Bug 114720 - [UPDATE] net/asterisk to 1.4.8
Summary: [UPDATE] net/asterisk to 1.4.8
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: Maxim Sobolev
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2007-07-19 04:50 UTC by viper
Modified: 2007-07-27 03:50 UTC (History)
0 users

See Also:


Attachments
file.shar (92.47 KB, text/plain)
2007-07-19 04:50 UTC, viper
no flags Details
asterisk.patch (41.66 KB, patch)
2007-07-19 08:36 UTC, viper
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description viper 2007-07-19 04:50:01 UTC
The PR can be applied only after updating the associated ports (http://www.freebsd.org/cgi/query-pr.cgi? Pr = 114613 and http://www.freebsd.org/cgi/query-pr.cgi?pr=114612). This PR (http://www.freebsd.org/cgi/query-pr.cgi?pr=114712&cat=ports) does not seem workable for several reasons.

Information from the site asterisk.org

Asterisk 1.4.5
"There has been a very large number of bugs fixed since the last release, including crashes and other critical issues. There were 244 commits to the 1.4 source tree and 74 commits to the 1.2 source tree since the last set of releases. Also, keep in mind that the release branches are only changed to fix problems. In the same time frame, the development tree had 439 commits. There is a ChangeLog available in the tarball of each release with a complete list of changes."

Asterisk 1.4.6
"We would also like to continue to encourage the community to upgrade to the 1.4 series. There have been almost 100 changes to the 1.4 tree since the last release. Keep in mind that we are still planning to move the 1.2 series 
of Asterisk into security maintenance only beginning August 1st."

Asterisk 1.4.8
"These releases contain fixes for four critical security vulnerabilities. One of these vulnerabilities is a remotely exploitable stack buffer overflow, which could allow an attacker to execute arbitrary code on the target machine. The other three are all remotely exploitable crash vulnerabilities."

Fix: Based on patch Richard E Neese and Phillip N.
My work as follows:
1. Minor cleanup make for happy "port test"
2. Cleanup "files/patch-configure"
3. Addes "files/patch-apps::app_rxfax.c", "files/patch-apps::app_txfax.c", "files/patch-configure.ac", "files/patch-makeopts.in" and "patch-build_tools::menuselect-deps.in"
4. Added work with spandsp.
6. Added work with Sqlite.
Reviewed at work.


Patch attached with submission follows:
Comment 1 Edwin Groothuis freebsd_committer freebsd_triage 2007-07-19 04:50:15 UTC
Responsible Changed
From-To: freebsd-ports-bugs->sobomax

Over to maintainer
Comment 2 Mark Linimon freebsd_committer freebsd_triage 2007-07-19 06:53:09 UTC
State Changed
From-To: open->feedback

Please submit updates in diff -u format, as sepcified by the Porter's 
Handbook.  Thanks.
Comment 3 viper 2007-07-19 08:36:41 UTC

_______________________
Best regards, 
VipeR
Comment 4 Mark Linimon freebsd_committer freebsd_triage 2007-07-19 08:55:19 UTC
State Changed
From-To: feedback->open

Feedback received.
Comment 5 dfilter service freebsd_committer freebsd_triage 2007-07-22 11:40:42 UTC
sobomax     2007-07-22 10:40:35 UTC

  FreeBSD ports repository

  Modified files:
    net/asterisk         Makefile distinfo pkg-plist 
    net/asterisk/files   asterisk.sh.in patch-Makefile 
                         patch-configure 
  Removed files:
    net/asterisk/files   patch-main::utils.c 
  Log:
  o Update to 1.4.8, which fixes some security issues.
  
  PR:             114720, 114712
  
  o Enable zaptel channel and friends on AMD64.
  
  PR:             112624
  
  o Improve startup script.
  
  PR:             107222
  
  Revision  Changes    Path
  1.74      +8 -7      ports/net/asterisk/Makefile
  1.25      +3 -3      ports/net/asterisk/distinfo
  1.7       +8 -0      ports/net/asterisk/files/asterisk.sh.in
  1.20      +9 -9      ports/net/asterisk/files/patch-Makefile
  1.2       +73 -18    ports/net/asterisk/files/patch-configure
  1.2       +0 -14     ports/net/asterisk/files/patch-main::utils.c (dead)
  1.29      +4 -4      ports/net/asterisk/pkg-plist
_______________________________________________
cvs-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/cvs-all
To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
Comment 6 Maxim Sobolev freebsd_committer freebsd_triage 2007-07-22 11:45:14 UTC
State Changed
From-To: open->closed

Commited with some mods, thanks!
Comment 7 Phillip N. 2007-07-22 16:05:22 UTC
Hi, im curious:

* I can read in /usr/ports/net/asterisk/work/asterisk-1.4.8/doc/mp3.txt,
that mpg123 is not recomended, why keep using it?

* Is there anything wrong with SQLLite and FAX support? i dont really
use them, but its just for curiosity...

thanks!!
Comment 8 viper 2007-07-22 21:43:24 UTC
	
I wonder what is wrong with the support of faxes and sqlite? 
I use work with faxes, and they are working normally. 

_______________________
Best regards, 
VipeR
Comment 9 dfilter service freebsd_committer freebsd_triage 2007-07-27 03:41:23 UTC
sobomax     2007-07-27 02:41:10 UTC

  FreeBSD ports repository

  Modified files:
    net/asterisk         Makefile distinfo pkg-plist 
    net/asterisk/files   patch-channels::chan_skinny.c 
  Log:
  Update to 1.4.9.
  
  Sponsored by: Sippy Software, Inc. ( http://www.sippysoft.com/ )
  
  Enable SQLite support.
  
  PR:             114720
  Submitted by:   VipeR
  
  Revision  Changes    Path
  1.77      +12 -2     ports/net/asterisk/Makefile
  1.26      +3 -3      ports/net/asterisk/distinfo
  1.2       +5 -5      ports/net/asterisk/files/patch-channels::chan_skinny.c
  1.30      +1 -0      ports/net/asterisk/pkg-plist
_______________________________________________
cvs-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/cvs-all
To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"