1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-03 06:04:53 +00:00

- Update net/asterisk to 1.8.15.1

- Update net/asterisk10 to 10.7.1
- Document vulnerabilities in vuln.xml
- Fix URLs in the pervious asterisk vuln.xml entry

Security:	http://www.vuxml.org/freebsd/4c53f007-f2ed-11e1-a215-14dae9ebcf89.html
This commit is contained in:
Florian Smeets 2012-08-30 22:14:10 +00:00
parent 52203b0bc0
commit b306f9876d
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=303393
5 changed files with 43 additions and 7 deletions

View File

@ -6,7 +6,7 @@
#
PORTNAME= asterisk
PORTVERSION= 1.8.15.0
PORTVERSION= 1.8.15.1
CATEGORIES= net
MASTER_SITES= http://downloads.asterisk.org/pub/telephony/asterisk/ \
http://downloads.asterisk.org/pub/telephony/asterisk/old-releases/

View File

@ -1,2 +1,2 @@
SHA256 (asterisk-1.8.15.0.tar.gz) = 32331f2a1bef79e31462abca2f8d2a23df01f0b927aa6c0d533023ef06fd2867
SIZE (asterisk-1.8.15.0.tar.gz) = 25083527
SHA256 (asterisk-1.8.15.1.tar.gz) = 993ea4b8a52242dd1884a5b0efb0076780fdb3367431ff74ac8937e6a6ae755e
SIZE (asterisk-1.8.15.1.tar.gz) = 25077347

View File

@ -6,7 +6,7 @@
#
PORTNAME= asterisk
PORTVERSION= 10.7.0
PORTVERSION= 10.7.1
CATEGORIES= net
MASTER_SITES= http://downloads.asterisk.org/pub/telephony/asterisk/ \
http://downloads.asterisk.org/pub/telephony/asterisk/old-releases/

View File

@ -1,2 +1,2 @@
SHA256 (asterisk-10.7.0.tar.gz) = fd97a1683de05df0a902ccbb8f2649ca2468cb5e2eb1e4023412b864eedcc76e
SIZE (asterisk-10.7.0.tar.gz) = 25006763
SHA256 (asterisk-10.7.1.tar.gz) = 44802eadcc457218fb55ba23229da1f8f9636a4a503ae2edb26496fab11b0863
SIZE (asterisk-10.7.1.tar.gz) = 24998267

View File

@ -51,6 +51,41 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="4c53f007-f2ed-11e1-a215-14dae9ebcf89">
<topic>asterisk -- multiple vulnerabilities</topic>
<affects>
<package>
<name>asterisk</name>
<range><gt>10.*</gt><lt>10.7.1</lt></range>
</package>
<package>
<name>asterisk18</name>
<range><gt>1.8.*</gt><lt>1.8.15.1</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Asterisk project reports:</p>
<blockquote cite="https://www.asterisk.org/security">
<p>Asterisk Manager User Unauthorized Shell Access</p>
<p>ACL rules ignored when placing outbound calls by certain IAX2
users</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2012-2186</cvename>
<cvename>CVE-2012-4737</cvename>
<url>http://downloads.digium.com/pub/security/AST-2012-012.html</url>
<url>http://downloads.digium.com/pub/security/AST-2012-013.html</url>
<url>https://www.asterisk.org/security</url>
</references>
<dates>
<discovery>2012-08-30</discovery>
<entry>2012-08-30</entry>
</dates>
</vuln>
<vuln vid="2b8cad90-f289-11e1-a215-14dae9ebcf89">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>
@ -1999,13 +2034,14 @@ Note: Please add new entries to the beginning of this file.
</description>
<references>
<cvename>CVE-2012-3812</cvename>
<url>http://downloads.digium.com/pub/security/AST-2012-010.html</url>
<url>http://downloads.digium.com/pub/security/AST-2012-011.html</url>
<url>http://downloads.digium.com/pub/security/AST-2012-012.html</url>
<url>https://www.asterisk.org/security</url>
</references>
<dates>
<discovery>2012-07-05</discovery>
<entry>2012-07-06</entry>
<modified>2012-08-30</modified>
</dates>
</vuln>