Commit graph

186027 commits

Author SHA1 Message Date
drochner
1c87b06a64 update to 2.36.1
This is a new major release.
2012-04-30 14:17:12 +00:00
drochner
a32ae4d72f sync w/ base pkg 2012-04-30 14:13:39 +00:00
drochner
b3756bf514 update to 2.26.1
This is a new major release tree.
2012-04-30 14:12:05 +00:00
drochner
27f31fe09b update to 1.30.0
changes:
-bugfixes
-documentation fixes
2012-04-30 14:06:02 +00:00
gdt
294f0d2e46 Updated pkgtools/pkg_rolling-replace to 0.24.1 2012-04-30 14:00:00 +00:00
gdt
7d59f91b4d Use " for PKGNAME_REQUIRED, so that ${pkg} is expanded.
Resolves at least some issues with finding the right pyNN-foo, when
replacing packages that don't match PYTHON_VERSION_DEFAULT.

(This was a stray change in my tree not committed for a while, but
it's been working ok.)

Now 0.24.1.
2012-04-30 13:59:38 +00:00
drochner
19b03d3cb0 needs glib2>=2.32 2012-04-30 13:57:02 +00:00
drochner
cc56c946a7 update to 2.32.1
This is the new major tree, needed for a number of Gnome pkgs.
The optional "kqueue" patch isn't ready yet, so the "kqueue" option
does not work atm.
2012-04-30 13:53:48 +00:00
obache
480cdd67f4 Only available on MASTER_SITE_MOZILLA_ALL. 2012-04-30 09:54:03 +00:00
sbd
2eecd30946 Disable GC_register_my_thread and GC_unregister_my_thread on NetBSD as
the version of boehm-gc bundled with gcc does not support NetBSD threads.
2012-04-30 09:12:28 +00:00
obache
ed7dbf8cd9 Add dm-download02.mozilla.org to MASTER_SITE_MOZILLA_ALL. 2012-04-30 09:10:06 +00:00
shattered
68c66fa8e1 Add x11 and sdl options (sdl does not work yet). 2012-04-30 08:26:41 +00:00
dholland
dadb70ad5a My stuff from this past weekend. 2012-04-30 08:09:13 +00:00
sbd
3cbad5e907 Updated x11/xorg-cf-files to 1.0.4nb4 2012-04-30 07:26:19 +00:00
sbd
d22300465c The changes to patch-ai in rev1.3 need the PKGREVISION to be bumped. 2012-04-30 07:26:08 +00:00
sbd
fab506b346 Remove gcc-go from PKG_SUGGESTED_OPTIONS as it seems to have some build
problems.
2012-04-30 04:17:39 +00:00
dholland
ce7871c5e9 Bump PKGREVISION for previous. 2012-04-30 04:02:34 +00:00
dholland
63c66fd040 DESTDIR support. Fix problems building the database. 2012-04-30 04:01:08 +00:00
jnemeth
d8074501ad Updated comms/asterisk16 to 1.6.2.24 2012-04-30 03:19:49 +00:00
jnemeth
38c2539a3f Update to Asterisk 1.6.2.24. This fixes AST-2012-004 and AST-2012-005.
The 1.6.2 series went End of Life on April 21st 2012, so this was
the last update.  This package will be deleted in the not too
distnat future.

The Asterisk Development Team has announced security releases for
Asterisk 1.6.2 , 1.8, and 10. The available security releases are
released as versions 1.6.2.24, 1.8.11.1, and 10.3.1.

The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the
following two issues:

 * A permission escalation vulnerability in Asterisk Manager
   Interface.  This would potentially allow remote authenticated
   users the ability to execute commands on the system shell with
   the privileges of the user running the Asterisk application.

 * A heap overflow vulnerability in the Skinny Channel driver.
   The keypad button message event failed to check the length of
   a fixed length buffer before appending a received digit to the
   end of that buffer.  A remote authenticated user could send
   sufficient keypad button message events that th e buffer would
   be overrun.

These issues and their resolution are described in the security
advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2012-004, AST-2012-005, and
AST-2012-006, which were released at the same time as this
announcement.

For a full list of changes in the current releases, please see the
ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.24

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf

Thank you for your continued support of Asterisk!
2012-04-30 03:19:40 +00:00
dholland
f7e33f85c7 Switch the qt4 option on by default, as it turns out it works and (to
my surprise) doesn't require PLIST additions. Ride the update as it was
less than an hour ago.
2012-04-30 02:54:28 +00:00
jnemeth
6a2b4e11a4 Updated comms/asterisk10 to 10.3.1 2012-04-30 02:53:47 +00:00
jnemeth
71b4572c54 Update to Asterisk 10.3.1. This Fixes AST-2012-004, AST-2012-005,
and AST-2012-006.

The Asterisk Development Team has announced security releases for
Asterisk 1.6.2 , 1.8, and 10. The available security releases are
released as versions 1.6.2.24, 1.8.11.1, and 10.3.1.

The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the
following two issues:

 * A permission escalation vulnerability in Asterisk Manager
   Interface.  This would potentially allow remote authenticated
   users the ability to execute commands on the system shell with
   the privileges of the user running the Asterisk application.

 * A heap overflow vulnerability in the Skinny Channel driver.
   The keypad button message event failed to check the length of
   a fixed length buffer before appending a received digit to the
   end of that buffer.  A remote authenticated user could send
   sufficient keypad button message events that th e buffer would
   be overrun.

In addition, the release of Asterisk 1.8.11.1 and 10.3.1 resolve
the following issue:

 * A remote crash vulnerability in the SIP channel driver when
   processing UPDATE requests.  If a SIP UPDATE request was received
   indicating a connected line update after a channel was terminated
   but before the final destruction of the associated SIP dialog,
   Asterisk would attempt a connected line update on a non-existing
   channel, causing a crash.

These issues and their resolution are described in the security
advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2012-004, AST-2012-005, and
AST-2012-006, which were released at the same time as this
announcement.

For a full list of changes in the current releases, please see the
ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.3.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-006.pdf

Thank you for your continued support of Asterisk!
2012-04-30 02:53:25 +00:00
dholland
5d605715aa DESTDIR support. 2012-04-30 02:51:50 +00:00
dholland
2ddb0bae0a Fix build on NetBSD. 2012-04-30 02:51:40 +00:00
jnemeth
cb7e394622 Updated comms/asterisk18 to 1.8.11.1 2012-04-30 02:34:05 +00:00
jnemeth
11449b0ae9 Update to Asterisk 1.8.11.1. This fixes AST-2012-004, AST-2012-005,
and AST-2012-006.

The Asterisk Development Team has announced security releases for
Asterisk 1.6.2 , 1.8, and 10. The available security releases are
released as versions 1.6.2.24, 1.8.11.1, and 10.3.1.

The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the
following two issues:

 * A permission escalation vulnerability in Asterisk Manager
   Interface.  This would potentially allow remote authenticated
   users the ability to execute commands on the system shell with
   the privileges of the user running the Asterisk application.

 * A heap overflow vulnerability in the Skinny Channel driver.
   The keypad button message event failed to check the length of
   a fixed length buffer before appending a received digit to the
   end of that buffer.  A remote authenticated user could send
   sufficient keypad button message events that th e buffer would
   be overrun.

In addition, the release of Asterisk 1.8.11.1 and 10.3.1 resolve
the following issue:

 * A remote crash vulnerability in the SIP channel driver when
   processing UPDATE requests.  If a SIP UPDATE request was received
   indicating a connected line update after a channel was terminated
   but before the final destruction of the associated SIP dialog,
   Asterisk would attempt a connected line update on a non-existing
   channel, causing a crash.

These issues and their resolution are described in the security
advisories.

For more information about the details of these vulnerabilities,
please read security advisories AST-2012-004, AST-2012-005, and
AST-2012-006, which were released at the same time as this
announcement.

For a full list of changes in the current releases, please see the
ChangeLogs:

http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.24
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.11.1
http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.3.1

The security advisories are available at:

 * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf
 * http://downloads.asterisk.org/pub/security/AST-2012-006.pdf

Thank you for your continued support of Asterisk!
2012-04-30 02:33:21 +00:00
dholland
3dd61415ee updated aqsis 2012-04-30 01:59:50 +00:00
dholland
07c59aeb65 Update to 1.8.1. Changes: 10 years of development.
Add missing DESTDIR support.

Restriction: so far the GUI parts, which require qt4, are not built
by default, and probably won't build yet if enabled.
2012-04-30 01:59:12 +00:00
dholland
18dba2ccff Fix build with non-default PREFIX: tell it where to find liblzo. Otherwise
it knows abotu /usr/pkg, looks there, and fails.
2012-04-29 22:49:31 +00:00
ryoon
304d9c65d1 Updated mail/thunderbird10 to 10.0.4
Updated mail/thunderbird10-l10n to 10.0.4
2012-04-29 20:38:46 +00:00
ryoon
f94f9f0c52 Update to 10.0.4
Patches from Bernd Ernesti on pkgsrc-users.

Changelog:
The following problems are fixed.
* Security fixes
* Using MAPI send with Thunderbird in offline mode will now work correctly
* Language packs will now work for all releases of an ESR branch
2012-04-29 20:36:30 +00:00
dholland
6da92a9b0a Patch out an unnecessary configure test that blows up with the latest
autoconf. While here, mop up some pkglint.
2012-04-29 17:17:59 +00:00
taca
ee54ecdf69 Note update of www/contao211-translations package to 201204290. 2012-04-29 16:45:54 +00:00
taca
19d19ad390 Update contao211-translations to 201204290.
Update Slovak language files.
2012-04-29 16:45:24 +00:00
taca
9971105dc0 Note update of devel/ruby-readline to 1.9.3p194nb1. 2012-04-29 16:44:21 +00:00
taca
c85bd8a671 Don't enable "readline" option default if RUBY_VER is prior to 193.
Ruby 1.9.3 changes its license and solve the problem with GPL3 of readline
license.  But Ruby 1.9.2/1.8.7 dosen't solve this problem.

If you want to use ruby-readline with GNU readline on ruby18 or ruby192,
please explictly set "readline" PKG_OPTION.

Fix PR pkg/41943.

Bump PKGREVISION.
2012-04-29 16:43:49 +00:00
taca
601296e43e Note update of www/php-apc package to 3.1.10. 2012-04-29 16:39:02 +00:00
taca
9b13382108 Update php-apc package to 3.1.10.
- Add PHP 5.4 support (Dmitry, Anatoliy, Pierre)
- Fixed bug #22679: Fix apc_bin_dump for constants. Use IS_CONSTANT_TYPE_MASK
  to handle all the constants, including the unqalified ones (instead of
  ~IS_CONSTANT_INDEX check)
- Fixed bug #23822, php crashes on apache restart
2012-04-29 16:38:14 +00:00
taca
44bf8d7a39 Note update of lang/pear package to 1.9.4nb3. 2012-04-29 16:35:21 +00:00
taca
37130afc4e Update Archive_Tar which included this package to 1.3.10.
Archive_Tar 1.3.10

Changelog:

* Fix Bug #13361: Unable to add() some files (ex. mp3) [mrook]
* Fix Bug #19330: Class creates incorrect (non-readable) tar.gz file [mrook]

Bump PKGREVISION.
2012-04-29 16:34:49 +00:00
ryoon
fc24bc9bdc Updated devel/xulrunner10 to 10.0.4
Updated www/firefox10 to 10.0.4
Updated www/firefox10-l10n to 10.0.4
2012-04-29 16:32:01 +00:00
ryoon
09db9bc659 Update to 10.0.4
Patches from Bernd Ernesti on pkgsrc-users.

Changelog:
The following problems are fixed.
* Security fixes
* extensions.checkCompatibility.* prefs didn't work as expected
  in ESR releases (734848)
* Firefox ESR 10.0.3 opened "Whats New" page after update (737535)
2012-04-29 16:30:08 +00:00
taca
42eed79d38 Note update of www/termtter package to 1.11.0. 2012-04-29 16:16:58 +00:00
taca
ac0c395771 Update termtter to 1.11.0.
Changes are unavailable.
2012-04-29 16:16:30 +00:00
taca
d10d4691ef Note update of these packages:
www/ramaze		2012.04.14
	www/ruby-mechanize	2.4
2012-04-29 16:12:20 +00:00
taca
5fdb62bb0e Update ruby-mechanize to 2.4.
=== 2.4

* Security fix:

  Mechanize#auth and Mechanize#basic_auth allowed disclosure of passwords to
  malicious servers and have been removed.

  In prior versions of mechanize only one set of HTTP authentication
  credentials were allowed for all connections.  If a mechanize instance
  connected to more than one server then a malicious server detecting
  mechanize could ask for HTTP Basic authentication.  This would expose the
  username and password intended only for one server.

  Mechanize#auth and Mechanize#basic_auth now warn when used.

  To fix the warning switch to Mechanize#add_auth which requires at the URI
  the credentials are intended for, the username and the password.
  Optionally an HTTP authentication realm or NTLM domain may be provided.

* Minor enhancement
  * Improved exception messages for 401 Unauthorized responses.  Mechanize now
    tells you if you were missing credentials, had an incorrect password, etc.
2012-04-29 16:11:17 +00:00
taca
34c53a2787 Update ramaze to 2012.04.14.
Changelog

* The Redis adapter (Ramaze::Cache::Redis) has been fixed so that it works
  with sessions, previously this would result in "Can't convert into symbol"
  errors and the like. This problem was caused by not encoding data using
  Marshal. Thanks to EdvardM for reporting the issue.
* The Redis cache adapter namespaces keys just like the other adapters.
* Ramaze::Cache::MemCache has been updated for the latest version of Dalli and
  should no longer display deprecation warnings. The minimum required version
  of Dalli has been set to at least 2.0.2.
* Various documentation improvements and additions.
* The HTML of the pagination helper can now be customized, thanks to Leucos
  and bougyman for adding it.
2012-04-29 16:09:34 +00:00
taca
22ccc89a7c Note update of www/ruby-unicorn package to 4.3.1. 2012-04-29 16:06:30 +00:00
taca
321dde0763 Update ruby-unicorn to 4.3.1.
=== unicorn 4.3.1 - shutdown() fixes / 2012-04-29 07:04 UTC

  * Call shutdown(2) if a client EOFs on us during upload.
    We can avoid holding a socket open if the Rack app forked a
    process during uploads.

  * ignore potential Errno::ENOTCONN errors (from shutdown(2)).
    Even on LANs, connections can occasionally be accept()-ed but
    be unusable afterwards.

  Thanks to Joel Nimety <jnimety@continuity.net>,
  Matt Smith <matt@nearapogee.com> and George <lists@southernohio.net>
  on the mongrel-unicorn@rubyforge.org mailing list for their
  feedback and testing for this release.

=== unicorn 4.3.0 - minor fixes and updates / 2012-04-17 21:51 UTC

  * PATH_INFO (aka REQUEST_PATH) increased to 4096 (from 1024).
    This allows requests with longer path components and matches
    the system PATH_MAX value common to GNU/Linux systems for
    serving filesystem components with long names.

  * Apps that fork() (but do not exec()) internally for background
    tasks now indicate the end-of-request immediately after
    writing the Rack response.

  Thanks to Hongli Lai, Lawrence Pit, Patrick Wenger and Nuo Yan
  for their valuable feedback for this release.

=== unicorn 4.2.1 - minor fix and doc updates / 2012-03-26 21:39 UTC

  * Stale pid files are detected if a pid is recycled by processes
    belonging to another user, thanks to Graham Bleach.
  * nginx example config updates thanks to to Eike Herzbach.
  * KNOWN_ISSUES now documents issues with apps/libs that install
    conflicting signal handlers.
2012-04-29 16:05:42 +00:00