Commit graph

201075 commits

Author SHA1 Message Date
adam
027c55a99b Changes 1.8.2.3:
* "rev-list --stdin" and friends kept bogus pointers into the input
  buffer around as human readable object names.  This was not a
  huge problem but was exposed by a new change that uses these
  names in error output.
* When "git difftool" drove "kdiff3", it mistakenly passed --auto
  option that was meant while resolving merge conflicts.
* "git remote add" command did not diagnose extra command line
  arguments as an error and silently ignored them.
Also contains a handful of trivial code clean-ups, documentation
updates, updates to the test suite, etc.
2013-05-15 11:16:29 +00:00
jnemeth
61152a581b hook xen{kernel,tools}42 into the build 2013-05-15 07:01:40 +00:00
jnemeth
4d9c54469a Added sysutils/xentools42 version 4.2.2 2013-05-15 07:00:22 +00:00
jnemeth
4678880615 Added sysutils/xenkernel42 version 4.2.2 2013-05-15 07:00:01 +00:00
jnemeth
c5ee69a5c1 Initial import of Xen 4.2: this is the tools part. This is mostly
functional for PV domains.  Support for HVM domains and grant tables
is still to come.  Note that xm/xend is deprecated in this version.
You should switch to using xl (which is tested to be working) if
you can.

----- 4.2.2

Xen 4.2.2 is a maintenance release in the 4.2 series and contains:
We recommend that all users of Xen 4.2.1 upgrade to Xen 4.2.2.

    This release fixes the following critical vulnerabilities:
        CVE-2012-5634 / XSA-33: VT-d interrupt remapping source
            validation flaw
        CVE-2013-0151 / XSA-34: nested virtualization on 32-bit
            exposes host crash
        CVE-2013-0152 / XSA-35: Nested HVM exposes host to being
            driven out of memory by guest
        CVE-2013-0153 / XSA-36: interrupt remap entries shared and
            old ones not cleared on AMD IOMMUs
        CVE-2013-0154 / XSA-37: Hypervisor crash due to incorrect
            ASSERT (debug build only)
        CVE-2013-0215 / XSA-38: oxenstored incorrect handling of
            certain Xenbus ring states
        CVE-2012-6075 / XSA-41: qemu (e1000 device driver): Buffer
            overflow when processing large packets
        CVE-2013-1917 / XSA-44: Xen PV DoS vulnerability with SYSENTER
        CVE-2013-1919 / XSA-46: Several access permission issues with
            IRQs for unprivileged guests
        CVE-2013-1920 / XSA-47: Potential use of freed memory in event
            channel operations
        CVE-2013-1922 / XSA-48: qemu-nbd format-guessing due to missing
            format specification

    This release contains many bug fixes and improvements (around
    100 since Xen 4.2.1). The highlights are:

        ACPI APEI/ERST finally working on production systems
        Bug fixes for other low level system state handling
        Bug fixes and improvements to the libxl tool stack
        Bug fixes to nested virtualization

----- 4.2.1

Xen 4.2.1 is a maintenance release in the 4.2 series and contains:
We recommend that all users of Xen 4.2.0 upgrade to Xen 4.2.1.

    The release fixes the following critical vulnerabilities:
        CVE-2012-4535 / XSA-20: Timer overflow DoS vulnerability
        CVE-2012-4537 / XSA-22: Memory mapping failure DoS
            vulnerability
        CVE-2012-4538 / XSA-23: Unhooking empty PAE entries DoS
            vulnerability
        CVE-2012-4539 / XSA-24: Grant table hypercall infinite
            loop DoS vulnerability
        CVE-2012-4544, CVE-2012-2625 / XSA-25: Xen domain builder
            Out-of-memory due to malicious kernel/ramdisk
        CVE-2012-5510 / XSA-26: Grant table version switch list
            corruption vulnerability
        CVE-2012-5511 / XSA-27: Several HVM operations do not
            validate the range of their inputs
        CVE-2012-5513 / XSA-29: XENMEM_exchange may overwrite
            hypervisor memory
        CVE-2012-5514 / XSA-30: Broken error handling in
            guest_physmap_mark_populate_on_demand()
        CVE-2012-5515 / XSA-31: Several memory hypercall operations
            allow invalid extent order values
        CVE-2012-5525 / XSA-32: several hypercalls do not validate
            input GFNs

    Among many bug fixes and improvements (around 100 since Xen 4.2.0):
        A fix for a long standing time management issue
        Bug fixes for S3 (suspend to RAM) handling
        Bug fixes for other low level system state handling
        Bug fixes and improvements to the libxl tool stack
        Bug fixes to nested virtualization

----- 4.2.0

The Xen 4.2 release contains a number of important new features
and updates including:

The release incorporates many new features and improvements to
existing features. There are improvements across the board including
to Security, Scalability, Performance and Documentation.

    XL is now the default toolstack: Significant effort has gone
in to the XL tool toolstack in this release and it is now feature
complete and robust enough that we have made it the default. This
toolstack can now replace xend in the majority of deployments, see
XL vs Xend Feature Comparison. As well as improving XL the underlying
libxl library has been significantly improved and supports the
majority of the most common toolstack features. In addition the
API has been declared stable which should make it even easier for
external toolstack such as libvirt and XCP's xapi to make full use
of this functionality in the future.

    Large Systems: Following on from the improvements made in 4.1
Xen now supports even larger systems, with up to 4095 host CPUs
and up to 512 guest CPUs. In addition toolstack feature like the
ability to automatically create a CPUPOOL per NUMA node and more
intelligent placement of guest VCPUs on NUMA nodes have further
improved the Xen experience on large systems.  Other new features,
such as multiple PCI segment support have also made a positive
impact on such systems.

    Improved security:  The XSM/Flask subsystem has seen several
enhancements, including improved support for disaggregated systems
and a rewritten example policy which is clearer and simpler to
modify to suit local requirements.

    Documentation: The Xen documentation has been much improved,
both the in-tree documentation and the wiki. This is in no small
part down to the success of the Xen Document Days so thanks to all
who have taken part.
2013-05-15 06:58:50 +00:00
jnemeth
098762889a Initial import of Xen 4.2. This is kernel part.
---- 4.2.2

Xen 4.2.2 is a maintenance release in the 4.2 series and contains:
We recommend that all users of Xen 4.2.1 upgrade to Xen 4.2.2.

    This release fixes the following critical vulnerabilities:
        CVE-2012-5634 / XSA-33: VT-d interrupt remapping source
            validation flaw
        CVE-2013-0151 / XSA-34: nested virtualization on 32-bit
            exposes host crash
        CVE-2013-0152 / XSA-35: Nested HVM exposes host to being
            driven out of memory by guest
        CVE-2013-0153 / XSA-36: interrupt remap entries shared and
            old ones not cleared on AMD IOMMUs
        CVE-2013-0154 / XSA-37: Hypervisor crash due to incorrect
            ASSERT (debug build only)
        CVE-2013-0215 / XSA-38: oxenstored incorrect handling of
            certain Xenbus ring states
        CVE-2012-6075 / XSA-41: qemu (e1000 device driver): Buffer
            overflow when processing large packets
        CVE-2013-1917 / XSA-44: Xen PV DoS vulnerability with SYSENTER
        CVE-2013-1919 / XSA-46: Several access permission issues with
            IRQs for unprivileged guests
        CVE-2013-1920 / XSA-47: Potential use of freed memory in event
            channel operations
        CVE-2013-1922 / XSA-48: qemu-nbd format-guessing due to missing
            format specification
    This release contains many bug fixes and improvements (around
    100 since Xen 4.2.1). The highlights are:
        ACPI APEI/ERST finally working on production systems
        Bug fixes for other low level system state handling
        Bug fixes and improvements to the libxl tool stack
        Bug fixes to nested virtualization

----- 4.2.1

Xen 4.2.1 is a maintenance release in the 4.2 series and contains:
We recommend that all users of Xen 4.2.0 upgrade to Xen 4.2.1.

    The release fixes the following critical vulnerabilities:
        CVE-2012-4535 / XSA-20: Timer overflow DoS vulnerability
        CVE-2012-4537 / XSA-22: Memory mapping failure DoS vulnerability
        CVE-2012-4538 / XSA-23: Unhooking empty PAE entries DoS vulnerability
        CVE-2012-4539 / XSA-24: Grant table hypercall infinite
            loop DoS vulnerability
        CVE-2012-4544, CVE-2012-2625 / XSA-25: Xen domain builder
            Out-of-memory due to malicious kernel/ramdisk
        CVE-2012-5510 / XSA-26: Grant table version switch list
            corruption vulnerability
        CVE-2012-5511 / XSA-27: Several HVM operations do not
            validate the range of their inputs
        CVE-2012-5513 / XSA-29: XENMEM_exchange may overwrite hypervisor memory
        CVE-2012-5514 / XSA-30: Broken error handling in
            guest_physmap_mark_populate_on_demand()
        CVE-2012-5515 / XSA-31: Several memory hypercall operations
            allow invalid extent order values
        CVE-2012-5525 / XSA-32: several hypercalls do not validate input GFNs
    Among many bug fixes and improvements (around 100 since Xen 4.2.0):
        A fix for a long standing time management issue
        Bug fixes for S3 (suspend to RAM) handling
        Bug fixes for other low level system state handling
        Bug fixes and improvements to the libxl tool stack
        Bug fixes to nested virtualization


----- 4.2.0

The Xen 4.2 release contains a number of important new features
and updates including:

The release incorporates many new features and improvements to
existing features. There are improvements across the board including
to Security, Scalability, Performance and Documentation.

    XL is now the default toolstack: Significant effort has gone
in to the XL tool toolstack in this release and it is now feature
complete and robust enough that we have made it the default. This
toolstack can now replace xend in the majority of deployments, see
XL vs Xend Feature Comparison. As well as improving XL the underlying
libxl library has been significantly improved and supports the
majority of the most common toolstack features. In addition the
API has been declared stable which should make it even easier for
external toolstack such as libvirt and XCP's xapi to make full use
of this functionality in the future.

    Large Systems: Following on from the improvements made in 4.1
Xen now supports even larger systems, with up to 4095 host CPUs
and up to 512 guest CPUs. In addition toolstack feature like the
ability to automatically create a CPUPOOL per NUMA node and more
intelligent placement of guest VCPUs on NUMA nodes have further
improved the Xen experience on large systems.  Other new features,
such as multiple PCI segment support have also made a positive
impact on such systems.

    Improved security: The XSM/Flask subsystem has seen several
enhancements, including improved support for disaggregated systems
and a rewritten example policy which is clearer and simpler to
modify to suit local requirements.

    Documentation: The Xen documentation has been much improved,
both the in-tree documentation and the wiki. This is in no small
part down to the success of the Xen Document Days so thanks to all
who have taken part.
2013-05-15 05:32:12 +00:00
richard
e7bd091756 terminate incomplete libpciaccess update 2013-05-15 03:54:42 +00:00
richard
33531ae865 Update sysutils/libpciutils with various upstream patches, many for solaris
and SPARC.  http://cgit.freedesktop.org/xorg/lib/libpciaccess/log/
2013-05-15 03:20:15 +00:00
rodent
4fbe1ce8fb Take maintainership (unless someone else wants it). 2013-05-15 00:47:01 +00:00
rodent
d03f56e3d5 +libkate 2013-05-15 00:42:52 +00:00
rodent
d5cbc68520 Added multimedia/libkate version 0.4.1 2013-05-15 00:42:02 +00:00
rodent
b6846bc385 Import libkate-0.4.1 as multimedia/libkate.
Kate is an overlay codec, originally designed for karaoke and text, that can be
multiplixed in Ogg. Text and images can be carried by a Kate stream, and
animated. Most of the time, this would be multiplexed with audio/video to carry
subtitles, song lyrics (with or without karaoke data), etc, but doesn't have to
be.

Series of curves (splines, segments, etc) may be attached to various properties
(text position, font size, etc) to create animated overlays. This allows
scrolling or fading text to be defined. This can even be used to draw arbitrary
shapes, so hand drawing can also be represented by a Kate stream.
2013-05-15 00:41:42 +00:00
wiz
3456ebbd6c Updated devel/diffuse to 0.4.7 2013-05-14 19:44:32 +00:00
wiz
2c6c9c8523 Update to 0.4.7:
Diffuse 0.4.7 - 2013-05-13
- added Jindřich Šesták's Czech translation
- improved character editing to allow easy indenting and moving the cursor by whole words
- added Miś Uszatek's Polish translation
- improved auto-detection of utf_16 and utf_32
- added "New N-Way File Merge..." menu item
- added syntax highlighting for Erlang and OpenCL files
2013-05-14 19:44:22 +00:00
wiz
8f615eefc3 Remove second '#' line in generated Makefile. Not necessary, since there's
already an empty line as third, now second, line per default.
2013-05-14 19:42:38 +00:00
imil
1b31735206 Updated sysutils/openxenmanager to 0.0.80nb2 2013-05-14 19:39:01 +00:00
imil
21ddab9d14 More package cleanup, added www/py-httplib2 as a dependency and
USE_TOOL+=pax
2013-05-14 19:38:28 +00:00
joerg
e425516f71 Force realigning the stack for Clang on AMD64 as Hotspot creates
misaligned stack frames.
2013-05-14 19:16:43 +00:00
joerg
a1bc1fabb2 Don't require bool conversion for streams. Deal with C++11 runtime
libraries.
2013-05-14 19:15:36 +00:00
joerg
aedfbb828d Default visibility wrappers for ios, ostream and unwind.h. 2013-05-14 19:08:42 +00:00
gdt
e0de916f15 Stop using PKG_OPTIONS.clamav as the options variable.
In 2005, this package started using PKG_OPTIONS.clamav instead of the
expected PKG_OPTIONS.p5-Mail-ClamAV, on the theory that the options
were the same.  Now, clamav supports "milter" and
"clamav-experimental", and p5- supports "curl".  So there's no way to
build this package with the curl option, and no way to build this
package if clamav has any options set.  Therefore, the change being
committed will not bother anyone :-)  Nevertheless, bump PKGREVISION.
2013-05-14 16:14:55 +00:00
taca
26cbd894a1 Note update of mail/dovecot2-pigeonhole package to 0.4.0. 2013-05-14 15:50:21 +00:00
taca
02997b1080 Update dovecot2-pigeonhole to 0.4.0.
v0.4.0 09-05-2013 Stephan Bosch <stephan@rename-it.nl>

+ Added doveadm-sieve plugin that provides the possibility to synch Sieve
  scripts using doveadm sync along with the user's mailboxes.
+ Added the Sieve extprograms plugin to the main Pigeonhole package. It is
  still a plugin, but it is now included so that a separate compile is no
  longer necessary and distributors are likely to include it. The extprograms
  plugin provides Sieve language extensions that allows executing
  (administrator-controlled) external programs for message delivery,
  message filtering and string manipulation. Refer to
  doc/plugins/sieve_extprograms.txt for more information.
+ Added debug message showing Pigeonhole version at initialization. Makes it
  very clear that the plugin is properly loaded.
+ Finished implementation of the Sieve include extension. It should now
  fully conform to RFC 6609. The main addition is the new :optional tag which
  makes the include command ignore missing included scripts without an error.
+ Finished implementation of the Sieve environment extension as much as
  possible. Environment items "location", "phase" and "domain" now also
  return a usable value.
2013-05-14 15:49:52 +00:00
taca
075c03e06b Dovecot 2.2 change API/ABI. 2013-05-14 15:48:40 +00:00
taca
a01a489170 Note update of mail/dovecot2 package to 2.2.1nb2. 2013-05-14 15:39:05 +00:00
taca
5a29700040 Add share/doc/dovecot/wiki/MailboxSettings.txt to PLIST.
Bump PKGREVISION.
2013-05-14 15:38:36 +00:00
taca
49d394e1bc * Properly handle the case of multiple values in RUBY_VERSION_SUPPORTED.
* Clean up PLIST_VARS.

No functional change should be done.
2013-05-14 15:18:05 +00:00
taca
39e9914848 RUBY_COMMANDS aren't specific to ruby193 but they will be also needed
by ruby200.
2013-05-14 15:08:58 +00:00
taca
643895a4b5 Note remove of www/typo3_46 package. 2013-05-14 14:48:43 +00:00
taca
873a7d6c50 Remove typo3_46 package, TYPO3 4.6.18 which isn't supported any more. 2013-05-14 14:48:10 +00:00
taca
2aea146eb8 Remove typo3_46. 2013-05-14 14:47:11 +00:00
taca
e0e00d7340 Note remove of www/squid27 package. 2013-05-14 14:44:10 +00:00
taca
44ac3b122e Remove squid27 package. It is squid-2.7.STABLE9 which isn't supported
any more.
2013-05-14 14:43:40 +00:00
taca
4d03db8582 Remove squid27. 2013-05-14 14:42:09 +00:00
imil
22d97af802 Updated sysutils/openxenmanager to 0.0.80nb1 2013-05-14 13:57:17 +00:00
imil
2f2a085427 Added missing dependencies, pre-requisites from
http://sourceforge.net/apps/trac/openxenmanager/wiki/GettingStarted:

py-gtk2, gtk-vnc, shared-mime-info and graphviz.
2013-05-14 13:56:48 +00:00
joerg
810eaf85a9 Add missing include for correct abs version. 2013-05-14 12:41:34 +00:00
joerg
40fecf2d62 Add public wrappers for ios, ostream and unwind.h, otherwise linking may
fail due to hidden definitions of system functions.
2013-05-14 12:41:02 +00:00
joerg
4e5a7d74bf Needs a C compiler. 2013-05-14 12:33:13 +00:00
fhajny
26ca11ce10 Update py-pytables to 2.4.0.
Major changes in 2.4:
- Improved HDF5 error logging management.
- Added support for the float16 data type.
- Leaf nodes now have attributes for retrieving the size of data in memory
  and on disk.
- Configurable maximum number of threads for Blosc and Numexpr.
- ndim (read-only) attribute added to Leaf, Atom and Col objects.
- Added read support for variable length string attributes.

Full changelog for 2.4.0, see:

  http://pytables.github.io/release-notes/RELEASE_NOTES_v2.4.x.html

Major changes in 2.3:

- Integrated functionality from PyTablesPro (re-licensed under a BSD license).
- OPSI is a powerful and innovative indexing engine allowing PyTables
  to perform fast queries on arbitrarily large tables.
- A fine-tuned LRU cache for both metadata (nodes) and regular data.

Full changelog for 2.3.x, see:

  http://pytables.github.io/release-notes/RELEASE_NOTES_v2.3.x.html
2013-05-14 09:57:58 +00:00
pettai
6c0e2403ab Updated net/knot to 1.2.0 2013-05-14 08:16:43 +00:00
pettai
4028e53eb9 v1.2.0 - Mar 29, 2013
---------------------

Bugfixes:
        * Memory leaks

(v1.2.0-rc4)

Features:
        * knotc 'zonestatus' command

Bugfixes:
        * Check for broken recvmmsg() implementation
        * Changing logfile ownership before dropping privileges
        * knotc respects 'control' section from configuration
        * RRL: resolved bucket collisions
        * RRL: updated bucket mapping to conform RRL technical memo

(v1.2.0-rc3)

Features:
        * Response rate limiting (see documentation)

Bugfixes:
        * Fixed OpenBSD build
        * Responses to ANY should contain RRSIGs

(v1.2.0-rc2)

Bugfixes:
        * Fixed processing of some non-standard dnames.
        * Correct checking of label length bounds in some cases.
        * More compliant rcodes in case of DDNS/TSIG failures.
        * Correct processing of malformed DDNS prereq section.

(v1.2.0-rc1)

Features:
        * Dynamic updates, including forwarding (limited on signed zones)
        * Updated remote control utility
        * Configurable TCP timeouts
        * LOC RR support
2013-05-14 08:16:05 +00:00
wiz
a88671b89a + denemo-1.0.2, diffuse-0.4.7, gthumb-3.2.2, libcares-1.10.0,
php-tt-rss-1.7.9, py-gobject3-3.8.2, typo3-6.0.5, webkit-gtk-2.0.2,
  wine-devel-1.5.30 [wait until NetBSD gains OSS 4 [kern/46611] or
  bring OSS 3 support back], xmp-4.0.5.
2013-05-14 06:47:01 +00:00
tez
f4bcf81828 Fix CVE-2002-2443 in mit-krb5 2013-05-13 22:47:14 +00:00
tez
57ade1a60c The kpasswd service provided by kadmind was vulnerable to a UDP
"ping-pong" attack [CVE-2002-2443].  Don't respond to packets unless
they pass some basic validation, and don't respond to our own error
packets.

Some authors use CVE-1999-0103 to refer to the kpasswd UDP ping-pong
attack or UDP ping-pong attacks in general, but there is discussion
leading toward narrowing the definition of CVE-1999-0103 to the echo,
chargen, or other similar built-in inetd services.

cf1a0c411bvs
2013-05-13 22:42:33 +00:00
richard
f10aa3d111 update PKGREVISION for x11/gdm 2013-05-13 21:22:30 +00:00
minskim
f11a70e5b1 Note update of emacs-snapshot. 2013-05-13 21:04:59 +00:00
minskim
07db45c86e Update emacs-snapshot to 24.3.50.20130510.
Notable changes:
- Use Gnulib ACL implementation, for benefit of Solaris etc.
- Eliminate variable c-standard-font-lock-fontify-region-function.
- Handle arbitrarily long C++ member initialisation lists.
2013-05-13 20:57:16 +00:00
riastradh
1d32aaa822 Add note about INSTALL scripts to TODO.crosscompile. 2013-05-13 15:14:42 +00:00
adam
77132ed275 Updated multimedia/ffmpeg to 20130510.1.2.1; multimedia/ffplay to 1.2.1 2013-05-13 14:45:40 +00:00