wmctrl: comment out dead site
wmakerconf: comment out spam site
wl-snapshot: switch to github, original page is gone
wistumbler2: comment out dead link
whowatch: comment out dead sites
weewm: comment out dead site
websvn: comment out dead site
wdg-validate: comment out dead link
WCMCommander: comment out dead links
wbm-cyrus-imapd: switch to https
wbd: comment out dead site
wandio: comment out dead site
vp: switch to http, since certificate is invalid
vista: comment out dead site
visitors: switch to https
viewnior: switch to https
velena: comment out dead link
vcf: comment out dead link
vbetool: comment out dead links
vamp-plugin-sdk: update HOMEPAGE, comment out dead master site
userspace-rcu: follow redirect
userppp: comment out dead link
add a conflict with chat/ninja which also installs bin/ninja
add a conflict with ninja-build which also installs bin/ninja
doc: Updated comms/asterisk23 to 23.2.2
NetBSD/pkgsrc w1vHMO4 — comms/asterisk23 Makefile distinfo, comms/asterisk23/patches patch-include_asterisk_autoconfig.h.in patch-configure
update to Asterisk 23.2.2:
----- 23.2.2 -----
## Change Log for Release asterisk-23.2.2
### Links:
- [Full ChangeLog](https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-23.2.2.html)
- [GitHub Diff](https://github.com/asterisk/asterisk/compare/23.2.1...23.2.2)
### Summary:
- Commits: 4
- Commit Authors: 2
- Issues Resolved: 0
- Security Advisories Resolved: 4
- [GHSA-85x7-54wr-vh42](https://github.com/asterisk/asterisk/security/advisories/GHSA-85x7-54wr-vh42): Asterisk xml.c uses unsafe XML_PARSE_NOENT leading to potential XXE Injection
- [GHSA-rvch-3jmx-3jf3](https://github.com/asterisk/asterisk/security/advisories/GHSA-rvch-3jmx-3jf3): ast_coredumper running as root sources ast_debug_tools.conf from /etc/asterisk; potentially leading to privilege escalation
[187 lines not shown] doc: Updated comms/asterisk22 to 22.8.2
update to Asterisk 22.8.2:
## Change Log for Release asterisk-22.8.2
### Links:
- [Full ChangeLog](https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-22.8.2.html)
- [GitHub Diff](https://github.com/asterisk/asterisk/compare/22.8.1...22.8.2)
### Summary:
- Commits: 4
- Commit Authors: 2
- Issues Resolved: 0
- Security Advisories Resolved: 4
- [GHSA-85x7-54wr-vh42](https://github.com/asterisk/asterisk/security/advisories/GHSA-85x7-54wr-vh42): Asterisk xml.c uses unsafe XML_PARSE_NOENT leading to potential XXE Injection
- [GHSA-rvch-3jmx-3jf3](https://github.com/asterisk/asterisk/security/advisories/GHSA-rvch-3jmx-3jf3): ast_coredumper running as root sources ast_debug_tools.conf from /etc/asterisk; potentially leading to privilege escalation
[17 lines not shown] doc: Updated comms/asterisk21 to 21.12.1
update to Asterisk 21.12.1: this is a security fix
## Change Log for Release asterisk-21.12.1
### Links:
- [Full ChangeLog](https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-21.12.1.html)
- [GitHub Diff](https://github.com/asterisk/asterisk/compare/21.12.0...21.12.1)
### Summary:
- Commits: 4
- Commit Authors: 2
- Issues Resolved: 0
- Security Advisories Resolved: 4
- [GHSA-85x7-54wr-vh42](https://github.com/asterisk/asterisk/security/advisories/GHSA-85x7-54wr-vh42): Asterisk xml.c uses unsafe XML_PARSE_NOENT leading to potential XXE Injection
- [GHSA-rvch-3jmx-3jf3](https://github.com/asterisk/asterisk/security/advisories/GHSA-rvch-3jmx-3jf3): ast_coredumper running as root sources ast_debug_tools.conf from /etc/asterisk; potentially leading to privilege escalation
- [GHSA-v6hp-wh3r-cwxh](https://github.com/asterisk/asterisk/security/advisories/GHSA-v6hp-wh3r-cwxh): The Asterisk embedded web server's /httpstatus page echos user supplied values(cookie and query string) without sanitization
- [GHSA-xpc6-x892-v83c](https://github.com/asterisk/asterisk/security/advisories/GHSA-xpc6-x892-v83c): ast_coredumper runs as root, and writes gdb init file to world writeable folder; leading to potential privilege escalation
[38 lines not shown]