The Asterisk Development Team has announced the final maintenance release of
Asterisk, version 1.4.42. This release is available for immediate download at
http://downloads.asterisk.org/pub/telephony/asterisk/

Please note that Asterisk 1.4.42 is the final maintenance release from the
1.4 branch. Support for security related issues will continue until April 21, 2012. For more information about support of the various Asterisk branches, see
https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions

The release of Asterisk 1.4.42 resolves several issues reported by the
community and would have not been possible without your participation.
Thank you!

The following is a sample of the issues resolved in this release:

* Resolve regression with ring groups in the Dial() application
  (Closes issue ASTERISK-17874. Reported by mspuhler. Patched by elguero)
* Resolve deadlock when using tab completion on the 'meetme kick' CLI command
  when an invalid (non-existent) conference room is specified.
  (Closes issue ASTERISK-17771. Reported, patched by zvision)
* Resolve issue where voice frames could be dropped when checking for T.38
  during early media.
  (Closes issue ASTERISK-17705. Reported, patched by oej)
* Resolve issue where DYNAMIC_FEATURES would not activate after a recent
  DTMF fix.
  (Closes issue ASTERISK-17914. Reported by vrban. Patched by twilson)

Additionally security announcements AST-2011-010, and AST-2011-011 have been
resolved in this release.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.4.42

Thank you for your continued support of Asterisk!

--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
              http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to