216 Commits

Author SHA1 Message Date
Timo Teräs
04e63b7eeb main/asterisk: upgrade to 15.7.1 2018-12-31 11:09:51 +02:00
Natanael Copa
20a584e9b9 main/asterisk: rebuild against openssl 1.1 2018-11-07 16:46:10 +00:00
J0WI
d2bfb22c8e main: (Bulk change) Update source urls to https using HTTPS Everywhere 2018-10-06 17:10:04 +00:00
Timo Teräs
d5cca06911 main/asterisk: security upgrade to 15.6.1
AST-2018-009 (CVE-2018-17281): Remote crash in HTTP websocket upgrade
2018-09-24 13:13:09 +00:00
Timo Teräs
54bbf89415 main/asterisk: upgrade to 15.6.0 2018-09-11 09:50:11 +03:00
Timo Teräs
8852ef767a main/asterisk: create asterisk group
fixes #9196
2018-08-14 18:18:44 +03:00
Timo Teräs
40fd8ce8d8 main/asterisk: security upgrade to 15.5.0
AST-2018-007: Infinite loop when reading iostreams
AST-2018-008: PJSIP endpoint presence disclosure when using ACL
2018-07-17 15:55:26 +03:00
Natanael Copa
48a845e605 main/asterisk: rebuild against libressl-2.7 2018-04-06 05:19:24 +00:00
Natanael Copa
2dc6862bdf main/asterisk: rebuild against mariadb-connector-c 2018-03-26 08:55:19 +00:00
Timo Teräs
5e49e48dfa main/asterisk: upgrade to 15.3.0 2018-03-16 13:33:44 +00:00
Timo Teräs
f0ae460f0c main/asterisk: security upgrade to 15.2.2
AST-2018-001 (CVE-2018-7285): Crash when receiving unnegotiated dynamic payload
AST-2018-002: Crash when given an invalid SDP media format description
AST-2018-003: Crash with an invalid SDP fmtp attribute
AST-2018-004 (CVE-2018-7284): Crash when receiving SUBSCRIBE request
AST-2018-005 (CVE-2018-7286): Crash when large numbers of TCP connections are closed suddenly
AST-2018-006 (CVE-2018-7287): WebSocket frames with 0 sized payload causes DoS
2018-02-22 14:40:32 +00:00
Timo Teräs
b137d471e4 main/asterisk: upgrade to 15.2.0 2018-01-15 20:10:08 +00:00
Timo Teräs
bd3bc89b4a main/asterisk: add libtool to makedepends
This is a requirement to get res_odbc built.
2018-01-04 06:34:59 +00:00
Jakub Jirutka
63f5e7d295 [various]: unify names of licenses according to SPDX
This commit updates $license variable in all APKBUILDs to comply with
short names specified by SPDX version 3.0 [1] where possible. It was
done using find-and-replace method on substrings inside $license
variables.

Only license names were updated, not "expressions" specifying relation
between the licenses (e.g. "X and Y", "X or Y", "X and (Y or Z)") or
exceptions (e.g. "X with exceptions").

Many licenses have a version or multiple variants, e.g. MPL-2.0,
BSD-2-Clause, BSD-3-Clause. However, $license in many aports do not
contain license version or variant. Since there's no way how to infer
this information just from abuild, it were left without the variant
suffix or version, i.e. non SPDX compliant.

GNU licenses (AGPL, GFDL, GPL, LGPL) are especially complicated. They
exist in two variants: -only (formerly e.g. GPL-2.0) and -or-later
(formerly e.g. GPL-2.0+). We did not systematically noted distinguish
between these variants, so GPL-2.0, GPL2, GPLv2 etc. may mean
GPL-2.0-only or GPL-2.0-or-later. Thus GNU licenses without "+" (e.g.
GPL2+) were left without the variant suffix, i.e. non SPDX compliant.

Note: This commit just fixes format of the license names, no
verification has been done if the specified license information is
actually correct!

[1]: https://spdx.org/licenses/
2017-12-30 21:05:50 +01:00
Timo Teräs
111c1c6642 main/asterisk: security upgrade to 15.1.5
AST-2017-014 Crash in PJSIP resource when missing a contact header
2017-12-28 12:07:18 +00:00
Timo Teräs
b59ff476b3 main/asterisk: upgrade to 15.1.4
AST-2017-012 Remote Crash Vulnerability in RTCP Stack
2017-12-19 06:37:11 +00:00
Timo Teräs
07ac854bf3 main/asterisk: upgrade to 15.1.3
AST-2017-013 DOS Vulnerability in Asterisk chan_skinny
2017-12-15 12:03:47 +00:00
Timo Teräs
47b4038d55 main/asterisk: upgrade to 15.1.2 2017-11-13 13:03:21 +00:00
Natanael Copa
6029b30a8f main/asterisk: rebuild against libressl-2.6 2017-11-09 19:58:35 +00:00
Timo Teräs
f8b076c309 main/asterisk: upgrade to 15.1.1
AST-2017-009 Buffer overflow in pjproject header parsing can cause crash
AST-2017-010 Buffer overflow in CDR's set user
AST-2017-011 Memory leak in pjsip session resource
2017-11-09 07:16:39 +00:00
Timo Teräs
af262bba6f main/asterisk: upgrade to 15.1.0 2017-10-31 06:37:38 +00:00
Timo Teräs
506d3af9a8 main/asterisk: security upgrade to 14.6.2 (CVE-2017-14099)
AST-2017-008 (CVE-2017-14099): RTP/RTCP information leak
2017-09-20 05:45:45 +00:00
Timo Teräs
c7be5ce155 main/asterisk: security upgrade to 14.6.1
AST-2017-005: Media takeover in RTP stack
AST-2017-006: Shell access command injection in app_minivm
AST-2017-007: Remote Crash Vulerability in res_pjsip
2017-09-01 05:47:27 +00:00
Timo Teräs
d920dcd3a7 main/asterisk: fix init.d to enable core dumps when requested
fixes #7583
2017-08-14 14:53:21 +03:00
Timo Teräs
af7f75ee24 main/asterisk: upgrade to 14.6.0 2017-07-12 14:25:22 +00:00
Timo Teräs
d3b69542ac main/asterisk: upgrade to 14.5.0
rebase iostream patch
2017-06-01 08:19:35 +00:00
Timo Teräs
868a19dbd9 main/asterisk: security upgrade to 14.4.1
AST-2017-002: Buffer Overrun in PJSIP  transaction layer
AST-2017-003: Crash in PJSIP multi-part body  parser
AST-2017-004: Memory exhaustion on short SCCP  packets
2017-05-22 06:10:22 +00:00
Natanael Copa
0299b73bbc main/asterisk: fix imap support
fixes #4840
2017-05-17 17:08:53 +00:00
Natanael Copa
1f28b274fa main/asterisk: rebuild against libressl 2.5 2017-04-18 20:45:35 +00:00
Timo Teräs
951d0ba989 main/asterisk: upgrade to 14.4.0 2017-04-12 11:21:55 +00:00
Timo Teräs
f4818d9fab main/asterisk: security upgrade to 14.3.1
AST-2017-001 Buffer overflow in CDR's set user
2017-04-05 06:40:59 +00:00
William Pitcock
a15c2a2581 main/asterisk: fix build under abuild 3.0 2017-03-29 05:25:04 +00:00
Timo Teräs
18f604284e main/asterisk: upgrade to 14.3.0
- rebase ASTERISK-24517
- remove upstreamed patch
2017-02-15 08:48:12 +00:00
Timo Teräs
702ee46493 main/asterisk: fix checksum 2017-01-26 07:09:37 +00:00
Timo Teräs
c7e134d319 main/asterisk: fix pjsip module loading
ref #6644
2017-01-26 07:08:01 +00:00
Timo Teräs
74cb67a0f5 main/asterisk: cherry-pick upstream follow-up fixes for ASTERISK-24517 2017-01-12 08:28:58 +02:00
Timo Teräs
3d66106628 main/asterisk: security upgrade to 14.2.1 (CVE-2016-9937)
also disable -march=native to use proper alpine default arch target
2016-12-21 09:11:25 +02:00
Timo Teräs
a86bb566b0 main/asterisk: upgrade to 14.2.0 2016-11-23 18:05:32 +00:00
Timo Teräs
e30b06dd6e main/asterisk: add upstream submitted portability fixes
fixes #3503
fixes #6394
2016-11-18 09:37:08 +02:00
Timo Teräs
b34f303ba4 main/asterisk: upgrade to 14.1.2 2016-11-11 06:11:24 +00:00
Timo Teräs
cc816aeb59 main/asterisk: upgrade to 14.1.1
- move libasteriskssl.so symlink back to main package
- fixes #6393
2016-11-01 15:09:03 +02:00
Timo Teräs
ade3338882 main/[various]: set proper arch
fixes commit "main/[various]: dont set arch in split function"
2016-11-01 09:19:40 +02:00
Natanael Copa
75ad2ca27e main/[various]: dont set arch in split function 2016-10-26 20:46:53 +00:00
Timo Teräs
83c49e20d7 main/asterisk: upgrade to 14.1.0 2016-10-26 05:19:55 +00:00
Natanael Copa
e1c1f94f5d main/asterisk: upgrade to 14.0.2 2016-10-10 12:04:04 +00:00
Timo Teräs
372b48e0f1 main/asterisk: upgrade to 13.11.1
AST-2016-006: Crash on ACK from unknown endpoint
AST-2016-007: RTP Resource Exhaustion

Remove our custom patch ASTERISK-19109 as unneeded since the
administrative mute can be used for similar features. And remove
musl-includes.patch as it was merged upstream.
2016-09-09 08:24:19 +03:00
Carlo Landmeter
e6311d6996 main/asterisk: disable imap on aarch64 2016-08-13 10:42:12 +00:00
Timo Teräs
9a79b7bf3b main/asterisk: upgrade to 13.9.1
- rebased ASTERISK-19109 patch
- add findutils as "find -printf" is now used in configure
2016-06-02 06:28:43 +00:00
Przemyslaw Pawelczyk
0f920d3abe main/[various]: bump pkgrel for pre-install fixes 2016-04-25 07:11:16 +00:00
Przemyslaw Pawelczyk
da4e96aace Reorder arguments passed to addgroup/adduser in scripts.
Now all invocations have following order of arguments (if present):

    addgroup -S -g ... GROUP
    adduser -S -u ... -D -H -h ... -s ... -G ... -g ... USER
2016-04-25 06:56:47 +00:00