Changes:
* Fix build on DragonFly due to pidfile changes.
* Add support for TECH_LOONGSON, TECH_ROCKCHIP, and TECH_GENERIC. Taken from
pkgsrc, submitted-by: Leonardo Taccari, original patches by Jared D. McNeill.
dbus-glib 0.104 (2015-02-09)
============================
The “smoke and ashes” release.
Deprecations:
• Document the entire library as deprecated (Simon McVittie, Philip Withnall)
Dependencies:
• libdbus 1.8 is required
• GLib 2.32 is required
Enhancements:
• The libdbus 1.8 dependency means we can now document that
dbus_g_thread_init() is idempotent and thread-safe
(fd.o #54770, Simon McVittie)
• Use g_cclosure_marshal_generic for all marshalling (fd.o #64214,
Simon McVittie)
Fixes:
• Allow timeouts to be migrated from one main context to another
without an assertion failure (fd.o #30574, Mike Gorse)
• Don't trip a libdbus fatal warning if a Unix fd or other unsupported type
is encountered in a message (fd.o #80557, Alban Crequy)
• Make the tests pass with newer GLib by not removing removed sources
(fd.o #83530, Simon McVittie)
• Fix some typos in the documentation (fd.o #45686, Jiří Klimeš)
• Make the Autotools setup less awful (fd.o #58698;
Rafał Mużyło, Simon McVittie)
D-Bus 1.8.16 (2015-02-09)
==
The “poorly concealed wrestlers” release.
Security fixes:
• Do not allow non-uid-0 processes to send forged ActivationFailure
messages. On Linux systems with systemd activation, this would
allow a local denial of service: unprivileged processes could
flood the bus with these forged messages, winning the race with
the actual service activation and causing an error reply
to be sent back when service auto-activation was requested.
This does not prevent the real service from being started,
so it only works while the real service is not running.
(CVE-2015-0245, fd.o #88811; Simon McVittie)
Other fixes:
• fix a Windows build failure (fd.o #88009, Ralf Habacker)
• on Windows, allow up to 8K connections to the dbus-daemon instead of the
previous 64, completing a previous fix which only worked under
Autotools (fd.o #71297, Ralf Habacker)
BackupPC is a high-performance, enterprise-grade system for backing up *NIX,
Windows and MacOSX PCs and laptops to a server's disk. BackupPC is highly
configurable and easy to install and maintain.
BackupPC does not require any agent software to be installed on the client
systems as it operates over SSH/rsync, Samba or ftp.
pkgsrc change: reduce conflict with adding pkg_alternatives support.
Changes from 1.7.5 are too many to write here, but version 2.4.1 fixes
CVE-2015-1426 security problem.
Add an 'ndmp' option, disabled by default.
Disable kerberos option by default.
These two changes allow amanda to build again on OS X. My belief,
posited on pkgsrc-users without contradiction, is that no pkgsrc users
use these features anyway. Normal amanda usage these days is over ssh
(which gets one PFS). NDMP is for direct dumping of NAS: usage is
probably rare and also in large installations where rebuilding is not
hard.
All in all, I thought it better for the pkgsrc/amanda universe to have
consistent options across platforms than to selectively disable on OS
X.
Official metrics to help the development direction of Capistrano.
Collects anonymous usage statistics about Capistrano to aid with platform
support and ruby version targeting.
1.6.10
Fixes an issue with the copy module when copying a directory that fails when changing file attributes and the target file already exists
Improved unicode handling when splitting args
1.6.9
Further improvements to module parameter parsing to address additional regressions caused by security fixes
1.6.8
Corrects a regression in the way shell and command parameters were being parsed
1.6.7
Security fixes:
Strip lookup calls out of inventory variables and clean unsafe data returned from lookup plugins (CVE-2014-4966)
Make sure vars don't insert extra parameters into module args and prevent duplicate params from superseding previous params (CVE-2014-4967)
1.6.6
Security updates to further protect against the incorrect execution of untrusted data
1.6.4, 1.6.5
Security updates related to evaluation of untrusted remote inputs
libpciaccess is used by the Xorg server to interface with the appropriate
routines for finding and using PCI bus devices on various operating systems.
This release provides a number of platform-specific improvements for various
platforms, including Linux, Solaris, OpenBSD, NetBSD, and Hurd, plus the
addition of some support for Cygwin.
Alan Coopersmith (3):
Enable use of __attribute__((deprecated)) with Solaris Studio 12.4 compiler
Solaris: Fix fd leak in pci_device_solx_devfs_map_range()
libpciaccess 0.13.3
Marcin Ko?cielnicki (1):
Fix IO access functions on linux+sysfs.
Mark Kettenis (1):
Use PCIOCREADMASK on OpenBSD.
Matthew Green (1):
Implement the kernel_has_driver() method for NetBSD.
Samuel Pitoiset (2):
Windows/Cygwin: Add support through the WinIo library
Fix a compilation error on GNU Hurd platforms.
Thomas Klausner (2):
Fix zlib handling on NetBSD.
Improve NetBSD i386 detection.
xenkernel45:
File "/tmp/pkgsrc/sysutils/xenkernel45/work.x86_64/xen-4.5.0/xen/tools/compat-
build-source.py", line 30
print line.rstrip()
^
SyntaxError: invalid syntax
xentools45:
File "mkchecker.py", line 40, in <module>
if compat_arches.has_key(a):
AttributeError: 'dict' object has no attribute 'has_key'
...
XXX Assume the same is true for python 3.4 and mark as not for 33 34
processes associated with the service. In the case of tenshi, the
refresh method currently uses :kill -HUP, which sends a HUP to the
spawned tail process as well as the tenshi process, killing the
tail and breaking tenshi.
Fix this problem. Bump PKGREVISION.
From Paul B. Henson in PR 49607.
launchd integration currently requires manual steps as described in MESSAGE.launchd. We may want to make it default once we have a framework for automatic launchd support.
guests operating systems on a single machine. Guest OSes (also
called "domains") require a modified kernel which supports Xen
hypercalls in replacement to access to the physical hardware. At
boot, the xen kernel is loaded along with the guest kernel for the
first domain (called domain0). domain0 has privileges to access
the physical hardware (PCI and ISA devices), administrate other
domains and provide virtual devices (disks and network) to other
domains.
xenkernel45 and xentools45 contains the kernel and tools from
the Xen 4.5.x branch