Date: Wed, 25 Jul 2007 10:43:54 -0400 From: "Phillip N." <pneumann@gmail.com> To: "FreeBSD gnats submit" <FreeBSD-gnats-submit@FreeBSD.org> Subject: ports/114906: [PATCH] update net/asterisk to 1.4.9 Message-ID: <1185374634.19856@negro.transtel.cl> Resent-Message-ID: <200707251750.l6PHo475017795@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 114906 >Category: ports >Synopsis: [PATCH] update net/asterisk to 1.4.9 >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Jul 25 17:50:03 GMT 2007 >Closed-Date: >Last-Modified: >Originator: Phillip N. >Release: FreeBSD 6.2-STABLE i386 >Organization: >Environment: System: FreeBSD 6.2-STABLE #2: Sun May 13 16:51:10 CLT 2007 root@negro.transtel.cl:/usr/obj/usr/src/sys/Negro >Description: The motivation of the update is this: http://ftp.digium.com/pub/asa/ASA-2007-018.pdf "Exhaustion vulnerability in IAX2 channel driver" the vulxml contains two thing i cannot figure out. These are: - vid (how is the id generated?) - bid (what is it?) Thanks! >How-To-Repeat: >Fix: --- iax-vul.patch begins here --- diff -ruN vuxml.orig/vuln.xml vuxml/vuln.xml --- vuxml.orig/vuln.xml Tue Jul 24 10:31:49 2007 +++ vuxml/vuln.xml Wed Jul 25 09:47:43 2007 @@ -34,6 +34,41 @@ --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="?????"> + <topic>asterisk -- Resource Exhaustion vulnerability in IAX2 channel driver</topic> + <affects> + <package> + <name>asterisk</name> + <range><gt>1.4.5</gt><lt>1.4.8</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Asterisk Project reports:</p> + <blockquote cite="http://tomcat.apache.org/security-5.html"> + <p>The IAX2 channel driver in Asterisk is vulnerable to a + Denial of Service attack when configured to allow + unauthenticated calls. An attacker can send a flood of NEW + packets for valid extensions to the server to initiate + calls as the unauthenticated user. This will cause resources + on the Asterisk system to get allocated that will never go + away. Furthermore, the IAX2 channel driver will be stuck + trying to reschedule retransmissions for each of these fake + calls forever. This can very quickly bring down a system and + the only way to recover is to restart Asterisk.</p> + </blockquote> + </body> + </description> + <references> + <cvename>ASA-2007-018</cvename> + <bid>???</bid> + </references> + <dates> + <discovery>2007-07-19</discovery> + <entry>2007-07-23</entry> + </dates> + </vuln> + <vuln vid="ab2575d6-39f0-11dc-b8cc-000fea449b8a"> <topic>tomcat -- XSS vulnerability in sample applications</topic> <affects> --- iax-vul.patch ends here --- --- asterisk-1.4.9.diff begins here --- diff -ruN asterisk.orig/Makefile asterisk/Makefile --- asterisk.orig/Makefile Mon Jul 23 05:36:14 2007 +++ asterisk/Makefile Wed Jul 25 12:38:49 2007 @@ -6,7 +6,7 @@ # PORTNAME= asterisk -PORTVERSION= 1.4.8 +PORTVERSION= 1.4.9 CATEGORIES= net MASTER_SITES= http://ftp.digium.com/pub/asterisk/ \ http://ftp.digium.com/pub/asterisk/old-releases/ @@ -145,6 +145,6 @@ .endif post-patch: - ${REINPLACE_CMD} -e 's|/var/lib|${PREFIX}/share|g' ${WRKSRC}/configs/musiconhold.conf.sample + @${REINPLACE_CMD} -e 's|/var/lib|${PREFIX}/share|g' ${WRKSRC}/configs/musiconhold.conf.sample .include <bsd.port.post.mk> diff -ruN asterisk.orig/distinfo asterisk/distinfo --- asterisk.orig/distinfo Sun Jul 22 06:40:35 2007 +++ asterisk/distinfo Wed Jul 25 12:26:16 2007 @@ -1,3 +1,3 @@ -MD5 (asterisk-1.4.8.tar.gz) = 7263ff56ad93cbb5efb971a536ee6a51 -SHA256 (asterisk-1.4.8.tar.gz) = 3eabdf2c52d366abe7dd1e303b982fa7aad12945b1ac32ee97dc4b652041a43f -SIZE (asterisk-1.4.8.tar.gz) = 11171190 +MD5 (asterisk-1.4.9.tar.gz) = e47f5b3cb5323318dc8c6fb7311b767e +SHA256 (asterisk-1.4.9.tar.gz) = c1b41503a0c29fd1f5172c834a60a3c5aacf472fd60a1272f743672af36602a6 +SIZE (asterisk-1.4.9.tar.gz) = 11182148 diff -ruN asterisk.orig/files/patch-channels::chan_skinny.c asterisk/files/patch-channels::chan_skinny.c --- asterisk.orig/files/patch-channels::chan_skinny.c Mon May 22 22:47:04 2006 +++ asterisk/files/patch-channels::chan_skinny.c Wed Jul 25 12:30:05 2007 @@ -1,14 +1,11 @@ - -$FreeBSD: ports/net/asterisk/files/patch-channels::chan_skinny.c,v 1.1 2006/05/23 02:47:04 sobomax Exp $ - ---- channels/chan_skinny.c.orig -+++ channels/chan_skinny.c -@@ -99,7 +99,7 @@ +--- channels/chan_skinny.c.orig Wed Jul 25 12:29:14 2007 ++++ channels/chan_skinny.c Wed Jul 25 12:29:34 2007 +@@ -107,7 +107,7 @@ #define htolel(x) (x) #define htoles(x) (x) #else --#if defined(SOLARIS) || defined(__Darwin__) || defined(__NetBSD__) -+#if defined(SOLARIS) || defined(__Darwin__) || defined(__NetBSD__) || defined(__FreeBSD__) +-#if defined(SOLARIS) || defined(__Darwin__) || defined(__NetBSD__) || defined(__OpenBSD__) ++#if defined(SOLARIS) || defined(__Darwin__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(__FreeBSD__) #define __bswap_16(x) \ - ((((x) & 0xff00) >> 8) | \ - (((x) & 0x00ff) << 8)) + ((((x) & 0xff00) >> 8) | \ + (((x) & 0x00ff) << 8)) --- asterisk-1.4.9.diff ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1185374634.19856>