The following Fedora EPEL 6 Security updates need testing:
https://admin.fedoraproject.org/updates/asterisk-1.8.4.4-1.el6
https://admin.fedoraproject.org/updates/drupal7-7.4-1.el6
https://admin.fedoraproject.org/updates/wordpress-3.1.4-1.el6
https://admin.fedoraproject.org/updates/dokuwiki-0-0.8.20110525.a.el6
https://admin.fedoraproject.org/updates/mingw32-libpng-1.2.37-3.el6
https://admin.fedoraproject.org/updates/libpng10-1.0.54-3.el6
https://admin.fedoraproject.org/updates/libmodplug-0.8.8.3-2.el6
https://admin.fedoraproject.org/updates/ejabberd-2.1.8-2.el6
https://admin.fedoraproject.org/updates/erlang-R14B-02.1.el6
The following builds have been pushed to Fedora EPEL 6 updates-testing
asterisk-1.8.4.4-1.el6
drupal6-6.22-3.el6
drupal6-feeds-1.0-0.6.beta11.el6
drupal7-7.4-1.el6
naev-0.5.0-3.el6
naev-data-0.5.0-4.el6
python-taboot-0.3.0-1.el6
root-5.28.00e-2.el6
rubygem-gem2rpm-0.7.1-1.el6
swatch-3.2.3-2.el6
wordpress-3.1.4-1.el6
Details about builds:
================================================================================
asterisk-1.8.4.4-1.el6 (FEDORA-EPEL-2011-3678)
The Open Source PBX
--------------------------------------------------------------------------------
Update Information:
The Asterisk Development Team has announced the release of Asterisk versions
1.4.41.2, 1.6.2.18.2, and 1.8.4.4, which are security releases.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of Asterisk 1.4.41.2, 1.6.2.18.2, and 1.8.4.4 resolves the
following issue:
AST-2011-011: Asterisk may respond differently to SIP requests from an
invalid SIP user than it does to a user configured on the system, even when the
alwaysauthreject option is set in the configuration. This can leak information
about what SIP users are valid on the Asterisk system.
For more information about the details of this vulnerability, please read
the security advisory AST-2011-011, which was released at the same time as this
announcement.
For a full list of changes in the current releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
Security advisory AST-2011-011 is available at:
http://downloads.asterisk.org/pub/security/AST-2011-011.pdf
The Asterisk Development Team has announced the release of Asterisk versions
1.4.41.1, 1.6.2.18.1, and 1.8.4.3, which are security releases.
These releases are available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of Asterisk 1.4.41.1, 1.6.2.18, and 1.8.4.3 resolves several issues
as outlined below:
* AST-2011-008: If a remote user sends a SIP packet containing a null,
Asterisk assumes available data extends past the null to the
end of the packet when the buffer is actually truncated when
copied. This causes SIP header parsing to modify data past
the end of the buffer altering unrelated memory structures.
This vulnerability does not affect TCP/TLS connections.
-- Resolved in 1.6.2.18.1 and 1.8.4.3
* AST-2011-009: A remote user sending a SIP packet containing a Contact header
with a missing left angle bracket (<) causes Asterisk to
access a null pointer.
-- Resolved in 1.8.4.3
* AST-2011-010: A memory address was inadvertently transmitted over the
network via IAX2 via an option control frame and the remote party would try
to access it.
-- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3
The issues and resolutions are described in the AST-2011-008, AST-2011-009, and
AST-2011-010 security advisories.
For more information about the details of these vulnerabilities, please read
the security advisories AST-2011-008, AST-2011-009, and AST-2011-010, which were
released at the same time as this announcement.
For a full list of changes in the current releases, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
Security advisories AST-2011-008, AST-2011-009, and AST-2011-010 are available
at:
http://downloads.asterisk.org/pub/security/AST-2011-008.pdf
http://downloads.asterisk.org/pub/security/AST-2011-009.pdf
http://downloads.asterisk.org/pub/security/AST-2011-010.pdf
The Asterisk Development Team has announced the release of Asterisk
version 1.8.4.2, which is a security release for Asterisk 1.8.
This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/releases
The release of Asterisk 1.8.4.2 resolves an issue with SIP URI
parsing which can lead to a remotely exploitable crash:
Remote Crash Vulnerability in SIP channel driver (AST-2011-007)
The issue and resolution is described in the AST-2011-007 security
advisory.
For more information about the details of this vulnerability, please
read the security advisory AST-2011-007, which was released at the
same time as this announcement.
For a full list of changes in the current release, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
Security advisory AST-2011-007 is available at:
http://downloads.asterisk.org/pub/security/AST-2011-007.pdf
The Asterisk Development Team has announced the release of Asterisk 1.8.4.1.
This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/
The release of Asterisk 1.8.4.1 resolves several issues reported by the
community. Without your help this release would not have been possible.
Thank you!
Below is a list of issues resolved in this release:
* Fix our compliance with RFC 3261 section 18.2.2. (aka Cisco phone fix)
(Closes issue #18951. Reported by jmls. Patched by wdoekes)
* Resolve a change in IPv6 header parsing due to the Cisco phone fix issue.
This issue was found and reported by the Asterisk test suite.
(Closes issue #18951. Patched by mnicholson)
* Resolve potential crash when using SIP TLS support.
(Closes issue #19192. Reported by stknob. Patched by Chainsaw. Tested by
vois, Chainsaw)
* Improve reliability when using SIP TLS.
(Closes issue #19182. Reported by st. Patched by mnicholson)
For a full list of changes in this release candidate, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4.1
The Asterisk Development Team has announced the release of Asterisk 1.8.4. This
release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/
The release of Asterisk 1.8.4 resolves several issues reported by the community.
Without your help this release would not have been possible. Thank you!
Below is a sample of the issues resolved in this release:
* Use SSLv23_client_method instead of old SSLv2 only.
(Closes issue #19095, #19138. Reported, patched by tzafrir. Tested by russell
and chazzam.
* Resolve crash in ast_mutex_init()
(Patched by twilson)
* Resolution of several DTMF based attended transfer issues.
(Closes issue #17999, #17096, #18395, #17273. Reported by iskatel, gelo,
shihchuan, grecco. Patched by rmudgett)
NOTE: Be sure to read the ChangeLog for more information about these changes.
* Resolve deadlocks related to device states in chan_sip
(Closes issue #18310. Reported, patched by one47. Patched by jpeeler)
* Resolve an issue with the Asterisk manager interface leaking memory when
disabled.
(Reported internally by kmorgan. Patched by russellb)
* Support greetingsfolder as documented in voicemail.conf.sample.
(Closes issue #17870. Reported by edhorton. Patched by seanbright)
* Fix channel redirect out of MeetMe() and other issues with channel softhangup
(Closes issue #18585. Reported by oej. Tested by oej, wedhorn, russellb.
Patched by russellb)
* Fix voicemail sequencing for file based storage.
(Closes issue #18498, #18486. Reported by JJCinAZ, bluefox. Patched by
jpeeler)
* Set hangup cause in local_hangup so the proper return code of 486 instead of
503 when using Local channels when the far sides returns a busy. Also affects
CCSS in Asterisk 1.8+.
(Patched by twilson)
* Fix issues with verbose messages not being output to the console.
(Closes issue #18580. Reported by pabelanger. Patched by qwell)
* Fix Deadlock with attended transfer of SIP call
(Closes issue #18837. Reported, patched by alecdavis. Tested by
alecdavid, Irontec, ZX81, cmaj)
Includes changes per AST-2011-005 and AST-2011-006
For a full list of changes in this release candidate, please see the ChangeLog:
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4
Information about the security releases are available at:
http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf
--------------------------------------------------------------------------------
ChangeLog:
* Wed Jun 29 2011 Jeffrey C. Ollie <jeff(a)ocjtech.us> - 1.8.4.4-1
- The Asterisk Development Team has announced the release of Asterisk
- versions 1.4.41.2, 1.6.2.18.2, and 1.8.4.4, which are security
- releases.
-
- These releases are available for immediate download at
-
http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of Asterisk 1.4.41.2, 1.6.2.18.2, and 1.8.4.4 resolves the
- following issue:
-
- AST-2011-011: Asterisk may respond differently to SIP requests from an
- invalid SIP user than it does to a user configured on the system, even
- when the alwaysauthreject option is set in the configuration. This can
- leak information about what SIP users are valid on the Asterisk
- system.
-
- For more information about the details of this vulnerability, please
- read the security advisory AST-2011-011, which was released at the
- same time as this announcement.
-
- For a full list of changes in the current releases, please see the ChangeLog:
-
-
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
-
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
-
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
-
- Security advisory AST-2011-011 is available at:
-
-
http://downloads.asterisk.org/pub/security/AST-2011-011.pdf
* Mon Jun 27 2011 Jeffrey C. Ollie <jeff(a)ocjtech.us> - 1.8.4.3-3
- Don't forget stereorize
* Mon Jun 27 2011 Jeffrey C. Ollie <jeff(a)ocjtech.us> - 1.8.4.3-2
- Move /var/run/asterisk to /run/asterisk
- Add comments to systemd service file on how to mimic safe_asterisk functionality
- Build more of the optional binaries
- Install the tmpfiles.d configuration on Fedora 15
* Fri Jun 24 2011 Jeffrey C. Ollie <jeff(a)ocjtech.us> - 1.8.4.3-1
- The Asterisk Development Team has announced the release of Asterisk versions
- 1.4.41.1, 1.6.2.18.1, and 1.8.4.3, which are security releases.
-
- These releases are available for immediate download at
-
http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of Asterisk 1.4.41.1, 1.6.2.18, and 1.8.4.3 resolves several issues
- as outlined below:
-
- * AST-2011-008: If a remote user sends a SIP packet containing a null,
- Asterisk assumes available data extends past the null to the
- end of the packet when the buffer is actually truncated when
- copied. This causes SIP header parsing to modify data past
- the end of the buffer altering unrelated memory structures.
- This vulnerability does not affect TCP/TLS connections.
- -- Resolved in 1.6.2.18.1 and 1.8.4.3
-
- * AST-2011-009: A remote user sending a SIP packet containing a Contact header
- with a missing left angle bracket (<) causes Asterisk to
- access a null pointer.
- -- Resolved in 1.8.4.3
-
- * AST-2011-010: A memory address was inadvertently transmitted over the
- network via IAX2 via an option control frame and the remote party would try
- to access it.
- -- Resolved in 1.4.41.1, 1.6.2.18.1, and 1.8.4.3
-
- The issues and resolutions are described in the AST-2011-008, AST-2011-009, and
- AST-2011-010 security advisories.
-
- For more information about the details of these vulnerabilities, please read
- the security advisories AST-2011-008, AST-2011-009, and AST-2011-010, which were
- released at the same time as this announcement.
-
- For a full list of changes in the current releases, please see the ChangeLog:
-
-
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
-
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
-
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
-
- Security advisories AST-2011-008, AST-2011-009, and AST-2011-010 are available
- at:
-
-
http://downloads.asterisk.org/pub/security/AST-2011-008.pdf
-
http://downloads.asterisk.org/pub/security/AST-2011-009.pdf
-
http://downloads.asterisk.org/pub/security/AST-2011-010.pdf
* Tue Jun 21 2011 Jeffrey C. Ollie <jeff(a)ocjtech.us> - 1.8.4.2-2
- Convert to systemd
* Fri Jun 17 2011 Marcela Mašláňová <mmaslano(a)redhat.com> - 1.8.4.2-1.2
- Perl mass rebuild
* Fri Jun 10 2011 Marcela Mašláňová <mmaslano(a)redhat.com> - 1.8.4.2-1.1
- Perl 5.14 mass rebuild
* Fri Jun 3 2011 Jeffrey C. Ollie <jeff(a)ocjtech.us> - 1.8.4.2-1:
-
- The Asterisk Development Team has announced the release of Asterisk
- version 1.8.4.2, which is a security release for Asterisk 1.8.
-
- This release is available for immediate download at
-
http://downloads.asterisk.org/pub/telephony/asterisk/releases
-
- The release of Asterisk 1.8.4.2 resolves an issue with SIP URI
- parsing which can lead to a remotely exploitable crash:
-
- Remote Crash Vulnerability in SIP channel driver (AST-2011-007)
-
- The issue and resolution is described in the AST-2011-007 security
- advisory.
-
- For more information about the details of this vulnerability, please
- read the security advisory AST-2011-007, which was released at the
- same time as this announcement.
-
- For a full list of changes in the current release, please see the ChangeLog:
-
-
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1...
-
- Security advisory AST-2011-007 is available at:
-
-
http://downloads.asterisk.org/pub/security/AST-2011-007.pdf
-
- The Asterisk Development Team has announced the release of Asterisk 1.8.4.1.
- This release is available for immediate download at
-
http://downloads.asterisk.org/pub/telephony/asterisk/
-
- The release of Asterisk 1.8.4.1 resolves several issues reported by the
- community. Without your help this release would not have been possible.
- Thank you!
-
- Below is a list of issues resolved in this release:
-
- * Fix our compliance with RFC 3261 section 18.2.2. (aka Cisco phone fix)
- (Closes issue #18951. Reported by jmls. Patched by wdoekes)
-
- * Resolve a change in IPv6 header parsing due to the Cisco phone fix issue.
- This issue was found and reported by the Asterisk test suite.
- (Closes issue #18951. Patched by mnicholson)
-
- * Resolve potential crash when using SIP TLS support.
- (Closes issue #19192. Reported by stknob. Patched by Chainsaw. Tested by
- vois, Chainsaw)
-
- * Improve reliability when using SIP TLS.
- (Closes issue #19182. Reported by st. Patched by mnicholson)
-
-
- For a full list of changes in this release candidate, please see the ChangeLog:
-
-
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4.1
- The Asterisk Development Team has announced the release of Asterisk 1.8.4. This
- release is available for immediate download at
-
http://downloads.asterisk.org/pub/telephony/asterisk/
-
- The release of Asterisk 1.8.4 resolves several issues reported by the community.
- Without your help this release would not have been possible. Thank you!
-
- Below is a sample of the issues resolved in this release:
-
- * Use SSLv23_client_method instead of old SSLv2 only.
- (Closes issue #19095, #19138. Reported, patched by tzafrir. Tested by russell
- and chazzam.
-
- * Resolve crash in ast_mutex_init()
- (Patched by twilson)
-
- * Resolution of several DTMF based attended transfer issues.
- (Closes issue #17999, #17096, #18395, #17273. Reported by iskatel, gelo,
- shihchuan, grecco. Patched by rmudgett)
-
- NOTE: Be sure to read the ChangeLog for more information about these changes.
-
- * Resolve deadlocks related to device states in chan_sip
- (Closes issue #18310. Reported, patched by one47. Patched by jpeeler)
-
- * Resolve an issue with the Asterisk manager interface leaking memory when
- disabled.
- (Reported internally by kmorgan. Patched by russellb)
-
- * Support greetingsfolder as documented in voicemail.conf.sample.
- (Closes issue #17870. Reported by edhorton. Patched by seanbright)
-
- * Fix channel redirect out of MeetMe() and other issues with channel softhangup
- (Closes issue #18585. Reported by oej. Tested by oej, wedhorn, russellb.
- Patched by russellb)
-
- * Fix voicemail sequencing for file based storage.
- (Closes issue #18498, #18486. Reported by JJCinAZ, bluefox. Patched by
- jpeeler)
-
- * Set hangup cause in local_hangup so the proper return code of 486 instead of
- 503 when using Local channels when the far sides returns a busy. Also affects
- CCSS in Asterisk 1.8+.
- (Patched by twilson)
-
- * Fix issues with verbose messages not being output to the console.
- (Closes issue #18580. Reported by pabelanger. Patched by qwell)
-
- * Fix Deadlock with attended transfer of SIP call
- (Closes issue #18837. Reported, patched by alecdavis. Tested by
- alecdavid, Irontec, ZX81, cmaj)
-
- Includes changes per AST-2011-005 and AST-2011-006
- For a full list of changes in this release candidate, please see the ChangeLog:
-
-
http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.4
-
- Information about the security releases are available at:
-
-
http://downloads.asterisk.org/pub/security/AST-2011-005.pdf
-
http://downloads.asterisk.org/pub/security/AST-2011-006.pdf
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #710441 - CVE-2011-2216 Asterisk: Remote DoS (crash) in SIP channel driver
(AST-2011-007)
https://bugzilla.redhat.com/show_bug.cgi?id=710441
--------------------------------------------------------------------------------
================================================================================
drupal6-6.22-3.el6 (FEDORA-EPEL-2011-3674)
An open-source content-management platform
--------------------------------------------------------------------------------
Update Information:
Removes spurious dirs in /etc/drupal6 to avoid confusion.
--------------------------------------------------------------------------------
ChangeLog:
* Thu Jun 30 2011 Jon Ciesla <limb(a)jcomserv.net> - 6.22-3
- Drop unneeded dirs in /etc/drupal6, BZ 706735.
* Fri Jun 17 2011 Jon Ciesla <limb(a)jcomserv.net> - 6.22-2
- Bump and rebuild for BZ 712251.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #706735 - Put modules and themes directories under /etc/drupal6/all/
https://bugzilla.redhat.com/show_bug.cgi?id=706735
--------------------------------------------------------------------------------
================================================================================
drupal6-feeds-1.0-0.6.beta11.el6 (FEDORA-EPEL-2011-3684)
An import and aggregation framework for Drupal
--------------------------------------------------------------------------------
Update Information:
New upstream version.
--------------------------------------------------------------------------------
ChangeLog:
* Thu Jun 30 2011 Peter Borsa <peter.borsa(a)gmail.com> - 1.0-0.6.beta11
- Fixed release number in the spec file.
* Thu Jun 30 2011 Peter Borsa <peter.borsa(a)gmail.com> - 1.0-0.1.beta11
- New upstream version.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #717587 - drupal6-feeds-1.0-beta11 is available
https://bugzilla.redhat.com/show_bug.cgi?id=717587
--------------------------------------------------------------------------------
================================================================================
drupal7-7.4-1.el6 (FEDORA-EPEL-2011-3672)
An open-source content-management platform
--------------------------------------------------------------------------------
Update Information:
Remember to log in as user 1 prior to the RPM update, to perform the DB upgrade via
http://yoursite/update.php.
* Advisory ID: DRUPAL-SA-CORE-2011-002
* Project: Drupal core [1]
* Version: 7.x
* Date: 2011-JUNE-29
* Security risk: Highly critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
.... Access bypass in node listings
Listings showing nodes but not JOINing the node table show all nodes
regardless of restrictions imposed by the node_access system. In core, this
affects the taxonomy and the forum subsystem.
Note that fixing this issue in contributed modules requires a
backwards-compatible API change for modules listing nodes. See
http://drupal.org/node/1204572 [3] for more details.
This issue affects Drupal 7.x only.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Drupal 7.0, 7.1 and 7.2.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you are running Drupal 7.x then upgrade to Drupal 7.3 or 7.4.
The Security Team has released both a pure security update without other bug
fixes and a security update combined with other bug fixes and improvements.
You can choose to either only include the security update for an immediate
fix (which might require less quality assurance and testing) or more fixes
and improvements alongside the security fixes by choosing between Drupal 7.3
and Drupal 7.4. Read the announcement [4] for more information.
See also the Drupal core [5] project page.
-------- REPORTED BY
---------------------------------------------------------
* The access bypass was reported independently by numerous people, including
Sascha Grossenbacher [6], Khaled Alhourani [7], and Ben Ford [8].
-------- FIXED BY
------------------------------------------------------------
* The access bypass was fixed by Károly Négyesi [9], member of the Drupal
security team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at
drupal.org or via the
contact form at
http://drupal.org/contact [10].
Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].
[1]
http://drupal.org/project/drupal
[2]
http://drupal.org/security-team/risk-levels
[3]
http://drupal.org/node/1204572
[4]
http://drupal.org/drupal-7.4
[5]
http://drupal.org/project/drupal
[6]
http://drupal.org/user/214652
[7]
http://drupal.org/user/265439
[8]
http://drupal.org/user/12534
[9]
http://drupal.org/user/9446
[10]
http://drupal.org/contact
[11]
http://drupal.org/security-team
[12]
http://drupal.org/writing-secure-code
[13]
http://drupal.org/security/secure-configuration
--------------------------------------------------------------------------------
ChangeLog:
* Thu Jun 30 2011 Jon Ciesla <limb(a)jcomserv.net> - 7.4-1
- New upstream, SA-CORE-2011-002, BZ 717874.
- Dropped unused dirs in /etc/drupal7/, BZ 703736.
* Fri Jun 17 2011 Jon Ciesla <limb(a)jcomserv.net> - 7.2-2
- Bump and rebuild for BZ 712251.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #717874 - Remote access bypass vulnerability in Drupal 7
https://bugzilla.redhat.com/show_bug.cgi?id=717874
[ 2 ] Bug #706736 - Put modules and themes directories under /etc/drupal7/all/
https://bugzilla.redhat.com/show_bug.cgi?id=706736
--------------------------------------------------------------------------------
================================================================================
naev-0.5.0-3.el6 (FEDORA-EPEL-2011-3673)
2d action, RPG space game
--------------------------------------------------------------------------------
Update Information:
First release in Fedora package collection.
--------------------------------------------------------------------------------
================================================================================
naev-data-0.5.0-4.el6 (FEDORA-EPEL-2011-3673)
Data files for NAEV
--------------------------------------------------------------------------------
Update Information:
First release in Fedora package collection.
--------------------------------------------------------------------------------
================================================================================
python-taboot-0.3.0-1.el6 (FEDORA-EPEL-2011-3677)
Client utility for scripted multi-system administration over Func
--------------------------------------------------------------------------------
Update Information:
Fixed #13 - Generate HTML versions of the man pages
Fixed #6, #7, #11, #12 - Updated the Nagios task completely to use the native Func Nagios
module
Fixed #17 - sleep.Minutes not printing correct status message
Fixed #20 - Be more helpful when YAML fails to load
Fixed #22 - Taboots not processing YAML files with multiple documents inside
Fixed #15 - Die gracefully when processing bad CLI options
--------------------------------------------------------------------------------
ChangeLog:
* Thu Jun 23 2011 Tim Bielawa <tbielawa(a)redhat.com> 0.3.0-1
- Update version. 0.3.0. If Linux can do it -- so can we. (tbielawa(a)redhat.com)
- Now included in EPEL and Fedora. Fixes #9 (tbielawa(a)redhat.com)
- Correct a lot of spelling errors. Fixes #23 (Taboot maintainer has atrocious
spelling) (tbielawa(a)redhat.com)
- Correctly handle YAML files with multiple YAML documents inside. Fixes #22
(tbielawa(a)redhat.com)
- Better YAML loading debugging. Fixes #20 (tbielawa(a)redhat.com)
- Handle bad CLI options gracefully. Fixes #15 (tbielawa(a)redhat.com)
- Modify patch from jdetiber. Fixes #17 - sleep.Minutes not printing correct
status message (tbielawa(a)redhat.com)
- Updated output for sleep.Minutes (jason.detiberus(a)redhat.com)
- Update man page (tbielawa(a)redhat.com)
- Update taboot-tasks manpage (tbielawa(a)redhat.com)
- Make HOST the default for downtime scheduling again (tbielawa(a)redhat.com)
- Updating Nagios task docs (tbielawa(a)redhat.com)
- Rewrite the Nagios task to use the new Func Nagios module instead of CURL.
Fixes #6, #7, #11, #12 (tbielawa(a)redhat.com)
- Adding HTML versions of the man pages to the HTML docs. Fixes #13
(tbielawa(a)redhat.com)
--------------------------------------------------------------------------------
================================================================================
root-5.28.00e-2.el6 (FEDORA-EPEL-2011-3683)
Numerical data analysis framework
--------------------------------------------------------------------------------
Update Information:
Update of root to version 5.28.00e. For a list of new features and fixed bugs see:
http://root.cern.ch/drupal/content/root-version-v5-28-00-patch-release-notes
--------------------------------------------------------------------------------
ChangeLog:
* Wed Jun 29 2011 Mattias Ellert <mattias.ellert(a)fysast.uu.se> - 5.28.00e-2
- Change build requires from qt-devel to qt4-devel
* Wed Jun 29 2011 Mattias Ellert <mattias.ellert(a)fysast.uu.se> - 5.28.00e-1
- Update to 5.28.00e
* Mon Jun 20 2011 ajax(a)redhat.com - 5.28.00d-2
- Rebuild for new glew soname
--------------------------------------------------------------------------------
================================================================================
rubygem-gem2rpm-0.7.1-1.el6 (FEDORA-EPEL-2011-3681)
Generate rpm specfiles from gems
--------------------------------------------------------------------------------
Update Information:
Updated to the 0.7.1 version.
--------------------------------------------------------------------------------
ChangeLog:
* Thu Jun 30 2011 Vít Ondruch <vondruch(a)redhat.com> - 0.7.1-1
- Updated to the 0.7.1 version.
* Wed Feb 9 2011 Fedora Release Engineering <rel-eng(a)lists.fedoraproject.org> -
0.6.0-6
- Rebuilt for
https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
--------------------------------------------------------------------------------
================================================================================
swatch-3.2.3-2.el6 (FEDORA-EPEL-2011-3687)
Tool for actively monitoring log files
--------------------------------------------------------------------------------
Update Information:
The Simple WATCHer is an automated monitoring tool that is capable
of alerting system administrators of anything that matches the
patterns described in the configuration file, whilst constantly
searching logfiles using perl.
--------------------------------------------------------------------------------
================================================================================
wordpress-3.1.4-1.el6 (FEDORA-EPEL-2011-3682)
Blog tool and publishing platform
--------------------------------------------------------------------------------
Update Information:
Upstream security release. Details at
http://wordpress.org/news/2011/06/wordpress-3-1-4/
Fix old FSF address and Summary to make rpmlint happy.
Make wp-content directory owned by apache:apache.
Correctly Provides/Obsoletes (with versions).
Upgrade to the latest upstream version (security fixes and enhancements, BZ 707772).
Move wp-content directory to /var/www/wordpress/ (BZ 522897).
Simplify overly detailed files list.
Actually, we just don't need gettext.php at all, it is provided by
php itself. Just remove the file, don't make a symlink.
Revert back to wp-content in /usr/share/wordpress, I am not able to make it
work. Not fixing BZ 522897.
--------------------------------------------------------------------------------
ChangeLog:
* Wed Jun 29 2011 Matěj Cepl <mcepl(a)redhat.com> - 3.1.4-1
- New upstream security release.
* Thu Jun 2 2011 Matěj Cepl <mcepl(a)redhat.com> - 3.1.3-3
- Actually, we just don't need gettext.php at all, it is provided by
php itself. Just remove the file, don't make a symlink.
- revert back to wp-content in /usr/share/wordpress, I am not able to make it
work. Not fixing BZ 522897.
* Wed Jun 1 2011 Matěj Cepl <mcepl(a)redhat.com> - 3.1.3-2
- Fix old FSF address and Summary to make rpmlint happy.
- Make wp-content directory owned by apache:apache
- Correctly Provides/Obsoletes (with versions)
* Wed May 25 2011 Matěj Cepl <mcepl(a)redhat.com> - 3.1.3-1
- Upgrade to the latest upstream version (security fixes and enhancements, BZ 707772)
- Move wp-content directory to /var/www/wordpress/ (BZ 522897)
- Simplify overly detailed %files
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #707772 - New upstream version 3.1.3 has been released
https://bugzilla.redhat.com/show_bug.cgi?id=707772
[ 2 ] Bug #522897 - Unable To Upload Images To /usr/share/wordpress/wp-content/uploads/
https://bugzilla.redhat.com/show_bug.cgi?id=522897
--------------------------------------------------------------------------------