View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/asterisk
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
ubuntu/saucy-devel 2013-10-17 00:03:21 UTC 2013-10-17
Import patches-unapplied version 1:1.8.13.1~dfsg-3ubuntu3 to ubuntu/saucy-pro...

Author: Colin Watson
Author Date: 2013-10-16 23:43:57 UTC

Import patches-unapplied version 1:1.8.13.1~dfsg-3ubuntu3 to ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 50497ce760ee15501e5e0593412c0c5b51fb3a01

New changelog entries:
  * Use the autotools-dev dh addon to update config.guess/config.sub for
    arm64.

ubuntu/saucy-proposed 2013-10-17 00:03:21 UTC 2013-10-17
Import patches-unapplied version 1:1.8.13.1~dfsg-3ubuntu3 to ubuntu/saucy-pro...

Author: Colin Watson
Author Date: 2013-10-16 23:43:57 UTC

Import patches-unapplied version 1:1.8.13.1~dfsg-3ubuntu3 to ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 50497ce760ee15501e5e0593412c0c5b51fb3a01

New changelog entries:
  * Use the autotools-dev dh addon to update config.guess/config.sub for
    arm64.

applied/ubuntu/saucy-proposed 2013-10-17 00:03:21 UTC 2013-10-17
Import patches-applied version 1:1.8.13.1~dfsg-3ubuntu3 to applied/ubuntu/sau...

Author: Colin Watson
Author Date: 2013-10-16 23:43:57 UTC

Import patches-applied version 1:1.8.13.1~dfsg-3ubuntu3 to applied/ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 4d7c9160e808a7e40cdbfff7a2636be0968a709c
Unapplied parent: 928864cf1980f5dfb4259b91d6d34e68451400a7

New changelog entries:
  * Use the autotools-dev dh addon to update config.guess/config.sub for
    arm64.

applied/ubuntu/saucy-devel 2013-10-17 00:03:21 UTC 2013-10-17
Import patches-applied version 1:1.8.13.1~dfsg-3ubuntu3 to applied/ubuntu/sau...

Author: Colin Watson
Author Date: 2013-10-16 23:43:57 UTC

Import patches-applied version 1:1.8.13.1~dfsg-3ubuntu3 to applied/ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 4d7c9160e808a7e40cdbfff7a2636be0968a709c
Unapplied parent: 928864cf1980f5dfb4259b91d6d34e68451400a7

New changelog entries:
  * Use the autotools-dev dh addon to update config.guess/config.sub for
    arm64.

applied/ubuntu/saucy 2013-10-17 00:03:21 UTC 2013-10-17
Import patches-applied version 1:1.8.13.1~dfsg-3ubuntu3 to applied/ubuntu/sau...

Author: Colin Watson
Author Date: 2013-10-16 23:43:57 UTC

Import patches-applied version 1:1.8.13.1~dfsg-3ubuntu3 to applied/ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 4d7c9160e808a7e40cdbfff7a2636be0968a709c
Unapplied parent: 928864cf1980f5dfb4259b91d6d34e68451400a7

New changelog entries:
  * Use the autotools-dev dh addon to update config.guess/config.sub for
    arm64.

ubuntu/saucy 2013-10-17 00:03:21 UTC 2013-10-17
Import patches-unapplied version 1:1.8.13.1~dfsg-3ubuntu3 to ubuntu/saucy-pro...

Author: Colin Watson
Author Date: 2013-10-16 23:43:57 UTC

Import patches-unapplied version 1:1.8.13.1~dfsg-3ubuntu3 to ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 50497ce760ee15501e5e0593412c0c5b51fb3a01

New changelog entries:
  * Use the autotools-dev dh addon to update config.guess/config.sub for
    arm64.

ubuntu/raring 2012-10-09 20:28:41 UTC 2012-10-09
Import patches-unapplied version 1:1.8.13.1~dfsg-1ubuntu2 to ubuntu/quantal

Author: Julian Taylor
Author Date: 2012-10-09 19:44:39 UTC

Import patches-unapplied version 1:1.8.13.1~dfsg-1ubuntu2 to ubuntu/quantal

Imported using git-ubuntu import.

Changelog parent: eed91c358f11c4b878fd6c2e4305c5e5ad6f211b

New changelog entries:
  * Build-depend on hardening-wrapper again,
    reenables pie and bindnow (LP: #1039542)

applied/ubuntu/quantal 2012-10-09 20:28:41 UTC 2012-10-09
Import patches-applied version 1:1.8.13.1~dfsg-1ubuntu2 to applied/ubuntu/qua...

Author: Julian Taylor
Author Date: 2012-10-09 19:44:39 UTC

Import patches-applied version 1:1.8.13.1~dfsg-1ubuntu2 to applied/ubuntu/quantal

Imported using git-ubuntu import.

Changelog parent: 80121bf2875e4fe7dd40b64c4430757d0edbc6f5
Unapplied parent: 94dbd4a65b3c2b200c89945c5eff7be5793c52f1

New changelog entries:
  * Build-depend on hardening-wrapper again,
    reenables pie and bindnow (LP: #1039542)

applied/ubuntu/quantal-devel 2012-10-09 20:28:41 UTC 2012-10-09
Import patches-applied version 1:1.8.13.1~dfsg-1ubuntu2 to applied/ubuntu/qua...

Author: Julian Taylor
Author Date: 2012-10-09 19:44:39 UTC

Import patches-applied version 1:1.8.13.1~dfsg-1ubuntu2 to applied/ubuntu/quantal

Imported using git-ubuntu import.

Changelog parent: 80121bf2875e4fe7dd40b64c4430757d0edbc6f5
Unapplied parent: 94dbd4a65b3c2b200c89945c5eff7be5793c52f1

New changelog entries:
  * Build-depend on hardening-wrapper again,
    reenables pie and bindnow (LP: #1039542)

applied/ubuntu/raring 2012-10-09 20:28:41 UTC 2012-10-09
Import patches-applied version 1:1.8.13.1~dfsg-1ubuntu2 to applied/ubuntu/qua...

Author: Julian Taylor
Author Date: 2012-10-09 19:44:39 UTC

Import patches-applied version 1:1.8.13.1~dfsg-1ubuntu2 to applied/ubuntu/quantal

Imported using git-ubuntu import.

Changelog parent: 80121bf2875e4fe7dd40b64c4430757d0edbc6f5
Unapplied parent: 94dbd4a65b3c2b200c89945c5eff7be5793c52f1

New changelog entries:
  * Build-depend on hardening-wrapper again,
    reenables pie and bindnow (LP: #1039542)

applied/ubuntu/raring-devel 2012-10-09 20:28:41 UTC 2012-10-09
Import patches-applied version 1:1.8.13.1~dfsg-1ubuntu2 to applied/ubuntu/qua...

Author: Julian Taylor
Author Date: 2012-10-09 19:44:39 UTC

Import patches-applied version 1:1.8.13.1~dfsg-1ubuntu2 to applied/ubuntu/quantal

Imported using git-ubuntu import.

Changelog parent: 80121bf2875e4fe7dd40b64c4430757d0edbc6f5
Unapplied parent: 94dbd4a65b3c2b200c89945c5eff7be5793c52f1

New changelog entries:
  * Build-depend on hardening-wrapper again,
    reenables pie and bindnow (LP: #1039542)

ubuntu/quantal 2012-10-09 20:28:41 UTC 2012-10-09
Import patches-unapplied version 1:1.8.13.1~dfsg-1ubuntu2 to ubuntu/quantal

Author: Julian Taylor
Author Date: 2012-10-09 19:44:39 UTC

Import patches-unapplied version 1:1.8.13.1~dfsg-1ubuntu2 to ubuntu/quantal

Imported using git-ubuntu import.

Changelog parent: eed91c358f11c4b878fd6c2e4305c5e5ad6f211b

New changelog entries:
  * Build-depend on hardening-wrapper again,
    reenables pie and bindnow (LP: #1039542)

ubuntu/quantal-devel 2012-10-09 20:28:41 UTC 2012-10-09
Import patches-unapplied version 1:1.8.13.1~dfsg-1ubuntu2 to ubuntu/quantal

Author: Julian Taylor
Author Date: 2012-10-09 19:44:39 UTC

Import patches-unapplied version 1:1.8.13.1~dfsg-1ubuntu2 to ubuntu/quantal

Imported using git-ubuntu import.

Changelog parent: eed91c358f11c4b878fd6c2e4305c5e5ad6f211b

New changelog entries:
  * Build-depend on hardening-wrapper again,
    reenables pie and bindnow (LP: #1039542)

ubuntu/raring-devel 2012-10-09 20:28:41 UTC 2012-10-09
Import patches-unapplied version 1:1.8.13.1~dfsg-1ubuntu2 to ubuntu/quantal

Author: Julian Taylor
Author Date: 2012-10-09 19:44:39 UTC

Import patches-unapplied version 1:1.8.13.1~dfsg-1ubuntu2 to ubuntu/quantal

Imported using git-ubuntu import.

Changelog parent: eed91c358f11c4b878fd6c2e4305c5e5ad6f211b

New changelog entries:
  * Build-depend on hardening-wrapper again,
    reenables pie and bindnow (LP: #1039542)

applied/ubuntu/precise-devel 2012-04-24 12:42:49 UTC 2012-04-24
Import patches-applied version 1:1.8.10.1~dfsg-1ubuntu1 to applied/ubuntu/pre...

Author: Andrew Mitchell
Author Date: 2012-04-24 10:15:54 UTC

Import patches-applied version 1:1.8.10.1~dfsg-1ubuntu1 to applied/ubuntu/precise

Imported using git-ubuntu import.

Changelog parent: 93a35142e8b2c9a7c92339f5cc8b52c62ec134c5
Unapplied parent: e89e71f2af41a038711729904062393ac417af8d

New changelog entries:
  * Merge from Debian unstable. (LP: #987772, #956578, #956580, #956581)
  * Remaining changes:
    - debian/asterisk.init: chown /dev/dahdi
    - debian/backports/hardy: add file
    - debian/backports/asterisk.init.hardy: add file
    - Fix building on armhf with debian/patches/armhf-fixes:
      + Flatten linux-gnueabihf in configure to linux-gnu, in
        the same way that's already done for linux-gnueabi
  * Changes dropped from Ubuntu delta as no longer applicable:
    - debian/patches/backport-r312866.diff: Backported from upstream
    - debian/control: Build-depend on hardening-wrapper, now handled
      by dpkg-buildflags
    - debian/rules: Make use of hardening-wrapper

ubuntu/precise-devel 2012-04-24 12:42:49 UTC 2012-04-24
Import patches-unapplied version 1:1.8.10.1~dfsg-1ubuntu1 to ubuntu/precise

Author: Andrew Mitchell
Author Date: 2012-04-24 10:15:54 UTC

Import patches-unapplied version 1:1.8.10.1~dfsg-1ubuntu1 to ubuntu/precise

Imported using git-ubuntu import.

Changelog parent: 84875e8b79f0d7864cabae1373612a78c96917d2

New changelog entries:
  * Merge from Debian unstable. (LP: #987772, #956578, #956580, #956581)
  * Remaining changes:
    - debian/asterisk.init: chown /dev/dahdi
    - debian/backports/hardy: add file
    - debian/backports/asterisk.init.hardy: add file
    - Fix building on armhf with debian/patches/armhf-fixes:
      + Flatten linux-gnueabihf in configure to linux-gnu, in
        the same way that's already done for linux-gnueabi
  * Changes dropped from Ubuntu delta as no longer applicable:
    - debian/patches/backport-r312866.diff: Backported from upstream
    - debian/control: Build-depend on hardening-wrapper, now handled
      by dpkg-buildflags
    - debian/rules: Make use of hardening-wrapper

ubuntu/precise 2012-04-24 12:42:49 UTC 2012-04-24
Import patches-unapplied version 1:1.8.10.1~dfsg-1ubuntu1 to ubuntu/precise

Author: Andrew Mitchell
Author Date: 2012-04-24 10:15:54 UTC

Import patches-unapplied version 1:1.8.10.1~dfsg-1ubuntu1 to ubuntu/precise

Imported using git-ubuntu import.

Changelog parent: 84875e8b79f0d7864cabae1373612a78c96917d2

New changelog entries:
  * Merge from Debian unstable. (LP: #987772, #956578, #956580, #956581)
  * Remaining changes:
    - debian/asterisk.init: chown /dev/dahdi
    - debian/backports/hardy: add file
    - debian/backports/asterisk.init.hardy: add file
    - Fix building on armhf with debian/patches/armhf-fixes:
      + Flatten linux-gnueabihf in configure to linux-gnu, in
        the same way that's already done for linux-gnueabi
  * Changes dropped from Ubuntu delta as no longer applicable:
    - debian/patches/backport-r312866.diff: Backported from upstream
    - debian/control: Build-depend on hardening-wrapper, now handled
      by dpkg-buildflags
    - debian/rules: Make use of hardening-wrapper

applied/ubuntu/precise 2012-04-24 12:42:49 UTC 2012-04-24
Import patches-applied version 1:1.8.10.1~dfsg-1ubuntu1 to applied/ubuntu/pre...

Author: Andrew Mitchell
Author Date: 2012-04-24 10:15:54 UTC

Import patches-applied version 1:1.8.10.1~dfsg-1ubuntu1 to applied/ubuntu/precise

Imported using git-ubuntu import.

Changelog parent: 93a35142e8b2c9a7c92339f5cc8b52c62ec134c5
Unapplied parent: e89e71f2af41a038711729904062393ac417af8d

New changelog entries:
  * Merge from Debian unstable. (LP: #987772, #956578, #956580, #956581)
  * Remaining changes:
    - debian/asterisk.init: chown /dev/dahdi
    - debian/backports/hardy: add file
    - debian/backports/asterisk.init.hardy: add file
    - Fix building on armhf with debian/patches/armhf-fixes:
      + Flatten linux-gnueabihf in configure to linux-gnu, in
        the same way that's already done for linux-gnueabi
  * Changes dropped from Ubuntu delta as no longer applicable:
    - debian/patches/backport-r312866.diff: Backported from upstream
    - debian/control: Build-depend on hardening-wrapper, now handled
      by dpkg-buildflags
    - debian/rules: Make use of hardening-wrapper

ubuntu/oneiric-devel 2012-03-23 08:04:05 UTC 2012-03-23
Import patches-unapplied version 1:1.8.4.4~dfsg-2ubuntu1.1 to ubuntu/oneiric-...

Author: Paul Belanger
Author Date: 2012-03-10 23:40:50 UTC

Import patches-unapplied version 1:1.8.4.4~dfsg-2ubuntu1.1 to ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: 7427bef68872b58157fdda97e72429c1112b758c

New changelog entries:
  * debian/patches/backport-r312866.diff
  - Responding to OPTIONS packet with 404 because Asterisk not looking for
     "s" extension (LP: #920020)

applied/ubuntu/oneiric-updates 2012-03-23 08:04:05 UTC 2012-03-23
Import patches-applied version 1:1.8.4.4~dfsg-2ubuntu1.1 to applied/ubuntu/on...

Author: Paul Belanger
Author Date: 2012-03-10 23:40:50 UTC

Import patches-applied version 1:1.8.4.4~dfsg-2ubuntu1.1 to applied/ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: 910763a2d147758dbd47b1dd81a4f02d43689bd4
Unapplied parent: 75e72e728386cc405eb6a43b910a747a097e2aaa

New changelog entries:
  * debian/patches/backport-r312866.diff
  - Responding to OPTIONS packet with 404 because Asterisk not looking for
     "s" extension (LP: #920020)

ubuntu/oneiric-proposed 2012-03-23 08:04:05 UTC 2012-03-23
Import patches-unapplied version 1:1.8.4.4~dfsg-2ubuntu1.1 to ubuntu/oneiric-...

Author: Paul Belanger
Author Date: 2012-03-10 23:40:50 UTC

Import patches-unapplied version 1:1.8.4.4~dfsg-2ubuntu1.1 to ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: 7427bef68872b58157fdda97e72429c1112b758c

New changelog entries:
  * debian/patches/backport-r312866.diff
  - Responding to OPTIONS packet with 404 because Asterisk not looking for
     "s" extension (LP: #920020)

ubuntu/oneiric-updates 2012-03-23 08:04:05 UTC 2012-03-23
Import patches-unapplied version 1:1.8.4.4~dfsg-2ubuntu1.1 to ubuntu/oneiric-...

Author: Paul Belanger
Author Date: 2012-03-10 23:40:50 UTC

Import patches-unapplied version 1:1.8.4.4~dfsg-2ubuntu1.1 to ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: 7427bef68872b58157fdda97e72429c1112b758c

New changelog entries:
  * debian/patches/backport-r312866.diff
  - Responding to OPTIONS packet with 404 because Asterisk not looking for
     "s" extension (LP: #920020)

applied/ubuntu/oneiric-devel 2012-03-23 08:04:05 UTC 2012-03-23
Import patches-applied version 1:1.8.4.4~dfsg-2ubuntu1.1 to applied/ubuntu/on...

Author: Paul Belanger
Author Date: 2012-03-10 23:40:50 UTC

Import patches-applied version 1:1.8.4.4~dfsg-2ubuntu1.1 to applied/ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: 910763a2d147758dbd47b1dd81a4f02d43689bd4
Unapplied parent: 75e72e728386cc405eb6a43b910a747a097e2aaa

New changelog entries:
  * debian/patches/backport-r312866.diff
  - Responding to OPTIONS packet with 404 because Asterisk not looking for
     "s" extension (LP: #920020)

applied/ubuntu/oneiric-proposed 2012-03-23 08:04:05 UTC 2012-03-23
Import patches-applied version 1:1.8.4.4~dfsg-2ubuntu1.1 to applied/ubuntu/on...

Author: Paul Belanger
Author Date: 2012-03-10 23:40:50 UTC

Import patches-applied version 1:1.8.4.4~dfsg-2ubuntu1.1 to applied/ubuntu/oneiric-proposed

Imported using git-ubuntu import.

Changelog parent: 910763a2d147758dbd47b1dd81a4f02d43689bd4
Unapplied parent: 75e72e728386cc405eb6a43b910a747a097e2aaa

New changelog entries:
  * debian/patches/backport-r312866.diff
  - Responding to OPTIONS packet with 404 because Asterisk not looking for
     "s" extension (LP: #920020)

debian/lenny 2012-03-10 15:10:23 UTC 2012-03-10
Import patches-unapplied version 1:1.4.21.2~dfsg-3+lenny6 to debian/lenny

Author: Tzafrir Cohen
Author Date: 2011-12-18 20:12:00 UTC

Import patches-unapplied version 1:1.4.21.2~dfsg-3+lenny6 to debian/lenny

Imported using git-ubuntu import.

Changelog parent: 41b7d8bb4cba727380a9ba474dd807afc12e7e45

New changelog entries:
  * Patch AST-2011-013: potential remote information disclosure
    Closes: #651552 (CVE-2011-4597 The side issue. The DoS is
    inapplicable to Lenny).
    - The patch changeges the sample sip.conf . We change the sample
       config files, but not the files under /etc/asterisk .

applied/debian/lenny 2012-03-10 15:10:23 UTC 2012-03-10
Import patches-applied version 1:1.4.21.2~dfsg-3+lenny6 to applied/debian/lenny

Author: Tzafrir Cohen
Author Date: 2011-12-18 20:12:00 UTC

Import patches-applied version 1:1.4.21.2~dfsg-3+lenny6 to applied/debian/lenny

Imported using git-ubuntu import.

Changelog parent: f10e4f462d728a1327fbc0a22617a7bba006125b
Unapplied parent: d2a2cf9f3e5702a26fe8e1fec3426acc0392eb80

New changelog entries:
  * Patch AST-2011-013: potential remote information disclosure
    Closes: #651552 (CVE-2011-4597 The side issue. The DoS is
    inapplicable to Lenny).
    - The patch changeges the sample sip.conf . We change the sample
       config files, but not the files under /etc/asterisk .

applied/ubuntu/oneiric 2011-09-23 11:03:37 UTC 2011-09-23
Import patches-applied version 1:1.8.4.4~dfsg-2ubuntu1 to applied/ubuntu/oneiric

Author: James Page
Author Date: 2011-09-20 13:05:14 UTC

Import patches-applied version 1:1.8.4.4~dfsg-2ubuntu1 to applied/ubuntu/oneiric

Imported using git-ubuntu import.

Changelog parent: 169ef7fff9aaef8e475afe436779fe4f42affa6d
Unapplied parent: ea7c159cbb19adb539573c4e72889edbe1263f75

New changelog entries:
  * Merge from debian unstable (LP: #852479). Remaining changes:
    - debian/control: Build-depend on hardening-wrapper
    - debian/rules: Make use of hardening-wrapper
    - debian/asterisk.init: chown /dev/dahdi
    - debian/backports/hardy: add file
    - debian/backports/asterisk.init.hardy: add file
  * Changes dropped from Ubuntu delta as no longer applicable:
    - debian/control:
      + Removed Uploaders field
      + Removed Debian Vcs-Svn entry and replaced with ubuntu-voip Vcs-Bzr,
        to reflect divergence in packages.

ubuntu/oneiric 2011-09-23 11:03:37 UTC 2011-09-23
Import patches-unapplied version 1:1.8.4.4~dfsg-2ubuntu1 to ubuntu/oneiric

Author: James Page
Author Date: 2011-09-20 13:05:14 UTC

Import patches-unapplied version 1:1.8.4.4~dfsg-2ubuntu1 to ubuntu/oneiric

Imported using git-ubuntu import.

Changelog parent: d6469f467c82622ff81d337196bcda19dd9c5873

New changelog entries:
  * Merge from debian unstable (LP: #852479). Remaining changes:
    - debian/control: Build-depend on hardening-wrapper
    - debian/rules: Make use of hardening-wrapper
    - debian/asterisk.init: chown /dev/dahdi
    - debian/backports/hardy: add file
    - debian/backports/asterisk.init.hardy: add file
  * Changes dropped from Ubuntu delta as no longer applicable:
    - debian/control:
      + Removed Uploaders field
      + Removed Debian Vcs-Svn entry and replaced with ubuntu-voip Vcs-Bzr,
        to reflect divergence in packages.

ubuntu/lucid-devel 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-unapplied version 1:1.6.2.5-0ubuntu1.4 to ubuntu/lucid-security

Author: Marc Deslauriers
Author Date: 2011-07-12 19:49:26 UTC

Import patches-unapplied version 1:1.6.2.5-0ubuntu1.4 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: fbb341b2f9c1375c4cbd4df1c20f626ca708a9c3

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

applied/ubuntu/natty-updates 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-applied version 1:1.6.2.9-2ubuntu2.1 to applied/ubuntu/natty-s...

Author: Marc Deslauriers
Author Date: 2011-07-12 18:38:08 UTC

Import patches-applied version 1:1.6.2.9-2ubuntu2.1 to applied/ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: a2153031b74a16ebcb697d55fb5d9ff4e83c50a0
Unapplied parent: d3e9a0fc992fce8066dcfb9e5baa2c2bcd262f3b

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

applied/ubuntu/natty-security 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-applied version 1:1.6.2.9-2ubuntu2.1 to applied/ubuntu/natty-s...

Author: Marc Deslauriers
Author Date: 2011-07-12 18:38:08 UTC

Import patches-applied version 1:1.6.2.9-2ubuntu2.1 to applied/ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: a2153031b74a16ebcb697d55fb5d9ff4e83c50a0
Unapplied parent: d3e9a0fc992fce8066dcfb9e5baa2c2bcd262f3b

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

applied/ubuntu/natty-devel 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-applied version 1:1.6.2.9-2ubuntu2.1 to applied/ubuntu/natty-s...

Author: Marc Deslauriers
Author Date: 2011-07-12 18:38:08 UTC

Import patches-applied version 1:1.6.2.9-2ubuntu2.1 to applied/ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: a2153031b74a16ebcb697d55fb5d9ff4e83c50a0
Unapplied parent: d3e9a0fc992fce8066dcfb9e5baa2c2bcd262f3b

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

applied/ubuntu/maverick-updates 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-applied version 1:1.6.2.7-1ubuntu1.2 to applied/ubuntu/maveric...

Author: Marc Deslauriers
Author Date: 2011-07-12 19:44:59 UTC

Import patches-applied version 1:1.6.2.7-1ubuntu1.2 to applied/ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: a7fe1bd894e80db981a4d17b5c4f25702cce0c0e
Unapplied parent: 2d2d7df5d96f609f6d51e304438baf8392e85f42

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

applied/ubuntu/maverick-security 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-applied version 1:1.6.2.7-1ubuntu1.2 to applied/ubuntu/maveric...

Author: Marc Deslauriers
Author Date: 2011-07-12 19:44:59 UTC

Import patches-applied version 1:1.6.2.7-1ubuntu1.2 to applied/ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: a7fe1bd894e80db981a4d17b5c4f25702cce0c0e
Unapplied parent: 2d2d7df5d96f609f6d51e304438baf8392e85f42

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

applied/ubuntu/maverick-devel 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-applied version 1:1.6.2.7-1ubuntu1.2 to applied/ubuntu/maveric...

Author: Marc Deslauriers
Author Date: 2011-07-12 19:44:59 UTC

Import patches-applied version 1:1.6.2.7-1ubuntu1.2 to applied/ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: a7fe1bd894e80db981a4d17b5c4f25702cce0c0e
Unapplied parent: 2d2d7df5d96f609f6d51e304438baf8392e85f42

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

applied/ubuntu/lucid-updates 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-applied version 1:1.6.2.5-0ubuntu1.4 to applied/ubuntu/lucid-s...

Author: Marc Deslauriers
Author Date: 2011-07-12 19:49:26 UTC

Import patches-applied version 1:1.6.2.5-0ubuntu1.4 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 24f98d22b4159e4ac79f029cd0218dabd311f46b
Unapplied parent: 332abf8ba3b9ccbfb5ff5b4bdbc5716a16f99629

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

applied/ubuntu/lucid-security 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-applied version 1:1.6.2.5-0ubuntu1.4 to applied/ubuntu/lucid-s...

Author: Marc Deslauriers
Author Date: 2011-07-12 19:49:26 UTC

Import patches-applied version 1:1.6.2.5-0ubuntu1.4 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 24f98d22b4159e4ac79f029cd0218dabd311f46b
Unapplied parent: 332abf8ba3b9ccbfb5ff5b4bdbc5716a16f99629

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

applied/ubuntu/lucid-devel 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-applied version 1:1.6.2.5-0ubuntu1.4 to applied/ubuntu/lucid-s...

Author: Marc Deslauriers
Author Date: 2011-07-12 19:49:26 UTC

Import patches-applied version 1:1.6.2.5-0ubuntu1.4 to applied/ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 24f98d22b4159e4ac79f029cd0218dabd311f46b
Unapplied parent: 332abf8ba3b9ccbfb5ff5b4bdbc5716a16f99629

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

ubuntu/natty-updates 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-unapplied version 1:1.6.2.9-2ubuntu2.1 to ubuntu/natty-security

Author: Marc Deslauriers
Author Date: 2011-07-12 18:38:08 UTC

Import patches-unapplied version 1:1.6.2.9-2ubuntu2.1 to ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: 81850a5b039d5bde4b325010103ac1f90739595d

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

ubuntu/natty-security 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-unapplied version 1:1.6.2.9-2ubuntu2.1 to ubuntu/natty-security

Author: Marc Deslauriers
Author Date: 2011-07-12 18:38:08 UTC

Import patches-unapplied version 1:1.6.2.9-2ubuntu2.1 to ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: 81850a5b039d5bde4b325010103ac1f90739595d

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

ubuntu/natty-devel 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-unapplied version 1:1.6.2.9-2ubuntu2.1 to ubuntu/natty-security

Author: Marc Deslauriers
Author Date: 2011-07-12 18:38:08 UTC

Import patches-unapplied version 1:1.6.2.9-2ubuntu2.1 to ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: 81850a5b039d5bde4b325010103ac1f90739595d

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

ubuntu/maverick-updates 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-unapplied version 1:1.6.2.7-1ubuntu1.2 to ubuntu/maverick-secu...

Author: Marc Deslauriers
Author Date: 2011-07-12 19:44:59 UTC

Import patches-unapplied version 1:1.6.2.7-1ubuntu1.2 to ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: 9fbf047e4c8b045e6f4b39c9aa20aa2e87ef9da2

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

ubuntu/maverick-security 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-unapplied version 1:1.6.2.7-1ubuntu1.2 to ubuntu/maverick-secu...

Author: Marc Deslauriers
Author Date: 2011-07-12 19:44:59 UTC

Import patches-unapplied version 1:1.6.2.7-1ubuntu1.2 to ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: 9fbf047e4c8b045e6f4b39c9aa20aa2e87ef9da2

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

ubuntu/maverick-devel 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-unapplied version 1:1.6.2.7-1ubuntu1.2 to ubuntu/maverick-secu...

Author: Marc Deslauriers
Author Date: 2011-07-12 19:44:59 UTC

Import patches-unapplied version 1:1.6.2.7-1ubuntu1.2 to ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: 9fbf047e4c8b045e6f4b39c9aa20aa2e87ef9da2

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

ubuntu/lucid-updates 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-unapplied version 1:1.6.2.5-0ubuntu1.4 to ubuntu/lucid-security

Author: Marc Deslauriers
Author Date: 2011-07-12 19:49:26 UTC

Import patches-unapplied version 1:1.6.2.5-0ubuntu1.4 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: fbb341b2f9c1375c4cbd4df1c20f626ca708a9c3

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

ubuntu/lucid-security 2011-07-18 13:04:22 UTC 2011-07-18
Import patches-unapplied version 1:1.6.2.5-0ubuntu1.4 to ubuntu/lucid-security

Author: Marc Deslauriers
Author Date: 2011-07-12 19:49:26 UTC

Import patches-unapplied version 1:1.6.2.5-0ubuntu1.4 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: fbb341b2f9c1375c4cbd4df1c20f626ca708a9c3

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code exection via
    crafted UDPTL packet
    - debian/patches/AST-2011-002-1.6.2.diff: properly calculate lengths in
      main/udptl.c.
    - CVE-2011-1147
  * SECURITY UPDATE: denial of service via manager session with invalid
    data
    - debian/patches/AST-2011-003-1.6.2.diff: check for errors in
      main/manager.c.
    - CVE-2011-1174
  * SECURITY UPDATE: denial of service via many short TLS sessions
    - debian/patches/AST-2011-004-1.6.2.diff: gracefully handle failures
      in main/tcptls.c.
    - CVE-2011-1175
  * SECURITY UPDATE: denial of service via a series of TCP connections
    - debian/patches/AST-2011-005-1.6.2.diff: add timeouts and session
      limits to main/manager.c, configs/manager.conf.sample,
      channels/chan_sip.c, channels/chan_skinny.c, main/http.c,
      configs/{skinny,sip,http}.conf.sample.
    - CVE-2011-1507
  * SECURITY UPDATE: remote command execution via incomplete system
    privilege check
    - debian/patches/AST-2011-006-1.6.2.diff: correctly check privileges in
      main/manager.c.
    - CVE-2011-1599
  * SECURITY UPDATE: denial of service via crafted packet and SIP channel
    driver
    - debian/patches/AST-2011-008.diff: set proper length in
      channels/chan_sip.c.
    - CVE-2011-2529
  * SECURITY UPDATE: denial of service and possible code execution via
    IAX2 channel driver crafted frame
    - debian/patches/AST-2011-010-1.6.2.diff: validate options in
      channels/chan_iax2.c, main/features.c.
    - CVE-2011-2535
  * SECURITY UPDATE: account name enumeration
    - debian/patches/AST-2011-011-1.6.2.diff: adjust responses in
      channels/chan_sip.c.
    - CVE-2011-2536

applied/ubuntu/natty 2011-01-21 15:04:54 UTC 2011-01-21
Import patches-applied version 1:1.6.2.9-2ubuntu2 to applied/ubuntu/natty

Author: Dave Walker
Author Date: 2011-01-20 21:19:46 UTC

Import patches-applied version 1:1.6.2.9-2ubuntu2 to applied/ubuntu/natty

Imported using git-ubuntu import.

Changelog parent: 69565643cb03d32bf43710152cba6a45eeb3b08e
Unapplied parent: fcf196ad4f468c4807383af0db1c959882891c85

New changelog entries:
  * SECURITY UPDATE: Stack buffer overflow in SIP channel driver. (LP: #705014)
    - debian/patches/AST-2011-001-1.6.2: The size of the output buffer passed
      to the ast_uri_encode function is now properly respected in main/utils.c.
      Patch courtesy of upstream.
    - CVE-2011-0495

ubuntu/natty 2011-01-21 15:04:54 UTC 2011-01-21
Import patches-unapplied version 1:1.6.2.9-2ubuntu2 to ubuntu/natty

Author: Dave Walker
Author Date: 2011-01-20 21:19:46 UTC

Import patches-unapplied version 1:1.6.2.9-2ubuntu2 to ubuntu/natty

Imported using git-ubuntu import.

Changelog parent: 1d1c97b1f60263659f144b4e4af13ef61aa480bb

New changelog entries:
  * SECURITY UPDATE: Stack buffer overflow in SIP channel driver. (LP: #705014)
    - debian/patches/AST-2011-001-1.6.2: The size of the output buffer passed
      to the ast_uri_encode function is now properly respected in main/utils.c.
      Patch courtesy of upstream.
    - CVE-2011-0495

ubuntu/lucid-proposed 2010-12-15 12:06:19 UTC 2010-12-15
Import patches-unapplied version 1:1.6.2.5-0ubuntu1.2 to ubuntu/lucid-proposed

Author: Lionel Porcheron
Author Date: 2010-12-06 15:56:12 UTC

Import patches-unapplied version 1:1.6.2.5-0ubuntu1.2 to ubuntu/lucid-proposed

Imported using git-ubuntu import.

Changelog parent: cdb8cc9018623f73fe9cb7a930f1b2ee0721595c

New changelog entries:
  * debian/patches/unattended_fix: Fix attended transfer call in 1.2.6.5
    Patch based on Asterisk project's upstream patch (between 1.2.6.5 and
    1.2.6.6 where issue is declared to be fixed see issue 16816 on Asterisk
    bug tracker). (LP: #686625)

applied/ubuntu/lucid-proposed 2010-12-15 12:06:19 UTC 2010-12-15
Import patches-applied version 1:1.6.2.5-0ubuntu1.2 to applied/ubuntu/lucid-p...

Author: Lionel Porcheron
Author Date: 2010-12-06 15:56:12 UTC

Import patches-applied version 1:1.6.2.5-0ubuntu1.2 to applied/ubuntu/lucid-proposed

Imported using git-ubuntu import.

Changelog parent: c9d91485bc3899cf941125d388678f0f4621e31c
Unapplied parent: d74248ddc155a5f29e8ed2e271a04165596c1fd5

New changelog entries:
  * debian/patches/unattended_fix: Fix attended transfer call in 1.2.6.5
    Patch based on Asterisk project's upstream patch (between 1.2.6.5 and
    1.2.6.6 where issue is declared to be fixed see issue 16816 on Asterisk
    bug tracker). (LP: #686625)

ubuntu/maverick 2010-06-23 21:06:48 UTC 2010-06-23
Import patches-unapplied version 1:1.6.2.7-1ubuntu1 to ubuntu/maverick

Author: Lorenzo De Liso
Author Date: 2010-06-23 17:37:50 UTC

Import patches-unapplied version 1:1.6.2.7-1ubuntu1 to ubuntu/maverick

Imported using git-ubuntu import.

Changelog parent: f7287526ffce9771cf0e9647a7d2d6003f090229

New changelog entries:
  * Merge from debian unstable (LP: #597792), remaining changes:
    - debian/control:
      + Build-depend on hardening-wrapper
      + Change Maintainer
      + Removed Uploaders field.
      + Removed Debian Vcs-Svn entry and replaced with ubuntu-voip Vcs-Bzr,
        to reflect divergence in packages.
    - debian/rules: Make use of hardening-wrapper
    - debian/asterisk.init: chown /dev/dahdi
    - debian/backports/hardy: add file
    - debian/backports/asterisk.init.hardy: add file

applied/ubuntu/maverick 2010-06-23 21:06:48 UTC 2010-06-23
Import patches-applied version 1:1.6.2.7-1ubuntu1 to applied/ubuntu/maverick

Author: Lorenzo De Liso
Author Date: 2010-06-23 17:37:50 UTC

Import patches-applied version 1:1.6.2.7-1ubuntu1 to applied/ubuntu/maverick

Imported using git-ubuntu import.

Changelog parent: 86f5375ad76a6311328873dc4726a9a18661cfa4
Unapplied parent: 9533f1d5c6d4fdc2010da5021f0802396fbb0d6b

New changelog entries:
  * Merge from debian unstable (LP: #597792), remaining changes:
    - debian/control:
      + Build-depend on hardening-wrapper
      + Change Maintainer
      + Removed Uploaders field.
      + Removed Debian Vcs-Svn entry and replaced with ubuntu-voip Vcs-Bzr,
        to reflect divergence in packages.
    - debian/rules: Make use of hardening-wrapper
    - debian/asterisk.init: chown /dev/dahdi
    - debian/backports/hardy: add file
    - debian/backports/asterisk.init.hardy: add file

applied/ubuntu/lucid 2010-04-14 23:04:42 UTC 2010-04-14
Import patches-applied version 1:1.6.2.5-0ubuntu1 to applied/ubuntu/lucid

Author: Jean-Michel Dault
Author Date: 2010-04-13 20:27:27 UTC

Import patches-applied version 1:1.6.2.5-0ubuntu1 to applied/ubuntu/lucid

Imported using git-ubuntu import.

Changelog parent: 6b2b05a01d191fc1d7778a91b1077ae08deaffcd
Unapplied parent: 2b84d1622334b44530d866b62907aa304a394d3d

New changelog entries:
  * New upstream bugfix release (1.6.2.5)
   * Security Fixes:
    - AST-2010-003: Invalid parsing of ACL rules can compromise security
    - AST-2010-002: Dialplan injection vulnerability
  * Remaining Ubuntu-specific changes:
    - debian/control: Build-depend on hardening-wrapper
    - debian/rules: Make use of hardening-wrapper
    - debian/control: Change Maintainer
    - debian/control: Removed Uploaders field.
    - debian/control: Removed Debian Vcs-Svn entry and replaced with
        ubuntu-voip Vcs-Bzr, to reflect divergence in packages.
    - debian/asterisk.init : chown /dev/dahdi
    - debian/backports/hardy : add file
    - debian/backports/asterisk.init.hardy : add file

ubuntu/lucid 2010-04-14 23:04:42 UTC 2010-04-14
Import patches-unapplied version 1:1.6.2.5-0ubuntu1 to ubuntu/lucid

Author: Jean-Michel Dault
Author Date: 2010-04-13 20:27:27 UTC

Import patches-unapplied version 1:1.6.2.5-0ubuntu1 to ubuntu/lucid

Imported using git-ubuntu import.

Changelog parent: 174cab7b2b61cb3ee6ff4245d040c6007b31fa8f

New changelog entries:
  * New upstream bugfix release (1.6.2.5)
   * Security Fixes:
    - AST-2010-003: Invalid parsing of ACL rules can compromise security
    - AST-2010-002: Dialplan injection vulnerability
  * Remaining Ubuntu-specific changes:
    - debian/control: Build-depend on hardening-wrapper
    - debian/rules: Make use of hardening-wrapper
    - debian/control: Change Maintainer
    - debian/control: Removed Uploaders field.
    - debian/control: Removed Debian Vcs-Svn entry and replaced with
        ubuntu-voip Vcs-Bzr, to reflect divergence in packages.
    - debian/asterisk.init : chown /dev/dahdi
    - debian/backports/hardy : add file
    - debian/backports/asterisk.init.hardy : add file

ubuntu/karmic-devel 2010-01-04 02:04:40 UTC 2010-01-04
Import patches-unapplied version 1:1.6.2.0~rc2-0ubuntu1.2 to ubuntu/karmic-pr...

Author: Roberto D'Auria
Author Date: 2009-12-29 21:42:00 UTC

Import patches-unapplied version 1:1.6.2.0~rc2-0ubuntu1.2 to ubuntu/karmic-proposed

Imported using git-ubuntu import.

Changelog parent: e47b613a0b79ec311d3edf48e8ed3ddc8175f69b

New changelog entries:
  * debian/patches/iax2-heavy-traffic-fix: Stops asterisk crashing on
    heavy traffic on iax2 channel, editing channels/chan_iax2.c.
    Based on upstream patch. (LP: #501116)

applied/ubuntu/karmic-updates 2010-01-04 02:04:40 UTC 2010-01-04
Import patches-applied version 1:1.6.2.0~rc2-0ubuntu1.2 to applied/ubuntu/kar...

Author: Roberto D'Auria
Author Date: 2009-12-29 21:42:00 UTC

Import patches-applied version 1:1.6.2.0~rc2-0ubuntu1.2 to applied/ubuntu/karmic-proposed

Imported using git-ubuntu import.

Changelog parent: 86090b3e77b037cade4c6d2d59d4d4fc1fdaec94
Unapplied parent: 98a61e7675a6eb0a0ef1e3f62eb3ab6ab935c14d

New changelog entries:
  * debian/patches/iax2-heavy-traffic-fix: Stops asterisk crashing on
    heavy traffic on iax2 channel, editing channels/chan_iax2.c.
    Based on upstream patch. (LP: #501116)

ubuntu/karmic-updates 2010-01-04 02:04:40 UTC 2010-01-04
Import patches-unapplied version 1:1.6.2.0~rc2-0ubuntu1.2 to ubuntu/karmic-pr...

Author: Roberto D'Auria
Author Date: 2009-12-29 21:42:00 UTC

Import patches-unapplied version 1:1.6.2.0~rc2-0ubuntu1.2 to ubuntu/karmic-proposed

Imported using git-ubuntu import.

Changelog parent: e47b613a0b79ec311d3edf48e8ed3ddc8175f69b

New changelog entries:
  * debian/patches/iax2-heavy-traffic-fix: Stops asterisk crashing on
    heavy traffic on iax2 channel, editing channels/chan_iax2.c.
    Based on upstream patch. (LP: #501116)

ubuntu/karmic-proposed 2010-01-04 02:04:40 UTC 2010-01-04
Import patches-unapplied version 1:1.6.2.0~rc2-0ubuntu1.2 to ubuntu/karmic-pr...

Author: Roberto D'Auria
Author Date: 2009-12-29 21:42:00 UTC

Import patches-unapplied version 1:1.6.2.0~rc2-0ubuntu1.2 to ubuntu/karmic-proposed

Imported using git-ubuntu import.

Changelog parent: e47b613a0b79ec311d3edf48e8ed3ddc8175f69b

New changelog entries:
  * debian/patches/iax2-heavy-traffic-fix: Stops asterisk crashing on
    heavy traffic on iax2 channel, editing channels/chan_iax2.c.
    Based on upstream patch. (LP: #501116)

applied/ubuntu/karmic-proposed 2010-01-04 02:04:40 UTC 2010-01-04
Import patches-applied version 1:1.6.2.0~rc2-0ubuntu1.2 to applied/ubuntu/kar...

Author: Roberto D'Auria
Author Date: 2009-12-29 21:42:00 UTC

Import patches-applied version 1:1.6.2.0~rc2-0ubuntu1.2 to applied/ubuntu/karmic-proposed

Imported using git-ubuntu import.

Changelog parent: 86090b3e77b037cade4c6d2d59d4d4fc1fdaec94
Unapplied parent: 98a61e7675a6eb0a0ef1e3f62eb3ab6ab935c14d

New changelog entries:
  * debian/patches/iax2-heavy-traffic-fix: Stops asterisk crashing on
    heavy traffic on iax2 channel, editing channels/chan_iax2.c.
    Based on upstream patch. (LP: #501116)

applied/ubuntu/karmic-devel 2010-01-04 02:04:40 UTC 2010-01-04
Import patches-applied version 1:1.6.2.0~rc2-0ubuntu1.2 to applied/ubuntu/kar...

Author: Roberto D'Auria
Author Date: 2009-12-29 21:42:00 UTC

Import patches-applied version 1:1.6.2.0~rc2-0ubuntu1.2 to applied/ubuntu/karmic-proposed

Imported using git-ubuntu import.

Changelog parent: 86090b3e77b037cade4c6d2d59d4d4fc1fdaec94
Unapplied parent: 98a61e7675a6eb0a0ef1e3f62eb3ab6ab935c14d

New changelog entries:
  * debian/patches/iax2-heavy-traffic-fix: Stops asterisk crashing on
    heavy traffic on iax2 channel, editing channels/chan_iax2.c.
    Based on upstream patch. (LP: #501116)

applied/ubuntu/karmic-security 2009-12-09 00:05:52 UTC 2009-12-09
Import patches-applied version 1:1.6.2.0~rc2-0ubuntu1.1 to applied/ubuntu/kar...

Author: Dave Walker
Author Date: 2009-12-07 12:23:36 UTC

Import patches-applied version 1:1.6.2.0~rc2-0ubuntu1.1 to applied/ubuntu/karmic-security

Imported using git-ubuntu import.

Changelog parent: 990a01fcd82f6636c0224ff15f55869acace5cac
Unapplied parent: e47b613a0b79ec311d3edf48e8ed3ddc8175f69b

New changelog entries:
  * SECURITY UPDATE: ACL not respected on SIP INVITE (LP: #491632).
    - debian/patches/AST-2009-007: Additional check in channels/chan_sip.c to
      check ACL for handling SIP INVITEs. This blocks calls on networks
      intended to be prohibited, by configuration. Based on upstream patch.
    - AST-2009-007
    - CVE-2009-3723
  * SECURITY UPDATE: SIP responses expose valid usernames (LP: #491637).
    - debian/patches/AST-2009-008: Sanitise certain return of REGISTER message
      to stop a specially crafted series of requests returning valid usernames.
      Based on upstream patch.
    - AST-2009-008
    - CVE-2009-3727
  * SECURITY UPDATE: RTP Remote Crash Vulnerability (LP: #493555).
    - debian/patches/AST-2009-010: Stops Asterisk from crashing when an RTP
      comfort noise payload containing 24 bytes or greater is recieved.
    - AST-2009-010
    - CVE-2009-4055

ubuntu/karmic-security 2009-12-09 00:05:52 UTC 2009-12-09
Import patches-unapplied version 1:1.6.2.0~rc2-0ubuntu1.1 to ubuntu/karmic-se...

Author: Dave Walker
Author Date: 2009-12-07 12:23:36 UTC

Import patches-unapplied version 1:1.6.2.0~rc2-0ubuntu1.1 to ubuntu/karmic-security

Imported using git-ubuntu import.

Changelog parent: 0feaa25c90354b4204237c2aa72f35aac806bca1

New changelog entries:
  * SECURITY UPDATE: ACL not respected on SIP INVITE (LP: #491632).
    - debian/patches/AST-2009-007: Additional check in channels/chan_sip.c to
      check ACL for handling SIP INVITEs. This blocks calls on networks
      intended to be prohibited, by configuration. Based on upstream patch.
    - AST-2009-007
    - CVE-2009-3723
  * SECURITY UPDATE: SIP responses expose valid usernames (LP: #491637).
    - debian/patches/AST-2009-008: Sanitise certain return of REGISTER message
      to stop a specially crafted series of requests returning valid usernames.
      Based on upstream patch.
    - AST-2009-008
    - CVE-2009-3727
  * SECURITY UPDATE: RTP Remote Crash Vulnerability (LP: #493555).
    - debian/patches/AST-2009-010: Stops Asterisk from crashing when an RTP
      comfort noise payload containing 24 bytes or greater is recieved.
    - AST-2009-010
    - CVE-2009-4055

applied/ubuntu/intrepid-security 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-applied version 1:1.4.21.2~dfsg-1ubuntu3.1 to applied/ubuntu/i...

Author: Brian Thomason
Author Date: 2009-10-07 18:31:11 UTC

Import patches-applied version 1:1.4.21.2~dfsg-1ubuntu3.1 to applied/ubuntu/intrepid-security

Imported using git-ubuntu import.

Changelog parent: c505b0d71673ea86083a52240c71dcbacb1d8f74
Unapplied parent: 789b192a87784a19da3ec54ab26c5b0b6ee89b4c

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

applied/ubuntu/jaunty-updates 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-applied version 1:1.4.21.2~dfsg-3ubuntu2.1 to applied/ubuntu/j...

Author: Brian Thomason
Author Date: 2009-10-06 19:49:28 UTC

Import patches-applied version 1:1.4.21.2~dfsg-3ubuntu2.1 to applied/ubuntu/jaunty-security

Imported using git-ubuntu import.

Changelog parent: 0d5881183053db79d78c15574858e6ccb8568494
Unapplied parent: b2013060759e813070e2dcde2575696ffa154fa4

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

applied/ubuntu/jaunty-security 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-applied version 1:1.4.21.2~dfsg-3ubuntu2.1 to applied/ubuntu/j...

Author: Brian Thomason
Author Date: 2009-10-06 19:49:28 UTC

Import patches-applied version 1:1.4.21.2~dfsg-3ubuntu2.1 to applied/ubuntu/jaunty-security

Imported using git-ubuntu import.

Changelog parent: 0d5881183053db79d78c15574858e6ccb8568494
Unapplied parent: b2013060759e813070e2dcde2575696ffa154fa4

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

applied/ubuntu/jaunty-devel 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-applied version 1:1.4.21.2~dfsg-3ubuntu2.1 to applied/ubuntu/j...

Author: Brian Thomason
Author Date: 2009-10-06 19:49:28 UTC

Import patches-applied version 1:1.4.21.2~dfsg-3ubuntu2.1 to applied/ubuntu/jaunty-security

Imported using git-ubuntu import.

Changelog parent: 0d5881183053db79d78c15574858e6ccb8568494
Unapplied parent: b2013060759e813070e2dcde2575696ffa154fa4

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

applied/ubuntu/intrepid-updates 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-applied version 1:1.4.21.2~dfsg-1ubuntu3.1 to applied/ubuntu/i...

Author: Brian Thomason
Author Date: 2009-10-07 18:31:11 UTC

Import patches-applied version 1:1.4.21.2~dfsg-1ubuntu3.1 to applied/ubuntu/intrepid-security

Imported using git-ubuntu import.

Changelog parent: c505b0d71673ea86083a52240c71dcbacb1d8f74
Unapplied parent: 789b192a87784a19da3ec54ab26c5b0b6ee89b4c

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

ubuntu/intrepid-devel 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-unapplied version 1:1.4.21.2~dfsg-1ubuntu3.1 to ubuntu/intrepi...

Author: Brian Thomason
Author Date: 2009-10-07 18:31:11 UTC

Import patches-unapplied version 1:1.4.21.2~dfsg-1ubuntu3.1 to ubuntu/intrepid-security

Imported using git-ubuntu import.

Changelog parent: d7206e2231070907f607602890b2a3fb1863e555

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

ubuntu/intrepid-security 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-unapplied version 1:1.4.21.2~dfsg-1ubuntu3.1 to ubuntu/intrepi...

Author: Brian Thomason
Author Date: 2009-10-07 18:31:11 UTC

Import patches-unapplied version 1:1.4.21.2~dfsg-1ubuntu3.1 to ubuntu/intrepid-security

Imported using git-ubuntu import.

Changelog parent: d7206e2231070907f607602890b2a3fb1863e555

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

ubuntu/intrepid-updates 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-unapplied version 1:1.4.21.2~dfsg-1ubuntu3.1 to ubuntu/intrepi...

Author: Brian Thomason
Author Date: 2009-10-07 18:31:11 UTC

Import patches-unapplied version 1:1.4.21.2~dfsg-1ubuntu3.1 to ubuntu/intrepid-security

Imported using git-ubuntu import.

Changelog parent: d7206e2231070907f607602890b2a3fb1863e555

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

ubuntu/jaunty-devel 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-unapplied version 1:1.4.21.2~dfsg-3ubuntu2.1 to ubuntu/jaunty-...

Author: Brian Thomason
Author Date: 2009-10-06 19:49:28 UTC

Import patches-unapplied version 1:1.4.21.2~dfsg-3ubuntu2.1 to ubuntu/jaunty-security

Imported using git-ubuntu import.

Changelog parent: 0dd43ad36cadf60d406a84a4694f73064d267c09

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

ubuntu/jaunty-security 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-unapplied version 1:1.4.21.2~dfsg-3ubuntu2.1 to ubuntu/jaunty-...

Author: Brian Thomason
Author Date: 2009-10-06 19:49:28 UTC

Import patches-unapplied version 1:1.4.21.2~dfsg-3ubuntu2.1 to ubuntu/jaunty-security

Imported using git-ubuntu import.

Changelog parent: 0dd43ad36cadf60d406a84a4694f73064d267c09

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

ubuntu/jaunty-updates 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-unapplied version 1:1.4.21.2~dfsg-3ubuntu2.1 to ubuntu/jaunty-...

Author: Brian Thomason
Author Date: 2009-10-06 19:49:28 UTC

Import patches-unapplied version 1:1.4.21.2~dfsg-3ubuntu2.1 to ubuntu/jaunty-security

Imported using git-ubuntu import.

Changelog parent: 0dd43ad36cadf60d406a84a4694f73064d267c09

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

applied/ubuntu/intrepid-devel 2009-10-22 19:06:08 UTC 2009-10-22
Import patches-applied version 1:1.4.21.2~dfsg-1ubuntu3.1 to applied/ubuntu/i...

Author: Brian Thomason
Author Date: 2009-10-07 18:31:11 UTC

Import patches-applied version 1:1.4.21.2~dfsg-1ubuntu3.1 to applied/ubuntu/intrepid-security

Imported using git-ubuntu import.

Changelog parent: c505b0d71673ea86083a52240c71dcbacb1d8f74
Unapplied parent: 789b192a87784a19da3ec54ab26c5b0b6ee89b4c

New changelog entries:
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001

ubuntu/hardy-devel 2009-09-28 13:12:13 UTC 2009-09-28
Import patches-unapplied version 1:1.4.17~dfsg-2ubuntu1.1 to ubuntu/hardy-sec...

Author: Brian Thomason
Author Date: 2009-03-16 21:52:11 UTC

Import patches-unapplied version 1:1.4.17~dfsg-2ubuntu1.1 to ubuntu/hardy-security

Imported using git-ubuntu import.

Changelog parent: 0aba44c7cf37a87cf5d111b096254cc96d656b67

New changelog entries:
  * SECURITY UPDATE: ACK response spoofing
    - added debian/patches/CVE-2008-1897: Adjust chan_iax2.c to use a special
      id to prevent ACK response spoofing. Based on upstream patch.
    - CVE-2008-1897
    - AST-2008-006
  * SECURITY UPDATE: POKE request flooding
    - added debian/patches/CVE-2008-3263: Adjust chan_iax2.c to prevent
      'POKE' request flooding. Based on upstream patch.
    - CVE-2008-3263
    - AST-2008-010
  * SECURITY UPDATE: firmware packet flooding
    - added debian/patches/CVE-2008-3264: Adjust chan_iax2.c to prevent
      firmware packet flooding. Based on upstream patch.
    - CVE-2008-3264
    - AST-2008-011
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001
  * SECURITY UPDATE: SIP responses expose valid usernames
    - added debian/patches/CVE-2008-3903: Adjust chan_sip.c to make
      it more difficult to scan for available usernames.
    - CVE-2008-3903
    - AST-2009-003
  * SECURITY UPDATE: An attacker could hijack a manager session
    - added debian/patches/CVE-2008-1390: Adjust manager.c to
      never assign an invalid id of 0
    - CVE-2008-1390
    - AST-2008-005

applied/ubuntu/hardy-devel 2009-09-28 13:12:13 UTC 2009-09-28
Import patches-applied version 1:1.4.17~dfsg-2ubuntu1.1 to applied/ubuntu/har...

Author: Brian Thomason
Author Date: 2009-03-16 21:52:11 UTC

Import patches-applied version 1:1.4.17~dfsg-2ubuntu1.1 to applied/ubuntu/hardy-security

Imported using git-ubuntu import.

Changelog parent: 0982d566572b81998c1bb7eb403618e1ca8b9997
Unapplied parent: 5fa1d249c95dbdd6d2ed0118171a740ccf6658ab

New changelog entries:
  * SECURITY UPDATE: ACK response spoofing
    - added debian/patches/CVE-2008-1897: Adjust chan_iax2.c to use a special
      id to prevent ACK response spoofing. Based on upstream patch.
    - CVE-2008-1897
    - AST-2008-006
  * SECURITY UPDATE: POKE request flooding
    - added debian/patches/CVE-2008-3263: Adjust chan_iax2.c to prevent
      'POKE' request flooding. Based on upstream patch.
    - CVE-2008-3263
    - AST-2008-010
  * SECURITY UPDATE: firmware packet flooding
    - added debian/patches/CVE-2008-3264: Adjust chan_iax2.c to prevent
      firmware packet flooding. Based on upstream patch.
    - CVE-2008-3264
    - AST-2008-011
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001
  * SECURITY UPDATE: SIP responses expose valid usernames
    - added debian/patches/CVE-2008-3903: Adjust chan_sip.c to make
      it more difficult to scan for available usernames.
    - CVE-2008-3903
    - AST-2009-003
  * SECURITY UPDATE: An attacker could hijack a manager session
    - added debian/patches/CVE-2008-1390: Adjust manager.c to
      never assign an invalid id of 0
    - CVE-2008-1390
    - AST-2008-005

applied/ubuntu/hardy-security 2009-09-28 13:12:13 UTC 2009-09-28
Import patches-applied version 1:1.4.17~dfsg-2ubuntu1.1 to applied/ubuntu/har...

Author: Brian Thomason
Author Date: 2009-03-16 21:52:11 UTC

Import patches-applied version 1:1.4.17~dfsg-2ubuntu1.1 to applied/ubuntu/hardy-security

Imported using git-ubuntu import.

Changelog parent: 0982d566572b81998c1bb7eb403618e1ca8b9997
Unapplied parent: 5fa1d249c95dbdd6d2ed0118171a740ccf6658ab

New changelog entries:
  * SECURITY UPDATE: ACK response spoofing
    - added debian/patches/CVE-2008-1897: Adjust chan_iax2.c to use a special
      id to prevent ACK response spoofing. Based on upstream patch.
    - CVE-2008-1897
    - AST-2008-006
  * SECURITY UPDATE: POKE request flooding
    - added debian/patches/CVE-2008-3263: Adjust chan_iax2.c to prevent
      'POKE' request flooding. Based on upstream patch.
    - CVE-2008-3263
    - AST-2008-010
  * SECURITY UPDATE: firmware packet flooding
    - added debian/patches/CVE-2008-3264: Adjust chan_iax2.c to prevent
      firmware packet flooding. Based on upstream patch.
    - CVE-2008-3264
    - AST-2008-011
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001
  * SECURITY UPDATE: SIP responses expose valid usernames
    - added debian/patches/CVE-2008-3903: Adjust chan_sip.c to make
      it more difficult to scan for available usernames.
    - CVE-2008-3903
    - AST-2009-003
  * SECURITY UPDATE: An attacker could hijack a manager session
    - added debian/patches/CVE-2008-1390: Adjust manager.c to
      never assign an invalid id of 0
    - CVE-2008-1390
    - AST-2008-005

applied/ubuntu/hardy-updates 2009-09-28 13:12:13 UTC 2009-09-28
Import patches-applied version 1:1.4.17~dfsg-2ubuntu1.1 to applied/ubuntu/har...

Author: Brian Thomason
Author Date: 2009-03-16 21:52:11 UTC

Import patches-applied version 1:1.4.17~dfsg-2ubuntu1.1 to applied/ubuntu/hardy-security

Imported using git-ubuntu import.

Changelog parent: 0982d566572b81998c1bb7eb403618e1ca8b9997
Unapplied parent: 5fa1d249c95dbdd6d2ed0118171a740ccf6658ab

New changelog entries:
  * SECURITY UPDATE: ACK response spoofing
    - added debian/patches/CVE-2008-1897: Adjust chan_iax2.c to use a special
      id to prevent ACK response spoofing. Based on upstream patch.
    - CVE-2008-1897
    - AST-2008-006
  * SECURITY UPDATE: POKE request flooding
    - added debian/patches/CVE-2008-3263: Adjust chan_iax2.c to prevent
      'POKE' request flooding. Based on upstream patch.
    - CVE-2008-3263
    - AST-2008-010
  * SECURITY UPDATE: firmware packet flooding
    - added debian/patches/CVE-2008-3264: Adjust chan_iax2.c to prevent
      firmware packet flooding. Based on upstream patch.
    - CVE-2008-3264
    - AST-2008-011
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001
  * SECURITY UPDATE: SIP responses expose valid usernames
    - added debian/patches/CVE-2008-3903: Adjust chan_sip.c to make
      it more difficult to scan for available usernames.
    - CVE-2008-3903
    - AST-2009-003
  * SECURITY UPDATE: An attacker could hijack a manager session
    - added debian/patches/CVE-2008-1390: Adjust manager.c to
      never assign an invalid id of 0
    - CVE-2008-1390
    - AST-2008-005

ubuntu/hardy-updates 2009-09-28 13:12:13 UTC 2009-09-28
Import patches-unapplied version 1:1.4.17~dfsg-2ubuntu1.1 to ubuntu/hardy-sec...

Author: Brian Thomason
Author Date: 2009-03-16 21:52:11 UTC

Import patches-unapplied version 1:1.4.17~dfsg-2ubuntu1.1 to ubuntu/hardy-security

Imported using git-ubuntu import.

Changelog parent: 0aba44c7cf37a87cf5d111b096254cc96d656b67

New changelog entries:
  * SECURITY UPDATE: ACK response spoofing
    - added debian/patches/CVE-2008-1897: Adjust chan_iax2.c to use a special
      id to prevent ACK response spoofing. Based on upstream patch.
    - CVE-2008-1897
    - AST-2008-006
  * SECURITY UPDATE: POKE request flooding
    - added debian/patches/CVE-2008-3263: Adjust chan_iax2.c to prevent
      'POKE' request flooding. Based on upstream patch.
    - CVE-2008-3263
    - AST-2008-010
  * SECURITY UPDATE: firmware packet flooding
    - added debian/patches/CVE-2008-3264: Adjust chan_iax2.c to prevent
      firmware packet flooding. Based on upstream patch.
    - CVE-2008-3264
    - AST-2008-011
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001
  * SECURITY UPDATE: SIP responses expose valid usernames
    - added debian/patches/CVE-2008-3903: Adjust chan_sip.c to make
      it more difficult to scan for available usernames.
    - CVE-2008-3903
    - AST-2009-003
  * SECURITY UPDATE: An attacker could hijack a manager session
    - added debian/patches/CVE-2008-1390: Adjust manager.c to
      never assign an invalid id of 0
    - CVE-2008-1390
    - AST-2008-005

ubuntu/hardy-security 2009-09-28 13:12:13 UTC 2009-09-28
Import patches-unapplied version 1:1.4.17~dfsg-2ubuntu1.1 to ubuntu/hardy-sec...

Author: Brian Thomason
Author Date: 2009-03-16 21:52:11 UTC

Import patches-unapplied version 1:1.4.17~dfsg-2ubuntu1.1 to ubuntu/hardy-security

Imported using git-ubuntu import.

Changelog parent: 0aba44c7cf37a87cf5d111b096254cc96d656b67

New changelog entries:
  * SECURITY UPDATE: ACK response spoofing
    - added debian/patches/CVE-2008-1897: Adjust chan_iax2.c to use a special
      id to prevent ACK response spoofing. Based on upstream patch.
    - CVE-2008-1897
    - AST-2008-006
  * SECURITY UPDATE: POKE request flooding
    - added debian/patches/CVE-2008-3263: Adjust chan_iax2.c to prevent
      'POKE' request flooding. Based on upstream patch.
    - CVE-2008-3263
    - AST-2008-010
  * SECURITY UPDATE: firmware packet flooding
    - added debian/patches/CVE-2008-3264: Adjust chan_iax2.c to prevent
      firmware packet flooding. Based on upstream patch.
    - CVE-2008-3264
    - AST-2008-011
  * SECURITY UPDATE: information leak in IAX2 authentication
    - added debian/patches/CVE-2009-0041: Adjust chan_iax2.c to fix
      information leak in IAX2 authentication. Based on upstream patch.
    - CVE-2009-0041
    - AST-2009-001
  * SECURITY UPDATE: SIP responses expose valid usernames
    - added debian/patches/CVE-2008-3903: Adjust chan_sip.c to make
      it more difficult to scan for available usernames.
    - CVE-2008-3903
    - AST-2009-003
  * SECURITY UPDATE: An attacker could hijack a manager session
    - added debian/patches/CVE-2008-1390: Adjust manager.c to
      never assign an invalid id of 0
    - CVE-2008-1390
    - AST-2008-005

applied/ubuntu/karmic 2009-09-22 18:04:31 UTC 2009-09-22
Import patches-applied version 1:1.6.2.0~rc2-0ubuntu1 to applied/ubuntu/karmic

Author: Dave Walker
Author Date: 2009-09-22 15:22:14 UTC

Import patches-applied version 1:1.6.2.0~rc2-0ubuntu1 to applied/ubuntu/karmic

Imported using git-ubuntu import.

Changelog parent: bd23cff683df8bed97dfa80edc44261bfc6cb39f
Unapplied parent: 0feaa25c90354b4204237c2aa72f35aac806bca1

New changelog entries:

  * New upstream version, upstream is now DFSG compliant.
    - ilibc has been removed upstream.
    - Music on Hold is now cc-by-sa.
    - binary firmware iaxy.bin has been removed upstream.
  * debian/rules: Santitised UPSTREAM variable for compatiability
    with Ubuntu and other variants.
  * debian/control: Removed Debian Vcs-Svn entry and replaced
    with ubuntu-voip Vcs-Bzr, to reflect divergence in packages.
  * patches/makefile_appdocs_dtd: Removed, merged upstream.
  * patches/disable_moh: Previosly disabled, removed from pool.
  * patches/ubuntu-banner: Ported debian-banner to display Ubuntu
    centric bug report information.
  * Refresh quilt patches

ubuntu/karmic 2009-09-22 18:04:31 UTC 2009-09-22
Import patches-unapplied version 1:1.6.2.0~rc2-0ubuntu1 to ubuntu/karmic

Author: Dave Walker
Author Date: 2009-09-22 15:22:14 UTC

Import patches-unapplied version 1:1.6.2.0~rc2-0ubuntu1 to ubuntu/karmic

Imported using git-ubuntu import.

Changelog parent: 431cada68dedf3f5d139c5cb7b57f3bea537f586

New changelog entries:

  * New upstream version, upstream is now DFSG compliant.
    - ilibc has been removed upstream.
    - Music on Hold is now cc-by-sa.
    - binary firmware iaxy.bin has been removed upstream.
  * debian/rules: Santitised UPSTREAM variable for compatiability
    with Ubuntu and other variants.
  * debian/control: Removed Debian Vcs-Svn entry and replaced
    with ubuntu-voip Vcs-Bzr, to reflect divergence in packages.
  * patches/makefile_appdocs_dtd: Removed, merged upstream.
  * patches/disable_moh: Previosly disabled, removed from pool.
  * patches/ubuntu-banner: Ported debian-banner to display Ubuntu
    centric bug report information.
  * Refresh quilt patches

ubuntu/jaunty 2009-04-19 00:04:26 UTC 2009-04-19
Import patches-unapplied version 1:1.4.21.2~dfsg-3ubuntu2 to ubuntu/jaunty

Author: Fran├žois Marier
Author Date: 2009-03-29 04:45:27 UTC

Import patches-unapplied version 1:1.4.21.2~dfsg-3ubuntu2 to ubuntu/jaunty

Imported using git-ubuntu import.

Changelog parent: 695a3f1d6bb4265dc4050789996011b64c2493a7

New changelog entries:
  * Fix for IAX2 encrypted channels dropping out due to normal packet loss
    (LP: #350732)

applied/ubuntu/jaunty 2009-04-19 00:04:26 UTC 2009-04-19
Import patches-applied version 1:1.4.21.2~dfsg-3ubuntu2 to applied/ubuntu/jaunty

Author: Fran├žois Marier
Author Date: 2009-03-29 04:45:27 UTC

Import patches-applied version 1:1.4.21.2~dfsg-3ubuntu2 to applied/ubuntu/jaunty

Imported using git-ubuntu import.

Changelog parent: feb989a057354fbc9172e9ad613d66277cf6f399
Unapplied parent: 0dd43ad36cadf60d406a84a4694f73064d267c09

New changelog entries:
  * Fix for IAX2 encrypted channels dropping out due to normal packet loss
    (LP: #350732)

ubuntu/intrepid 2008-09-30 02:04:16 UTC 2008-09-30
Import patches-unapplied version 1:1.4.21.2~dfsg-1ubuntu3 to ubuntu/intrepid

Author: Thierry Carrez
Author Date: 2008-09-29 12:21:59 UTC

Import patches-unapplied version 1:1.4.21.2~dfsg-1ubuntu3 to ubuntu/intrepid

Imported using git-ubuntu import.

Changelog parent: 2795497b3da80e22fcc9f3727b89d693bccf92bd

New changelog entries:
  * debian/asterisk.init: Fix status action so that it returns the
    LSB-compliant return codes (LP: #248947)
  * debian/control: added lsb-base dependency for using status_of_proc

applied/ubuntu/intrepid 2008-09-30 02:04:16 UTC 2008-09-30
Import patches-applied version 1:1.4.21.2~dfsg-1ubuntu3 to applied/ubuntu/int...

Author: Thierry Carrez
Author Date: 2008-09-29 12:21:59 UTC

Import patches-applied version 1:1.4.21.2~dfsg-1ubuntu3 to applied/ubuntu/intrepid

Imported using git-ubuntu import.

Changelog parent: 3ea6be2e7445aef6ec0d1679c990378db11e5ad5
Unapplied parent: d7206e2231070907f607602890b2a3fb1863e555

New changelog entries:
  * debian/asterisk.init: Fix status action so that it returns the
    LSB-compliant return codes (LP: #248947)
  * debian/control: added lsb-base dependency for using status_of_proc

applied/ubuntu/hardy 2008-04-12 07:03:39 UTC 2008-04-12
Import patches-applied version 1:1.4.17~dfsg-2ubuntu1 to applied/ubuntu/hardy

Author: William Grant
Author Date: 2008-04-05 00:32:12 UTC

Import patches-applied version 1:1.4.17~dfsg-2ubuntu1 to applied/ubuntu/hardy

Imported using git-ubuntu import.

Changelog parent: 9ba6e0d537795a11d342eb1d33587154688e2fbd
Unapplied parent: 0aba44c7cf37a87cf5d111b096254cc96d656b67

New changelog entries:
  * SECURITY UPDATE: arbitrary code execution and authentication bypass.
    (LP: #210124)
    - debian/patches/CVE-2008-1289: Check that incoming RTP payloads are
      within buffer limits. Patch from Debian.
    - debian/patches/CVE-2008-1332: Ensure that allowguest has been enabled
      before deciding that authentication isn't required. Patch from Debian.
    - debian/patches/CVE-2008-1333: Interpret logging output as a character
      string, not a format string. Patch from Debian.
    - References:
      + CVE-2008-1289
      + CVE-2008-1332
      + CVE-2008-1333
      + AST-2008-002
      + AST-2008-003
      + AST-2008-004
  * Modify Maintainer value to match the DebianMaintainerField
    specification.

ubuntu/hardy 2008-04-12 07:03:39 UTC 2008-04-12
Import patches-unapplied version 1:1.4.17~dfsg-2ubuntu1 to ubuntu/hardy

Author: William Grant
Author Date: 2008-04-05 00:32:12 UTC

Import patches-unapplied version 1:1.4.17~dfsg-2ubuntu1 to ubuntu/hardy

Imported using git-ubuntu import.

Changelog parent: 0084db3d33dc5b2f1f694a35af6002caaeeaa045

New changelog entries:
  * SECURITY UPDATE: arbitrary code execution and authentication bypass.
    (LP: #210124)
    - debian/patches/CVE-2008-1289: Check that incoming RTP payloads are
      within buffer limits. Patch from Debian.
    - debian/patches/CVE-2008-1332: Ensure that allowguest has been enabled
      before deciding that authentication isn't required. Patch from Debian.
    - debian/patches/CVE-2008-1333: Interpret logging output as a character
      string, not a format string. Patch from Debian.
    - References:
      + CVE-2008-1289
      + CVE-2008-1332
      + CVE-2008-1333
      + AST-2008-002
      + AST-2008-003
      + AST-2008-004
  * Modify Maintainer value to match the DebianMaintainerField
    specification.

applied/ubuntu/gutsy-devel 2007-08-29 11:03:33 UTC 2007-08-29
Import patches-applied version 1:1.4.11~dfsg-1 to applied/ubuntu/gutsy

Author: Faidon Liambotis
Author Date: 2007-08-22 17:55:12 UTC

Import patches-applied version 1:1.4.11~dfsg-1 to applied/ubuntu/gutsy

Imported using git-ubuntu import.

Changelog parent: 261b5142658ede418453d75399d3e5551b7b51ba
Unapplied parent: f37c95f13b3ee3017e506a136b84cb9e60fbdc55

New changelog entries:
  [ Tzafrir Cohen ]
  * Remove libgtk2.0-dev from Build-Depends since the GTK+ console was not
    getting built anyway.
  [ Kilian Krause ]
  * Add dpkg-dev (>= 1.13.19) to Build-Depends for binary:Version and
    source:Version.
  [ Faidon Liambotis ]
  * New upstream release. (Closes: #439062)
    - AST-2007-020 Resource Exhaustion vulnerability in SIP channel driver
  * Switch to quilt as a patch management system instead of dpatch.
  * Add bristuff 0.4.0-test4
    - Split into smaller, individual patches (bristuff/).
    - Mention HFC-S/HFC-4S support in the Description.
    - Use libpri-bristuffed.so.1 and its respective header
      (use-libpri-bristuffed).
    - Ship xagi-test.c as an example.
    - Add a news item to NEWS.Debian stating bristuff's inclusion.
  * Major overhaul of the postinst scripts, completely replacing asterisk_fix.
    - Create Asterisk's directories on asterisk.dirs to track them using dpkg.
    - Add asterisk.postinst which calls adduser, chown, chmod. Improve error
      handling.
    - Don't do unnecessary stuff on asterisk-config postinst.
      (Closes: #431506)
    - chmod /etc/asterisk on build-time to allow the user to modify the
      permissions; this required a lintian override.
    - Honor dpkg-statoverride on all the chowned/chmoded directories and
      configuration files under /etc/asterisk.
    - Handle asterisk-config -> asterisk installation order properly
      (Closes: #408708)
    - Don't add asterisk user to audio and dialout groups if existed before.
      This allows the administrator to remove the membership.
    - Don't depend on adduser from asterisk-config.
  * Remove Suggests to gnomemeeting (it's a dummy package nowdays),
    asterisk-rate-engine and add one for twinkle.
  * Remove Conflicts for an old version of asterisk-oh323 which was only
    present until sarge.
  * Remove versioned dependencies on ancient (pre-sarge) versions of sed and
    adduser.
  * Patch channels/h323/ast_h323.cxx to add some missing PTRACING #ifdef
    (h323-add-missing-ptrace-guard).
  * h323-workaround-openh323-segfault patch: workaround a libopenh323 bug
    (#438815) which causes Asterisk to segfault on startup. (Closes: #435146)
  * Remove -XCVS from dh_installexamples arguments. Upstream doesn't use CVS
    anymore.
  * Add a README.Debian for asterisk-h323 that explains the differences
    between the different H.323 channel drivers, taken from the asterisk-oh323
    package.
  * Clarify asterisk-h323's description and mention the other channel drivers.
  * Suggest asterisk-h323 from asterisk.

ubuntu/gutsy 2007-08-29 11:03:33 UTC 2007-08-29
Import patches-unapplied version 1:1.4.11~dfsg-1 to ubuntu/gutsy

Author: Faidon Liambotis
Author Date: 2007-08-22 17:55:12 UTC

Import patches-unapplied version 1:1.4.11~dfsg-1 to ubuntu/gutsy

Imported using git-ubuntu import.

Changelog parent: 0ea4a31c6c3a222d24eb2f8611f5b14e05a4ab70

New changelog entries:
  [ Tzafrir Cohen ]
  * Remove libgtk2.0-dev from Build-Depends since the GTK+ console was not
    getting built anyway.
  [ Kilian Krause ]
  * Add dpkg-dev (>= 1.13.19) to Build-Depends for binary:Version and
    source:Version.
  [ Faidon Liambotis ]
  * New upstream release. (Closes: #439062)
    - AST-2007-020 Resource Exhaustion vulnerability in SIP channel driver
  * Switch to quilt as a patch management system instead of dpatch.
  * Add bristuff 0.4.0-test4
    - Split into smaller, individual patches (bristuff/).
    - Mention HFC-S/HFC-4S support in the Description.
    - Use libpri-bristuffed.so.1 and its respective header
      (use-libpri-bristuffed).
    - Ship xagi-test.c as an example.
    - Add a news item to NEWS.Debian stating bristuff's inclusion.
  * Major overhaul of the postinst scripts, completely replacing asterisk_fix.
    - Create Asterisk's directories on asterisk.dirs to track them using dpkg.
    - Add asterisk.postinst which calls adduser, chown, chmod. Improve error
      handling.
    - Don't do unnecessary stuff on asterisk-config postinst.
      (Closes: #431506)
    - chmod /etc/asterisk on build-time to allow the user to modify the
      permissions; this required a lintian override.
    - Honor dpkg-statoverride on all the chowned/chmoded directories and
      configuration files under /etc/asterisk.
    - Handle asterisk-config -> asterisk installation order properly
      (Closes: #408708)
    - Don't add asterisk user to audio and dialout groups if existed before.
      This allows the administrator to remove the membership.
    - Don't depend on adduser from asterisk-config.
  * Remove Suggests to gnomemeeting (it's a dummy package nowdays),
    asterisk-rate-engine and add one for twinkle.
  * Remove Conflicts for an old version of asterisk-oh323 which was only
    present until sarge.
  * Remove versioned dependencies on ancient (pre-sarge) versions of sed and
    adduser.
  * Patch channels/h323/ast_h323.cxx to add some missing PTRACING #ifdef
    (h323-add-missing-ptrace-guard).
  * h323-workaround-openh323-segfault patch: workaround a libopenh323 bug
    (#438815) which causes Asterisk to segfault on startup. (Closes: #435146)
  * Remove -XCVS from dh_installexamples arguments. Upstream doesn't use CVS
    anymore.
  * Add a README.Debian for asterisk-h323 that explains the differences
    between the different H.323 channel drivers, taken from the asterisk-oh323
    package.
  * Clarify asterisk-h323's description and mention the other channel drivers.
  * Suggest asterisk-h323 from asterisk.

ubuntu/gutsy-devel 2007-08-29 11:03:33 UTC 2007-08-29
Import patches-unapplied version 1:1.4.11~dfsg-1 to ubuntu/gutsy

Author: Faidon Liambotis
Author Date: 2007-08-22 17:55:12 UTC

Import patches-unapplied version 1:1.4.11~dfsg-1 to ubuntu/gutsy

Imported using git-ubuntu import.

Changelog parent: 0ea4a31c6c3a222d24eb2f8611f5b14e05a4ab70

New changelog entries:
  [ Tzafrir Cohen ]
  * Remove libgtk2.0-dev from Build-Depends since the GTK+ console was not
    getting built anyway.
  [ Kilian Krause ]
  * Add dpkg-dev (>= 1.13.19) to Build-Depends for binary:Version and
    source:Version.
  [ Faidon Liambotis ]
  * New upstream release. (Closes: #439062)
    - AST-2007-020 Resource Exhaustion vulnerability in SIP channel driver
  * Switch to quilt as a patch management system instead of dpatch.
  * Add bristuff 0.4.0-test4
    - Split into smaller, individual patches (bristuff/).
    - Mention HFC-S/HFC-4S support in the Description.
    - Use libpri-bristuffed.so.1 and its respective header
      (use-libpri-bristuffed).
    - Ship xagi-test.c as an example.
    - Add a news item to NEWS.Debian stating bristuff's inclusion.
  * Major overhaul of the postinst scripts, completely replacing asterisk_fix.
    - Create Asterisk's directories on asterisk.dirs to track them using dpkg.
    - Add asterisk.postinst which calls adduser, chown, chmod. Improve error
      handling.
    - Don't do unnecessary stuff on asterisk-config postinst.
      (Closes: #431506)
    - chmod /etc/asterisk on build-time to allow the user to modify the
      permissions; this required a lintian override.
    - Honor dpkg-statoverride on all the chowned/chmoded directories and
      configuration files under /etc/asterisk.
    - Handle asterisk-config -> asterisk installation order properly
      (Closes: #408708)
    - Don't add asterisk user to audio and dialout groups if existed before.
      This allows the administrator to remove the membership.
    - Don't depend on adduser from asterisk-config.
  * Remove Suggests to gnomemeeting (it's a dummy package nowdays),
    asterisk-rate-engine and add one for twinkle.
  * Remove Conflicts for an old version of asterisk-oh323 which was only
    present until sarge.
  * Remove versioned dependencies on ancient (pre-sarge) versions of sed and
    adduser.
  * Patch channels/h323/ast_h323.cxx to add some missing PTRACING #ifdef
    (h323-add-missing-ptrace-guard).
  * h323-workaround-openh323-segfault patch: workaround a libopenh323 bug
    (#438815) which causes Asterisk to segfault on startup. (Closes: #435146)
  * Remove -XCVS from dh_installexamples arguments. Upstream doesn't use CVS
    anymore.
  * Add a README.Debian for asterisk-h323 that explains the differences
    between the different H.323 channel drivers, taken from the asterisk-oh323
    package.
  * Clarify asterisk-h323's description and mention the other channel drivers.
  * Suggest asterisk-h323 from asterisk.

applied/ubuntu/gutsy 2007-08-29 11:03:33 UTC 2007-08-29
Import patches-applied version 1:1.4.11~dfsg-1 to applied/ubuntu/gutsy

Author: Faidon Liambotis
Author Date: 2007-08-22 17:55:12 UTC

Import patches-applied version 1:1.4.11~dfsg-1 to applied/ubuntu/gutsy

Imported using git-ubuntu import.

Changelog parent: 261b5142658ede418453d75399d3e5551b7b51ba
Unapplied parent: f37c95f13b3ee3017e506a136b84cb9e60fbdc55

New changelog entries:
  [ Tzafrir Cohen ]
  * Remove libgtk2.0-dev from Build-Depends since the GTK+ console was not
    getting built anyway.
  [ Kilian Krause ]
  * Add dpkg-dev (>= 1.13.19) to Build-Depends for binary:Version and
    source:Version.
  [ Faidon Liambotis ]
  * New upstream release. (Closes: #439062)
    - AST-2007-020 Resource Exhaustion vulnerability in SIP channel driver
  * Switch to quilt as a patch management system instead of dpatch.
  * Add bristuff 0.4.0-test4
    - Split into smaller, individual patches (bristuff/).
    - Mention HFC-S/HFC-4S support in the Description.
    - Use libpri-bristuffed.so.1 and its respective header
      (use-libpri-bristuffed).
    - Ship xagi-test.c as an example.
    - Add a news item to NEWS.Debian stating bristuff's inclusion.
  * Major overhaul of the postinst scripts, completely replacing asterisk_fix.
    - Create Asterisk's directories on asterisk.dirs to track them using dpkg.
    - Add asterisk.postinst which calls adduser, chown, chmod. Improve error
      handling.
    - Don't do unnecessary stuff on asterisk-config postinst.
      (Closes: #431506)
    - chmod /etc/asterisk on build-time to allow the user to modify the
      permissions; this required a lintian override.
    - Honor dpkg-statoverride on all the chowned/chmoded directories and
      configuration files under /etc/asterisk.
    - Handle asterisk-config -> asterisk installation order properly
      (Closes: #408708)
    - Don't add asterisk user to audio and dialout groups if existed before.
      This allows the administrator to remove the membership.
    - Don't depend on adduser from asterisk-config.
  * Remove Suggests to gnomemeeting (it's a dummy package nowdays),
    asterisk-rate-engine and add one for twinkle.
  * Remove Conflicts for an old version of asterisk-oh323 which was only
    present until sarge.
  * Remove versioned dependencies on ancient (pre-sarge) versions of sed and
    adduser.
  * Patch channels/h323/ast_h323.cxx to add some missing PTRACING #ifdef
    (h323-add-missing-ptrace-guard).
  * h323-workaround-openh323-segfault patch: workaround a libopenh323 bug
    (#438815) which causes Asterisk to segfault on startup. (Closes: #435146)
  * Remove -XCVS from dh_installexamples arguments. Upstream doesn't use CVS
    anymore.
  * Add a README.Debian for asterisk-h323 that explains the differences
    between the different H.323 channel drivers, taken from the asterisk-oh323
    package.
  * Clarify asterisk-h323's description and mention the other channel drivers.
  * Suggest asterisk-h323 from asterisk.

applied/ubuntu/feisty-devel 2007-05-24 22:03:25 UTC 2007-05-24
Import patches-applied version 1:1.2.16~dfsg-1ubuntu3.1 to applied/ubuntu/fei...

Author: pirast
Author Date: 2007-04-28 12:34:02 UTC

Import patches-applied version 1:1.2.16~dfsg-1ubuntu3.1 to applied/ubuntu/feisty-security

Imported using git-ubuntu import.

Changelog parent: 08de78075c00d8de632346b884942d9c1afc8542
Unapplied parent: 29d7073b893f732d44a01ba4827ff029814e568d

New changelog entries:
  * SECURITY UPDATE: Fix ASA-2007-011 and ASA-2007-012
  * Add ASA-2007-011+012.dpatch: upstream fixes.
  * References:
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053967.html
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053968.html
    CVE-2007-2294 CVE-2007-2297

ubuntu/feisty-updates 2007-05-24 22:03:25 UTC 2007-05-24
Import patches-unapplied version 1:1.2.16~dfsg-1ubuntu3.1 to ubuntu/feisty-se...

Author: pirast
Author Date: 2007-04-28 12:34:02 UTC

Import patches-unapplied version 1:1.2.16~dfsg-1ubuntu3.1 to ubuntu/feisty-security

Imported using git-ubuntu import.

Changelog parent: 52805280eb5aade79200e4cd34906a9394a6d00b

New changelog entries:
  * SECURITY UPDATE: Fix ASA-2007-011 and ASA-2007-012
  * Add ASA-2007-011+012.dpatch: upstream fixes.
  * References:
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053967.html
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053968.html
    CVE-2007-2294 CVE-2007-2297

ubuntu/feisty-security 2007-05-24 22:03:25 UTC 2007-05-24
Import patches-unapplied version 1:1.2.16~dfsg-1ubuntu3.1 to ubuntu/feisty-se...

Author: pirast
Author Date: 2007-04-28 12:34:02 UTC

Import patches-unapplied version 1:1.2.16~dfsg-1ubuntu3.1 to ubuntu/feisty-security

Imported using git-ubuntu import.

Changelog parent: 52805280eb5aade79200e4cd34906a9394a6d00b

New changelog entries:
  * SECURITY UPDATE: Fix ASA-2007-011 and ASA-2007-012
  * Add ASA-2007-011+012.dpatch: upstream fixes.
  * References:
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053967.html
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053968.html
    CVE-2007-2294 CVE-2007-2297

ubuntu/feisty-devel 2007-05-24 22:03:25 UTC 2007-05-24
Import patches-unapplied version 1:1.2.16~dfsg-1ubuntu3.1 to ubuntu/feisty-se...

Author: pirast
Author Date: 2007-04-28 12:34:02 UTC

Import patches-unapplied version 1:1.2.16~dfsg-1ubuntu3.1 to ubuntu/feisty-security

Imported using git-ubuntu import.

Changelog parent: 52805280eb5aade79200e4cd34906a9394a6d00b

New changelog entries:
  * SECURITY UPDATE: Fix ASA-2007-011 and ASA-2007-012
  * Add ASA-2007-011+012.dpatch: upstream fixes.
  * References:
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053967.html
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053968.html
    CVE-2007-2294 CVE-2007-2297

ubuntu/edgy-updates 2007-05-24 22:03:25 UTC 2007-05-24
Import patches-unapplied version 1:1.2.12.1.dfsg-1ubuntu1.4 to ubuntu/edgy-se...

Author: pirast
Author Date: 2007-04-28 12:46:52 UTC

Import patches-unapplied version 1:1.2.12.1.dfsg-1ubuntu1.4 to ubuntu/edgy-security

Imported using git-ubuntu import.

Changelog parent: 5491f405acfb7cf10407fa44b8c2a1154f1a88ab

New changelog entries:
  * SECURITY UPDATE: Fix ASA-2007-011 and ASA-2007-012
  * Add ASA-2007-011+012.dpatch: upstream fixes.
  * References:
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053967.html
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053968.html
    CVE-2007-2294 CVE-2007-2297

ubuntu/edgy-security 2007-05-24 22:03:25 UTC 2007-05-24
Import patches-unapplied version 1:1.2.12.1.dfsg-1ubuntu1.4 to ubuntu/edgy-se...

Author: pirast
Author Date: 2007-04-28 12:46:52 UTC

Import patches-unapplied version 1:1.2.12.1.dfsg-1ubuntu1.4 to ubuntu/edgy-security

Imported using git-ubuntu import.

Changelog parent: 5491f405acfb7cf10407fa44b8c2a1154f1a88ab

New changelog entries:
  * SECURITY UPDATE: Fix ASA-2007-011 and ASA-2007-012
  * Add ASA-2007-011+012.dpatch: upstream fixes.
  * References:
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053967.html
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053968.html
    CVE-2007-2294 CVE-2007-2297

ubuntu/edgy-devel 2007-05-24 22:03:25 UTC 2007-05-24
Import patches-unapplied version 1:1.2.12.1.dfsg-1ubuntu1.4 to ubuntu/edgy-se...

Author: pirast
Author Date: 2007-04-28 12:46:52 UTC

Import patches-unapplied version 1:1.2.12.1.dfsg-1ubuntu1.4 to ubuntu/edgy-security

Imported using git-ubuntu import.

Changelog parent: 5491f405acfb7cf10407fa44b8c2a1154f1a88ab

New changelog entries:
  * SECURITY UPDATE: Fix ASA-2007-011 and ASA-2007-012
  * Add ASA-2007-011+012.dpatch: upstream fixes.
  * References:
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053967.html
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053968.html
    CVE-2007-2294 CVE-2007-2297

applied/ubuntu/feisty-updates 2007-05-24 22:03:25 UTC 2007-05-24
Import patches-applied version 1:1.2.16~dfsg-1ubuntu3.1 to applied/ubuntu/fei...

Author: pirast
Author Date: 2007-04-28 12:34:02 UTC

Import patches-applied version 1:1.2.16~dfsg-1ubuntu3.1 to applied/ubuntu/feisty-security

Imported using git-ubuntu import.

Changelog parent: 08de78075c00d8de632346b884942d9c1afc8542
Unapplied parent: 29d7073b893f732d44a01ba4827ff029814e568d

New changelog entries:
  * SECURITY UPDATE: Fix ASA-2007-011 and ASA-2007-012
  * Add ASA-2007-011+012.dpatch: upstream fixes.
  * References:
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053967.html
    http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053968.html
    CVE-2007-2294 CVE-2007-2297

101200 of 228 results

Other repositories

Name Last Modified
lp:ubuntu/+source/asterisk 2020-02-18
lp:~ddstreet/ubuntu/+source/asterisk 2019-08-29
12 of 2 results
You can't create new repositories for asterisk in Ubuntu.