Fedora EPEL 6 updates-testing report

updates at fedoraproject.org updates at fedoraproject.org
Sat Jul 2 17:27:58 UTC 2011


The following Fedora EPEL 6 Security updates need testing:

    https://admin.fedoraproject.org/updates/drupal7-7.4-1.el6
    https://admin.fedoraproject.org/updates/wordpress-3.1.4-1.el6
    https://admin.fedoraproject.org/updates/asterisk-1.8.4.4-3.el6
    https://admin.fedoraproject.org/updates/dokuwiki-0-0.8.20110525.a.el6
    https://admin.fedoraproject.org/updates/mingw32-libpng-1.2.37-3.el6
    https://admin.fedoraproject.org/updates/libpng10-1.0.54-3.el6
    https://admin.fedoraproject.org/updates/libmodplug-0.8.8.3-2.el6
    https://admin.fedoraproject.org/updates/ejabberd-2.1.8-2.el6
    https://admin.fedoraproject.org/updates/erlang-R14B-02.1.el6


The following builds have been pushed to Fedora EPEL 6 updates-testing

    asterisk-1.8.4.4-3.el6
    botan-1.8.12-1.el6
    packagedb-cli-1.0.0-6.el6
    php-symfony-YAML-1.0.6-1.el6
    supybot-gribble-0.83.4.1-6.el6
    throttle-1.2-4.el6
    waf-1.6.6-1.el6

Details about builds:


================================================================================
 asterisk-1.8.4.4-3.el6 (FEDORA-EPEL-2011-3702)
 The Open Source PBX
--------------------------------------------------------------------------------
Update Information:

Remove erroneous systemd dependencies

The Asterisk Development Team has announced the release of Asterisk versions
1.4.41.2, 1.6.2.18.2, and 1.8.4.4, which are security releases.

These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The release of Asterisk 1.4.41.2, 1.6.2.18.2, and 1.8.4.4 resolves the
following issue:

AST-2011-011: Asterisk may respond differently to SIP requests from an
invalid SIP user than it does to a user configured on the system, even when the
alwaysauthreject option is set in the configuration. This can leak information
about what SIP users are valid on the Asterisk system.

For more information about the details of this vulnerability, please read
the security advisory AST-2011-011, which was released at the same time as this
announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.41.2
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.18.2
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.4

Security advisory AST-2011-011 is available at:

http://downloads.asterisk.org/pub/security/AST-2011-011.pdf
The Asterisk Development Team has announced the release of Asterisk versions
1.4.41.1, 1.6.2.18.1, and 1.8.4.3, which are security releases.

These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The release of Asterisk 1.4.41.1, 1.6.2.18, and 1.8.4.3 resolves several issues
as outlined below:

* AST-2011-008: If a remote user sends a SIP packet containing a null,
 Asterisk assumes available data extends past the null to the
 end of the packet when the buffer is actually truncated when
 copied.  This causes SIP header parsing to modify data past
 the end of the buffer altering unrelated memory structures.
 This vulnerability does not affect TCP/TLS connections.
 -- Resolved in 1.6.2.18.1 and 1.8.4.3

* AST-2011-009: A remote user sending a SIP packet containing a Contact header
 with a missing left angle bracket (<) causes Asterisk to
 access a null pointer.
 -- Resolved in 1.8.4.3

* AST-2011-010: A memory address was inadvertently transmitted over the
 network via IAX2 via an option control frame and the remote party would try
 to access it.
 -- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3


The issues and resolutions are described in the AST-2011-008, AST-2011-009, and
AST-2011-010 security advisories.

For more information about the details of these vulnerabilities, please read
the security advisories AST-2011-008, AST-2011-009, and AST-2011-010, which were
released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.41.1
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.18.1
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.3

Security advisories AST-2011-008, AST-2011-009, and AST-2011-010 are available
at:

http://downloads.asterisk.org/pub/security/AST-2011-008.pdf
http://downloads.asterisk.org/pub/security/AST-2011-009.pdf
http://downloads.asterisk.org/pub/security/AST-2011-010.pdf

The Asterisk Development Team has announced the release of Asterisk
version 1.8.4.2, which is a security release for Asterisk 1.8.

This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases

The release of Asterisk 1.8.4.2 resolves an issue with SIP URI
parsing which can lead to a remotely exploitable crash:

   Remote Crash Vulnerability in SIP channel driver (AST-2011-007)

The issue and resolution is described in the AST-2011-007 security
advisory.

For more information about the details of this vulnerability, please
read the security advisory AST-2011-007, which was released at the
same time as this announcement.

For a full list of changes in the current release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.2

Security advisory AST-2011-007 is available at:

http://downloads.asterisk.org/pub/security/AST-2011-007.pdf

The Asterisk Development Team has announced the release of Asterisk 1.8.4.1.
This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/

The release of Asterisk 1.8.4.1 resolves several issues reported by the
community. Without your help this release would not have been possible.
Thank you!

Below is a list of issues resolved in this release:

 * Fix our compliance with RFC 3261 section 18.2.2. (aka Cisco phone fix)
  (Closes issue #18951. Reported by jmls. Patched by wdoekes)

 * Resolve a change in IPv6 header parsing due to the Cisco phone fix issue.
  This issue was found and reported by the Asterisk test suite.
  (Closes issue #18951. Patched by mnicholson)

 * Resolve potential crash when using SIP TLS support.
  (Closes issue #19192. Reported by stknob. Patched by Chainsaw. Tested by
   vois, Chainsaw)

 * Improve reliability when using SIP TLS.
  (Closes issue #19182. Reported by st. Patched by mnicholson)


For a full list of changes in this release candidate, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4.1

The Asterisk Development Team has announced the release of Asterisk 1.8.4. This
release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/

The release of Asterisk 1.8.4 resolves several issues reported by the community.
Without your help this release would not have been possible. Thank you!

Below is a sample of the issues resolved in this release:

 * Use SSLv23_client_method instead of old SSLv2 only.
  (Closes issue #19095, #19138. Reported, patched by tzafrir. Tested by russell
  and chazzam.

 * Resolve crash in ast_mutex_init()
  (Patched by twilson)

 * Resolution of several DTMF based attended transfer issues.
  (Closes issue #17999, #17096, #18395, #17273. Reported by iskatel, gelo,
  shihchuan, grecco. Patched by rmudgett)

  NOTE: Be sure to read the ChangeLog for more information about these changes.

 * Resolve deadlocks related to device states in chan_sip
  (Closes issue #18310. Reported, patched by one47. Patched by jpeeler)

 * Resolve an issue with the Asterisk manager interface leaking memory when
  disabled.
  (Reported internally by kmorgan. Patched by russellb)

 * Support greetingsfolder as documented in voicemail.conf.sample.
  (Closes issue #17870. Reported by edhorton. Patched by seanbright)

 * Fix channel redirect out of MeetMe() and other issues with channel softhangup
  (Closes issue #18585. Reported by oej. Tested by oej, wedhorn, russellb.
  Patched by russellb)

 * Fix voicemail sequencing for file based storage.
  (Closes issue #18498, #18486. Reported by JJCinAZ, bluefox. Patched by
  jpeeler)

 * Set hangup cause in local_hangup so the proper return code of 486 instead of
  503 when using Local channels when the far sides returns a busy. Also affects
  CCSS in Asterisk 1.8+.
  (Patched by twilson)

 * Fix issues with verbose messages not being output to the console.
  (Closes issue #18580. Reported by pabelanger. Patched by qwell)

 * Fix Deadlock with attended transfer of SIP call
  (Closes issue #18837. Reported, patched by alecdavis. Tested by
  alecdavid, Irontec, ZX81, cmaj)

Includes changes per AST-2011-005 and AST-2011-006
For a full list of changes in this release candidate, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4

Information about the security releases are available at:

http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf

--------------------------------------------------------------------------------
ChangeLog:

* Fri Jul  1 2011 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.4.4-3
- Bump release
* Fri Jul  1 2011 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.4.4-2
- Fix systemd dependencies in EL6 and F15
* Thu Jun 30 2011 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.4.4-2
- Fedora Directory Server -> 389 Directory Server
* Wed Jun 29 2011 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.4.4-1
- The Asterisk Development Team has announced the release of Asterisk
- versions 1.4.41.2, 1.6.2.18.2, and 1.8.4.4, which are security
- releases.
-
- These releases are available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of Asterisk 1.4.41.2, 1.6.2.18.2, and 1.8.4.4 resolves the
- following issue:
-
- AST-2011-011: Asterisk may respond differently to SIP requests from an
- invalid SIP user than it does to a user configured on the system, even
- when the alwaysauthreject option is set in the configuration. This can
- leak information about what SIP users are valid on the Asterisk
- system.
-
- For more information about the details of this vulnerability, please
- read the security advisory AST-2011-011, which was released at the
- same time as this announcement.
-
- For a full list of changes in the current releases, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.41.2
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.18.2
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.4
-
- Security advisory AST-2011-011 is available at:
-
- http://downloads.asterisk.org/pub/security/AST-2011-011.pdf
* Mon Jun 27 2011 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.4.3-3
- Don't forget stereorize
* Mon Jun 27 2011 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.4.3-2
- Move /var/run/asterisk to /run/asterisk
- Add comments to systemd service file on how to mimic safe_asterisk functionality
- Build more of the optional binaries
- Install the tmpfiles.d configuration on Fedora 15
* Fri Jun 24 2011 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.4.3-1
- The Asterisk Development Team has announced the release of Asterisk versions
- 1.4.41.1, 1.6.2.18.1, and 1.8.4.3, which are security releases.
-
- These releases are available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of Asterisk 1.4.41.1, 1.6.2.18, and 1.8.4.3 resolves several issues
- as outlined below:
-
- * AST-2011-008: If a remote user sends a SIP packet containing a null,
-  Asterisk assumes available data extends past the null to the
-  end of the packet when the buffer is actually truncated when
-  copied.  This causes SIP header parsing to modify data past
-  the end of the buffer altering unrelated memory structures.
-  This vulnerability does not affect TCP/TLS connections.
-  -- Resolved in 1.6.2.18.1 and 1.8.4.3
-
- * AST-2011-009: A remote user sending a SIP packet containing a Contact header
-  with a missing left angle bracket (<) causes Asterisk to
-  access a null pointer.
-  -- Resolved in 1.8.4.3
-
- * AST-2011-010: A memory address was inadvertently transmitted over the
-  network via IAX2 via an option control frame and the remote party would try
-  to access it.
-  -- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3
-
- The issues and resolutions are described in the AST-2011-008, AST-2011-009, and
- AST-2011-010 security advisories.
-
- For more information about the details of these vulnerabilities, please read
- the security advisories AST-2011-008, AST-2011-009, and AST-2011-010, which were
- released at the same time as this announcement.
-
- For a full list of changes in the current releases, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.4.41.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.18.1
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.3
-
- Security advisories AST-2011-008, AST-2011-009, and AST-2011-010 are available
- at:
-
- http://downloads.asterisk.org/pub/security/AST-2011-008.pdf
- http://downloads.asterisk.org/pub/security/AST-2011-009.pdf
- http://downloads.asterisk.org/pub/security/AST-2011-010.pdf
* Tue Jun 21 2011 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.4.2-2
- Convert to systemd
* Fri Jun 17 2011 Marcela Mašláňová <mmaslano at redhat.com> - 1.8.4.2-1.2
- Perl mass rebuild
* Fri Jun 10 2011 Marcela Mašláňová <mmaslano at redhat.com> - 1.8.4.2-1.1
- Perl 5.14 mass rebuild
* Fri Jun  3 2011 Jeffrey C. Ollie <jeff at ocjtech.us> - 1.8.4.2-1:
-
- The Asterisk Development Team has announced the release of Asterisk
- version 1.8.4.2, which is a security release for Asterisk 1.8.
-
- This release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of Asterisk 1.8.4.2 resolves an issue with SIP URI
- parsing which can lead to a remotely exploitable crash:
-
-    Remote Crash Vulnerability in SIP channel driver (AST-2011-007)
-
- The issue and resolution is described in the AST-2011-007 security
- advisory.
-
- For more information about the details of this vulnerability, please
- read the security advisory AST-2011-007, which was released at the
- same time as this announcement.
-
- For a full list of changes in the current release, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.4.2
-
- Security advisory AST-2011-007 is available at:
-
- http://downloads.asterisk.org/pub/security/AST-2011-007.pdf
-
- The Asterisk Development Team has announced the release of Asterisk 1.8.4.1.
- This release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/
-
- The release of Asterisk 1.8.4.1 resolves several issues reported by the
- community. Without your help this release would not have been possible.
- Thank you!
-
- Below is a list of issues resolved in this release:
-
-  * Fix our compliance with RFC 3261 section 18.2.2. (aka Cisco phone fix)
-   (Closes issue #18951. Reported by jmls. Patched by wdoekes)
-
-  * Resolve a change in IPv6 header parsing due to the Cisco phone fix issue.
-   This issue was found and reported by the Asterisk test suite.
-   (Closes issue #18951. Patched by mnicholson)
-
-  * Resolve potential crash when using SIP TLS support.
-   (Closes issue #19192. Reported by stknob. Patched by Chainsaw. Tested by
-    vois, Chainsaw)
-
-  * Improve reliability when using SIP TLS.
-   (Closes issue #19182. Reported by st. Patched by mnicholson)
-
-
- For a full list of changes in this release candidate, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4.1

- The Asterisk Development Team has announced the release of Asterisk 1.8.4. This
- release is available for immediate download at
- http://downloads.asterisk.org/pub/telephony/asterisk/
-
- The release of Asterisk 1.8.4 resolves several issues reported by the community.
- Without your help this release would not have been possible. Thank you!
-
- Below is a sample of the issues resolved in this release:
-
-  * Use SSLv23_client_method instead of old SSLv2 only.
-   (Closes issue #19095, #19138. Reported, patched by tzafrir. Tested by russell
-   and chazzam.
-
-  * Resolve crash in ast_mutex_init()
-   (Patched by twilson)
-
-  * Resolution of several DTMF based attended transfer issues.
-   (Closes issue #17999, #17096, #18395, #17273. Reported by iskatel, gelo,
-   shihchuan, grecco. Patched by rmudgett)
-
-   NOTE: Be sure to read the ChangeLog for more information about these changes.
-
-  * Resolve deadlocks related to device states in chan_sip
-   (Closes issue #18310. Reported, patched by one47. Patched by jpeeler)
-
-  * Resolve an issue with the Asterisk manager interface leaking memory when
-   disabled.
-   (Reported internally by kmorgan. Patched by russellb)
-
-  * Support greetingsfolder as documented in voicemail.conf.sample.
-   (Closes issue #17870. Reported by edhorton. Patched by seanbright)
-
-  * Fix channel redirect out of MeetMe() and other issues with channel softhangup
-   (Closes issue #18585. Reported by oej. Tested by oej, wedhorn, russellb.
-   Patched by russellb)
-
-  * Fix voicemail sequencing for file based storage.
-   (Closes issue #18498, #18486. Reported by JJCinAZ, bluefox. Patched by
-   jpeeler)
-
-  * Set hangup cause in local_hangup so the proper return code of 486 instead of
-   503 when using Local channels when the far sides returns a busy. Also affects
-   CCSS in Asterisk 1.8+.
-   (Patched by twilson)
-
-  * Fix issues with verbose messages not being output to the console.
-   (Closes issue #18580. Reported by pabelanger. Patched by qwell)
-
-  * Fix Deadlock with attended transfer of SIP call
-   (Closes issue #18837. Reported, patched by alecdavis. Tested by
-   alecdavid, Irontec, ZX81, cmaj)
-
- Includes changes per AST-2011-005 and AST-2011-006
- For a full list of changes in this release candidate, please see the ChangeLog:
-
- http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4
-
- Information about the security releases are available at:
-
- http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
- http://downloads.asterisk.org/pub/security/AST-2011-006.pdf
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #710441 - CVE-2011-2216 Asterisk: Remote DoS (crash) in SIP channel driver (AST-2011-007)
        https://bugzilla.redhat.com/show_bug.cgi?id=710441
--------------------------------------------------------------------------------


================================================================================
 botan-1.8.12-1.el6 (FEDORA-EPEL-2011-3703)
 Crypto library written in C++
--------------------------------------------------------------------------------
Update Information:

Update to the latest version of the 1.8 series, 1.8.12.

Relevant items from the upstream changelog:

 * If EMSA3(Raw) was used for more than one signature, it would produce incorrect output.
 * Fix a memory leak in the constructors of DataSource_Stream and DataSink_Stream which would occur if opening the file failed. PR 144

See http://botan.randombit.net/log.html#version-1-8-12-2011-06-20.
--------------------------------------------------------------------------------
ChangeLog:

* Sat Jul  2 2011 Thomas Moschny <thomas.moschny at gmx.de> - 1.8.12-1
- Update to 1.8.12.
* Mon Feb  7 2011 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 1.8.11-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
--------------------------------------------------------------------------------


================================================================================
 packagedb-cli-1.0.0-6.el6 (FEDORA-EPEL-2011-3665)
 A CLI for pkgdb
--------------------------------------------------------------------------------
Update Information:

First release of packagedb-cli
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #717555 - Review Request: packagedb-cli - A CLI for pkgdb
        https://bugzilla.redhat.com/show_bug.cgi?id=717555
--------------------------------------------------------------------------------


================================================================================
 php-symfony-YAML-1.0.6-1.el6 (FEDORA-EPEL-2011-3699)
 The Symfony YAML Component
--------------------------------------------------------------------------------
Update Information:

* move documentation in /usr/share/doc/pear

Upstream Changelog

Version 1.0.6
* fabien: fixed typo
* fabien: renamed doc files to avoid collision with pecl/yaml

Version 1.0.5
* indiyets: fixed package.xml

Version 1.0.4
* fabien: fixed parsing of simple inline documents

--------------------------------------------------------------------------------
ChangeLog:

* Sat Jul  2 2011 Remi Collet <Fedora at famillecollet.com> - 1.0.6-1
- Version 1.0.6 (stable) - API 1.0.0 (stable)
- move doc in /usr/share/doc/pear
- add generated CHANGELOG
--------------------------------------------------------------------------------


================================================================================
 supybot-gribble-0.83.4.1-6.el6 (FEDORA-EPEL-2011-3707)
 Cross-platform support bot based on supybot
--------------------------------------------------------------------------------
Update Information:

Here is where you
give an explanation of
your update.
Here is where you
give an explanation of
your update.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #693664 - Review Request: supybot-gribble - Cross-platform support bot based on supybot
        https://bugzilla.redhat.com/show_bug.cgi?id=693664
--------------------------------------------------------------------------------


================================================================================
 throttle-1.2-4.el6 (FEDORA-EPEL-2011-3700)
 Bandwidth limiting pipe
--------------------------------------------------------------------------------
Update Information:

initial package
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #617340 - Review Request: throttle - copy stdin to stdout at the specified speed (or lower)
        https://bugzilla.redhat.com/show_bug.cgi?id=617340
--------------------------------------------------------------------------------


================================================================================
 waf-1.6.6-1.el6 (FEDORA-EPEL-2011-3706)
 A Python-based build system
--------------------------------------------------------------------------------
Update Information:

Update to latest version, 1.6.6. From the upstream changelog:

NEW IN WAF 1.6.6
----------------

 * Fix the performance regression related to #974

NEW IN WAF 1.6.5
----------------

 * More documentation
 * Re-enable the colors for msys
 * Add the .ui files for the qt4 translations
 * Fix the conf.check_large_file() test
 * Fix the conf.check_library() in C++ mode #955
 * Improve the latex scanner to avoid depending on generated files #943
 * Remove the @file processing from the winrc tasks
 * Fix the python detection using python-config
 * Add the missing default includes and defines to the moc command
 * Improve support for hierarchical go-lang packages #953
 * Fix the gfortran verbose flag detection on Windows
 * Fix the support of fortran import libraries #950
 * Added a fix for running with Python 2.4 on Windows #949
 * Limited support for IronPython
 * Support for older Visual Studio versions (VC6) #952
 * New waf.bat file #964
 * New method ConfigSet.keys
 * New Visual Studio and Eclipse CTD project generators (waflib/extras)
 * New lru_cache tool for use with WAFCACHE (waflib/extras)

--------------------------------------------------------------------------------
ChangeLog:

* Sat Jun 18 2011 Thomas Moschny <thomas.moschny at gmx.de> - 1.6.6-1
- Update to 1.6.6.
- Remove unused extras/subprocess.py.
- Small patch for syntax errors.
--------------------------------------------------------------------------------





More information about the epel-devel-list mailing list