head 1.3; access; symbols pkgsrc-2021Q2:1.2.0.4 pkgsrc-2021Q2-base:1.2 pkgsrc-2021Q1:1.2.0.2 pkgsrc-2021Q1-base:1.2 pkgsrc-2020Q4:1.1.0.20 pkgsrc-2020Q4-base:1.1 pkgsrc-2020Q3:1.1.0.18 pkgsrc-2020Q3-base:1.1 pkgsrc-2020Q2:1.1.0.16 pkgsrc-2020Q2-base:1.1 pkgsrc-2020Q1:1.1.0.12 pkgsrc-2020Q1-base:1.1 pkgsrc-2019Q4:1.1.0.14 pkgsrc-2019Q4-base:1.1 pkgsrc-2019Q3:1.1.0.10 pkgsrc-2019Q3-base:1.1 pkgsrc-2019Q2:1.1.0.8 pkgsrc-2019Q2-base:1.1 pkgsrc-2019Q1:1.1.0.6 pkgsrc-2019Q1-base:1.1 pkgsrc-2018Q4:1.1.0.4 pkgsrc-2018Q4-base:1.1 pkgsrc-2018Q3:1.1.0.2 pkgsrc-2018Q3-base:1.1; locks; strict; comment @# @; 1.3 date 2021.06.27.08.53.54; author jnemeth; state dead; branches; next 1.2; commitid nm2bDeB91cgruKYC; 1.2 date 2021.01.17.08.32.40; author jnemeth; state Exp; branches; next 1.1; commitid LxuEO4QRgqDby3EC; 1.1 date 2018.07.16.21.53.04; author joerg; state Exp; branches; next ; commitid 2t0uQsF4hoYfqpKA; desc @@ 1.3 log @Removed comms/asterisk15 as mentioned on pkgsrc-users. @ text @$NetBSD: distinfo,v 1.2 2021/01/17 08:32:40 jnemeth Exp $ SHA1 (asterisk-15.7.4/asterisk-15.7.4.tar.gz) = e2978dffcd8d82de2597ac39d20dd2f5fcee3528 RMD160 (asterisk-15.7.4/asterisk-15.7.4.tar.gz) = f4d5601871353822d79f195c0b75407ceb5fcff9 SHA512 (asterisk-15.7.4/asterisk-15.7.4.tar.gz) = fe6fe24daad5b09f2eea1ba8b69a28cdf2149c334038387491fef2215aa2c8051190648f14f3db09b024d80fdfa27b0693289d4e5bdc1fbe4733eed94893f79b Size (asterisk-15.7.4/asterisk-15.7.4.tar.gz) = 27592178 bytes SHA1 (asterisk-15.7.4/asterisk-extra-sounds-en-gsm-1.5.2.tar.gz) = 0207e289404704c42941759db9660269599044f9 RMD160 (asterisk-15.7.4/asterisk-extra-sounds-en-gsm-1.5.2.tar.gz) = 5d660e7664a56086bd60ad49196e1b622a60f106 SHA512 (asterisk-15.7.4/asterisk-extra-sounds-en-gsm-1.5.2.tar.gz) = 3f2f7bf3d5bce3544bc013f913c352f0204a3ce96239987403eb9dce8bc87e64a61d437762323a422a87b2fad1f3bf3e7a5f3d0d340f912a1b1dbfea9479d41d Size (asterisk-15.7.4/asterisk-extra-sounds-en-gsm-1.5.2.tar.gz) = 4253587 bytes SHA1 (asterisk-15.7.4/pjproject-2.8.md5) = 17d1316b036742ece5f7f7a2393d5580e8b5e454 RMD160 (asterisk-15.7.4/pjproject-2.8.md5) = 251b49688d3d8b83b97880abbdcf7f4978336bb5 SHA512 (asterisk-15.7.4/pjproject-2.8.md5) = ac3ceac0c279a00de6098476346dcbdfd3b24f7be9f93746162ed5ead265ac20e58731d3fd6c23348fa92d2e635ddf932ddfaecf98a79e0a26a6eb717d122a36 Size (asterisk-15.7.4/pjproject-2.8.md5) = 107 bytes SHA1 (asterisk-15.7.4/pjproject-2.8.tar.bz2) = 7366fb16b082f449dec34dbe1fd3ee82ffd81290 RMD160 (asterisk-15.7.4/pjproject-2.8.tar.bz2) = 515f2cf7fd48ea9a541aff49c815ef004b085c07 SHA512 (asterisk-15.7.4/pjproject-2.8.tar.bz2) = 0a0ee66932959710f806cb1d88a3b946b214d2caecd54ecc9eabdbdb17f7f4fa0b7d27567dc3796d845a25b850c974536e7c7538d51f93771d13dd2fd309eaf5 Size (asterisk-15.7.4/pjproject-2.8.tar.bz2) = 4976501 bytes SHA1 (patch-Makefile) = 57220de5746364db229e5f7b54af8794cbf4a166 SHA1 (patch-addons_chan__ooh323.c) = 1775da7ca2129a962ed460bd1e78ba3ce6afa62c SHA1 (patch-apps_app__adsiprog.c) = 031139e5cd1ef6bb2afb0a74fee3d752eded0a2c SHA1 (patch-apps_app__chanspy.c) = 29a807909645c1ad0c8f81b6513a284b978e7c47 SHA1 (patch-apps_app__directory.c) = 889a78123033709d28b0b805f2a379242ccd7dcc SHA1 (patch-apps_app__dumpchan.c) = 127ac02bdc180ad2334cd095aa6e646feb6fba10 SHA1 (patch-apps_app__followme.c) = c6a5790b5e9b34d07dbfdd66a58e2854c8c72695 SHA1 (patch-apps_app__minivm.c) = 22ee6ebfbe205baf0acf46ab16c94fea1750f2fb SHA1 (patch-apps_app__queue.c) = 03051f924b52cdb7ab69959740ff3efee15b78b1 SHA1 (patch-apps_app__sms.c) = ad65b3cb2a30489551101f7534c691cd1155d18f SHA1 (patch-apps_app__voicemail.c) = bee10453a86039a99db9df644585800f347aaace SHA1 (patch-build__tools_mkpkgconfig) = 7fab8fcf46d9f8a3b98455674fec6307ec472b23 SHA1 (patch-cdr_cdr__pgsql.c) = 82b002a1f5ed3b7361a98e2bffb5cea8833949b8 SHA1 (patch-cel_cel__pgsql.c) = b280efab2b035ce60be268bac9bc8824910b2b8f SHA1 (patch-channels_chan__pjsip.c) = efd4cbb82133fc5ddf7de70d01c99e185c585211 SHA1 (patch-channels_chan__sip.c) = ed285612eae6cbfde19ded87db9360c0bca153c7 SHA1 (patch-channels_pjsip_cli__commands.c) = 01baa9d242e3af02a1f3540cfb3064ad68c71d67 SHA1 (patch-channels_pjsip_dialplan__functions.c) = 2cf8199c4ec9d4894eb922c2703d49ecc06188ef SHA1 (patch-configure) = 9af6b9735e2be12cb7caa03ada623d2b6e971c22 SHA1 (patch-configure.ac) = 411ba9ca8242e28ef5d35ad77a0f5fa9d6dba564 SHA1 (patch-contrib_scripts_vmail.cgi) = 7935ce96ea319eb19cc2ce999813eb837d5357c0 SHA1 (patch-funcs_func__cdr.c) = 79c743df264948e5ea9e1c292012a1f6362d0c1e SHA1 (patch-funcs_func__channel.c) = 9d6ed8a2431fbde6879782d8228030467aabe7eb SHA1 (patch-funcs_func__env.c) = 9305d4dde2509f689e676295d3eb06bf5a74b3cb SHA1 (patch-funcs_func__pjsip__aor.c) = 9874f8d66a8afd26ae1669aa727cb5fa2a788334 SHA1 (patch-funcs_func__pjsip__contact.c) = 9b1fa54ee31a549be40d487c650cc79d625c8092 SHA1 (patch-funcs_func__pjsip__endpoint.c) = 263a4bdb6365bcc9f6392d25a5aef5c607e59d04 SHA1 (patch-funcs_func__strings.c) = 08d313add57c5be822a19311fc70a7555bd63877 SHA1 (patch-include_asterisk_autoconfig.h.in) = 23807b08b94f5cf9c2de76c2928f7ae38997d006 SHA1 (patch-include_asterisk_lock.h) = ce636ef6102a2a95600cfc8215305507e08fe8f9 SHA1 (patch-include_asterisk_sha1.h) = 9b233ef82b50b8d94177616e1382991656ce1ebf SHA1 (patch-include_asterisk_strings.h) = 9ace78a13131bcb411eda79a98264b5cfcc7789c SHA1 (patch-main_Makefile) = 41360ca6fe5791f1a38d77406729e4730b691752 SHA1 (patch-main_acl.c) = 06a9d247b19d648e9ff54ac2a234dc8ac8c023bb SHA1 (patch-main_app.c) = 1c12bb207dcb0060017d63ba4f11fcf63d60a45e SHA1 (patch-main_ast__expr2.c) = bad644eb956645e889344810ec315afd430853be SHA1 (patch-main_ast__expr2.y) = 56ac74b5a3ae47bd5bec798e549ec43bd085e0e8 SHA1 (patch-main_asterisk.c) = 1262d792f330fe8a1bb1d1f7ba51bc502d65be42 SHA1 (patch-main_astmm.c) = 26a98d6fbb567ae619041ebd01a31349a847deab SHA1 (patch-main_bridge__basic.c) = b48627e563e20544017fdfcfb4559e868badf41d SHA1 (patch-main_callerid.c) = 0ea1b3df8aaf3969fcd9e06055c8e6184d50d3d3 SHA1 (patch-main_cdr.c) = 540fbdb354aba100fa37392b879b92a85d1d8620 SHA1 (patch-main_cel.c) = 22fa21db8e0afa0958d34014f52e2c4fe9c73ba2 SHA1 (patch-main_cli.c) = ee72bcaac7dce397354cbc09af4ed7441dbb4650 SHA1 (patch-main_conversions.c) = 9e7304fad72de95ec6fb7dd6a801c730b4928e42 SHA1 (patch-main_dns__naptr.c) = 4fa3fe5d2acf7bcd84ca2044280c644e4bd15d7f SHA1 (patch-main_enum.c) = 1bcd8d4faffa879ed3547c141307fcd1f2c53108 SHA1 (patch-main_features.c) = 6e50ea4c6ee26f56edca22611aeed44787459968 SHA1 (patch-main_http.c) = b36f1f3f0da25456a17888d34ea2bf7b61c1acf4 SHA1 (patch-main_indications.c) = d28d78ee9b493303e5569c9b8335cf3d5158790b SHA1 (patch-main_logger.c) = 321a52b3015af85ea13055953cec5a5d9da05ec8 SHA1 (patch-main_manager.c) = cb87e72e630a5f192b614d203a8cd81190ba1424 SHA1 (patch-main_netsock.c) = c2cb47fd2ddc628aae0a7ff1c625d6cb7329b45b SHA1 (patch-main_pbx.c) = 8e7ced268edb29238f96418e8b21456364c4ae1f SHA1 (patch-main_pbx__builtins.c) = f53aadc04fd489f6725911537007af4f4076ee56 SHA1 (patch-main_pbx__timing.c) = a4657330086c5b0e8fd271d5676fb897badea452 SHA1 (patch-main_sched.c) = 4219ac1561e8c4fbc5b1facdf38b3e8b764d5def SHA1 (patch-main_stdtime_localtime.c) = 1e3c62d70eab62c46ac29e03e842229cf7587d2b SHA1 (patch-main_tdd.c) = 9f525971938dd4f222622cb3e78a35822bd08389 SHA1 (patch-main_test.c) = f38b370cdb5788304e02c71ef05d2130ead9de98 SHA1 (patch-main_utils.c) = 2762f982f7a66979e363e984b0948364e1b03b7e SHA1 (patch-menuselect_menuselect.c) = 8bae3a2c6b8c6e7927b35bd83147a55e380efd7f SHA1 (patch-pbx_pbx__config.c) = cc5e6d2b383f86abfb354c9bf14fc93374fba0a3 SHA1 (patch-pbx_pbx__dundi.c) = 1bc28ff2412da569f139f245c5223845a2f6cebe SHA1 (patch-res_ael_pval.c) = 8a238c78403d3098bf8be8ae266162bc05e586f3 SHA1 (patch-res_res__calendar.c) = 45211a3baf8fbd8b201ba0167f8c56fb35728c4a SHA1 (patch-res_res__calendar__caldav.c) = afe2f4806dd57148dde11baeefaa7897fce4d485 SHA1 (patch-res_res__calendar__icalendar.c) = ed34b7147d8834ebadac9b1b8488a4c645f90a5b SHA1 (patch-res_res__hep__pjsip.c) = b0c8fed52451ec31a2c77d4abd28640631bb708c SHA1 (patch-res_res__limit.c) = e80f370fe5b84dcdc2f38e2137d5ed6f75ba35a4 SHA1 (patch-res_res__musiconhold.c) = 2396c344aa0383e694631eedcca7655147bca8ab SHA1 (patch-res_res__pjproject.c) = 0326bf12d9f798c8eae2eff4fad8b86d4bbc0589 SHA1 (patch-res_res__pjsip.c) = d287cdb4823e81d41ea3fb28eea433db76e66bec SHA1 (patch-res_res__pjsip__acl.c) = 8a83ce62fa07f48d2437c27fed41eb57aa827809 SHA1 (patch-res_res__pjsip__authenticator__digest.c) = e8591364ef3489f6200e66091be7d45c5aa228d5 SHA1 (patch-res_res__pjsip__caller__id.c) = 37e8e540d41679d5c02a328c26b98ad5df7c830f SHA1 (patch-res_res__pjsip__config__wizard.c) = 23f7df16177b80f11fbce13c32deb163bd169ea1 SHA1 (patch-res_res__pjsip__dialog__info__body__generator.c) = 29ff600d169910c2eacc49c1e9df79fcb2469869 SHA1 (patch-res_res__pjsip__diversion.c) = 4ef93a2138c10e84c7f58467216620af1b9765bd SHA1 (patch-res_res__pjsip__dlg__options.c) = f9a68ad4af360d55d76bc989148320e614b4ca74 SHA1 (patch-res_res__pjsip__dtmf__info.c) = 2993ce118d81388f2383295834e31d2cd71029ba SHA1 (patch-res_res__pjsip__empty__info.c) = b8a5e5b285f9a2a198ca2e4da7096d16c66e439f SHA1 (patch-res_res__pjsip__endpoint__identifier__anonymous.c) = c3771b1d420026916e232e18282708f6b729c8a7 SHA1 (patch-res_res__pjsip__endpoint__identifier__ip.c) = 0afe3372ab2721b81bb543c2c9ef7661656671e1 SHA1 (patch-res_res__pjsip__endpoint__identifier__user.c) = f4b47f404627633f824bb4b50e92a285d79c03a5 SHA1 (patch-res_res__pjsip__exten__state.c) = 01cc18f9a95fa903d684ccd1032de0e8b4463430 SHA1 (patch-res_res__pjsip__header__funcs.c) = 8125f46dd7b8af537ff732542ef36518a48684ab SHA1 (patch-res_res__pjsip__history.c) = c8c901bc059b27028c02f8c3df0de5e0e944c3f2 SHA1 (patch-res_res__pjsip__logger.c) = f25a1e7a47a697620b00ada4556e39dfe54f298c SHA1 (patch-res_res__pjsip__messaging.c) = 084aaaac58afbe9a76511e847760ea203c311256 SHA1 (patch-res_res__pjsip__mwi.c) = 446043b276cb3f14a751bb48ff17cbc34ac2eb9f SHA1 (patch-res_res__pjsip__mwi__body__generator.c) = 80a913e23ebf797a5f232de2be067b4358a3d21a SHA1 (patch-res_res__pjsip__nat.c) = bf2e251d6e146fc60b70fafa96392b05ad693520 SHA1 (patch-res_res__pjsip__notify.c) = 936fe989780bfebf82d111c90992e9684e7f50ba SHA1 (patch-res_res__pjsip__one__touch__record__info.c) = 71b2b3f8fcb56858ae36eeb7c0871988605f936d SHA1 (patch-res_res__pjsip__outbound__authenticator__digest.c) = ae264eb365fa1c547b03dfe33cd47ec4a4ba2b8c SHA1 (patch-res_res__pjsip__outbound__publish.c) = 463b23a7a17d13f55c2d78bbb25dc1c71071bf08 SHA1 (patch-res_res__pjsip__outbound__registration.c) = cf701495e7120ee2c3445c292d9c3bdb5216f5b3 SHA1 (patch-res_res__pjsip__path.c) = 0bce833c6eb7a7668d3da0eb1a138cc78f4be77c SHA1 (patch-res_res__pjsip__phoneprov__provider.c) = 9f4e0e5cc6fa82eb981e7c18d2d3f5c5db56c86a SHA1 (patch-res_res__pjsip__pidf__body__generator.c) = 86fa07e3750bd2f3acb74e3d2fca7d4e01ecad28 SHA1 (patch-res_res__pjsip__pidf__digium__body__supplement.c) = aa71dd3ac1203040c3af314688320daeced3266b SHA1 (patch-res_res__pjsip__pidf__eyebeam__body__supplement.c) = 081009ebeeefc73aaeee462b9a4e0b71a0c88f14 SHA1 (patch-res_res__pjsip__publish__asterisk.c) = 02a6015e99fdd17ea10d442b728d9ed532b9cd70 SHA1 (patch-res_res__pjsip__pubsub.c) = f0c4a3a66b6e7247caf33dbdead9d1c08370287b SHA1 (patch-res_res__pjsip__refer.c) = a912a58630144cfbffbdfb9ff07fd7e95415ee70 SHA1 (patch-res_res__pjsip__registrar.c) = 9ae7ab0f1032375b5435a3cc2d269aeb15b1180d SHA1 (patch-res_res__pjsip__rfc3326.c) = 859eb71622cc3d66ecb3003fd07be7455ec57674 SHA1 (patch-res_res__pjsip__sdp__rtp.c) = 8dd97457792eefc6ef2ea9d39985d976e6074a77 SHA1 (patch-res_res__pjsip__send__to__voicemail.c) = 30efb4d7985ed780db42d3a1f6ab93754e62813f SHA1 (patch-res_res__pjsip__session.c) = b98cfbb0ba14683dc2efc7106e67363708dbaf3d SHA1 (patch-res_res__pjsip__sips__contact.c) = 69a197754f55fee89b370fc3d4c18a4fe4783c18 SHA1 (patch-res_res__pjsip__t38.c) = e30159250ac299190e6ec36e723a1d217f94b721 SHA1 (patch-res_res__pjsip__transport__websocket.c) = f74adcd9c193acfe9744d49ae4248b806499c07e SHA1 (patch-res_res__pjsip__xpidf__body__generator.c) = 27eb80e19aafefd2966baff800a21ffaca0e250d SHA1 (patch-res_res__pjsip_config__auth.c) = bf56ad74af5525544a3f77268c9e0884f8e8a574 SHA1 (patch-res_res__pjsip_config__domain__aliases.c) = 65eea0261c9e769b428a8925415e38f061099620 SHA1 (patch-res_res__pjsip_config__global.c) = 28e088302ce4cbe46a9b321d3e089d3a99b08f50 SHA1 (patch-res_res__pjsip_config__system.c) = b7e57c35ec71931c75cbf3300e4bbc18f1a8e32e SHA1 (patch-res_res__pjsip_config__transport.c) = c269cda08565abd0df0df43400b5bc293cb53514 SHA1 (patch-res_res__pjsip_location.c) = 4d34085251f168147709994acd625da90d5e1fc4 SHA1 (patch-res_res__pjsip_pjsip__cli.c) = 306815aff92220fad2625a1160059946e61eef96 SHA1 (patch-res_res__pjsip_pjsip__configuration.c) = 6ecc82e9c83982b0ad30a51578f14ff1d58caced SHA1 (patch-res_res__pjsip_pjsip__distributor.c) = ee53596e5b83432900bca92eade9c4b46c4ea4e9 SHA1 (patch-res_res__pjsip_pjsip__global__headers.c) = 2d6ce3c4fdec88c6408e46fd117069dba2b2e209 SHA1 (patch-res_res__pjsip_pjsip__message__filter.c) = cb3942bf6cd642b1ac491eefc356ad912719290c SHA1 (patch-res_res__pjsip_pjsip__options.c) = a016064904b4e663b713f5555778e327baeabb42 SHA1 (patch-res_res__pjsip_pjsip__resolver.c) = a237411f2cdfe264b25e99db72182c80f741fb09 SHA1 (patch-res_res__pjsip_pjsip__scheduler.c) = 1993e266411217b702da4365d50c2cb80bfd6045 SHA1 (patch-res_res__pjsip_pjsip__session.c) = 58092107a59b3c7a9078759e468a9d548005fe4a SHA1 (patch-res_res__pjsip_pjsip__transport__events.c) = daf80357c42d03d1aae4637d2e3c7793fae1a330 SHA1 (patch-res_res__pjsip_pjsip__transport__management.c) = 43949821170fd2c10826a4121e98b96fedb9eb85 SHA1 (patch-res_res__pjsip_presence__xml.c) = bf1870287d0940d77a94c06ca8ef5f499453439c SHA1 (patch-res_res__pjsip_security__events.c) = 423c2820dc190b2f7476433cd6abc9daf0980dac SHA1 (patch-res_res__rtp__asterisk.c) = 874c2f6d388beaa0d84ec76c65173bfd83ab04d7 SHA1 (patch-res_res__xmpp.c) = eca0915ac537e4a5a0bdded8e2c10cf23538ff71 SHA1 (patch-sounds_Makefile) = acc15088ae2545f2822246466bfe783b5215fc54 SHA1 (patch-tests_test__locale.c) = f3f1edc86356f2a7b4d3493433c772e164c77f66 SHA1 (patch-tests_test__voicemail__api.c) = c600f726136581e47cf34da2c0bb485b8a5912eb SHA1 (patch-utils_Makefile) = 4b4be483c20768d640efae5c18fc6f6770eb8c0c SHA1 (patch-utils_db1-ast_include_db.h) = 03b43353b7967f999ace3eb160828c530e2e8fae SHA1 (patch-utils_extconf.c) = f35d079c4801fe20132ff52d63d951d9e1658902 SHA1 (patch-utils_smsq.c) = 5c4cd729f1c9cb68291c514a2e54418e9b5a47cb @ 1.2 log @asterisk15: Update to asterisk 15.7.4. ----- The Asterisk Development Team would like to announce security releases for Asterisk 13, 15 and 16. The available releases are released as versions 13.28.1, 15.7.4 and 16.5.1. These releases are available for immediate download at https://downloads.asterisk.org/pub/telephony/asterisk/releases The following security vulnerabilities were resolved in these versions: * AST-2019-004: Crash when negotiating for T.38 with a declined stream When Asterisk sends a re-invite initiating T.38 faxing, and the endpoint responds with a declined media stream a crash will then occur in Asterisk. * AST-2019-005: Remote Crash Vulnerability in audio transcoding When audio frames are given to the audio transcoding support in Asterisk the number of samples are examined and as part of this a message is output to indicate that no samples are present. A change was done to suppress this message for a particular scenario in which the message was not relevant. This change assumed that information about the origin of a frame will always exist when in reality it may not. For a full list of changes in the current releases, please see the ChangeLogs: https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-15.7.4 The security advisories are available at: https://downloads.asterisk.org/pub/security/AST-2019-004.pdf https://downloads.asterisk.org/pub/security/AST-2019-005.pdf ----- The Asterisk Development Team would like to announce security releases for Asterisk 13, 15 and 16, and Certified Asterisk 13.21. The available releases are released as versions 13.27.1, 15.7.3, 16.4.1 and 13.21-cert4. These releases are available for immediate download at https://downloads.asterisk.org/pub/telephony/asterisk/releases The following security vulnerabilities were resolved in these versions: * AST-2019-002: Remote crash vulnerability with MESSAGE messages A specially crafted SIP in-dialog MESSAGE message can cause Asterisk to crash. * AST-2019-003: Remote Crash Vulnerability in chan_sip channel driver When T.38 faxing is done in Asterisk a T.38 reinvite may be sent to an endpoint to switch it to T.38. If the endpoint responds with an improperly formatted SDP answer including both a T.38 UDPTL stream and an audio or video stream containing only codecs not allowed on the SIP peer or user a crash will occur. The code incorrectly assumes that there will be at least one common codec when T.38 is also in the SDP answer. For a full list of changes in the current releases, please see the ChangeLogs: https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-15.7.3 The security advisories are available at: https://downloads.asterisk.org/pub/security/AST-2019-002.pdf https://downloads.asterisk.org/pub/security/AST-2019-003.pdf ----- The Asterisk Development Team would like to announce security releases for Asterisk 15 and 16. The available releases are released as versions 15.7.2 and 16.2.1. These releases are available for immediate download at https://downloads.asterisk.org/pub/telephony/asterisk/releases The following security vulnerabilities were resolved in these versions: * AST-2019-001: Remote crash vulnerability with SDP protocol violation When Asterisk makes an outgoing call, a very specific SDP protocol violation by the remote party can cause Asterisk to crash. For a full list of changes in the current releases, please see the ChangeLogs: https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-15.7.2 The security advisory is available at: https://downloads.asterisk.org/pub/security/AST-2019-001.pdf ----- The Asterisk Development Team would like to announce the release of Asterisk 15.7.1. This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk The release of Asterisk 15.7.1 resolves an issue reported by the community and would have not been possible without your participation. Thank you! The following issue is resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-28222 - Regression: MWI polling no longer works (Reported by abelbeck) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-15.7.1 ----- The Asterisk Development Team would like to announce the release of Asterisk 15.7.0. This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk The release of Asterisk 15.7.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following issues are resolved in this release: Security bugs fixed in this release: ----------------------------------- * ASTERISK-28127 - Buffer overflow for DNS SRV/NAPTR records (Reported by Jan Hoffmann) * ASTERISK-28013 - res_http_websocket: Crash when reading HTTP Upgrade requests (Reported by Sean Bright) Bugs fixed in this release: ----------------------------------- * ASTERISK-28076 - bridging: Asterisk crashes when receiving an empty realtime text frame (Reported by Emmanuel BUU) * ASTERISK-28084 - app_queue: QueueMemberStatus Event flooding AMI (Reported by Andrej) * ASTERISK-28077 - res_pjsip: improve realtime performance on CLI 'pjsip show contacts' (Reported by Alexei Gradinari) * ASTERISK-27920 - app_queue: Queue member considered inuse after immediately hanging up during dialing. (Reported by Cao Minh Hiep) * ASTERISK-26094 - stasis: Playing MOH to bridge with ARI does not work (Reported by Cameron) * ASTERISK-28065 - res_odbc: missing SQL error diagnostic (Reported by Alexei Gradinari) * ASTERISK-28057 - chan_sip: SipNotify via AMI behaves differently to CLI (Reported by Peter Katzmann) * ASTERISK-28045 - configure script does not enforce libunbound2 version (Reported by Samuel Galarneau) * ASTERISK-28070 - testsuite: Sniffer assumes pjmedia will use ports below 10000 (Reported by Joshua C. Colp) * ASTERISK-27854 - rtp: Crash in off-nominal case where RTP instance can't be set up (Reported by Lei Fu) * ASTERISK-28059 - PJSIP: Update bundled PJPROJECT to version 2.8 (Reported by Joshua C. Colp) * ASTERISK-27121 - res_pjsip_mwi: Memory leak on reload (Reported by Sergej Kasumovic) * ASTERISK-28047 - chan_pjsip: Declined video stream is added when no video codecs configured and session refresh with removed video stream occurs (Reported by Will) * ASTERISK-28049 - res_pjproject build failure (Reported by Jaco Kroon) * ASTERISK-28034 - chan_sip unstable with TLS after asterisk start or reloads (Reported by David Hajek) * ASTERISK-28029 - [patch] res_musiconhold : music on hold will not start if previous hold just reached end of file (Reported by Frederic LE FOLL) * ASTERISK-28005 - channel.c: ARI ring only once (Reported by Hajek Michal) * ASTERISK-28032 - Realtime queuemembers are not updated during retry phase (Reported by lvl) * ASTERISK-27988 - alembic: PJSIP "mwi_subscribe_replaces_unsolicited" field is integer not boolean (Reported by Joshua C. Colp) * ASTERISK-28020 - res_pjsip_transport_websocket: Properly set 'received' for IPv6 (Reported by Sean Bright) * ASTERISK-28022 - res_pjsip realtime: uri column in ps_contacts table can be too short (Reported by Florian Floimair) Improvements made in this release: ----------------------------------- * ASTERISK-28046 - Remove stale nonoptreq references (Reported by Walter Doekes) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-15.7.0 ----- The Asterisk Development Team would like to announce security releases for Asterisk 15 and 16. The available releases are released as versions 15.6.2 and 16.0.1. These releases are available for immediate download at https://downloads.asterisk.org/pub/telephony/asterisk/releases The following security vulnerabilities were resolved in these versions: There is a buffer overflow vulnerability in dns_srv and dns_naptr functions of Asterisk that allows an attacker to crash Asterisk via a specially crafted DNS SRV or NAPTR response. The attacker???s request causes Asterisk to segfault and crash. For a full list of changes in the current releases, please see the ChangeLogs: https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-15.6.2 The security advisory is available at: https://downloads.asterisk.org/pub/security/AST-2018-010.pdf ----- The Asterisk Development Team would like to announce security releases for Asterisk 13, 14 and 15, and Certified Asterisk 13.21. The available releases are released as versions 13.23.1, 14.7.8, 15.6.1 and 13.21-cert3. These releases are available for immediate download at https://downloads.asterisk.org/pub/telephony/asterisk/releases The following security vulnerabilities were resolved in these versions: * AST-2018-009: Remote crash vulnerability in HTTP websocket upgrade There is a stack overflow vulnerability in the res_http_websocket.so module of Asterisk that allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket. The attacker???s request causes Asterisk to run out of stack space and crash. For a full list of changes in the current releases, please see the ChangeLogs: https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-15.6.1 The security advisory is available at: https://downloads.asterisk.org/pub/security/AST-2018-009.pdf ----- The Asterisk Development Team would like to announce the release of Asterisk 15.6.0. This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk The release of Asterisk 15.6.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following issues are resolved in this release: Bugs fixed in this release: ----------------------------------- * ASTERISK-28002 - When T.140 realtime text is negociated, a lot of debug traces are generated (Reported by Emmanuel BUU) * ASTERISK-27881 - PBX calls via chan_sip TCP trunk now get authentification error (Reported by Ian Gilmour) * ASTERISK-28011 - chan_sip: get_refer_info() attempted unlock mutex 'peer' without owning it! (Reported by Alec Davis) * ASTERISK-27944 - res_pjsip_t38: Crash receiving 1xx responses other than 100 before 200 for T.38 reINVITE (Reported by Joshua Elson) * ASTERISK-28007 - rtcp-mux is put in SDP answer regardless of offer (Reported by Torrey Searle) * ASTERISK-27398 - No joint capabilities with video and audio-only streams (Reported by Benjamin Keith Ford) * ASTERISK-27973 - app_queue: QUEUESTATUS = CONTINUE instead LEAVEEMPTY (Reported by Valentin Safonov) * ASTERISK-27997 - pjproject_bundled: Fix for Solaris builds. Do not undef s_addr. (Reported by Alexander Traud) * ASTERISK-27999 - Wrong SRTP use status report (Reported by Salah Ahmed) * ASTERISK-28001 - res_pjsip_registrar: Improve performance of inbound handling (Reported by Joshua Colp) * ASTERISK-27966 - pjsip: Race condition in 183 re transmission can result in a deadlock (Reported by Torrey Searle) * ASTERISK-15331 - make menuselect fails due to undefined symbols (initscr32, w32addch) in menuselect_curses.o (Reported by Majdi Bsoul) * ASTERISK-14935 - [regression] menuselect compilation failure on Solaris 10 (Reported by Samuel Owens) * ASTERISK-12382 - menuselect compilation failure on Solaris 10 / gcc 3.4.3 (Reported by rleasure) * ASTERISK-9107 - menuselect compilation failure on Solaris 10/gcc-4.1.1 (Reported by Bob Atkins) * ASTERISK-27991 - BuildSystem: Enable Jansson in Solaris 11. (Reported by Alexander Traud) * ASTERISK-27548 - res_pjsip_endpoint_identifier_ip only matches against "generic string" headers (Reported by George Joseph) * ASTERISK-27990 - res_rtp_asterisk: Requires OpenSSL in Developer Mode. (Reported by Alexander Traud) * ASTERISK-27591 - Frack errors in stasis.c and memory leakage (Reported by Siruja Maharjan) * ASTERISK-27978 - res_pjsip: Change default transport keepalive to preserve behavior (Reported by Joshua Colp) * ASTERISK-27968 - systemd: asterisk.service (Reported by seanchann.zhou) * ASTERISK-27880 - [patch] pjproject_bundled: Repair ./configure --with-ssl=PATH. (Reported by Alexander Traud) * ASTERISK-27810 - BASIC-RETRANS: Implement receive (Reported by Benjamin Keith Ford) * ASTERISK-27972 - res_sorcery_config: Allow object name based matching (Reported by Joshua Colp) * ASTERISK-25548 - stasis: Improve message type "Use of before init/after destruction" error (Reported by Joshua Colp) * ASTERISK-27967 - srtp: rejecting short sdes lifetimes incompatible with obihai ATAs (Reported by Nick French) * ASTERISK-27961 - res_pjsip: Spurious ERROR logging when printing headers in sip_msg (Reported by Nick French) * ASTERISK-27563 - pjsip modules always get -O2 even when DONT_OPTIMIZE is set (Reported by George Joseph) * ASTERISK-27957 - PJSIP proposes ICE candidates on answer even if not in offer (Reported by Torrey Searle) * ASTERISK-27347 - [patch] pjproject_bundled: Disable TCP/TLS keep-alives. (Reported by Alexander Traud) * ASTERISK-27938 - [patch] Compile fails with `IPTOS_MINCOST' undeclared. (Reported by Alexander Traud) * ASTERISK-27955 - res_pjsip_session: sdp group:BUNDLE attribute truncated (Reported by Kevin Harwell) * ASTERISK-27956 - res_pjsip_pubsub: segfault in function publish_expire (Reported by Alexei Gradinari) * ASTERISK-27949 - res_pjsip_rfc3326: A lot of endpoints do not correctly handle two Reason headers (Reported by Ross Beer) * ASTERISK-27763 - res_pjsip_session: Initial INVITE with audio+fax results in 488 instead of declining stream (Reported by Thiago Coutinho) * ASTERISK-27657 - res_pjsip_t38: ATA fails with hangupcause 58(Bearer capability not available) (Reported by Jared Hull) * ASTERISK-27080 - res_pjsip_t38: Slow T.38 re-invite rejection if remote leg has T.38 disabled (Reported by Torrey Searle) * ASTERISK-26686 - res_pjsip: Lock inversion in transport management (Reported by Ross Beer) * ASTERISK-27939 - [patch] bridge_softmix_binaural: Enable FFTW3 in Solaris 11. (Reported by Alexander Traud) Improvements made in this release: ----------------------------------- * ASTERISK-28006 - PJSIP: Missing "party=calling"/"party=called" in Remote-Party-ID (Reported by Eric Dantie) * ASTERISK-27995 - pjproject_bundled: Find shared libraries in root --with-ssl=PATH. (Reported by Alexander Traud) * ASTERISK-27993 - pjsip_wizard example gives wrong info about unsupported SRV records (Reported by Jonathan Harris) * ASTERISK-27970 - res_rtp_asterisk: T.140 packets containing backspace or end of line are merged with regular text and it causes some UA to break (Reported by Emmanuel BUU) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-15.6.0 ----- The Asterisk Development Team would like to announce the release of Asterisk 15.5.0. This release is available for immediate download at http://downloads.asterisk.org/pub/telephony/asterisk The release of Asterisk 15.5.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following issues are resolved in this release: Security bugs fixed in this release: ----------------------------------- * ASTERISK-27818 - Username bruteforce is possible when using ACL with PJSIP (Reported by John) * ASTERISK-27807 - iostreams: Potential DoS when client connection closed prematurely (Reported by Sean Bright) Bugs fixed in this release: ----------------------------------- * ASTERISK-27783 - res_pjsip_pubsub: apparent crash on shutdown (Reported by Kevin Harwell) * ASTERISK-27870 - app_confbridge: Conference bridge and announcer channels are not removed if conference is ended as soon as it starts (Reported by Robert Mordec) * ASTERISK-27943 - AMI: Action SendText needs to use the correct thread. (Reported by Richard Mudgett) * ASTERISK-27942 - res_pjsip_messaging doesn't accept application/* content-types. (Reported by George Joseph) * ASTERISK-27909 - cdr: Deadlock with submit_scheduled_batch and submit_unscheduled_batch (Reported by Denis Lebedev) * ASTERISK-27936 - res_pjsip_session doesn't update media when a 200 comes in with a different port than a 183 (Reported by George Joseph) * ASTERISK-26987 - pbx_dundi: Asterisk crashes when unloading module pbx_dundi.so with dundi peers (Reported by Kirsty Tyerman) * ASTERISK-27933 - [patch] uuid: Enable UUID in Solaris 11. (Reported by Alexander Traud) * ASTERISK-27625 - channels: CHECK_BLOCKING is ineffective (Reported by Corey Farrell) * ASTERISK-27931 - [patch] BuildSystem: Enable ./configure in Solaris 11. (Reported by Alexander Traud) * ASTERISK-27926 - [patch] bootstrap.sh: find -maxdepth is not POSIX compatible. (Reported by Alexander Traud) * ASTERISK-27903 - menuselect: GCC 8: restrict-qualified parameter passed and aliased. (Reported by Alexander Traud) * ASTERISK-27914 - [patch] tests/test_utils: Repair ./configure --with-ssl=PATH. (Reported by Alexander Traud) * ASTERISK-27705 - chan_iax2: Stops listening for traffic (Reported by Kirsty Tyerman) * ASTERISK-27908 - [patch] crypto.h: Repair ./configure --with-ssl=PATH. (Reported by Alexander Traud) * ASTERISK-27905 - [patch] res_srtp: Repair ./configure --with-ssl=PATH. (Reported by Alexander Traud) * ASTERISK-27888 - SQL fetch error on query which return 0 columns (Reported by Alexei Gradinari) * ASTERISK-27902 - chan_pjsip isn't updating hangupcause on 4XX responses (Reported by George Joseph) * ASTERISK-27901 - [patch] ooh323c: GCC 8: output truncated before terminating nul. (Reported by Alexander Traud) * ASTERISK-27872 - res_pjsip: Modified qualify_frequency doesn't effect until pjsip reload (Reported by Alexei Gradinari) * ASTERISK-27094 - res_fax: Deadlock when using Local channels and fax gateway (Reported by David Brillert) * ASTERISK-27848 - rtp: DTMF Breaks With telephony-event/16000 (Reported by Dominic) * ASTERISK-25261 - Manager events for MeetMe have incorrectly documented key name 'Usernum' - should be 'User' (Reported by Francois Blackburn) * ASTERISK-27878 - [patch] tcptls.h: Repair ./configure --with-ssl=PATH. (Reported by Alexander Traud) * ASTERISK-27876 - [patch] tcptls: Allow OpenSSL configured with no-dh. (Reported by Alexander Traud) * ASTERISK-27874 - [patch] tcptls: Allow OpenSSL 1.1.x configured with enable-ssl3-method no-deprecated. (Reported by Alexander Traud) * ASTERISK-27845 - Codec-Change Re-INVITE during DTMF can cause marker bit error (Reported by Torrey Searle) * ASTERISK-27831 - res_rtp_asterisk: Add support for abs-send-time RTP extension (Reported by Joshua Colp) * ASTERISK-27863 - config/ast_destroy_realtime_fields: successful DELETE is treated as failed (Reported by Alexei Gradinari) * ASTERISK-27865 - [patch]: tcptls: Repair ./configure --with-ssl=PATH. (Reported by Alexander Traud) * ASTERISK-27760 - Asterisk ODBC Voicemail Prompt storage fails with recent MariaDB version. (Reported by Nic Colledge) * ASTERISK-27853 - Incorrect error reported when leaving/retrieving a ODBC voicemail (Reported by Nic Colledge) * ASTERISK-27726 - chan_mobile: presents incorrect inbound Caller-ID names (Reported by Brian) * ASTERISK-27861 - [patch] res_pjsip_endpoint_identifier_ip: Unregister the module for headers. (Reported by Alexander Traud) * ASTERISK-27860 - [patch] res_pjsip: Register pjsip_transport_management not externally but internally. (Reported by Alexander Traud) * ASTERISK-27852 - cli: "manager show settings" mislabels HTTP timeout as being minutes. (Reported by Corey Farrell) * ASTERISK-27824 - Fix issues exposed by GCC 8 (Reported by George Joseph) * ASTERISK-27850 - [patch] rtp_engine: Allow Media Formats with add_static_payload(-1) on egress again. (Reported by Alexander Traud) * ASTERISK-27811 - [patch] sip_to_pjsip: Enable python3 compatibility. (Reported by Alexander Traud) * ASTERISK-27841 - digest over for manager (ami) over http fails on too long uris (Reported by Jaco Kroon) * ASTERISK-26570 - Macro allows an infinite loop of dialplan inclusion resulting in a crash (Reported by Tzafrir Cohen) * ASTERISK-27801 - Asterisk got stuck while enabling "ari set debug all on" (Reported by shaurya jain) * ASTERISK-27795 - chan_sip: one way / no audio with srtp (Reported by Florian Kaiser) * ASTERISK-27800 - One way audio when calling from Asterisk(sip trunk) to another number where both are connected to a SBC using TLS+SRTP (Reported by Artur Pires) * ASTERISK-26806 - pjsip_options: rework to make more efficient (Reported by Kevin Harwell) * ASTERISK-27814 - translate: interpolated frames are not passed through (Reported by Kevin Harwell) * ASTERISK-27812 - When the ooh323 debug is on there is no ringing signal to incoming calls via H323 trunk. (Reported by Dimos) * ASTERISK-26893 - No "alert" or "progress" in chan_ooh323 if debug is enabled only on the module (Reported by Marco Giordani) * ASTERISK-27639 - [patch] BuildSystem: Enable IMAP storage on FreeBSD and DragonFly BSD. (Reported by Alexander Traud) * ASTERISK-27804 - bridge_softmix / app_confbridge: Add support for combining REMB reports (Reported by Joshua Colp) * ASTERISK-27418 - app_confbridge: "core show profile bridge" does not output "sfu" when video_mode is sfu (Reported by Carlos Chavez) * ASTERISK-27808 - [patch] chan_vpb: Avoid GNU old-style field designator extension. (Reported by Alexander Traud) Improvements made in this release: ----------------------------------- * ASTERISK-27929 - [patch] BuildSystem: Enable autotools in Solaris 11. (Reported by Alexander Traud) * ASTERISK-27752 - Ten seconds of silence after mp3 playback (Reported by Sam Wierema) * ASTERISK-27910 - [patch] res_rtp_asterisk: Allow OpenSSL configured with no-deprecated. (Reported by Alexander Traud) * ASTERISK-27906 - [patch] res_crypto: Allow OpenSSL configured with no-deprecated. (Reported by Alexander Traud) * ASTERISK-27877 - app_confbridge: Add talking indicator for ConfBridgeList AMI response (Reported by William McCall) * ASTERISK-27873 - documentation: Error on wiki description of Asterisk 13 "MeetmeMute" event (Reported by Alessandro Polidori) * ASTERISK-27846 - ast_coredumper: Fix OUTPUT directory (Reported by Ted G) * ASTERISK-27867 - [patch] libasteriskssl: Allow OpenSSL 1.0.2 configured with no-deprecated. (Reported by Alexander Traud) * ASTERISK-27796 - res_hep: Allow create_address to resolve a provided hostname (Reported by Sebastian Gutierrez) * ASTERISK-27820 - [patch] Add DragonFly BSD. (Reported by Alexander Traud) * ASTERISK-27793 - cppcheck identifies redundant "if" (Reported by Ilya Shipitsin) For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-15.5.0 @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.1 2018/07/16 21:53:04 joerg Exp $ @ 1.1 log @Add Asterisk 15.4.1: Asterisk is a complete PBX in software. It provides all of the features you would expect from a PBX and more. Asterisk does voice over IP in three protocols, and can interoperate with almost all standards-based telephony equipment using relatively inexpensive hardware. Asterisk provides Voicemail services with Directory, Call Conferencing, Interactive Voice Response, Call Queuing. It has support for three-way calling, caller ID services, ADSI, SIP and H.323 (as both client and gateway). This is a standard version. It is scheduled to go to security fixes only on October 3th, 2018, and EOL on October 3th, 2019. See here for more information about Asterisk versions: https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.7 2018/01/24 05:51:40 jnemeth Exp $ d3 17 a19 17 SHA1 (asterisk-15.4.1/asterisk-15.4.1.tar.gz) = 54fbda90840e5a25228fafae67872bdd642c084d RMD160 (asterisk-15.4.1/asterisk-15.4.1.tar.gz) = cbf26cf02e670ed49416eabf2acd168980fb1804 SHA512 (asterisk-15.4.1/asterisk-15.4.1.tar.gz) = e4bad97c1804e65a5940a399fe9aaa8fa1c3327be0f5043272c28cb04a9bbd8382b1a4ed8c28a66b1fcb57a756ac4bc97ed3454f1ecc2437f8292e90f3376dc0 Size (asterisk-15.4.1/asterisk-15.4.1.tar.gz) = 27587819 bytes SHA1 (asterisk-15.4.1/asterisk-extra-sounds-en-gsm-1.5.2.tar.gz) = 0207e289404704c42941759db9660269599044f9 RMD160 (asterisk-15.4.1/asterisk-extra-sounds-en-gsm-1.5.2.tar.gz) = 5d660e7664a56086bd60ad49196e1b622a60f106 SHA512 (asterisk-15.4.1/asterisk-extra-sounds-en-gsm-1.5.2.tar.gz) = 3f2f7bf3d5bce3544bc013f913c352f0204a3ce96239987403eb9dce8bc87e64a61d437762323a422a87b2fad1f3bf3e7a5f3d0d340f912a1b1dbfea9479d41d Size (asterisk-15.4.1/asterisk-extra-sounds-en-gsm-1.5.2.tar.gz) = 4253587 bytes SHA1 (asterisk-15.4.1/pjproject-2.7.2.md5) = c0d375b5372cfbd9d3ef2819c57f2999cd44fb22 RMD160 (asterisk-15.4.1/pjproject-2.7.2.md5) = f0d33ce6457026506a6d12d90fb753542f9c27c9 SHA512 (asterisk-15.4.1/pjproject-2.7.2.md5) = 7546b2f76ab27e1465b09b34da71a0c585a08aaf6dc27905b23ec5237763e13d45a5ea21176d4c275bd5de21c36e05dbf6204b0435f8a4d29235027dd7ed5173 Size (asterisk-15.4.1/pjproject-2.7.2.md5) = 112 bytes SHA1 (asterisk-15.4.1/pjproject-2.7.2.tar.bz2) = b45a4764a46c4f19ca28110a9db033691d9a5309 RMD160 (asterisk-15.4.1/pjproject-2.7.2.tar.bz2) = 02eab8b6b688f91f049469e42e5de81b886294ea SHA512 (asterisk-15.4.1/pjproject-2.7.2.tar.bz2) = 3d355ffcbbeed62cfc711e574a987dc06043ccf4f2625820adffa89167022b8306fcee3fada71d3d45e7b902fc9c65ac8221de101cbafed25362a3921f702afd Size (asterisk-15.4.1/pjproject-2.7.2.tar.bz2) = 4994233 bytes SHA1 (patch-Makefile) = 74e65482ee36afedd4b7723be8fbe2c82bc0e797 d27 1 a27 1 SHA1 (patch-apps_app__queue.c) = 89a14825792f8ee6bc4c235fc9732ecb342449c9 d33 1 a33 2 SHA1 (patch-channels_chan__oss.c) = 64e45a57e99046597cdadd31c30db45032657df1 SHA1 (patch-channels_chan__pjsip.c) = 8450fe50b7b7ea2c41737930fef4c4480c8efb66 d37 1 a37 1 SHA1 (patch-configure) = ea2daa50074d12bf0a0edef07a61e1ac7c85efde d42 1 a42 1 SHA1 (patch-funcs_func__env.c) = d9cf08d606c7d5b748f6ae12fd66455a3d30cbf8 a47 1 SHA1 (patch-include_asterisk_endian.h) = 1fc20d750da7d0a0407c1e1694b8bb21753acdcd d56 1 a56 1 SHA1 (patch-main_asterisk.c) = e0b89d10d0a4815ad9d608fd785b62acf189be42 d90 1 a90 1 SHA1 (patch-res_res__pjproject.c) = d72c6fd3696872e5cae55b9b32dc2d813079a620 d135 2 a136 2 SHA1 (patch-res_res__pjsip_config__domain__aliases.c) = 45ddbb599e4e0afd45eb3994e6b623f64da60399 SHA1 (patch-res_res__pjsip_config__global.c) = aca854cc1a84be76308885e47e11f2e8dcde3e5d d145 1 a145 1 SHA1 (patch-res_res__pjsip_pjsip__options.c) = a585f4ad6ad8b547239c5a3666b9fb9643c5e02f d153 1 a153 1 SHA1 (patch-res_res__rtp__asterisk.c) = 10cd3c4c8d82d51c074d4d1433d3d0d8ff9ddd9f a161 1 SHA1 (patch-utils_streamplayer.c) = a5bbff91d87f017143c57ae39d4fac5cda20f584 @