. The Asterisk Development Team has announced security releases for Asterisk 1.6.2 , 1.8, and 10. The available security releases are released as versions 1.6.2.24, 1.8.11.1, and 10.3.1. The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the following two issues: * A permission escalation vulnerability in Asterisk Manager Interface. This would potentially allow remote authenticated users the ability to execute commands on the system shell with the privileges of the user running the Asterisk application. * A heap overflow vulnerability in the Skinny Channel driver. The keypad button message event failed to check the length of a fixed length buffer before appending a received digit to the end of that buffer. A remote authenticated user could send sufficient keypad button message events that th e buffer would be overrun. These issues and their resolution are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-004, AST-2012-005, and AST-2012-006, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.24 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf Thank you for your continued support of Asterisk! To generate a diff of this commit: cvs rdiff -u -r1.40 -r1.41 pkgsrc/comms/asterisk16/Makefile cvs rdiff -u -r1.26 -r1.27 pkgsrc/comms/asterisk16/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.