Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mail.NetBSD.org", Issuer "Postmaster NetBSD.org" (verified OK)) by mollari.NetBSD.org (Postfix) with ESMTPS id 4E70671A6B for ; Thu, 29 Aug 2013 23:14:43 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id B010314A14B; Thu, 29 Aug 2013 23:14:42 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id D9DA014A148 for ; Thu, 29 Aug 2013 23:14:39 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id HqS0WH-4ygOI for ; Thu, 29 Aug 2013 23:14:39 +0000 (UTC) Received: from cvs.netbsd.org (cvs.NetBSD.org [IPv6:2001:4f8:3:7:2e0:81ff:fe30:95bd]) by mail.netbsd.org (Postfix) with ESMTP id 0E2F114A147 for ; Thu, 29 Aug 2013 23:14:38 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id C379996; Thu, 29 Aug 2013 23:14:38 +0000 (UTC) Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" MIME-Version: 1.0 Date: Thu, 29 Aug 2013 23:14:38 +0000 From: "John Nemeth" Subject: CVS commit: pkgsrc/comms/asterisk10 To: pkgsrc-changes@NetBSD.org Reply-To: jnemeth@netbsd.org X-Mailer: log_accum Message-Id: <20130829231438.C379996@cvs.netbsd.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: jnemeth Date: Thu Aug 29 23:14:38 UTC 2013 Modified Files: pkgsrc/comms/asterisk10: Makefile distinfo Log Message: Update to Asterisk 10.12.3: this is a security fix release to fix AST-2013-004 and AST-2013-005. pkgsrc change: disable detection of broken IP_PKTINFO on NetBSD The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security rele ases are released as versions 1.8.15-cert2, 11.2-cert2, 1.8.23.1, 10.12.3, 10.12.3-di giumphones, and 11.5.1. The release of these versions resolve the following issues: * A remotely exploitable crash vulnerability exists in the SIP channel driver if an ACK with SDP is received after the channel has been terminated. The handling code incorrectly assumes that the channel will always be present. * A remotely exploitable crash vulnerability exists in the SIP channel driver if an invalid SDP is sent in a SIP request that defines media descriptions before connection information. The handling code incorrectly attempts to reference the socket address information even though that information has not yet been set. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-004 and AST-2013-005, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.12.3 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-004.pdf * http://downloads.asterisk.org/pub/security/AST-2013-005.pdf Thank you for your continued support of Asterisk! To generate a diff of this commit: cvs rdiff -u -r1.51 -r1.52 pkgsrc/comms/asterisk10/Makefile cvs rdiff -u -r1.27 -r1.28 pkgsrc/comms/asterisk10/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.