[asterisk/f14] 1.6.2.19
Jeffrey C. Ollie
jcollie at fedoraproject.org
Tue Jun 28 15:30:08 UTC 2011
commit 15f7783c73e34c5e526333eb07731c4161446680
Author: Jeffrey C. Ollie <jeff at ocjtech.us>
Date: Tue Jun 28 10:29:39 2011 -0500
1.6.2.19
.gitignore | 2 +
asterisk.spec | 73 +++++++++++++++++++++++++++++++++++++++++++++-----------
sources | 4 +-
3 files changed, 62 insertions(+), 17 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index 20d1496..5f0d377 100644
--- a/.gitignore
+++ b/.gitignore
@@ -22,3 +22,5 @@ asterisk-1.6.2.11.tar.gz.asc
/asterisk-1.6.2.18.tar.gz.asc
/asterisk-1.6.2.18.1.tar.gz
/asterisk-1.6.2.18.1.tar.gz.asc
+/asterisk-1.6.2.19-rc1.tar.gz
+/asterisk-1.6.2.19-rc1.tar.gz.asc
diff --git a/asterisk.spec b/asterisk.spec
index 3aae5cd..71df2b1 100644
--- a/asterisk.spec
+++ b/asterisk.spec
@@ -1,8 +1,8 @@
-#global _rc 1
+%global _rc 1
Summary: The Open Source PBX
Name: asterisk
-Version: 1.6.2.18.1
-Release: 1%{?_rc:.rc%{_rc}}%{?dist}
+Version: 1.6.2.19
+Release: 0.1%{?_rc:.rc%{_rc}}%{?dist}
License: GPLv2
Group: Applications/Internet
URL: http://www.asterisk.org/
@@ -1032,16 +1032,59 @@ fi
%{_libdir}/asterisk/modules/app_voicemail_plain.so
%changelog
+* Tue Jun 28 2011 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.6.2.19-0.1:
+- The Asterisk Development Team has announced the first release
+- candidate of Asterisk 1.6.2.19. This release candidate is available
+- for immediate download at
+- http://downloads.asterisk.org/pub/telephony/asterisk/
+-
+- Please note that Asterisk 1.6.2.19 will be the final maintenance
+- release from the 1.6.2 branch. Support for security related issues
+- will continue for one additional year. For more information about
+- support of the various Asterisk branches, see
+- https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions
+-
+- The release of Asterisk 1.6.2.19-rc1 resolves several issues reported
+- by the community and would have not been possible without your
+- participation. Thank you!
+-
+- The following is a sample of the issues resolved in this release candidate:
+-
+- * Don't broadcast FullyBooted to every AMI connection The FullyBooted
+- event should not be sent to every AMI connection every time someone
+- connects via AMI. It should only be sent to the user who just
+- connected. (Closes issue #18168. Reported, patched by FeyFre)
+-
+- * Fix thread blocking issue in the sip TCP/TLS implementation.
+- (Closes issue #18497. Reported by vois. Tested by vois, rossbeer,
+- kowalma, Freddi_Fonet. Patched by dvossel)
+-
+- * Don't delay DTMF in core bridge while listening for DTMF features.
+- (Closes issue #15642, #16625. Reported by jasonshugart,
+- sharvanek. Tested by globalnetinc, jde. Patched by oej, twilson)
+-
+- * Fix chan_local crashs in local_fixup() Thanks OEJ for tracking down
+- the issue and submitting the patch. (Closes issue #19053. Reported,
+- patched by oej)
+-
+- * Don't offer video to directmedia callee unless caller offered it as
+- well (Closes issue #19195. Reported, patched by one47)
+-
+- For a full list of changes in this release candidate, please see the
+- ChangeLog:
+-
+- http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.19-rc1
+
* Sat Jun 25 2011 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.6.2.18.1-1
- The Asterisk Development Team has announced the release of Asterisk versions
- 1.4.41.1, 1.6.2.18.1, and 1.8.4.3, which are security releases.
--
+-
- These releases are available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
--
+-
- The release of Asterisk 1.4.41.1, 1.6.2.18, and 1.8.4.3 resolves several issues
- as outlined below:
--
+-
- * AST-2011-008: If a remote user sends a SIP packet containing a null,
- Asterisk assumes available data extends past the null to the
- end of the packet when the buffer is actually truncated when
@@ -1049,34 +1092,34 @@ fi
- the end of the buffer altering unrelated memory structures.
- This vulnerability does not affect TCP/TLS connections.
- -- Resolved in 1.6.2.18.1 and 1.8.4.3
--
+-
- * AST-2011-009: A remote user sending a SIP packet containing a Contact header
- with a missing left angle bracket (<) causes Asterisk to
- access a null pointer.
- -- Resolved in 1.8.4.3
--
+-
- * AST-2011-010: A memory address was inadvertently transmitted over the
- network via IAX2 via an option control frame and the remote party would try
- to access it.
- -- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3
--
--
+-
+-
- The issues and resolutions are described in the AST-2011-008, AST-2011-009, and
- AST-2011-010 security advisories.
--
+-
- For more information about the details of these vulnerabilities, please read
- the security advisories AST-2011-008, AST-2011-009, and AST-2011-010, which were
- released at the same time as this announcement.
--
+-
- For a full list of changes in the current releases, please see the ChangeLog:
--
+-
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.41.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.18.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.3
--
+-
- Security advisories AST-2011-008, AST-2011-009, and AST-2011-010 are available
- at:
--
+-
- http://downloads.asterisk.org/pub/security/AST-2011-008.pdf
- http://downloads.asterisk.org/pub/security/AST-2011-009.pdf
- http://downloads.asterisk.org/pub/security/AST-2011-010.pdf
diff --git a/sources b/sources
index 4921957..0d9caa3 100644
--- a/sources
+++ b/sources
@@ -1,2 +1,2 @@
-0a0c1d8dfe8cfe0dac36b250761fd1e1 asterisk-1.6.2.18.1.tar.gz
-4f5cffa1431be0db4880f46789bcdc75 asterisk-1.6.2.18.1.tar.gz.asc
+61d306f861e456b4244036cb5a2390f8 asterisk-1.6.2.19-rc1.tar.gz
+d7b527d3399ff40e9390485bbe8496ce asterisk-1.6.2.19-rc1.tar.gz.asc
More information about the scm-commits
mailing list