Commit graph

172965 commits

Author SHA1 Message Date
taca
3cc2dab7d0 Update bind98 package to 9.8.0pl4 (9.8.0-P4), security release.
Introduction

   BIND 9.8.0-P4 is security patch for BIND 9.8.0.

   Please see the CHANGES file in the source code release for a complete
   list of all changes.


	--- 9.8.0-P4 released ---

3124.	[bug]		Use an rdataset attribute flag to indicate
			negative-cache records rather than using rrtype 0;
			this will prevent problems when that rrtype is
			used in actual DNS packets.  [RT #24777]

	--- 9.8.0-P3 released (withdrawn) ---

3126.	[security]	Using DNAME record to generate replacements caused
			RPZ to exit with a assertion failure. [RT #23766]

3125.	[security]	Using wildcard CNAME records as a replacement with
			RPZ caused named to exit with a assertion failure.
			[RT #24715]

3123.	[security]	Change #2912 exposed a latent flaw in
			dns_rdataset_totext() that could cause named to
			crash with an assertion failure. [RT #24777]

3115.	[bug]		Named could fail to return requested data when
			following a CNAME that points into the same zone.
			[RT #2445]
2011-07-05 13:35:29 +00:00
mspo
d64f5efdab Upgrade from 2.1.0 -> latest (2.5.1). Also fixes build.
---
Release messages:
The RabbitMQ team is pleased to announce the release of RabbitMQ 2.1.1.
This release fixes a number of bugs and introduces some enhancements,
including exchange to exchange bindings and some performance improvements,
in the server and clients.

The RabbitMQ team is pleased to announce the release of RabbitMQ 2.2.0.
This release fixes a number of bugs and introduces some enhancements,
including automatic upgrades of non-clustered brokers, per-queue message
TTLs and significantly reduced memory usage for pending acknowledgements.

Perfectly timed one day before the start of the year of the Rabbit,
the RabbitMQ team is pleased to announce the release of RabbitMQ 2.3.0.
This release fixes a number of bugs and introduces some enhancements,
including streaming publish confirmations, new plugin mechanisms for
authentication and authorisation, and a great deal more.

The RabbitMQ team is pleased to announce the release of RabbitMQ 2.3.1.
This release fixes a small number of bugs, in particular one serious bug
in 2.3.0 which could lead to queue processes crashing.

The RabbitMQ team is delighted to announce the release of RabbitMQ 2.4.0.
This release fixes a number of bugs and introduces some enhancements,
including fast routing for topic exchanges, sender-selected distribution
and server-side consumer cancellation notifications.

The RabbitMQ team is delighted to announce the release of RabbitMQ 2.4.1.
This release fixes a number of bugs, in particular one bug in 2.4.0 that
would break upgrades if durable queues were present. A notable enhancement
included in this release are cluster upgrades.

The RabbitMQ team is delighted to announce the release of RabbitMQ 2.5.0.
This release fixes a number of bugs. In particular:
recovery has been simplified, improving startup times when many exchanges
or bindings exist
bindings are recovered between durable queues and non-durable exchanges
on restart of individual cluster nodes
better performance under high load and memory pressure
source compatibility with the new Erlang R14B03 release
New features include:
tracing facility for debugging incoming and outgoing messages, (see firehose)
improved inbound network performance
improved routing performance
new rabbitmqctl commands ('report', 'environment', and 'cluster_status')

The RabbitMQ team is pleased to announce the release of RabbitMQ 2.5.1.
This release correctly upgrades from RabbitMQ 2.1.1 and 2.2.0.
There are no other changes compared with 2.5.0.
2011-07-05 13:09:04 +00:00
jnemeth
125c097b80 Update to Asterisk 1.8.4.4 (fixes AST-2011-011):
Asterisk Project Security Advisory - AST-2011-011

   +------------------------------------------------------------------------+
   |      Product       | Asterisk                                          |
   |--------------------+---------------------------------------------------|
   |      Summary       | Possible enumeration of SIP users due to          |
   |                    | differing authentication responses                |
   |--------------------+---------------------------------------------------|
   | Nature of Advisory | Unauthorized data disclosure                      |
   |--------------------+---------------------------------------------------|
   |   Susceptibility   | Remote unauthenticated sessions                   |
   |--------------------+---------------------------------------------------|
   |      Severity      | Moderate                                          |
   |--------------------+---------------------------------------------------|
   |   Exploits Known   | No                                                |
   |--------------------+---------------------------------------------------|
   |      CVE Name      | CVE-2011-2536                                     |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Description | Asterisk may respond differently to SIP requests from an |
   |             | invalid SIP user than it does to a user configured on    |
   |             | the system, even when the alwaysauthreject option is set |
   |             | in the configuration. This can leak information about    |
   |             | what SIP users are valid on the Asterisk system.         |
   +------------------------------------------------------------------------+

   +------------------------------------------------------------------------+
   | Resolution | Respond to SIP requests from invalid and valid SIP users  |
   |            | in the same way. Asterisk 1.4 and 1.6.2 do not respond    |
   |            | identically by default due to backward-compatibility      |
   |            | reasons, and must have alwaysauthreject=yes set in        |
   |            | sip.conf. Asterisk 1.8 defaults to alwaysauthreject=yes.  |
   |            |                                                           |
   |            | IT IS ABSOLUTELY IMPERATIVE that users of Asterisk 1.4    |
   |            | and 1.6.2 set alwaysauthreject=yes in the general section |
   |            | of sip.conf.                                              |
   +------------------------------------------------------------------------+
2011-07-05 08:42:56 +00:00
jnemeth
a30622e2dd Update to 1.6.2.19 (fixes several security issues):
Please note that Asterisk 1.6.2.19 is the final maintenance release
from the 1.6.2 branch. Support for security related issues will
continue until April 21, 2012. For more information about support
of the various Asterisk branches, see
https://wiki.asterisk.org/wiki/display/AST/Asterisk+Versions

The release of Asterisk 1.6.2.19 resolves several issues reported
by the community and would have not been possible without your
participation.  Thank you!

The following is a sample of the issues resolved in this release:

* Don't broadcast FullyBooted to every AMI connection
   The FullyBooted event should not be sent to every AMI connection
   every time someone connects via AMI. It should only be sent to
   the user who just connected.
   (Closes issue #18168. Reported, patched by FeyFre)
* Fix thread blocking issue in the sip TCP/TLS implementation.
   (Closes issue #18497. Reported by vois. Tested by vois, rossbeer, kowalma,
   Freddi_Fonet. Patched by dvossel)
* Don't delay DTMF in core bridge while listening for DTMF features.
   (Closes issue #15642, #16625. Reported by jasonshugart, sharvanek. Tested by
   globalnetinc, jde. Patched by oej, twilson)
* Fix chan_local crashs in local_fixup()
   Thanks OEJ for tracking down the issue and submitting the patch.
   (Closes issue #19053. Reported, patched by oej)
* Don't offer video to directmedia callee unless caller offered it as well
   (Closes issue #19195. Reported, patched by one47)

Additionally security announcements AST-2011-008, AST-2011-010, and
AST-2011-011 have been resolved in this release.

For a full list of changes in this release, please see the ChangeLog:

http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.6.2.19
2011-07-05 08:34:47 +00:00
dholland
edfbf7955c Fix broken build. Needs explicit -lgcrypt. Add comment to patch-aa. 2011-07-05 05:02:10 +00:00
dholland
ab15844b62 Fix build with current png and gtk2. Fix patch-aa to not (inadvertently?)
disable optimization. No version bump since package wasn't buildable.
2011-07-05 04:28:34 +00:00
schnoebe
fb518ed493 Update distinfo after patches/patch-cmake_modules_FindTagLib.cmake has
had $ NetBSD $ expanded.
2011-07-05 04:09:05 +00:00
schnoebe
3a9efdea16 Add a patch for cmake/modules/FindTagLib.cmake to handle version
comparison correctly.
2011-07-05 04:04:30 +00:00
dholland
85640821af Add libXxf86dga and libXxf86vm and their *proto, because it wants them
and with native X finds part of them and then dies. Also apply
REPLACE_PYTHON to a python script and add python dep.
2011-07-05 03:44:06 +00:00
dholland
96b131efcc Bump PKGREVISION (to 18) for previous. 2011-07-05 03:27:49 +00:00
dholland
6ed83acafe Patch LP64 problems, add patch comments, fix some pkglint.
This may or may not fully run on LP64 platforms but it's much more
likely to now than previously.
2011-07-05 03:27:22 +00:00
dholland
841fd490b3 Fix up xf86dga handling so it will hopefully work with -5 native X. 2011-07-05 02:14:12 +00:00
dholland
c3879d2c74 Add xf86dgaproto to hopefully fix -5 native X failure. 2011-07-05 01:59:46 +00:00
dholland
37190dd5d5 Add xf86dgaproto and xextproto to hopefully fix -5 native X failure. 2011-07-05 01:53:48 +00:00
dholland
16f46108b5 Add xf86dgaproto to hopefully fix -5 native X failure. 2011-07-05 01:33:25 +00:00
dholland
363d292038 If it's going to install tcl scripts, and use REPLACE_INTERPRETER on them,
it needs to depend on tcl. PKGREVISION -> 4
2011-07-05 01:30:52 +00:00
dholland
46a73c7dfc Another one that installs perl scripts and uses REPLACE_PERL without
actually depending on perl.
2011-07-05 01:14:20 +00:00
dholland
660346e3c3 The "aot-compile" script uses python, so depend on python and deploy
REPLACE_PYTHON accordingly. PKGREVISION -> 3
2011-07-05 00:28:33 +00:00
jym
7bc796a43c check-interpreter fix. Add patch-aa for dblatex interpreter fix, see
comment in file.
2011-07-04 23:08:22 +00:00
jym
2a97ae3fad check-interpreter fix. 2011-07-04 22:23:12 +00:00
jym
34d7decd36 check-interpreter fix. 2011-07-04 22:08:01 +00:00
jym
90ef535081 Reuse the PYTHON_PATCH_SCRIPTS for interpreter fix. This is obviously
the same as my previous patch, no functional change.
2011-07-04 21:58:37 +00:00
dholland
1703ac3893 Needs USE_TOOLS+=perl:run, not just REPLACE_PERL. 2011-07-04 21:37:34 +00:00
jym
1e564a0d08 check-interpreter fix.
XXX package has a dependency on kdepimlibs4 on my host. Side effect maybe.
Not sure why TeXmacs would require KDE PIM libs.
2011-07-04 21:33:52 +00:00
jym
a91ee17dc4 check-interpreter fix. 2011-07-04 21:22:46 +00:00
tez
e0e117e7a6 openssl security fix 2011-07-04 14:49:45 +00:00
tez
2269c189c8 Correct the fix for http://secunia.com/advisories/44572/
See the thread here:
  http://www.mail-archive.com/openssl-dev@openssl.org/msg29283.html
2011-07-04 14:42:56 +00:00
spz
d26bad2846 a few bulk builds get compile failures in src/rpsl I can't reproduce;
try MAKE_JOBS_SAFE=NO to see if that fixes it for them
2011-07-04 12:08:51 +00:00
obache
484fb7f96a need qmake to build, add buildlink to qt4-tools. 2011-07-04 11:34:21 +00:00
obache
629288b45a * Remove patch-ab.
It does not support python27 and python31, but basically pkgsrc pass python
  path as PYTHON configure environment variable, so no need to add python
  variants here.
* Pass mozilla-rootcerts path as default CA certifcates file path to configure
  script like other packeges, or failed to configure if default expected
  files does not exist.
* On more care for in-tree *.pc file, or fail to configure.
  configure script add in-tree path to PKG_CONFIG, but pkgsrc pkg-config wrapper
  will overwrite and hide it.
* Set LICENSE as "gnu-lgpl-v2.1 AND mit" from COPYING file.
2011-07-04 07:08:24 +00:00
jym
5bf4ea1711 check-interpreter fix. Thank goodness REPLACE_INTERPRETER supports
globbing...
2011-07-04 01:13:30 +00:00
jym
5f9557b434 check-interpreter fix. 2011-07-04 00:18:07 +00:00
dholland
81fc88401f Add xf86dgaproto; may fix build with native X. 2011-07-03 22:09:41 +00:00
dholland
0e8bca8baa Fix failed build by removing stray ./ in some paths. Was meant to go
with previous commit but cvs apparently belched.
2011-07-03 22:04:51 +00:00
dholland
1ec21b7369 Fix failed build by removing stray ./ in some paths. 2011-07-03 22:04:06 +00:00
jym
d83eceebc5 Remove the part from patch-ac that modifies interpreter path. Not needed. 2011-07-03 21:42:24 +00:00
dholland
9a2a1bb6d9 add more REPLACE_PERL 2011-07-03 21:40:44 +00:00
jym
bf48b9b5d9 check-interpreter fix. 2011-07-03 21:36:20 +00:00
jym
ad45fc7d2c check-interpreter fix. 2011-07-03 21:25:50 +00:00
jym
c752e5a9ad check-interpreter fix. 2011-07-03 20:47:34 +00:00
jym
31aac40ec5 check-interpreter fix. Use subst.mk for substitution. 2011-07-03 20:44:45 +00:00
dholland
820433d9ad add patch comments 2011-07-03 20:15:58 +00:00
jym
1febc2e19f check-interpreter fix. 2011-07-03 20:01:26 +00:00
dholland
34f6b61280 Set DIST_SUBDIR. For some reason upstream reissued the same tarball with
a different timestamp in the gzip header. grr
2011-07-03 19:49:37 +00:00
jym
3bdb2fe89f check-interpreter fix. 2011-07-03 19:45:14 +00:00
dholland
3ec51c041e Add xf86vidmodeproto to (hopefully) fix the build on netbsd-5, plus add
direct dep on libX11 according to verifypc.
2011-07-03 19:24:36 +00:00
dholland
bfd08d0432 Add xf86vidmodeproto in the hopes this will fix the -5 native X build, like
in xine-ui, but I can't actually test that.
2011-07-03 18:16:19 +00:00
mspo
bdd5661b48 Updated games/scid to 3.6.1nb2 2011-07-03 17:06:39 +00:00
mspo
0756d2c1ff add python dep for pgnfix and REPLACE_PYTHON 2011-07-03 17:02:22 +00:00
jym
d729ab7223 check-interpreter fix. 2011-07-03 16:27:14 +00:00