Commit graph

232218 commits

Author SHA1 Message Date
dholland
03742f43db PR 49757: remove kazehakase
tnn wrote:
 : As the software seems to be ...
 :
 : 1) completely abandoned by upstream for several years
 : 2) hasn't worked in pkgsrc for at least as long
 : 3) has been removed from all linux distributions I can find
 :
 : ... the only reasonable choice of action is to remove it.
2015-04-18 21:25:01 +00:00
dholland
c5db3aa83b added security/mozilla-rootcerts-openssl 2015-04-18 21:20:51 +00:00
joerg
543c036ed4 Needs explicit libdrm dependency. 2015-04-18 20:44:47 +00:00
joerg
7222fce1ea Allow building on NetBSD/arm. 2015-04-18 20:44:08 +00:00
joerg
6f31dee37a Use uname -m output for NetBSD/ARM in the PLIST as the package does. 2015-04-18 20:43:19 +00:00
joerg
4b11e81000 Add long long overloads to help ILP32 targets. 2015-04-18 20:42:39 +00:00
joerg
d917ca2fe2 Support NetBSD/ARM. Simplify NetBSD/amd64. 2015-04-18 20:41:44 +00:00
joerg
ba4222e2ee Not MAKE_JOBS_SAFE. 2015-04-18 20:41:10 +00:00
joerg
782b3d375b Let clang ignore the mixed up return use of the K&R code. 2015-04-18 20:40:46 +00:00
dholland
28a72db5a4 Add mozilla-rootcerts-openssl.
It operates the mozilla-rootcerts installer script in order to allow
managing the resulting output openssl certs with the package tools.

Since openssl does not support more than one directory of certificates
(sheesh) this is an abusive package - it installs directly into the
openssl certs directory even though this is a sysconfig directory that
should normally only be touched using the config files infrastructure.
And, for native openssl, it's in the root /etc outside of $PREFIX.

Nonetheless, having this package is better than not having it.

Probably at some point this and the mozilla-rootcerts package should
be folded together in some fashion; but I didn't want to do that up
front, and in particular I didn't want to muck with the installer
script in mozilla-rootcerts any more than necessary to make this
package possible. This in particular prevented e.g. installing the
certs in share/ and symlinking them into the certs directory.

As things are, if you already have the certs installed manually you
can install this package over them cleanly, and thenceforth not have
to update them by hand.
2015-04-18 20:21:25 +00:00
schwarz
c6a36e1521 Updated mail/sylpheed to 3.4.2 (some minor bug fixes) 2015-04-18 20:14:58 +00:00
dholland
69b63823bc Add support for -d destdir to the mozilla-rootcerts installer script. 2015-04-18 20:11:35 +00:00
joerg
e7863e1a9d Until there is evidence to the contrary, provide _COMPILER_ABI_FLAG on
all platforms.
2015-04-18 19:53:59 +00:00
cheusov
6238e8d2d5 Depends on python-dateutil>=2.2; ++pkgrevision 2015-04-18 18:27:16 +00:00
tnn
187e09b507 Move patch-src_glu_sgi_libtess_sweep.c from MesaLib to here since this
package is built independently now.
Bump PKGREVISON.

The commit message in MesaLib read:
date: 2015-01-29 23:35:43 +0100;  author: nat;  state: Exp;
Fix segfaults and crashing with applications that use libGLU.
2015-04-18 17:44:12 +00:00
schmonz
19ef1ad8c1 Updated textproc/py-html2text to 2015.4.14 2015-04-18 14:09:00 +00:00
schmonz
f90ae3a796 Update to 2015.4.14. From the changelog:
* Feature #56: Treat '-' file parameter as stdin.
* Feature #57: Retain escaping of html except within code or pre tags.
* Feature #59: Write image tags with height and width attrs as raw
  html to retain dimensions
2015-04-18 14:08:54 +00:00
mef
54e3fb6386 Updated fonts/lohit-fonts to 2.3.8 2015-04-18 12:43:15 +00:00
mef
5180945d02 (pkgsrc)
- Add LICENSE as gnu-gpl-v2
(upstream)
 - Update 2.3.1 to 2.3.8
---------------------
* Thu Mar 05 2009 Rahul Bhalerao <rbhalera@redhat.com> - 2.3.8
- Bug 428427 - [kn_IN][fonts-indic] - 0CB5+0CCA is wrongly rendering
- Bug 450699 - [ta_IN]Errors in "sh" and "shrI" in Lohit Tamil
  font (fixed in font, needs rendering update)
- Bug 476427 - [te_IN] -
  Consonant+Virama+Consonant+Virama+space renders the second
  virama as a separate glyph in lohit-telugu font
- Bug 479100 - [kn_IN] Conjunct combination of U0C9D with
  U0CCA/U0CCB is rendering wrongly
- Bug 483530 - [bn_IN]Lohit Bengali font cheating about character support
- Added Lohit-Assamese
- Modified README file.
2015-04-18 12:43:07 +00:00
rodent
7f6a668f5c Fix build on SunOS. 2015-04-18 12:39:05 +00:00
mef
d558cce4e7 Updated fonts/tamsyn-font to 1.11 2015-04-18 12:06:55 +00:00
mef
d6d5eff122 Update to 1.11
--------------
CHANGES IN 1.11 2015-01-21

  Changed capital "A" to be less pointy, more consistent between sizes.
  Expecting hate mail.

  Previously, unimplemented chars defaulted to print a blank space under X.
  Now those chars are not placed in the font at all in order to allow
  fontconfig to fall back to use a char from another font.  (Thanks, Allen,
  for pointing this out and testing the fix.)
2015-04-18 12:06:08 +00:00
wen
7fa4aaff81 Updated devel/p5-Class-C3 to 0.28 2015-04-18 11:59:02 +00:00
wen
3f83646eff Update to 0.28
Upstream changes:
0.28 - 2015-04-14
    - Change link to Dylan paper to use archive.org, as the original link has
      gone offline (RT#99756).
2015-04-18 11:58:06 +00:00
wen
2ff09fd0b0 Updated devel/p5-Moose to 2.1404 2015-04-18 11:52:23 +00:00
wen
8371b9bca8 Update to 2.1404
Update DEPENDS

Upstream changes:
2.1404   2015-04-16

  [BUG FIXES]

  - Add Sub::Identify to prereqs. (RT #101661)
  - bump List::Util prereq to avoid a memory leak (RT#101124)

  [DOCUMENTATION]

  - Added section to Moose::Manual::Resources to list external links related
    to Moose (RT #101993, Michael LaGrasta)
2015-04-18 11:51:15 +00:00
tsutsui
cfa145751d Updated multimedia/adobe-flash-plugin11 to 11.2.202.457 2015-04-18 10:05:44 +00:00
tsutsui
d77c69b6a3 Update adobe-flash-plugin11 to 11.2.202.457.
Upstream announcement:
 https://helpx.adobe.com/security/products/flash-player/apsb15-06.html

Security updates available for Adobe Flash Player

Release date: April 14, 2015

Vulnerability identifier: APSB15-06

CVE number: CVE-2015-0346, CVE-2015-0347, CVE-2015-0348, CVE-2015-0349,
 CVE-2015-0350, CVE-2015-0351, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354,
 CVE-2015-0355, CVE-2015-0356, CVE-2015-0357, CVE-2015-0358, CVE-2015-0359,
 CVE-2015-0360, CVE-2015-3038, CVE-2015-3039, CVE-2015-3040, CVE-2015-3041,
 CVE-2015-3042, CVE-2015-3043, CVE-2015-3044

Platform: All Platforms
2015-04-18 10:04:29 +00:00
manu
cf545205bf Build fix for missing __i686.get_pc_thunk.bx symbol
Depending on the compiler, __i686.get_pc_thunk.bx may be missing
from runtime. Replace it by a localy supplied version.
2015-04-18 07:23:18 +00:00
rodent
ab0af02be4 Updated net/libzrtpcpp to 4.4.0 2015-04-18 03:36:36 +00:00
rodent
ff44be253e Add sqlite3 PKG_OPTION. USE_CMAKE instead of autotools. Update openssl
dependency. Bump BUILDLINK_A{B,P}I* in buildlink3.mk due to API changes.

From NEWS:

== GNU ZRTP 4.4.0 ==

Changes the handling of HMAC and Hash contexts to avoild tool
many malloc/free calls and thus memory pointer problems.

Enhance the handling an check the nonce when using multi-stream
mode. This required a modification to the class file and some
modifications on the API. The old functions are now deprecated
but still usable. Nevertheless you should change your application
to use the new fuctions which support the new nonce handling and
checks.

Some bug fixing as well.

== GNU ZRTP 4.3.1 ==

This is a bugfix release. It fixes several compiler issues in
iOS8 Clang, Mircosoft C++ compiler (VS 2012) etc.

This release also adds a fix to address a possible problem when
using 'memset(...)' on a memory area immediately followed by a
'free(...)' call to free this memory area. Some compilers may
otpimize the code and do not call 'memset(...)'. That's bad for
software that deals with secure keys :-) . The fix removes this
possible vulnerability.


== GNU ZRTP 4.3.0 ==

This version adds some new API that provide to set retry timer
values and to get some retry counters.

Application may now set some values of the retry counters during
the discovery (Hello) and the negotiation phase. Applications may
increase the number of retries or modify the capping to support
slow or bad networks.

To get some idea about the actual number of retries during ZRTP
negotiation an application may now use the new API to get an array
of counters. The ZRTP state engine records how many retries occured
during the different protocol states.

Note: only the ZRTP initiator performs packet retries after the
discovery (Hello) phase. The responder would always return zero
alues for the other retry counters.

Because we have a new set of functions the API changed, thus it's
necessary to recompile applications that use the new library version.


== GNU ZRTP 4.2.4 ==

Only small changes to enable Android X86 (see clients/tivi/android)
as an example.

Rename functions aes_init() to aes_init_zrtp() to avoid names clashes
with other libreries that may include own AES modules.


== GNU ZRTP 4.2.3 ==

The optional SAS relay feature (refer to RFC6189, chapter 7.3) is
not longer compiled by default. If your project needs this support
then modify the CMakeLists.txt file and uncomment a 'add_definition'
statments. See comment in the CMakelists.txt file.

The reasons to disable this optional feature in the default build:
it's rarely used and some concerns about misusing this feature.


== GNU ZRTP 4.2.2 ==

A small enhancement in SRTP handling to provide a longer bit-shift
register with 128 bits. The replay now check accepts packets which
are up to 127 sequence number behing the current packet. The upper
layer (codecs) gets more packets on slower/bad networks that we may
see on mobile 3G/4G connections.

If the codecs do not remove silence then this may lead to some longer
audio replay, similar to sattelite communication.


== GNU ZRTP 4.2.1 ==

Bug fixes in the SRTP part that checks for replay and updates the ROC.

The wrong computations lead to false replay indications and to wrong
HMAC, thus they dropped to much packets, in particular under bad network
conditions.

Changed the handling the the zrtp_getSasType function the the ZrtpCWrapper.
Please check the inline documentation and the compiler warning how to
use the return value of the function.
2015-04-18 03:36:23 +00:00
rodent
e457955c84 Updated net/ccrtp to 2.1.2 2015-04-18 03:12:51 +00:00
rodent
b79d6e86e5 libgcrypt and openssl are PKG_OPTIONS, with openssl enabled by default.
libgcrypt doesn't get used if openssl is installed. There's no way of disabling
openssl if it's found. Fix infodir using SUBST. Depends on latest version of
ucommon. From ChangeLog:

Changes from 2.1.1 to 2.1.2
- use ucommon cmake macros
- copyright assignment to Cherokees of Idaho
- copyright updates and corrections to bring current

Changes from 2.1.0 to 2.1.1
- fix endianness checks
- cleanup alloc/dealloc
- configure: fix libtoolize warning
- requires ucommon 6.2.2 for endian fixes

Changes from 2.0.9 to 2.1.0
- configure: add option to disable compilation of demos
- OSX: Check for macports glibtoolize.
- modernized cmake
- use standard header for malloc
- uptick of abi version for ucommon

2014-04-14  David Sugar (for 2.0.9)

        Merged fix from Alexandre Lision for initial rtcp seq #
2015-04-18 03:11:47 +00:00
rodent
4002c14951 +rabbitmq-3.5.1 2015-04-18 02:56:51 +00:00
rodent
2523d39e5a Remove BUILDLINK_API_DEPENDS for PKG_BUILD_OPTIONS. 2015-04-18 02:48:50 +00:00
rodent
bc55daabcd Updated devel/ucommon to 6.3.1 2015-04-18 02:43:36 +00:00
rodent
b492e9d535 Update to 6.3.1. Two patches aren't needed anymore.
patch-commoncpp_address.cpp breaks the build. I'm not seeing how bitset
would use the C++ stdlib version, since <bitset> isn't included.
OpenSSL and GNUTLS are package options, defaulting to openssl. Set
PKG_BUILD_OPTIONS.ucommon accordingly. Major shared library change, so
update buildlink3.mk accordinly. Updates to dependant packages coming
shortly. From ChangeLog:

Changes from 6.3.0 to 6.3.1
- copyright assignment to Cherokees of Idaho
- introduction of ucommon cmake hosted macros
- simplified doxygen doc support
- convergence of automake and cmake builds
- make utils easier for source introspection
- converted for cmake builds on debian
- count for String::check should be size_t
- string bounds checking

Changes from 6.2.3 to 6.3.0
- remove legacy cmodel support
- modernize library usage
- simplify autoconf and cmake
- introduce sysruntime...
- cleanup memory operators....

Changes from 6.2.2 to 6.2.3
- a few socket fixes, mostly windows related...

Changes from 6.2.1 to 6.2.2
- bumped gnutls to 3.0.0 or later...
- lots of bug fixes and general cleanup
- socket endian issues and other things for ccrtp
- templated newp and freep handle management

Changes from 6.2.0 to 6.2.1
- datetime: fix const inconsistency
- fsys: cached error variable must be mutable
- replacment new/delete cannot be declared inline
- fix exception specifier clash for c++11

Changes from 6.1.11 to 6.2.0
- standardized cmake paths and stand-alone usages
- gnutls support in cmake
- unified openssl checks, even works for windows
- improved openssl support, new static crypto option
- pkgconfig usable in win32, other win32 fixes
- fixes for mac build & optional disable of utils
- upticked abi version to 7, should have happened with 10/11?

Changes from 6.1.10 to 6.1.11
- any addr and overloads in commoncpp
- cmake abi fix and other apple specific issues
- stream fixes, sflphone recommended changes, and other updates
- key protocol added
- cleaner build for binding without resolver
- cleanup and fixes for commoncpp peering...
- UDPSocket: use ucommon::Socket::address
- Socket::address: add setAny(sockaddr*), setLoopback(sockaddr*)

Changes from 6.1.9 to 6.1.10
- for next release
- iso cleaness
- Fix memory leak in DateTime ctor
- Fix utf8::count()
- secure::erase() should be more secure

Changes from 6.1.8 to 6.1.9
- ost::Socket: use ucommon::Socket for join(), drop() implementations
- back to native threading model for mingw
- Socket::store: use existing len method
- Socket::address: allow printing to std::ostream
- Socket::address: use in_port_t for port numbers
- Socket::join, ::drop: allow to set interface index for IPv6

Changes from 6.1.7 to 6.1.8
- mingw libstdc++ c++11 support now requires winpthread
- more android related updates

Changes from 6.1.6 to 6.1.7
- lots of android related updates

Changes from 6.1.5 to 6.1.6
- some windows and mingw fixes
- Socket::address::print(): minor fixes
- Socket::address: fix constructor documentation
- Socket::address: add unit tests for print()
- Socket::address: add print() method
- Socket::address: add withPort()
- Socket::address: add constructors from standard addr types
- Socket::address: use existing len() method.

Changes from 6.1.4 to 6.1.5
- key merge on load for 6.1.5

Changes from 6.1.3 to 6.1.4
- lots of namespace usage cleanup
- Socket::address: add unit tests for new features
- Socket::address: add isAny, setAny, isLoopback, setLoopback, any, loopback
- Socket::address: convert port to network byte order
- ost::Socket: add compatibility with ucommon::Socket::address
- we don't want commoncpp configs if no lib made
- Socket::address: add equality operator, getPort, setPort, getSize
- improved cmake and added srpm, todo make targets

Changes from 6.1.2 to 6.1.3
- revised unixaddr buffer overflow issue

Changes from 6.1.1 to 6.1.2
- updated contacts, fsf address, and copyright
- revised cmake build
- added setgroups

from ucommon 6.1.0 to 6.1.1
- module flag support for older commoncpp packages
- fix for commoncpp pc file
- some additional original classes mapped to commoncpp
- default Semaphore constructor now valid special case
2015-04-18 02:43:24 +00:00
rodent
9f495c9b6c Apparently, the patch checksums were hosed. Fixing. 2015-04-18 01:25:45 +00:00
wiz
e81df8e825 Updated meta-pkgs/modular-xorg-libs to 1.2 2015-04-17 20:00:35 +00:00
wiz
ac7509d2c9 Add libXpresent. Bump version. 2015-04-17 20:00:22 +00:00
wiz
ec2b2a3ed9 Add buildlink3.mk file. 2015-04-17 19:59:25 +00:00
wiz
0222118c72 Added x11/libXpresent version 1.0.0 2015-04-17 19:57:28 +00:00
wiz
71aa1847a9 + libXpresent. 2015-04-17 19:54:59 +00:00
wiz
994afa6351 Import libXpresent-1.0.0 as x11/libXpresent.
This provides an Xlib-compatible API for the Present extension.
2015-04-17 19:54:46 +00:00
wiz
9ebefbc892 Updated net/youtube-dl to 20150417 2015-04-17 18:22:55 +00:00
wiz
d52d3e371d Update to 2015.04.17, provided by Leonardo Taccari in PR 49844.
Changes:
2015.04.17
 [QQMusic] Add new extractor
 [srf] Add new extractor

2015.04.09
 [Gamersyde] Add new extractor
 [RadioJavan] Add new extractor
 Remove check for ssl certs: When it uses a capath instead of a cafile,
  'get_ca_certs' or 'cert_store_stats' only returns certificates already used in
  a connection
 [udn] Add new extractor

2015.04.03
 [Dumpert] Add new extractor (Dutch video site Dumpert)

2015.03.28
 [22tracks] Add new extractor
 [Varzesh3] Add new extractor

2015.03.24
 [safari] Add safaribooksonline extractor
 [pornovoisines] Add extractor
 [MiomioTV] Add new extractor
 [nrk:playlist] Add extractor

2015.03.18
 [ultimedia] Add extractor
 [primesharetv] Add primeshare.tv extractor
 [rtve] Add new extractor for rtve infantil

2015.03.15
 [viewster] Add extractor
 [kanalplay] Add extractor
 [footyroom] Add extractor
 [ssa] Add extractor
 [yamusic] rename to yandexmusic

2015.03.09
 [pladform] Add extractor
 [gazeta] Add new extractor
 [eagleplatform] Add extractor
 [douyutv] Add new extractor
 [playwire] Add extractor

2015.03.03.1
 Make sure netrc works for all extractors with login support

2015.03.03
 [downloader/external] Add support for custom options

2015.02.28
 [thechive] remove in favor of Kaltura
 [oppetarkiv] Add new extractor and merge with svtplay
 [odnoklassniki] Add extractor
 [kaltura] Add new extractor
 [TheChiveIE] added support for thechive.com
2015-04-17 18:22:41 +00:00
taca
45f50ed812 Note update of PHP packages:
lang/php54	5.4.40
	lang/php55	5.5.24
	lang/php56	5.6.8
2015-04-17 16:43:45 +00:00
taca
ec6a486c31 Update php56 to 5.6.8.
16 Apr 2015, PHP 5.6.8

- Core:
  . Fixed bug #66609 (php crashes with __get() and ++ operator in some cases).
    (Dmitry, Laruence)
  . Fixed bug #68021 (get_browser() browser_name_regex returns non-utf-8
    characters). (Tjerk)
  . Fixed bug #68917 (parse_url fails on some partial urls). (Wei Dai)
  . Fixed bug #69134 (Per Directory Values overrides PHP_INI_SYSTEM
    configuration options). (Anatol Belski)
  . Additional fix for bug #69152 (Type confusion vulnerability in
    exception::getTraceAsString). (Stas)
  . Fixed bug #69210 (serialize function return corrupted data when sleep has
    non-string values). (Juan Basso)
  . Fixed bug #69212 (Leaking VIA_HANDLER func when exception thrown in
    __call/... arg passing). (Nikita)
  . Fixed bug #69221 (Segmentation fault when using a generator in combination
    with an Iterator). (Nikita)
  . Fixed bug #69337 (php_stream_url_wrap_http_ex() type-confusion
    vulnerability). (Stas)
  . Fixed bug #69353 (Missing null byte checks for paths in various PHP
    extensions). (Stas)

- Apache2handler:
  . Fixed bug #69218 (potential remote code execution with apache 2.4
    apache2handler). (Gerrit Venema)

- cURL:
  . Implemented FR#69278 (HTTP2 support). (Masaki Kagaya)
  . Fixed bug #68739 (Missing break / control flow). (Laruence)
  . Fixed bug #69316 (Use-after-free in php_curl related to
    CURLOPT_FILE/_INFILE/_WRITEHEADER). (Laruence)

- Date:
  . Fixed bug #69336 (Issues with "last day of <monthname>"). (Derick Rethans)

- Enchant:
  . Fixed bug #65406 (Enchant broker plugins are in the wrong place in windows
    builds). (Anatol)

- Ereg:
  . Fixed bug #68740 (NULL Pointer Dereference). (Laruence)

- Fileinfo:
  . Fixed bug #68819 (Fileinfo on specific file causes spurious OOM and/or
    segfault). (Anatol Belski)

- Filter:
  . Fixed bug #69202: (FILTER_FLAG_STRIP_BACKTICK ignored unless other
    flags are used). (Jeff Welch)
  . Fixed bug #69203 (FILTER_FLAG_STRIP_HIGH doesn't strip ASCII 127). (Jeff
    Welch)

- OPCache:
  . Fixed bug #69297 (function_exists strange behavior with OPCache on
    disabled function). (Laruence)
  . Fixed bug #69281 (opcache_is_script_cached no longer works). (danack)
  . Fixed bug #68677 (Use After Free). (CVE-2015-1351) (Laruence)

- OpenSSL
  . Fixed bugs #68853, #65137 (Buffered crypto stream data breaks IO polling
    in stream_select() contexts) (Chris Wright)
  . Fixed bug #69197 (openssl_pkcs7_sign handles default value incorrectly)
    (Daniel Lowrey)
  . Fixed bug #69215 (Crypto servers should send client CA list)
    (Daniel Lowrey)
  . Add a check for RAND_egd to allow compiling against LibreSSL (Leigh)

- Phar:
  . Fixed bug #64343 (PharData::extractTo fails for tarball created by BSD tar).
    (Mike)
  . Fixed bug #64931 (phar_add_file is too restrictive on filename). (Mike)
  . Fixed bug #65467 (Call to undefined method cli_arg_typ_string). (Mike)
  . Fixed bug #67761 (Phar::mapPhar fails for Phars inside a path containing
    ".tar"). (Mike)
  . Fixed bug #69324 (Buffer Over-read in unserialize when parsing Phar). (Stas)
  . Fixed bug #69441 (Buffer Overflow when parsing tar/zip/phar in
    phar_set_inode). (Stas)

- Postgres:
  . Fixed bug #68741 (Null pointer dereference). (CVE-2015-1352) (Laruence)

- SPL:
  . Fixed bug #69227 (Use after free in zval_scan caused by
     spl_object_storage_get_gc). (adam dot scarr at 99designs dot com)

- SOAP:
  . Fixed bug #69293 (NEW segfault when using SoapClient::__setSoapHeader
     (bisected, regression)). (Laruence)

- Sqlite3:
  . Fixed bug #68760 (SQLITE segfaults if custom collator throws an exception).
     (Dan Ackroyd)
  . Fixed bug #69287 (Upgrade bundled libsqlite to 3.8.8.3). (Anatol)
  . Fixed bug #66550 (SQLite prepared statement use-after-free). (Sean Heelan)
2015-04-17 16:42:43 +00:00
taca
7acc97f360 Update php55 to 5.5.24.
16 Apr 2015, PHP 5.5.24

- Apache2handler:
  . Fixed bug #69218 (potential remote code execution with apache 2.4
    apache2handler). (Gerrit Venema)

- Core:
  . Fixed bug #66609 (php crashes with __get() and ++ operator in some cases).
    (Dmitry, Laruence)
  . Fixed bug #67626 (User exceptions not properly handled in streams).
    (Julian)
  . Fixed bug #68021 (get_browser() browser_name_regex returns non-utf-8
    characters). (Tjerk)
  . Fixed bug #68917 (parse_url fails on some partial urls). (Wei Dai)
  . Fixed bug #69134 (Per Directory Values overrides PHP_INI_SYSTEM
    configuration options). (Anatol Belski)
  . Additional fix for bug #69152 (Type confusion vulnerability in
    exception::getTraceAsString). (Stas)
  . Fixed bug #69212 (Leaking VIA_HANDLER func when exception thrown in
    __call/... arg passing). (Nikita)
  . Fixed bug #69221 (Segmentation fault when using a generator in combination
    with an Iterator). (Nikita)
  . Fixed bug #69337 (php_stream_url_wrap_http_ex() type-confusion
    vulnerability). (Stas)
  . Fixed bug #69353 (Missing null byte checks for paths in various PHP
    extensions). (Stas)

- Curl:
  . Implemented FR#69278 (HTTP2 support). (Masaki Kagaya)
  . Fixed bug #69316 (Use-after-free in php_curl related to
    CURLOPT_FILE/_INFILE/_WRITEHEADER). (Laruence)

- Date:
  . Export date_get_immutable_ce so that it can be used by extensions. (Derick
    Rethans)
  . Fixed bug #69336 (Issues with "last day of <monthname>"). (Derick Rethans)

- Enchant:
  . Fixed bug #65406 (Enchant broker plugins are in the wrong place in windows
    builds). (Anatol)

- Fileinfo:
  . Fixed bug #68819 (Fileinfo on specific file causes spurious OOM and/or
    segfault). (Anatol Belski)

- Filter:
  . Fixed bug #69202 (FILTER_FLAG_STRIP_BACKTICK ignored unless other
    flags are used). (Jeff Welch)
  . Fixed bug #69203 (FILTER_FLAG_STRIP_HIGH doesn't strip ASCII 127). (Jeff
    Welch)

- Mbstring:
  . Fixed bug #68846 (False detection of CJK Unified Ideographs Extension E).
    (Masaki Kagaya)

- OPCache
   . Fixed bug #68677 (Use After Free). (CVE-2015-1351) (Laruence)
   . Fixed bug #69281 (opcache_is_script_cached no longer works). (danack)

- OpenSSL:
  . Fixed bug #67403 (Add signatureType to openssl_x509_parse).
  . Add a check for RAND_egd to allow compiling against LibreSSL (Leigh)

- Phar:
  . Fixed bug #64343 (PharData::extractTo fails for tarball created by BSD tar).
    (Mike)
  . Fixed bug #64931 (phar_add_file is too restrictive on filename). (Mike)
  . Fixed bug #65467 (Call to undefined method cli_arg_typ_string). (Mike)
  . Fixed bug #67761 (Phar::mapPhar fails for Phars inside a path containing
    ".tar"). (Mike)
  . Fixed bug #69324 (Buffer Over-read in unserialize when parsing Phar). (Stas)
  . Fixed bug #69441 (Buffer Overflow when parsing tar/zip/phar in
    phar_set_inode). (Stas)

- Postgres:
  . Fixed bug #68741 (Null pointer dereference). (CVE-2015-1352) (Laruence)

- SPL:
  . Fixed bug #69227 (Use after free in zval_scan caused by
     spl_object_storage_get_gc). (adam dot scarr at 99designs dot com)

- SOAP:
  . Fixed bug #69293 (NEW segfault when using SoapClient::__setSoapHeader
     (bisected, regression)). (thomas at shadowweb dot org, Laruence)

- SQLITE:
  . Fixed bug #68760 (SQLITE segfaults if custom collator throws an exception).
     (Dan Ackroyd)
  . Fixed bug #69287 (Upgrade bundled sqlite to 3.8.8.3). (Anatol)
2015-04-17 16:40:58 +00:00
taca
95f7c77dfe Update php54 to 5.4.40.
16 Apr 2015 PHP 5.4.40

- Apache2handler:
  . Fixed bug #69218 (potential remote code execution with apache 2.4
    apache2handler). (Gerrit Venema)

- Core:
  . Additional fix for bug #69152 (Type confusion vulnerability in
    exception::getTraceAsString). (Stas)
  . Fixed bug #69337 (php_stream_url_wrap_http_ex() type-confusion
    vulnerability). (Stas)
  . Fixed bug #69353 (Missing null byte checks for paths in various PHP
    extensions). (Stas)

- cURL:
  . Fixed bug #69316 (Use-after-free in php_curl related to
    CURLOPT_FILE/_INFILE/_WRITEHEADER). (Laruence)

- Ereg:
  . Fixed bug #68740 (NULL Pointer Dereference). (Laruence)

- Fileinfo:
  . Fixed bug #68819 (Fileinfo on specific file causes spurious OOM and/or
    segfault). (Anatol Belski)

- GD:
  . Fixed bug #68601 (buffer read overflow in gd_gif_in.c). (Remi)

- Phar:
  . Fixed bug #68901 (use after free). (bugreports at internot dot info)
  . Fixed bug #69324 (Buffer Over-read in unserialize when parsing Phar). (Stas)
  . Fixed bug #69441 (Buffer Overflow when parsing tar/zip/phar in
    phar_set_inode). (Stas)

- Postgres:
  . Fixed bug #68741 (Null pointer deference) (CVE-2015-1352). (Xinchen Hui)

- SOAP:
  . Fixed bug #69152 (Type Confusion Infoleak Vulnerability in unserialize()
    with SoapFault). (Dmitry)

- Sqlite3:
  . Fixed bug #66550 (SQLite prepared statement use-after-free). (Sean Heelan)
2015-04-17 16:39:56 +00:00