summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Regression fix by Jaco Kroon closes bug #374195. If you set DAHDI channel ↵Tony Vroon2011-07-061-4/+6
| | | | | | variables from your dial plan and this stopped working in 1.6.2.19; this is for you. (Portage version: 2.1.10.4/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Regression fix by Jaco Kroon closes bug #374195. If you set DAHDI channel ↵Tony Vroon2011-07-062-1/+233
| | | | | | variables from your dial plan and this stopped working in 1.6.2.19; this is for you. (Portage version: 2.1.10.4/cvs/Linux x86_64)
* Actually install the newest init script with Jaco Kroon's restart fixes; as ↵Tony Vroon2011-07-041-3/+13
| | | | | | pointed out by Erik Wallin (reopened) bug #345307. (Portage version: 2.1.10.4/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Actually install the newest init script with Jaco Kroon's restart fixes; as ↵Tony Vroon2011-07-043-5/+14
| | | | | | pointed out by Erik Wallin (reopened) bug #345307. (Portage version: 2.1.10.4/cvs/Linux x86_64)
* This is the final maintenance release in the 1.6.2 branch, which will ↵Tony Vroon2011-06-291-1/+4
| | | | | | receive security updates until April 21, 2012. The FullyBooted event is no longer erroneously broadcasted to all AMI connections. Resolves a thread blocking issue in SIP TCP/TLS, a chan_local crash, DTMF delays in core bridge and no longer offers video in directmedia unless both sides support it. Secured up to and including AST-2011-011. (Portage version: 2.1.10.3/cvs/Linux x86_64, unsigned Manifest commit)
* This is the final maintenance release in the 1.6.2 branch, which will ↵Tony Vroon2011-06-292-1/+236
| | | | | | receive security updates until April 21, 2012. The FullyBooted event is no longer erroneously broadcasted to all AMI connections. Resolves a thread blocking issue in SIP TCP/TLS, a chan_local crash, DTMF delays in core bridge and no longer offers video in directmedia unless both sides support it. Secured up to and including AST-2011-011. (Portage version: 2.1.10.3/cvs/Linux x86_64)
* Remove last vulnerable ebuild in 1.6.2 branch now that stabling has been ↵Tony Vroon2011-06-291-13/+1
| | | | | | completed. For security bug #373409. (Portage version: 2.1.10.3/cvs/Linux x86_64, unsigned Manifest commit)
* Remove last vulnerable ebuild in 1.6.2 branch now that stabling has been ↵Tony Vroon2011-06-292-226/+5
| | | | | | completed. For security bug #373409. (Portage version: 2.1.10.3/cvs/Linux x86_64)
* x86 stable, bug #373409Markus Meier2011-06-291-2/+12
| | | | (Portage version: 2.1.10.3/cvs/Linux x86_64, signed Manifest commit with key 072AD062)
* x86 stable, bug #373409Markus Meier2011-06-292-3/+6
| | | | (Portage version: 2.1.10.3/cvs/Linux x86_64)
* amd64 stable, bug #373409Kenneth Prugh2011-06-281-2/+2
| | | | (Portage version: 2.1.10.3/cvs/Linux x86_64, unsigned Manifest commit)
* amd64 stable, bug #373409Kenneth Prugh2011-06-282-3/+6
| | | | (Portage version: 2.1.10.3/cvs/Linux x86_64)
* Version bump to 1.6.2.18.2 for AST-2011-011 (information disclosure on ↵Tony Vroon2011-06-281-1/+3
| | | | | | valid/invalid SIP usernames even with alwaysauthreject). (Portage version: 2.1.10.3/cvs/Linux x86_64, unsigned Manifest commit)
* Version bump to 1.6.2.18.2 for AST-2011-011 (information disclosure on ↵Tony Vroon2011-06-282-1/+232
| | | | | | valid/invalid SIP usernames even with alwaysauthreject). (Portage version: 2.1.10.3/cvs/Linux x86_64)
* Trim down 1.8 branch by removing vulnerable 1.8.4.3 ebuild. Version bump to ↵Tony Vroon2011-06-281-13/+3
| | | | | | 1.8.4.4 for AST-2011-011. Information disclosure vulnerability; alwaysauthreject is not always effective resulting in different replies for non-existent SIP users than for a wrong password on a valid user. (Portage version: 2.1.10.3/cvs/Linux x86_64, unsigned Manifest commit)
* Trim down 1.8 branch by removing vulnerable 1.8.4.3 ebuild. Version bump to ↵Tony Vroon2011-06-282-2/+11
| | | | | | 1.8.4.4 for AST-2011-011. Information disclosure vulnerability; alwaysauthreject is not always effective resulting in different replies for non-existent SIP users than for a wrong password on a valid user. (Portage version: 2.1.10.3/cvs/Linux x86_64)
* Changelog typo fix: 1.8 -> 1.6.2; more caffeine required.Tony Vroon2011-06-271-4/+4
| | | | (Portage version: 2.1.10.3/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Changelog typo fix: 1.8 -> 1.6.2; more caffeine required.Tony Vroon2011-06-271-2/+2
| | | | (Portage version: 2.1.10.3/cvs/Linux x86_64)
* Remove last vulnerable ebuild on 1.8 branch now that stabling has been ↵Tony Vroon2011-06-271-7/+5
| | | | | | completed for security bug #372793. (Portage version: 2.1.10.3/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Remove last vulnerable ebuild on 1.8 branch now that stabling has been ↵Tony Vroon2011-06-272-226/+5
| | | | | | completed for security bug #372793. (Portage version: 2.1.10.3/cvs/Linux x86_64)
* x86 stable wrt security bug #372793Paweł Hajdan2011-06-261-6/+6
| | | | (Portage version: 2.1.9.42/cvs/Linux i686, signed Manifest commit with key 30427902)
* x86 stable wrt security bug #372793Paweł Hajdan2011-06-262-3/+7
| | | | (Portage version: 2.1.9.42/cvs/Linux i686)
* Mark stable on AMD64 based on arch testing by Agostino "ago" Sarubbo; for ↵Tony Vroon2011-06-241-5/+5
| | | | | | security bug #372793. (Portage version: 2.1.10.3/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Mark stable on AMD64 based on arch testing by Agostino "ago" Sarubbo; for ↵Tony Vroon2011-06-242-3/+7
| | | | | | security bug #372793. (Portage version: 2.1.10.3/cvs/Linux x86_64)
* Security update 1.6.2.18.1 resolves AST-2011-008 (buffer overflow due to ↵Tony Vroon2011-06-241-6/+6
| | | | | | NULL in SIP packet), AST-2011-009 (null pointer dereference due to missing left angle bracket in Contact header) & AST-2011-010 (unresolved pointer in IAX2 option control frame dereferenced by remote party). Remove one vulnerable non-stable ebuild. (Portage version: 2.1.10.3/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Security update 1.6.2.18.1 resolves AST-2011-008 (buffer overflow due to ↵Tony Vroon2011-06-242-2/+12
| | | | | | NULL in SIP packet), AST-2011-009 (null pointer dereference due to missing left angle bracket in Contact header) & AST-2011-010 (unresolved pointer in IAX2 option control frame dereferenced by remote party). Remove one vulnerable non-stable ebuild. (Portage version: 2.1.10.3/cvs/Linux x86_64)
* Trim down 1.8 branch by removing vulnerable ebuild. Security update 1.8.4.3 ↵Tony Vroon2011-06-241-6/+6
| | | | | | resolves AST-2011-008 (buffer overflow due to NULL in SIP packet), AST-2011-009 (null pointer dereference due to missing left angle bracket in Contact header) & AST-2011-010 (unresolved pointer in IAX2 option control frame dereferenced by remote party). (Portage version: 2.1.10.3/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Trim down 1.8 branch by removing vulnerable ebuild. Security update 1.8.4.3 ↵Tony Vroon2011-06-242-2/+12
| | | | | | resolves AST-2011-008 (buffer overflow due to NULL in SIP packet), AST-2011-009 (null pointer dereference due to missing left angle bracket in Contact header) & AST-2011-010 (unresolved pointer in IAX2 option control frame dereferenced by remote party). (Portage version: 2.1.10.3/cvs/Linux x86_64)
* Security update 1.8.4.2; upstream vulnerability report AST-2011-007 ↵Tony Vroon2011-06-061-3/+13
| | | | | | describes a remotely exploitable crash in the SIP channel driver. Remove vulnerable 1.8.4.1 ebuild; the 1.6.2 branch is not affected and remains the current stable. (Portage version: 2.1.9.50/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Security update 1.8.4.2; upstream vulnerability report AST-2011-007 ↵Tony Vroon2011-06-062-2/+11
| | | | | | describes a remotely exploitable crash in the SIP channel driver. Remove vulnerable 1.8.4.1 ebuild; the 1.6.2 branch is not affected and remains the current stable. (Portage version: 2.1.9.50/cvs/Linux x86_64)
* Remove old 1.8 patches in files directory; a patch tarball has been used for ↵Tony Vroon2011-06-011-20/+1
| | | | | | a while now. (Portage version: 2.1.9.49/cvs/Linux x86_64, unsigned Manifest commit)
* Remove old 1.8 patches in files directory; a patch tarball has been used for ↵Tony Vroon2011-06-0110-311/+14
| | | | | | a while now. (Portage version: 2.1.9.49/cvs/Linux x86_64)
* Clean up older ebuilds and USE-flag description for misdn in preparation for ↵Tony Vroon2011-05-271-11/+5
| | | | | | unmasking. (Portage version: 2.1.9.49/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Clean up older ebuilds and USE-flag description for misdn in preparation for ↵Tony Vroon2011-05-274-872/+6
| | | | | | unmasking. (Portage version: 2.1.9.49/cvs/Linux x86_64)
* Bugfix release; Cisco 79xx phones now register again. Unreachable TCP/TLS ↵Tony Vroon2011-05-261-4/+7
| | | | | | peers no longer cause the SIP stack to explode. Snom phones can now reliably register over TLS. Upstream patch scavenged to prevent PUBLISH dialogs accumulating. (Portage version: 2.1.9.49/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Bugfix release; Cisco 79xx phones now register again. Unreachable TCP/TLS ↵Tony Vroon2011-05-262-1/+445
| | | | | | peers no longer cause the SIP stack to explode. Snom phones can now reliably register over TLS. Upstream patch scavenged to prevent PUBLISH dialogs accumulating. (Portage version: 2.1.9.49/cvs/Linux x86_64)
* QA: ensure presence of dialout group. Fix install when using new, ↵Diego Elio Pettenò2011-05-251-8/+8
| | | | | | OpenRC/Baselayout2-native stages that lack such group. (Portage version: 2.2.0_alpha35/cvs/Linux x86_64, signed Manifest commit with key 2200D978)
* QA: ensure presence of dialout group. Fix install when using new, ↵Diego Elio Pettenò2011-05-255-5/+15
| | | | | | OpenRC/Baselayout2-native stages that lack such group. (Portage version: 2.2.0_alpha35/cvs/Linux x86_64)
* Bugfix release, with directmedia codecs that only 1 side supports are no ↵Tony Vroon2011-05-131-4/+6
| | | | | | longer offered. Several DTMF transfer fixes and SIP deadlock fixes. Channel soft hangup fixes relevant to redirects out of MeetMe. Distro patchset unchanged. (Portage version: 2.1.9.49/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Bugfix release, with directmedia codecs that only 1 side supports are no ↵Tony Vroon2011-05-132-1/+233
| | | | | | longer offered. Several DTMF transfer fixes and SIP deadlock fixes. Channel soft hangup fixes relevant to redirects out of MeetMe. Distro patchset unchanged. (Portage version: 2.1.9.49/cvs/Linux x86_64)
* Build additional utilities like smsq as suggested by Nico Baggus in bug ↵Tony Vroon2011-05-131-1/+14
| | | | | | #358001. Fix up dodoc call and drop broken misdn support, bugs #360141 & #360143 by Agostino "ago" Sarubbo. Apply patch for upstream bug #19192, as diagnosed by Stefan "stkn" Knoblich. (Portage version: 2.1.9.49/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Build additional utilities like smsq as suggested by Nico Baggus in bug ↵Tony Vroon2011-05-132-1/+444
| | | | | | #358001. Fix up dodoc call and drop broken misdn support, bugs #360141 & #360143 by Agostino "ago" Sarubbo. Apply patch for upstream bug #19192, as diagnosed by Stefan "stkn" Knoblich. (Portage version: 2.1.9.49/cvs/Linux x86_64)
* Removed vulnerable ebuild for CVE-2011-{1507,1599}, security bug #364887.Tony Vroon2011-04-281-13/+1
| | | | (Portage version: 2.1.9.46/cvs/Linux x86_64, unsigned Manifest commit)
* Removed vulnerable ebuild for CVE-2011-{1507,1599}, security bug #364887.Tony Vroon2011-04-282-225/+4
| | | | (Portage version: 2.1.9.46/cvs/Linux x86_64)
* x86 stable per bug 364887Thomas Kahle2011-04-281-6/+6
| | | | (Portage version: 2.1.9.46/cvs/Linux i686, signed Manifest commit with key 0x20F2A3AE)
* x86 stable per bug 364887Thomas Kahle2011-04-282-3/+6
| | | | (Portage version: 2.1.9.46/cvs/Linux i686)
* Mark stable on AMD64 for security bug #364887. Arch testing by Agostino ↵Tony Vroon2011-04-261-5/+5
| | | | | | "ago" Sarubbo. (Portage version: 2.1.9.46/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Mark stable on AMD64 for security bug #364887. Arch testing by Agostino ↵Tony Vroon2011-04-262-3/+7
| | | | | | "ago" Sarubbo. (Portage version: 2.1.9.46/cvs/Linux x86_64)
* Make dependency on newer DAHDI explicit to avoid surprises for the X86 team.Tony Vroon2011-04-261-5/+5
| | | | (Portage version: 2.1.9.46/cvs/Linux x86_64, signed Manifest commit with key 0xB5058F9A)
* Make dependency on newer DAHDI explicit to avoid surprises for the X86 team.Tony Vroon2011-04-262-3/+6
| | | | (Portage version: 2.1.9.46/cvs/Linux x86_64)