Also update port infrastructure, remove needless script.
<ChangeLog>
What's new in Redis 2.2.7
=========================
* Fixed bug #543-2 (the issue was reopened with a completely different report)
that caused Redis to randomly crash on list push performed against lists
with other clients blocked with BLPOP (or variants).
What's new in Redis 2.2.6
=========================
* Fixed bug #543. If you saw Redis instances crashing on List operations
(only happening with a non-default max entry size ziplist setting in
redis.conf) it was almost certainly this problem.
* Fixed a bug with replication where SLAVEOF NO ONE caused a slave to close the
connection with all its slaves.
</ChangeLog>
4.76 is the security release that fixes CVE-2011-1764, format string
attack and information leak, both inside the DKIM code.
List of changes (ftp://exim.inode.at/exim/ChangeLogs/ChangeLog-4.76):
PP/01 The new ldap_require_cert option would segfault if used. Fixed.
PP/02 Harmonised TLS library version reporting; only show if
debugging. Layout now matches that introduced for other
libraries in 4.74 PP/03.
PP/03 New openssl_options items: no_sslv2 no_sslv3 no_ticket no_tlsv1
PP/04 New "dns_use_edns0" global option.
PP/05 Don't segfault on misconfiguration of ref:name exim-user as uid.
Bugzilla 1098.
PP/06 Extra paranoia around buffer usage at the STARTTLS transition.
nb: Exim is not vulnerable to http://www.kb.cert.org/vuls/id/555316
TK/01 Updated PolarSSL code to 0.14.2.
Bugzilla 1097. Patch from Andreas Metzler.
PP/07 Catch divide-by-zero in ${eval:...}.
Fixes bugzilla 1102.
PP/08 Condition negation of bool{}/bool_lax{} did not negate. Fixed.
Bugzilla 1104.
TK/02 Bugzilla 1106: CVE-2011-1764 - DKIM log line was subject to a
format-string attack -- SECURITY: remote arbitrary code execution.
TK/03 SECURITY - DKIM signature header parsing was double-expanded,
second time unintentionally subject to list matching rules,
letting the header cause arbitrary Exim lookups (of items which can
occur in lists, *not* arbitrary string expansion). This allowed for
information disclosure.
PP/09 Fix another SIGFPE (x86) in ${eval:...} expansion, this time related
to INT_MIN/-1 -- value coerced to INT_MAX.
New stuff (ftp://exim.inode.at/exim/ChangeLogs/NewStuff-4.76):
1. The global option "dns_use_edns0" may be set to coerce EDNS0 usage
on or off in the resolver library.
And I am also adding patch for exiqgrep that was taken from
http://bugs.exim.org/show_bug.cgi?id=1103 [1].
PR: ports/156903 [2], ports/156872 [3]
Reported-by: Oliver Brandmueller <ob@e-gitt.net> [1], admin@anes.su [2], Alexander Wittig <alexander@wittig.name> [3]
Approved-by: erwin (mentor)
Feature-safe: yes
Update Gstreamer-plugins(-base) to 0.10.33
Update Gstreamer-plugins-good to 0.10.29
Update Gstreamer-plugins-bad to 0.10.22
Update Gstreamer-plugins-ugly to 0.10.18
(but schedule it for removal soon)
2. update net-im/skype to 2.1.0.81.
- It supports sound and video, please read the pkg-message to find out how to
make it work.
- OPTIONify
Both ports are based on repocopy from net/skype.
Many thanks to: avg@, nox@, kwm@, miwi@, netchild@ and many others
PR: 147550 [1], 156860 [2] (partially based on)
Submitted by: HASHI Hiroaki <hashiz@meridiani.jp> [1],
patch from nox@ [2]
Catalyst::Controller which is an instance of
CatalystX::SimpleLogin::Controller::Login into your application. This provides
a simple login and logout page with the adition of only one line of code and
one template to your application.
WWW: http://search.cpan.org/dist/CatalystX-SimpleLogin/
Add LICENSE.
Pass --docdir through CONFIGURE_ARGS to install into the right places.
Disable the libc malloc() alignment test according to consultation of the
upstream author, Marcus F. X. J. Oberhumer. He advised that the test were
too strict and would be changed for 2.06.
Refresh patches.
PR: ports/156931