Next | Query returned 181 messages, browsing 91 to 100 | Previous

History of commit frequency

CVS Commit History:


   2014-04-09 09:27:19 by OBATA Akio | Files touched by this commit (452)
Log message:
recursive bump from icu shlib major bump.
   2014-03-11 15:05:19 by Jonathan Perkin | Files touched by this commit (350)
Log message:
Remove example rc.d scripts from PLISTs.

These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or
ignored otherwise.
   2014-02-13 00:18:57 by Matthias Scheler | Files touched by this commit (1568)
Log message:
Recursive PKGREVISION bump for OpenSSL API version bump.
   2014-01-08 00:33:28 by John Nemeth | Files touched by this commit (2) | Package updated
Log message:
Update to Asterisk 1.8.25.0: this is a minor bug fix update

The Asterisk Development Team has announced the release of Asterisk 1.8.25.0.

The release of Asterisk 1.8.25.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- chan_sip: Fix an issue where an incompatible audio format may be
      added to SDP.

* --- cdr_adaptive_odbc: Also apply a filter when the CDR value is
      empty.

* --- app_queue: Fix Queuelog EXITWITHKEY only logging two of four
      fields

* --- chan_sip: Do not increment the SDP version between 183 and 200
      responses.

* --- chan_sip: Fix Realtime Peer Update Problem When Un-registering
      And Expires Header In 200ok

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.25.0

Thank you for your continued support of Asterisk!
   2013-12-17 03:29:11 by John Nemeth | Files touched by this commit (2) | Package updated
Log message:
Update to Asterisk 1.8.24.1:  this is a security update that fixes
AST-2013-006 and AST-2013-007.

The Asterisk Development Team has announced security releases for Certified
Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security
releases are released as versions 1.8.15-cert4, 11.2-cert3, 1.8.24.1, 10.12.4,
10.12.4-digiumphones, and 11.6.1.

The release of these versions resolve the following issues:

* A buffer overflow when receiving odd length 16 bit messages in app_sms. An
  infinite loop could occur which would overwrite memory when a message is
  received into the unpacksms16() function and the length of the message is an
  odd number of bytes.

* Prevent permissions escalation in the Asterisk Manager Interface. Asterisk
  now marks certain individual dialplan functions as 'dangerous', which will
  inhibit their execution from external sources.

  A 'dangerous' function is one which results in a privilege escalation. For
  example, if one were to read the channel variable SHELL(rm -rf /) Bad
  Things(TM) could happen; even if the external source has only read
  permissions.

  Execution from external sources may be enabled by setting 'live_dangerously'
  to 'yes' in the [options] section of asterisk.conf. Although doing so is not
  recommended.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities, please read
security advisories AST-2013-006 and AST-2013-007, which were
released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.24.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2013-006.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-007.pdf

Thank you for your continued support of Asterisk!
   2013-10-27 00:29:22 by John Nemeth | Files touched by this commit (2)
Log message:
Update to Asterisk 1.8.24.0: this is a general bugfix release:

The Asterisk Development Team has announced the release of Asterisk 1.8.24.0.

The release of Asterisk 1.8.24.0 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* --- Fix a longstanding issue with MFC-R2 configuration that
      prevented users

* --- Fix Not Storing Current Incoming Recv Address

* --- Fix Segfault When Syntax Of A Line Under [applicationmap] Is
      Invalid

* --- Tolerate presence of RFC2965 Cookie2 header by ignoring it

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.24.0

Thank you for your continued support of Asterisk!
   2013-10-19 11:07:13 by Adam Ciarcinski | Files touched by this commit (346)
Log message:
Revbump after updating textproc/icu
   2013-10-10 16:42:40 by Ryo ONODERA | Files touched by this commit (1058)
Log message:
Recursive revbump from pango-1.36.0
   2013-09-02 21:51:33 by Adam Ciarcinski | Files touched by this commit (1071) | Package updated
Log message:
Revbump after cairo update
   2013-08-29 05:00:47 by John Nemeth | Files touched by this commit (2)
Log message:
Update to Asterisk 1.8.23.1: this is a security fix release to fix
AST-2013-004 and AST-2013-005.

The Asterisk Development Team has announced security releases for
Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The
available security rele ases are released as versions 1.8.15-cert2,
11.2-cert2, 1.8.23.1, 10.12.3, 10.12.3-di giumphones, and 11.5.1.

The release of these versions resolve the following issues:

* A remotely exploitable crash vulnerability exists in the SIP
  channel driver if an ACK with SDP is received after the channel
  has been terminated.  The handling code incorrectly assumes that
  the channel will always be present.

* A remotely exploitable crash vulnerability exists in the SIP
  channel driver if an invalid SDP is sent in a SIP request that
  defines media descriptions before connection information. The
  handling code incorrectly attempts to reference the socket address
  information even though that information has not yet been set.

These issues and their resolutions are described in the security advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2013-004 and AST-2013-005,
which were released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.23.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2013-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2013-005.pdf

Thank you for your continued support of Asterisk!

Next | Query returned 181 messages, browsing 91 to 100 | Previous