Next | Query returned 105 messages, browsing 21 to 30 | Previous

History of commit frequency

CVS Commit History:


   2022-06-28 13:38:00 by Thomas Klausner | Files touched by this commit (3952)
Log message:
*: recursive bump for perl 5.36
   2022-05-05 10:20:09 by Nia Alarie | Files touched by this commit (4)
Log message:
asterisk*: Use OPSYS_VERSION to numerically compare NetBSD versions
   2022-04-18 21:12:27 by Adam Ciarcinski | Files touched by this commit (1798) | Package updated
Log message:
revbump for textproc/icu update
   2021-12-08 17:07:18 by Adam Ciarcinski | Files touched by this commit (3063)
Log message:
revbump for icu and libffi
   2021-11-09 13:04:43 by Nia Alarie | Files touched by this commit (7)
Log message:
mk: For consistency, rename PKG_HAS_ to OPSYS_HAVE_.

Requested by jperkin.
   2021-11-09 12:11:08 by Nia Alarie | Files touched by this commit (4)
Log message:
asterisk*: Detect kqueue/timerfd through pkgsrc infrastructure.

Fixes PLIST on NetBSD/current.
   2021-10-26 12:06:07 by Nia Alarie | Files touched by this commit (85)
Log message:
comms: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes
   2021-10-07 15:27:10 by Nia Alarie | Files touched by this commit (85)
Log message:
comms: Remove SHA1 hashes for distfiles
   2021-09-29 21:01:31 by Adam Ciarcinski | Files touched by this commit (872)
Log message:
revbump for boost-libs
   2021-08-01 04:57:12 by John Nemeth | Files touched by this commit (2)
Log message:
asterisk13: Update to Asterisk 13.38.3.

The Asterisk Development Team would like to announce security releases for
Asterisk 13, 16, 17 and 18, and Certified Asterisk 16.8. The available releases
are released as versions 13.38.3, 16.19.1, 17.9.4, 18.5.1 and 16.8-cert10.

These releases are available for immediate download at

https://downloads.asterisk.org/pub/telephony/asterisk/releases

The following security vulnerabilities were resolved in these versions:

* AST-2021-007: Remote Crash Vulnerability in PJSIP channel driver
  When Asterisk receives a re-INVITE without SDP after having sent
  a BYE request a crash will occur. This occurs due to the Asterisk
  channel no longer being present while code assumes it is.

* AST-2021-008: Remote crash when using IAX2 channel driver
  If the IAX2 channel driver receives a packet that contains an

* AST-2021-009: pjproject/pjsip: crash when SSL socket destroyed during
                handshake
  Depending on the timing, it's possible for Asterisk to crash when
  using a TLS connection if the underlying socket parent/listener
  gets destroyed during the handshake.

For a full list of changes in the current releases, please see the ChangeLogs:

https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-13.38.3

The security advisories are available at:

https://downloads.asterisk.org/pub/security/AST-2021-007.pdf
https://downloads.asterisk.org/pub/security/AST-2021-008.pdf
https://downloads.asterisk.org/pub/security/AST-2021-009.pdf

Thank you for your continued support of Asterisk!

Next | Query returned 105 messages, browsing 21 to 30 | Previous