summaryrefslogtreecommitdiff
blob: 90f8f3a0509be92307a13e093eb1669ab8bbf4d4 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
# ChangeLog for net-misc/asterisk
# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/net-misc/asterisk/ChangeLog,v 1.520 2015/04/13 12:34:35 chainsaw Exp $

*asterisk-13.3.2 (13 Apr 2015)
*asterisk-12.8.2 (13 Apr 2015)
*asterisk-11.17.1 (13 Apr 2015)

  13 Apr 2015; Tony Vroon <chainsaw@gentoo.org> -asterisk-11.16.0.ebuild,
  +asterisk-11.17.1.ebuild, -asterisk-12.8.1.ebuild, +asterisk-12.8.2.ebuild,
  -asterisk-13.1.1.ebuild, -asterisk-13.2.0.ebuild, +asterisk-13.3.2.ebuild:
  Upgrades on branches 11, 12 & 13 to address a null-byte exploit in TLS
  certificate CN field verification (CVE-2015-3008 / AST-2015-003). Removed all
  vulnerable non-stable ebuilds. For security bug #546040 by Agostino "ago"
  Sarubbo.

*asterisk-13.2.0 (23 Mar 2015)
*asterisk-11.16.0 (23 Mar 2015)

  23 Mar 2015; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.16.0.ebuild,
  +asterisk-13.2.0.ebuild:
  New releases on 11 & 13 branches; DAHDI channel variable patch now upstream
  (after only 3.5 years).

*asterisk-13.1.1 (11 Feb 2015)
*asterisk-12.8.1 (11 Feb 2015)

  11 Feb 2015; Tony Vroon <chainsaw@gentoo.org> -asterisk-11.14.2.ebuild,
  -asterisk-11.14.2-r1.ebuild, -asterisk-11.15.0.ebuild,
  -asterisk-12.7.2.ebuild, -asterisk-12.7.2-r1.ebuild, -asterisk-12.8.0.ebuild,
  -asterisk-12.8.0-r1.ebuild, +asterisk-12.8.1.ebuild, -asterisk-13.1.0.ebuild,
  +asterisk-13.1.1.ebuild:
  Upgrades on the 12 & 13 branches for security bug #539806 (CVE-2015-1558).
  Removed vulnerable ebuilds.

  10 Feb 2015; Agostino Sarubbo <ago@gentoo.org> asterisk-11.15.0-r1.ebuild:
  Stable for x86, wrt bug #539058

  10 Feb 2015; Agostino Sarubbo <ago@gentoo.org> asterisk-11.15.0-r1.ebuild:
  Stable for amd64, wrt bug #539058

*asterisk-13.1.0 (05 Jan 2015)

  05 Jan 2015; Tony Vroon <chainsaw@gentoo.org> +asterisk-13.1.0.ebuild:
  Introduction of the LTS 13 branch, currently masked. Expect the 12 branch to
  fall away and 13 to take its place. The aim is to have only 11 marked stable
  for the short term. G729 VAD patch rediffed by Jaco Kroon. Closes bug #529396
  by Milos Ivanovic.

*asterisk-11.14.2-r1 (30 Dec 2014)
*asterisk-11.15.0-r1 (30 Dec 2014)
*asterisk-12.8.0-r1 (30 Dec 2014)
*asterisk-12.7.2-r1 (30 Dec 2014)

  30 Dec 2014; Matthias Maier <tamiko@gentoo.org> +asterisk-11.14.2-r1.ebuild,
  +asterisk-11.15.0-r1.ebuild, +asterisk-12.7.2-r1.ebuild,
  +asterisk-12.8.0-r1.ebuild, +files/asterisk.service,
  +files/asterisk.service.conf, +files/asterisk.tmpfiles.conf:
  provide systemd service files, bug #529192

  28 Dec 2014; Aaron W. Swenson <titanofold@gentoo.org>
  asterisk-11.14.2.ebuild, asterisk-11.15.0.ebuild, asterisk-12.7.2.ebuild,
  asterisk-12.8.0.ebuild:
  Rename virtual/postgresql to dev-db/postgresql

*asterisk-12.8.0 (22 Dec 2014)
*asterisk-11.15.0 (22 Dec 2014)

  22 Dec 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-11.14.1.ebuild,
  +asterisk-11.15.0.ebuild, +asterisk-12.8.0.ebuild:
  Remove vulnerable stable ebuild for security bug #532242. Add newer ebuilds
  on both branches which contain primarily crash fixes.

  21 Dec 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-11.14.2.ebuild:
  Stable for x86, wrt bug #532242

  21 Dec 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-11.14.2.ebuild:
  Stable for amd64, wrt bug #532242

*asterisk-12.7.2 (16 Dec 2014)
*asterisk-11.14.2 (16 Dec 2014)

  16 Dec 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.14.2.ebuild,
  -asterisk-12.7.1.ebuild, +asterisk-12.7.2.ebuild:
  Incorrect and unsafe memory handling (AST-2014-019) in res_http_websocket
  addressed in both branches, vulnerable non-stable ebuilds removed. For
  security bug #532242. Enable MeetMe conference support if DAHDI is enabled,
  as requested by Kristian Fiskerstrand in bug #531486.

  24 Nov 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-11.13.1.ebuild:
  Remove vulnerable ebuilds now that stabilisation is complete. For security
  bug #530056.

  24 Nov 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-11.14.1.ebuild:
  Stable for x86, wrt bug #530056

  24 Nov 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-11.14.1.ebuild:
  Stable for amd64, wrt bug #530056

*asterisk-12.7.1 (24 Nov 2014)
*asterisk-11.14.1 (24 Nov 2014)

  24 Nov 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-11.14.0.ebuild,
  +asterisk-11.14.1.ebuild, -asterisk-12.6.1.ebuild, -asterisk-12.7.0.ebuild,
  +asterisk-12.7.1.ebuild:
  11 branch susceptible to AST-2014-012, AST-2014-014, AST-2014-017 &
  AST-2014-018. 12 branch susceptible to AST-2014-012, AST-2014-013,
  AST-2014-015, AST-2014-016, AST-2014-017 & AST-2014-018. Vulnerable
  non-stable ebuilds removed. For security bug #530056.

*asterisk-12.7.0 (20 Nov 2014)
*asterisk-11.14.0 (20 Nov 2014)

  20 Nov 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.14.0.ebuild,
  +asterisk-12.7.0.ebuild:
  Resource leak fixes, particularly in error paths.

  03 Nov 2014; Aaron W. Swenson <titanofold@gentoo.org>
  asterisk-11.13.1.ebuild, asterisk-12.6.1.ebuild:
  Update PostgreSQL dependencies and/or checks to virtual/postgresql.

  02 Nov 2014; Sven Vermeulen <swift@gentoo.org> asterisk-11.13.1.ebuild,
  asterisk-12.6.1.ebuild:
  Remove sec-policy/selinux-* dependency from DEPEND but keep in RDEPEND (bug
  #527698)

  21 Oct 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-11.12.1.ebuild:
  Remove vulnerable ebuilds now that stabilisation is complete. For security
  bug #526208.

  21 Oct 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-11.13.1.ebuild:
  Stable for x86, wrt bug #526208

  21 Oct 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-11.13.1.ebuild:
  Stable for amd64, wrt bug #526208

*asterisk-12.6.1 (21 Oct 2014)
*asterisk-11.13.1 (21 Oct 2014)

  21 Oct 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.28.2.ebuild,
  -asterisk-1.8.29.0.ebuild, -asterisk-11.13.0.ebuild,
  +asterisk-11.13.1.ebuild, -asterisk-12.5.1.ebuild, -asterisk-12.6.0.ebuild,
  +asterisk-12.6.1.ebuild, -files/1.6.0/asterisk.confd,
  -files/1.8.0/asterisk.initd4, -files/1.8.0/asterisk.initd5,
  -files/1.8.0/asterisk.initd6:
  New releases on the 11 & 12 branches to address the POODLE (AST-2014-011) SSL
  3.0 vulnerability. The 1.8 branch is hereby removed from portage as
  previously announced. 11 is low-churn and ideal to target for production
  environments. Our patch sets against 1.8 cost significant effort to maintain
  and essentially add 11-branch features to it.

*asterisk-12.6.0 (29 Sep 2014)

  29 Sep 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-12.6.0.ebuild:
  Additional resilience against invalid (ao2) object references. Now supports
  empty passwords for PJSIP userpass authentication. Masquerade fixes for T38
  between PJSIP and non-PJSIP chanels. FORTIFY_SOURCE fix now upstream. Modify
  permissions to suit a multi-daemon setup as per Jaco Kroon in bug #507894.

*asterisk-11.13.0 (29 Sep 2014)

  29 Sep 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.13.0.ebuild:
  Additional resilience against invalid (ao2) object references. FORTIFY_SOURCE
  fix now upstream. Modify permissions to suit a multi-daemon setup as per Jaco
  Kroon in bug #507894.

  22 Sep 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-11.10.2.ebuild:
  Remove vulnerable ebuild for security bug #523216 as stabilisation is
  complete. 1.8 branch not affected.

  20 Sep 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-11.12.1.ebuild:
  Stable for x86, wrt bug #523216

  20 Sep 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-11.12.1.ebuild:
  Stable for amd64, wrt bug #523216

*asterisk-12.5.1 (19 Sep 2014)
*asterisk-11.12.1 (19 Sep 2014)

  19 Sep 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-11.11.0.ebuild,
  -asterisk-11.12.0.ebuild, +asterisk-11.12.1.ebuild, -asterisk-12.3.2.ebuild,
  -asterisk-12.4.0.ebuild, -asterisk-12.5.0.ebuild, +asterisk-12.5.1.ebuild:
  Upstream fix to fully respect SpanDSP API and avoid a potential null pointer
  dereference. On the 12 branch, additional input validation for the PubSub
  framework in PJSIP. Remove older non-stable ebuilds.

  18 Sep 2014; Tony Vroon <chainsaw@gentoo.org> asterisk-1.8.28.2.ebuild,
  asterisk-1.8.29.0.ebuild, asterisk-11.10.2.ebuild, asterisk-11.11.0.ebuild,
  asterisk-11.12.0.ebuild, asterisk-12.3.2.ebuild, asterisk-12.4.0.ebuild,
  asterisk-12.5.0.ebuild:
  Add missing build-time dependency on pkgconfig, as identified by cyberbat in
  bug #522396.

*asterisk-12.5.0 (20 Aug 2014)
*asterisk-11.12.0 (20 Aug 2014)

  20 Aug 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.12.0.ebuild,
  +asterisk-12.5.0.ebuild:
  Squelching the FORTIFY_SOURCE warnings, as we have this in our GCC specs the
  build system should not try to apply it again on the command line. At long
  last handles large SIP-over-SSL packets correctly. LUA vs convential dial
  plan context clashes found & fixed.

*asterisk-12.4.0 (14 Jul 2014)
*asterisk-11.11.0 (14 Jul 2014)
*asterisk-1.8.29.0 (14 Jul 2014)

  14 Jul 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-1.8.29.0.ebuild,
  +asterisk-11.11.0.ebuild, +asterisk-12.4.0.ebuild:
  New development on the 12 branch adds persistent connection support on the
  built-in HTTP server. Fixes trickling down to stable branches include making
  ast_careful_fwrite careful enough to avoid infinite loops and avoiding
  unnecessary MOH restarts. Downstream patchset unchanged.

  23 Jun 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.26.1.ebuild,
  -asterisk-11.8.1.ebuild, -asterisk-12.1.1.ebuild, -asterisk-12.2.0.ebuild:
  Remove vulnerable ebuilds for security bug #513102, as requested by Agostino
  "ago" Sarubbo.

  21 Jun 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.28.2.ebuild,
  asterisk-11.10.2.ebuild:
  Stable for x86, wrt bug #513102

  21 Jun 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.28.2.ebuild,
  asterisk-11.10.2.ebuild:
  Stable for amd64, wrt bug #513102

*asterisk-12.3.2 (16 Jun 2014)

  16 Jun 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-12.3.1.ebuild,
  +asterisk-12.3.2.ebuild:
  Upstream distributed a broken release that did not carry traffic for SIP over
  TCP or SIP over TLS. This remains masked and is not recommended for
  production deployments.

*asterisk-11.10.2 (16 Jun 2014)
*asterisk-1.8.28.2 (16 Jun 2014)

  16 Jun 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.28.1.ebuild,
  +asterisk-1.8.28.2.ebuild, -asterisk-11.10.1.ebuild,
  +asterisk-11.10.2.ebuild:
  Upstream distributed a broken release that did not carry traffic for SIP over
  TCP or SIP over TLS.

*asterisk-12.3.1 (14 Jun 2014)

  14 Jun 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-12.1.1.ebuild,
  -asterisk-12.2.0.ebuild, -asterisk-12.3.0.ebuild, +asterisk-12.3.1.ebuild:
  And now for the 12 branch, which has additional vulnerabilities in the PJSIP
  channel driver. MixMonitor AMI command allowed arbitrary shell commands to be
  executed (AST-2014-006). Upstream replacement of plain broken SSL read
  implementation as part of an HTTPS denial of service (AST-2014-007) finally
  fixes ASTERISK-18345 after almost three years. Relevant downstream patch
  removed, this means we were very likely not vulnerable. Resolves a remote
  crash in publish/subscribe framework (AST-2014-005) due to deadlock on a
  synchronously dispatched task.

*asterisk-12.3.1 (14 Jun 2014)

  14 Jun 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-12.1.1.ebuild,
  -asterisk-12.2.0.ebuild, -asterisk-12.3.0.ebuild, +asterisk-12.3.1.ebuild:
  And now for the 12 branch, which has additional vulnerabilities in the PJSIP
  channel driver. MixMonitor AMI command allowed arbitrary shell commands to be
  executed (AST-2014-006). Upstream replacement of plain broken SSL read
  implementation as part of an HTTPS denial of service (AST-2014-007) finally
  fixes ASTERISK-18345 after almost three years. Relevant downstream patch
  removed, this means we were very likely not vulnerable. Resolves a remote
  crash in publish/subscribe framework (AST-2014-005) due to deadlock on a
  synchronously dispatched task.

*asterisk-11.10.1 (14 Jun 2014)
*asterisk-1.8.28.1 (14 Jun 2014)

  14 Jun 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.27.0.ebuild,
  -asterisk-1.8.28.0.ebuild, +asterisk-1.8.28.1.ebuild,
  -asterisk-11.9.0.ebuild, -asterisk-11.10.0.ebuild, +asterisk-11.10.1.ebuild:
  MixMonitor AMI command allowed arbitrary shell commands to be executed
  (AST-2014-006). Upstream replacement of plain broken SSL read implementation
  as part of an HTTPS denial of service (AST-2014-007) finally fixes
  ASTERISK-18345 after almost three years. Relevant downstream patch removed,
  this means we were very likely not vulnerable.

*asterisk-12.3.0 (02 Jun 2014)

  02 Jun 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-12.3.0.ebuild:
  Significant string handling fixes as encouraged by GCC 4.10; leak fixes for
  PJSIP. Still not recommended for production deployment, remains masked.

*asterisk-11.10.0 (30 May 2014)
*asterisk-1.8.28.0 (30 May 2014)

  30 May 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-1.8.28.0.ebuild,
  +asterisk-11.10.0.ebuild:
  Bugfixes trickling down from Asterisk 12 development, particularly around
  string handling and signedness mismatches (GCC 4.10 is clamping down on this
  hard). T38 backport patch rediffed for 1.8 branch.

  08 May 2014; Tony Vroon <chainsaw@gentoo.org> asterisk-1.8.26.1.ebuild,
  asterisk-1.8.27.0.ebuild, asterisk-11.8.1.ebuild, asterisk-11.9.0.ebuild,
  asterisk-12.1.1.ebuild, asterisk-12.2.0.ebuild:
  Update ebuild dependencies to ensure only the 2.6 slot of gmime is selected.
  Inverting the search order in the configure script was only a partial fix. As
  pointed out by Pacho Ramos in bug #439846.

*asterisk-12.2.0 (25 Apr 2014)

  25 Apr 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-12.2.0.ebuild:
  Adds HEPv3 protocol support and PJSIP gains DNS client abilities that unlock
  SRV records & weighting. This branch remains experimental and is not
  recommended for production use at this time.

*asterisk-1.8.27.0 (25 Apr 2014)

  25 Apr 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-1.8.27.0.ebuild:
  Select bug fixes as cherry picked from the 11 branch. TLS chaining support
  finally upstream. Move up to 11 if you still use this.

*asterisk-11.9.0 (25 Apr 2014)

  25 Apr 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.9.0.ebuild:
  Bug fix release, fixes include but are not limited to dial plan functions
  coping with a NULL channel (AMI global function), correct NULL handling in
  ODBC, advertising MESSAGE support in SIP headers, SpanDSP API adherence and
  protection against non-G711 data in fax detection routines. TLS chaining
  support finally upstream.

  11 Mar 2014; Agostino Sarubbo <ago@gentoo.org> -asterisk-1.8.25.0.ebuild,
  -asterisk-11.7.0.ebuild:
  Remove old

  11 Mar 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.26.1.ebuild,
  asterisk-11.8.1.ebuild:
  Stable for x86, wrt bug #504180

  11 Mar 2014; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.26.1.ebuild,
  asterisk-11.8.1.ebuild:
  Stable for amd64, wrt bug #504180

*asterisk-12.1.1 (11 Mar 2014)
*asterisk-11.8.1 (11 Mar 2014)
*asterisk-1.8.26.1 (11 Mar 2014)

  11 Mar 2014; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.26.0.ebuild,
  +asterisk-1.8.26.1.ebuild, -asterisk-11.7.0-r1.ebuild,
  -asterisk-11.8.0.ebuild, +asterisk-11.8.1.ebuild, -asterisk-12.0.0.ebuild,
  -asterisk-12.1.0.ebuild, +asterisk-12.1.1.ebuild:
  New releases in all three branches to address a stack overflow in HTTP cookie
  header processing, a file descriptor exhaustion through session timers in
  chan_sip and two remote crashes in PJSIP (12 branch only). Removed all
  vulnerable non-stable ebuilds. Upstream vulnerability reports AST-2014-001,
  002, 003 & 004.

*asterisk-12.1.0 (04 Mar 2014)

  04 Mar 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-12.1.0.ebuild:
  Version bump on the 12 branch. This, at long last, merges the TLS chaining
  support. Still not recommended for production deployments at this time.

*asterisk-1.8.26.0 (04 Mar 2014)

  04 Mar 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-1.8.26.0.ebuild:
  Version bump on the 1.8 branch. If you still use this, you should be thinking
  about 11.

*asterisk-11.8.0 (04 Mar 2014)

  04 Mar 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.8.0.ebuild:
  Fixes a crash on hangup cause set, which is a regression introduced by an
  earlier fix. Performance improvements for high console verbosity. Updated
  G729 VAD detection patch by Jaco Kroon, closes bug #496584.

*asterisk-11.7.0-r1 (06 Feb 2014)

  06 Feb 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.7.0-r1.ebuild:
  Stop blowing up the V21 tone detector in SpanDSP by sanitising the input data
  properly. Patch by Michal Rybarik scavenged from an upstream bug report by
  Jaco Kroon. Closes bug #500504.

*asterisk-12.0.0 (13 Jan 2014)

  13 Jan 2014; Tony Vroon <chainsaw@gentoo.org> +asterisk-12.0.0.ebuild:
  First release on the 12 branch. This is not LTS, and uses the new PJSIP-based
  SIP channel. If in doubt, you are not ready for this.

  08 Jan 2014; Mike Frysinger <vapier@gentoo.org> asterisk-1.8.25.0.ebuild,
  asterisk-11.7.0.ebuild:
  Inherit the user eclass for enewuser/etc...

  23 Dec 2013; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.23.1.ebuild,
  -asterisk-1.8.24.0.ebuild, -asterisk-11.5.1.ebuild, -asterisk-11.6.0.ebuild,
  -asterisk-11.6.0-r1.ebuild:
  Remove all vulnerable ebuilds for AST-2013-006 & AST-2013-007; for security
  bug #494630.

  23 Dec 2013; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.25.0.ebuild,
  asterisk-11.7.0.ebuild:
  Stable for x86, wrt bug #494630

  23 Dec 2013; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.25.0.ebuild,
  asterisk-11.7.0.ebuild:
  Stable for amd64, wrt bug #494630

*asterisk-11.7.0 (18 Dec 2013)
*asterisk-1.8.25.0 (18 Dec 2013)

  18 Dec 2013; Tony Vroon <chainsaw@gentoo.org> +asterisk-1.8.25.0.ebuild,
  +asterisk-11.7.0.ebuild:
  Upgrades on both branches for memory corruption (AST-2013-006) & security
  bypass (AST-2013-007) vulnerabilities, as per Agostino Sarubbo in security
  bug #494630. Squelch unnecessary chatter from build system, as per Patryk
  Rzadzinski in bug #489862.

*asterisk-11.6.0-r1 (30 Oct 2013)

  30 Oct 2013; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.6.0-r1.ebuild:
  A useful response to the debug USE-flag, as suggested by Kerin Millar and
  implemented by Jaco Kroon. Closes bug #346959.

  27 Oct 2013; Pacho Ramos <pacho@gentoo.org> metadata.xml:
  Voip herd is removed: http://article.gmane.org/gmane.linux.gentoo.devel/88434

*asterisk-1.8.24.0 (22 Oct 2013)

  22 Oct 2013; Tony Vroon <chainsaw@gentoo.org> +asterisk-1.8.24.0.ebuild:
  Version bump.

*asterisk-11.6.0 (22 Oct 2013)

  22 Oct 2013; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.6.0.ebuild:
  Version bump. Features improved NAT support and plugs a memory leak in the
  logger.

  28 Aug 2013; Agostino Sarubbo <ago@gentoo.org> -asterisk-1.8.20.2.ebuild,
  -asterisk-11.2.2.ebuild:
  Remove old

  28 Aug 2013; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.23.1.ebuild,
  asterisk-11.5.1.ebuild:
  Stable for x86, wrt bug #482776

  28 Aug 2013; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.23.1.ebuild,
  asterisk-11.5.1.ebuild:
  Stable for amd64, wrt bug #482776

*asterisk-11.5.1 (28 Aug 2013)
*asterisk-1.8.23.1 (28 Aug 2013)

  28 Aug 2013; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.22.0.ebuild,
  -asterisk-1.8.23.0.ebuild, +asterisk-1.8.23.1.ebuild,
  -asterisk-11.4.0.ebuild, -asterisk-11.5.0.ebuild, +asterisk-11.5.1.ebuild,
  +files/1.8.0/asterisk.initd7:
  Security upgrades for AST-2013-004 & AST-2013-005 on both branches.
  Behavioral improvements for G729 VAD, closes bug #480928. Add missed
  ownership checks to init script, closes bug #482688. Both by Jaco Kroon.
  Removed all insecure non-stable ebuilds.

  31 Jul 2013; Tony Vroon <chainsaw@gentoo.org> asterisk-1.8.20.2.ebuild,
  -asterisk-1.8.21.0.ebuild, asterisk-1.8.22.0.ebuild,
  asterisk-1.8.23.0.ebuild, asterisk-11.2.2.ebuild, -asterisk-11.3.0.ebuild,
  asterisk-11.4.0.ebuild, asterisk-11.5.0.ebuild:
  Make our inability to co-exist with net-libs/pjsip explicit to avoid any
  build failures. Closes bug #47812 by Steven Lai. Removed older non-stable
  builds on both branches.

*asterisk-11.5.0 (23 Jul 2013)
*asterisk-1.8.23.0 (23 Jul 2013)

  23 Jul 2013; Tony Vroon <chainsaw@gentoo.org> +asterisk-1.8.23.0.ebuild,
  +asterisk-11.5.0.ebuild, +files/1.8.0/asterisk.initd6:
  Bugfix releases on both branches. Completely revised init script by Jaco
  Kroon that supports running multiple Asterisk instances on a single host,
  closes bug #473224.

*asterisk-1.8.22.0 (20 May 2013)

  20 May 2013; Tony Vroon <chainsaw@gentoo.org> +asterisk-1.8.22.0.ebuild:
  One of the last bugfix releases on the 1.8 branch. You need to migrate to 11.
  And soon.

*asterisk-11.4.0 (20 May 2013)

  20 May 2013; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.4.0.ebuild:
  In a refreshing change of heart, upstream now care about parallel build
  failures. Drop our relevant two downstream patches. Fixes a
  res_timing_pthread deadlock, an FD leak in the web server and more SRTP
  decryption/white noise issues.

  30 Mar 2013; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.20.1.ebuild,
  -asterisk-11.2.1.ebuild:
  Remove vulnerable ebuilds after stabling, for security bug #463622.

  30 Mar 2013; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.20.2.ebuild,
  asterisk-11.2.2.ebuild:
  Stable for x86, wrt bug #463622

  30 Mar 2013; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.20.2.ebuild,
  asterisk-11.2.2.ebuild:
  Stable for amd64, wrt bug #463622

*asterisk-11.3.0 (29 Mar 2013)
*asterisk-1.8.21.0 (29 Mar 2013)

  29 Mar 2013; Tony Vroon <chainsaw@gentoo.org> +asterisk-1.8.21.0.ebuild,
  +asterisk-11.3.0.ebuild:
  Bugfix releases on both branches. Native RTP bridging is no longer attempted
  if packetisation differs, this helps to prevent fax failures. Improved
  locking to prevent deadlocks.

*asterisk-11.2.2 (28 Mar 2013)
*asterisk-1.8.20.2 (28 Mar 2013)

  28 Mar 2013; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.19.1.ebuild,
  -asterisk-1.8.20.0.ebuild, +asterisk-1.8.20.2.ebuild,
  -asterisk-11.1.2.ebuild, -asterisk-11.2.0.ebuild, -asterisk-11.2.1-r2.ebuild,
  +asterisk-11.2.2.ebuild:
  Security upgrade to address a boundary error in H264 video SDP handling,
  naive Content-Length variable parsing in HTTP POST requests and an
  information leak around account existence for the SIP channel driver.

*asterisk-11.2.1-r2 (06 Mar 2013)

  06 Mar 2013; Tony Vroon <chainsaw@gentoo.org> -asterisk-11.2.1-r1.ebuild,
  +asterisk-11.2.1-r2.ebuild:
  Stop installing the /var/run directory structure, closes bug #451808. Two
  additional stability fixes, closes bug #460568. Removing -r1 ebuild as the
  reload protections within it are incomplete. Use -r2 or last stable. All
  patching by Jaco Kroon.

*asterisk-11.2.1-r1 (05 Mar 2013)

  05 Mar 2013; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.2.1-r1.ebuild:
  Fix by Jaco Kroon to correctly handle error returns for dundi lookups,
  previously resulting in segmentation faults. Closes bug #460406.

  26 Feb 2013; Agostino Sarubbo <ago@gentoo.org> asterisk-11.2.1.ebuild:
  Stable for x86, wrt bug #458126

  26 Feb 2013; Agostino Sarubbo <ago@gentoo.org> asterisk-11.2.1.ebuild:
  Stable for amd64, wrt bug #458126

  12 Feb 2013; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.20.1.ebuild:
  Stable for x86, wrt bug #456936

  12 Feb 2013; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.20.1.ebuild:
  Stable for amd64, wrt bug #456936

*asterisk-11.2.1 (24 Jan 2013)
*asterisk-1.8.20.1 (24 Jan 2013)

  24 Jan 2013; Tony Vroon <chainsaw@gentoo.org> +files/1.8.0/asterisk.initd5,
  -files/1.8.0/asterisk.initd, -files/1.8.0/asterisk.initd2,
  -files/1.8.0/asterisk.initd3, +asterisk-1.8.20.1.ebuild,
  +asterisk-11.2.1.ebuild:
  Partial rewrite of the init script by Jaco Kroon addresses shortcomings
  identified by Vincent Brillault in bug #445176. Upstream fixes include an
  astcanary PID mix-up and a necessary reset of the RTP sequence counter when
  SSRC changes.

*asterisk-1.8.20.0 (15 Jan 2013)

  15 Jan 2013; Tony Vroon <chainsaw@gentoo.org> +asterisk-1.8.20.0.ebuild:
  Bugfix release on the 1.8 branch. The fix for bug #440278 is now upstream.

*asterisk-11.2.0 (15 Jan 2013)

  15 Jan 2013; Tony Vroon <chainsaw@gentoo.org> +asterisk-11.2.0.ebuild:
  Bugfix release on the 11 branch. The fix for bug #440278 is now upstream.

*asterisk-11.1.2 (07 Jan 2013)

  07 Jan 2013; Tony Vroon <chainsaw@gentoo.org> -asterisk-11.1.1.ebuild,
  +asterisk-11.1.2.ebuild:
  One final unsafe use of TCP reads onto the stack in res_xmpp; also stops
  caching taking place where unnecessary. This completes the DoS protection
  intended for 11.1.1; removing unsafe ebuild from tree.

  04 Jan 2013; Tony Vroon <chainsaw@gentoo.org> asterisk-1.8.19.1.ebuild,
  asterisk-11.1.1.ebuild:
  Remove /var/run keepdir statements as per Diego Elio Pettenò in bug #450222.

  04 Jan 2013; Tony Vroon <chainsaw@gentoo.org> -asterisk-10.11.1.ebuild:
  As previously announced the 10 branch of Asterisk is now being removed. For
  stable releases, you want the 1.8 branch. For an actively developed branch
  with more features, you want the 11 branch.

  03 Jan 2013; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.18.0-r2.ebuild:
  Clear vulnerable ebuild in 1.8 branch now that stabling has completed.

  03 Jan 2013; Agostino Sarubbo <ago@gentoo.org> asterisk-1.8.19.1.ebuild:
  Stable for amd64, wrt bug #449828

  03 Jan 2013; Andreas Schuerch <nativemad@gentoo.org>
  asterisk-1.8.19.1.ebuild:
  x86 stable, see bug 449828

*asterisk-11.1.1 (02 Jan 2013)
*asterisk-10.11.1 (02 Jan 2013)
*asterisk-1.8.19.1 (02 Jan 2013)

  02 Jan 2013; Tony Vroon <chainsaw@gentoo.org> -asterisk-1.8.15.1.ebuild,
  -asterisk-1.8.18.1.ebuild, -asterisk-1.8.19.0.ebuild,
  +asterisk-1.8.19.1.ebuild, -asterisk-10.10.1.ebuild,
  -asterisk-10.11.0.ebuild, +asterisk-10.11.1.ebuild, -asterisk-11.0.2.ebuild,
  -asterisk-11.1.0.ebuild, +asterisk-11.1.1.ebuild:
  Security releases on all three branches; stop using stack allocations in TCP
  receive paths, as multiple packets may be concatenated together and overflow
  the stack as a result (CVE-2012-5976 / AST-2012-015). Never cache devices
  that are not associated with a physical entity, as to do so allows a denial
  of service through cache exhaustion (CVE-2012-5977 / AST-2012-014). Remove
  all non-stable vulnerable ebuilds. As requested by Sean Amoss in bug #449828.

  01 Jan 2013; Andreas K. Huettel <dilfridge@gentoo.org> +ChangeLog-2012:
  Split ChangeLog.

  For previous entries, please see ChangeLog-2012.