which is required to update misc/p5-Locale-US.
This module is a simpler version of the excellent Data::Section. If
you want more functionalities such as merging data sections or
changing header patterns, use Data::Section instead.
Changes from 10.3.183.7
Critical vulnerabilities have been identified in Adobe Flash Player
11.0.1.152 and earlier versions for Windows, Macintosh, Linux and
Solaris, and Adobe Flash Player 11.0.1.153 and earlier versions
for Android. These vulnerabilities could cause a crash and potentially
allow an attacker to take control of the affected system.
Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier
versions for Windows, Macintosh, Linux and Solaris update to Adobe
Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153
and earlier versions for Android should update to Adobe Flash Player
11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows,
Macintosh, and Android should update to Adobe AIR 3.1.0.4880.
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2445).
This update resolves a heap corruption vulnerability that could lead to code execution (CVE-2011-2450).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2451).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2452).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2453).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2454).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2455).
This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456).
This update resolves a stack overflow vulnerability that could lead to code execution (CVE-2011-2457).
This update resolves a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2459).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2460).
... now after reading the above, just how happy are people running this code
from their browsers?
Changes from 11.0.1.152
Critical vulnerabilities have been identified in Adobe Flash Player
11.0.1.152 and earlier versions for Windows, Macintosh, Linux and
Solaris, and Adobe Flash Player 11.0.1.153 and earlier versions
for Android. These vulnerabilities could cause a crash and potentially
allow an attacker to take control of the affected system.
Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier
versions for Windows, Macintosh, Linux and Solaris update to Adobe
Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153
and earlier versions for Android should update to Adobe Flash Player
11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows,
Macintosh, and Android should update to Adobe AIR 3.1.0.4880.
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2445).
This update resolves a heap corruption vulnerability that could lead to code execution (CVE-2011-2450).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2451).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2452).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2453).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2454).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2455).
This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456).
This update resolves a stack overflow vulnerability that could lead to code execution (CVE-2011-2457).
This update resolves a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2459).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2460).
... now after reading the above, just how happy are people running this code
from their browsers?
There are VCL-incompatible changes between 2.x and 3.x.
Some release highlights (https://www.varnish-cache.org/):
Introduction of VMODs
Add streaming on pass and miss. This is controlled by the beresp.do_stream boolean. This includes support for compression/uncompression.
Add support for ESI and gzip.
Handle objects larger than 2G.
HTTP Range support is now enabled by default
The ban lurker is enabled by default
if there is a backend or director with the name default, use that as the default backend, otherwise use the first one listed.
Add many more stats counters. Amongst those, add per storage backend stats and per-backend statistics.
Syslog the platform we are running on
The -l (shared memory log file) argument has been changed, please see the varnishd manual for the new syntax.
The -S and -T arguments are now stored in the shmlog
Make it possible to name storage backends. The names have to be unique.
The max_esi_includes parameter has been renamed to max_esi_depth.
The err_ttl parameter has been removed and is replaced by a setting in default.vcl.
Add panic.show and panic.clear CLI commands.
VCL now has vcl_init and vcl_fini functions that are called when a given VCL has been loaded and unloaded.
Varnish is now stricter in enforcing no duplication of probes, backends and ACLs.
The ABI of vmods are now checked. This will require a rebuild of all vmods against the new version of Varnish.
XXX Set MAKE_JOBS_SAFE=no for now. Should investigate why it fails
without it as it prolongs build time significantly.
Upstream changes:
Add-ons installed by third party programs are now disabled by default
Added a one-time add-on selection dialog to manage previously installed add-ons
Added Twitter to the search bar for select locales. Additional locale support
will be added in the future
Added a preference to load tabs on demand, improving start-up time when
windows are restored
Improved performance and memory handling when using <audio> and <video>
elements
Added CORS support for cross-domain textures in WebGL
Added support for HTML5 context menus
Added support for insertAdjacentHTML
Improved CSS hyphen support for many languages
Improved WebSocket support
Fixed several stability issues
Fixed several security issues
Recent versions of devel/p5-Object-InsideOut optionally uses this
module.
This module provides pseudorandom number generators (PRNGs) that are
based on the Mersenne Twister algorithm. There is a functional
interface to a standalone PRNG, and an OO interface (based on the
inside-out object model as implemented by the Object::InsideOut
module) for generating multiple PRNG objects.
Changes from previous:
0.93 Fri Feb 11 17:13:02 EST 2011
- When slurping MARCXML records (e.g., via MARC::Batch), can
now handle XML files that use a prefix
to refer to the http://www.loc.gov/MARC21/slim namespace.
- If trying to parse a MARCXML record that has omitted
the <record> wrapper element, throw an exception
with a more meaningful error message.
- adjusted copyright statement further to meet Debian requirements
(RT#48333)
- set license in Makefile.PL
Changes from previous:
0.14 Mon Oct 31 10:37:49 PDT 2011
- Fixed a bug where croak was not imported from Carp (ctfliblime)
0.13 Sun Sep 18 12:10:56 PDT 2011
- Set the status header to 302 if there's Location header but no Status in the resonse (ASP)
0.12 Thu Jun 9 23:58:10 PDT 2011
- Fixed the PSGI header generation to prevent invalid PSGI response headers
such as newlines in the value and "Status" key
0.11 Fri Feb 18 21:35:29 PST 2011
- Filter psgix.* environment too (mkanat)
Changes from previous:
3.84 Tue Oct 11 22:42:26 2011
- Fixed bug in string dump of objects
3.83 Thu Oct 6 23:53:04 2011
- Fix bug with NOT_SHARED in threads::shared app
- Document error caused by returning non-shared objects from threads
3.82 Tue Sep 27 23:28:33 2011
- Fix obj ID reuse for shared objects in threaded app
- Documented limitation regarding removing shared internal objects
3.81 Tue Mar 22 02:20:49 2011
- Faster initialization (from O(n^3) to O(n))
3.79 Fri Dec 24 18:06:02 2010
- Bundle update
3.78 Fri Dec 24 15:35:25 2010
- POD update
3.77 Tue Dec 21 14:29:37 2010
- Test fixes for $@ changes
- Test change for ??? syntax error
3.76 Mon Nov 15 00:01:50 2010
- Skip some more shared tests under 5.8.8 and prior
3.75 Tue Nov 9 15:01:06 2010
- Skip some shared tests under 5.8.8 and prior
3.74 Tue Nov 9 02:16:45 2010
- threads::shared version number in test
3.73 Mon Nov 8 18:53:00 2010
- Fix obj ID handling for shared objects in threaded app
3.72 Mon Oct 18 21:15:53 2010
- Fix obj ID handling for non-shared objects in threaded app
3.71 Wed Oct 13 18:25:20 2010
- Fixed a memory leak
3.69 Tue Sep 28 20:38:53 2010
- Fix test counts in t/27-exception.t
3.68 Thu Sep 23 17:09:21 2010
- POD note to 'use threads' in DBI applications [bug #58394]
- Allow warnings for unhandled args
Changes from previous:
0.05 2011-02-26
- In Moose 1.9900+, attributes from roles no longer acquire the consuming
class's attribute traits. However, you can apply attribute traits like this
one to attributes in roles, and that trait is preserved when the role is
applied to a class.
See the documentation for more details.
Changes from previous:
Version 1.02 2011-06-23
Added 'width' method.
Updated some tests which did not run correctly with perl 5.015. Renee Baecker
Version 1.03 2011-06-28
Missed one of the tests that fail with perl 5.015.
This package is required to update databases/p5-DBIx-Class-Schema-Loader.
MooseX::MarkAsMethods allows one to easily mark certain functions as
Moose methods. This will allow other packages such as
namespace::autoclean to operate without blowing away your overloads.
After using MooseX::MarkAsMethods your overloads will be recognized by
Class::MOP as being methods, and class extension as well as
composition from roles with overloads will "just work".
Changes from previous:
0.110001 2011-04-03 16:32:15 America/New_York
prevent Test::MinimumVersion test from causing a requirement on T::MV
and, thus, PPI! Thanks for the report, Matt S. Trout!
0.110000 2011-03-17 21:40:36 America/New_York
provide a much clearer and more fatal error when SASL authentication
has failed because Authen::SASL or MIME::Base64 is not available
Changes from previous:
0.17 Wed Oct 26 08:34:17 EST 2011
* Warnings avoidance for reloading a module not in %INC
* Updated inc/ and META.yml
0.16 Fri Apr 15 15:03:21 EST 2011
* SIGNATURE file bug
0.15 Fri Apr 15 15:00:15 EST 2011
* No functional changes. Added missing test dependencies. Thanks to JQUELIN & Paul at City Fan
0.14 Tue Apr 12 18:07:44 EST 2011
* Actually remove subroutines from the symbol table, Thanks to DOY.