Age | Commit message (Collapse) | Author | Files | Lines |
|
emulators/suse131_openssl: security update
Revisions pulled up:
- emulators/suse131_openssl/Makefile 1.8
- emulators/suse131_openssl/distinfo 1.8
---
Module Name: pkgsrc
Committed By: obache
Date: Wed May 14 09:31:44 UTC 2014
Modified Files:
pkgsrc/emulators/suse131_openssl: Makefile distinfo
Log Message:
Apply openSUSE Security Update: openSUSE-SU-2014:0635-1
update for openssl
Description:
- Fixed bug[ bnc#876282], CVE-2014-0198 openssl: OpenSSL NULL pointer
dereference in do_ssl3_write Add file: CVE-2014-0198.patch
Bump PKGREVISION.
|
|
emulators/suse131_libpng: security update
Revisions pulled up:
- emulators/suse131_libpng/Makefile 1.4
- emulators/suse131_libpng/distinfo 1.4
---
Module Name: pkgsrc
Committed By: obache
Date: Thu May 8 12:46:36 UTC 2014
Modified Files:
pkgsrc/emulators/suse131_libpng: Makefile distinfo
Log Message:
Apply openSUSE Security Update: openSUSE-SU-2014:0618-1
update for libpng12
Description:
This libpng12 update fixes the following two security
issues.
- bnc#873123: Fixed integer overflow leading to a
heap-based buffer overflow in png_set_sPLT() and
png_set_text_2() (CVE-2013-7354).
- bnc#873124: Fixed integer overflow leading to a
heap-based buffer overflow in png_set_unknown_chunks()
(CVE-2013-7353).
Bump PKGREVISION.
|
|
|
|
multimedia/adobe-flash-plugin11: security update
Revisions pulled up:
- multimedia/adobe-flash-plugin11/Makefile 1.29
- multimedia/adobe-flash-plugin11/distinfo 1.27
---
Module Name: pkgsrc
Committed By: obache
Date: Wed May 14 09:22:18 UTC 2014
Modified Files:
pkgsrc/multimedia/adobe-flash-plugin11: Makefile distinfo
Log Message:
Update adobe-flash-plugin11 to 11.2.202.359 for APSB14-14.
|
|
|
|
databases/openldap-server: security patch
Revisions pulled up:
- databases/openldap-server/Makefile 1.41
- databases/openldap/distinfo 1.95
- databases/openldap/patches/patch-libraries_librewrite_session.c 1.1
-------------------------------------------------------------------
Module Name: pkgsrc
Committed By: tron
Date: Fri May 9 08:12:00 UTC 2014
Modified Files:
pkgsrc/databases/openldap: distinfo
pkgsrc/databases/openldap-server: Makefile
Added Files:
pkgsrc/databases/openldap/patches: patch-libraries_librewrite_session.c
Log Message:
Add patch from OpenLDAP GIT repository to fix CVE-2013-4449 (SA55238).
To generate a diff of this commit:
cvs rdiff -u -r1.94 -r1.95 pkgsrc/databases/openldap/distinfo
cvs rdiff -u -r1.40 -r1.41 pkgsrc/databases/openldap-server/Makefile
cvs rdiff -u -r0 -r1.1 \
pkgsrc/databases/openldap/patches/patch-libraries_librewrite_session.c
|
|
|
|
mail/thunderbird: restore dropped enigmail distinfo
Revisions pulled up:
- mail/thunderbird/distinfo 1.140
-------------------------------------------------------------------
Module Name: pkgsrc
Committed By: tron
Date: Tue May 6 19:26:57 UTC 2014
Modified Files:
pkgsrc/mail/thunderbird: distinfo
Log Message:
Re-add checksum for "enigmail-1.6.tar.gz". Problem found by wizd(8).
To generate a diff of this commit:
cvs rdiff -u -r1.139 -r1.140 pkgsrc/mail/thunderbird/distinfo
|
|
|
|
mail/thunderbird: security update
Revisions pulled up:
- mail/thunderbird/Makefile 1.136
- mail/thunderbird/distinfo 1.139
-------------------------------------------------------------------
Module Name: pkgsrc
Committed By: tron
Date: Tue May 6 16:03:38 UTC 2014
Modified Files:
pkgsrc/mail/thunderbird: Makefile distinfo
Log Message:
Update "thunderbird" package to version 24.5.0.
The following security problems were fixed in this release:
- MFSA 2014-46 Use-after-free in nsHostResolve
- MFSA 2014-44 Use-after-free in imgLoader while resizing images
- MFSA 2014-43 Cross-site scripting (XSS) using history navigations
- MFSA 2014-42 Privilege escalation through Web Notification API
- MFSA 2014-38 Buffer overflow when using non-XBL object as XBL
- MFSA 2014-37 Out of bounds read while decoding JPG images
- MFSA 2014-35 Privilege escalation through Mozilla Maintenance Service
Installer
- MFSA 2014-34 Miscellaneous memory safety hazards
To generate a diff of this commit:
cvs rdiff -u -r1.135 -r1.136 pkgsrc/mail/thunderbird/Makefile
cvs rdiff -u -r1.138 -r1.139 pkgsrc/mail/thunderbird/distinfo
|
|
|
|
emulators/suse131_mozilla-nss: security update
Revisions pulled up:
- emulators/suse131_mozilla-nss/Makefile 1.2-1.3
- emulators/suse131_mozilla-nss/distinfo 1.2-1.3
---
Module Name: pkgsrc
Committed By: obache
Date: Fri Apr 4 10:08:21 UTC 2014
Modified Files:
pkgsrc/emulators/suse131_mozilla-nss: Makefile distinfo
Log Message:
Update suse131_mozilla-nss RPM to 3.15.5-16.1 from openSUSE-SU-2014:0448-1.
Changes in mozilla-nss:
- update to 3.15.5
* required for Firefox 28
* export FREEBL_LOWHASH to get the correct default
headers (bnc#865539) New functionality
* Added support for the TLS application layer protocol
negotiation (ALPN) extension. Two SSL socket options,
SSL_ENABLE_NPN and SSL_ENABLE_ALPN, can be used to
control whether NPN or ALPN (or both) should be used
for application layer protocol negotiation.
* Added the TLS padding extension. The extension type
value is 35655, which may change when an official
extension type value is assigned by IANA. NSS
automatically adds the padding extension to ClientHello
when necessary.
* Added a new macro CERT_LIST_TAIL, defined in certt.h,
for getting the tail of a CERTCertList. Notable Changes
* bmo#950129: Improve the OCSP fetching policy when
verifying OCSP responses
* bmo#949060: Validate the iov input argument (an array
of PRIOVec structures) of ssl_WriteV (called via
PR_Writev). Applications should still take care when
converting struct iov to PRIOVec because the iov_len
members of the two structures have different types
(size_t vs. int). size_t is unsigned and may be larger
than int.
Bump PKGREVISION.
---
Module Name: pkgsrc
Committed By: obache
Date: Sat May 3 02:19:27 UTC 2014
Modified Files:
pkgsrc/emulators/suse131_mozilla-nss: Makefile distinfo
Log Message:
Apply Security Update: openSUSE-SU-2014:0599-1
update for MozillaFirefox
Description:
This is also a mozilla-nss update to version 3.16:
* required for Firefox 29
* bmo#903885 - (CVE-2014-1492) In a wildcard certificate,
the wildcard character should not be embedded within
the U-label of an internationalized domain name. See
the last bullet point in RFC 6125, Section 7.2.
* Supports the Linux x32 ABI. To build for the Linux x32
target, set the environment variable USE_X32=1 when
building NSS. New Functions:
* NSS_CMSSignerInfo_Verify New Macros
* TLS_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_3DES_EDE_CBC_SHA, etc., cipher suites that
were first defined in SSL 3.0 can now be referred to
with their official IANA names in TLS, with the TLS_
prefix. Previously, they had to be referred to with
their names in SSL 3.0, with the SSL_ prefix. Notable
Changes:
* ECC is enabled by default. It is no longer necessary to
set the environment variable NSS_ENABLE_ECC=1 when
building NSS. To disable ECC, set the environment
variable NSS_DISABLE_ECC=1 when building NSS.
* libpkix should not include the common name of CA as DNS
names when evaluating name constraints.
* AESKeyWrap_Decrypt should not return SECSuccess for
invalid keys.
* Fix a memory corruption in sec_pkcs12_new_asafe.
* If the NSS_SDB_USE_CACHE environment variable is set,
skip the runtime test sdb_measureAccess.
* The built-in roots module has been updated to version
1.97, which adds, removes, and distrusts several
certificates.
* The atob utility has been improved to automatically
ignore lines of text that aren't in base64 format.
* The certutil utility has been improved to support
creation of version 1 and version 2 certificates, in
addition to the existing version 3 support.
Bump PKGREVISION.
|
|
emulators/suse131_libcurl: security update
Revisions pulled up:
- emulators/suse131_libcurl/Makefile 1.4
- emulators/suse131_libcurl/distinfo 1.4
---
Module Name: pkgsrc
Committed By: obache
Date: Sat May 3 02:13:44 UTC 2014
Modified Files:
pkgsrc/emulators/suse131_libcurl: Makefile distinfo
Log Message:
Apply Security Update: openSUSE-SU-2014:0598-1
update for curl
Description:
This curl update fixes two security issues:
- bnc#868627: Fixed wrong re-use of connections
(CVE-2014-0138).
- bnc#868629: Fixed IP address wildcard certificate
validation (CVE-2014-0139).
Bump PKGREVISION.
|
|
emulators/suse131_openssl: security update
Revisions pulled up:
- emulators/suse131_openssl/Makefile 1.6-1.7
- emulators/suse131_openssl/distinfo 1.6-1.7
---
Module Name: pkgsrc
Committed By: obache
Date: Wed Apr 23 13:14:42 UTC 2014
Modified Files:
pkgsrc/emulators/suse131_openssl: Makefile distinfo
Log Message:
Apply Security Update: openSUSE-SU-2014:0560-1
update for openssl
This is an openssl version update to 1.0.1g.
- The main reason for this upgrade was to be clear about
the TLS heartbeat problem know as "Heartbleed"
(CVE-2014-0160). That problem was already fixed in our
previous openssl update.
Bump PKGREVISION.
---
Module Name: pkgsrc
Committed By: obache
Date: Sat May 3 02:10:06 UTC 2014
Modified Files:
pkgsrc/emulators/suse131_openssl: Makefile distinfo
Log Message:
Apply Security Update: openSUSE-SU-2014:0592-1
OpenSSL: Fixed a use-after-free race condition in OpenSSL's read buffer.
Description:
A use-after-free race condition in OpenSSL's read buffer
was fixed that could cause connections to drop
(CVE-2010-5298).
Bump PKGREVISION.
|
|
|
|
archivers/libarchive: build fix
Revisions pulled up:
- archivers/libarchive/files/libarchive/archive_read_support_format_iso9660.c 1.5
---
Module Name: pkgsrc
Committed By: adam
Date: Mon Apr 7 18:40:05 UTC 2014
Modified Files:
pkgsrc/archivers/libarchive/files/libarchive:
archive_read_support_format_iso9660.c
Log Message:
Non-void function must return a value
|
|
www/mediawiki: security update
Revisions pulled up:
- www/mediawiki/Makefile 1.39
- www/mediawiki/distinfo 1.28
---
Module Name: pkgsrc
Committed By: wen
Date: Thu May 1 16:10:05 UTC 2014
Modified Files:
pkgsrc/www/mediawiki: Makefile distinfo
Log Message:
Update to 1.22.6
Upstream changes:
MediaWiki 1.22.6[edit | edit source]
This is a security release of the MediaWiki 1.22 branch.
Changes since 1.22.5[edit | edit source]
(bug 63251) SECURITY: Escape sortKey in pageInfo.
MediaWiki 1.22.5[edit | edit source]
This is a security and maintenance release of the MediaWiki 1.22 branch.
Changes since 1.22.4[edit | edit source]
(bug 62497) SECURITY: Add CSRF token on Special:ChangePassword.
(bug 62467) Set a title for the context during import on the cli.
Fix custom local MediaWiki:Helppage values.
mediawiki.js: Fix documentation breakage.
(bug 58153) Make MySQLi work with non standard port.
(bug 53887) Reintroduced a link to help pages in the default sidebar,
that any sysop can customize by editing MediaWiki:Sidebar locally. The
link now points to a mediawiki.org page which is guaranteed to exist.
Nothing needs to be done on your end, but remember to adjust
MediaWiki:Sidebar for the needs of your wikis. Everyone can help with
the shared documentation by translating:
https://www.mediawiki.org/wiki/Special:Translate/agg-Help_pages .
(bug 53888) Corrected a regression in 1.22 which introduced red links
on the login page. If you previously installed 1.22.x and have created
a local page to make the red link blue, write its title as in
MediaWiki:helplogin-url if you didn't already. Otherwise, you don't
need to do anything, but you can translate the help page at
https://www.mediawiki.org/wiki/Help:Logging_in
|
|
lang/sun-jdk7: security update
lang/sun-jre7: security update
Revisions pulled up:
- lang/sun-jdk7/distinfo 1.15
- lang/sun-jre7/Makefile.common 1.6
- lang/sun-jre7/distinfo 1.17
---
Module Name: pkgsrc
Committed By: ryoon
Date: Wed Apr 30 23:12:48 UTC 2014
Modified Files:
pkgsrc/lang/sun-jdk7: distinfo
pkgsrc/lang/sun-jre7: Makefile.common distinfo
Log Message:
Update to 7.0.55
Changelog:
JavaFX Release Notes
JavaFX is now part of JDK. JDK 7u55 release includes JavaFX version 2.2.55.
New Features and Changes
The frequency of some security dialogs has been reduced on systems that run the same RIA multiple times.
See 8029649.
Using "*" in Caller-Allowable-Codebase Attribute.
If a stand-alone asterisk (*), or asterisk as part of a top level domain such as (*.org), is specified as the value for the Caller-Allowable-Codebase attribute, then calls from JavaScript code to the RIA will show a security warning. An option to remember the choice is also provided, and if the user selects the option to remember the choice to run the RIA, no further warning messages are shown for the same RIA, when run with JavaScript from the same source.
For more information, see JAR File Manifest Attributes for Security documentation.
See 8033707.
Disabling Sponsor Offers in the Java Installer
During the installation of Java, users may be presented with the option of downloading and installing sponsor offers, such as browser add-ons, or security software. With 7u55 and later releases of Java, sponsor offers can be bypassed entirely by using "SPONSORS=0" as an option, when installing Java via the command line:
Manually download the 32bit online installer for 7u55 to your local machine.
Click the Windows Start Button/Menu. From the available Menu choices, select the 'Search box' and enter the text "command" in it.
A list of matches will appear. Select 'Command Prompt' from the available Programs list.
Navigate to the folder containing the downloaded installer, e.g.:
cd c:\Users\<username>\Downloads
To start the installation, in the Command Prompt window type:
jre-7u55-windows-i586-iftw.exe SPONSORS=0
The option to disable sponsors will persist across all future updates and re-installs of Java.
Note that sponsor offers, and therefore this functionality, is only applicable to online 32bit JRE installers and Auto Update mechanisms for the Windows operating system.
Bug Fixes
Bug Id Category Sub-Category Description
JDK-7190349 client-libs 2d [macosx] Text (Label) is incorrectly drawn with a rotated g2d
JDK-8013569 client-libs 2d [macosx] JLabel preferred size incorrect on retina displays with non-default font size
JDK-6571600 client-libs java.awt JNI use results in UnsatisfiedLinkError looking for libmawt.so
JDK-8025588 client-libs java.awt [macosx] Frozen AppKit thread in 7u40
JDK-5049299 core-libs java.lang (process) Use posix_spawn, not fork, on S10 to avoid swap exhaustion
JDK-8020191 core-libs java.lang System.getProperty( " os.name " ) returns " Windows NT (unknown) " on Windows 8.1
JDK-8030822 core-libs java.time (tz) Support tzdata2013i
JDK-8019853 core-libs java.util.logging Break logging and AWT circular dependency
JDK-8026474 deploy deployment_toolkit deployJava.js versioncheck doesn't work in IE11
JDK-8028691 deploy plugin loading browser proxy via config script should not trigger JAR download
JDK-8029649 deploy plugin Reduce dialog frequency when app is run multiple times
JDK-8033705 deploy plugin Array out of bounds exception in PluginMain.performSSVValidation
JDK-8033779 deploy plugin JRE 7u51 Plugin Failing to Run Older JRE Version < 1.6.0
JDK-8029922 deploy webstart 32-bit only Java Web Start apps fail to run on 32- and 64-bit JRE configs
JDK-8031579 deploy webstart Spurious Missing Manifest Permissions Attribute Warning When Launching versioned Java Web Start app
JDK-8024830 hotspot compiler SEGV in org.apache.lucene.codecs.compressing.CompressingTermVectorsReader.get
JDK-8035618 other-libs corba:rmi-iiop Four api/org_omg/CORBA TCK tests fail under plugin only
|
|
|
|
multimedia/adobe-flash-plugin11: security update
Revisions pulled up:
- multimedia/adobe-flash-plugin11/Makefile 1.28
- multimedia/adobe-flash-plugin11/distinfo 1.26
---
Module Name: pkgsrc
Committed By: obache
Date: Wed Apr 30 01:33:41 UTC 2014
Modified Files:
pkgsrc/multimedia/adobe-flash-plugin11: Makefile distinfo
Log Message:
Update adobe-flash-plugin11 to 11.2.202.356 for APSB14-13.
|
|
|
|
No change for !=Darwin.
This fixes at least some fuse-using packages.
(Proposed on tech-pkg on April 6, no objections received.)
|
|
|
|
www/drupal7: security update
Revisions pulled up:
- www/drupal7/Makefile 1.25
- www/drupal7/distinfo 1.18
---
Module Name: pkgsrc
Committed By: taca
Date: Sat Apr 26 09:29:35 UTC 2014
Modified Files:
pkgsrc/www/drupal7: Makefile distinfo
Log Message:
Update drupal7 to 7.27.
Drupal 7.27, 2014-04-16
----------------------
- Fixed security issues (information disclosure). See SA-CORE-2014-002.
|
|
www/drupal6: security update
Revisions pulled up:
- www/drupal6/Makefile 1.46
- www/drupal6/distinfo 1.30
---
Module Name: pkgsrc
Committed By: taca
Date: Sat Apr 26 09:29:03 UTC 2014
Modified Files:
pkgsrc/www/drupal6: Makefile distinfo
Log Message:
Update drupal6 to 6.31.
Drupal 6.31, 2014-04-16
----------------------
- Fixed security issues (information disclosure). See SA-CORE-2014-002.
|
|
net/freeradius2: security patch
Revisions pulled up:
- net/freeradius2/Makefile 1.35
- net/freeradius2/distinfo 1.16
- net/freeradius2/patches/patch-src_modules_rlm__pap_rlm__pap.c 1.1
---
Module Name: pkgsrc
Committed By: he
Date: Sun Apr 27 12:10:56 UTC 2014
Modified Files:
pkgsrc/net/freeradius2: Makefile distinfo
Added Files:
pkgsrc/net/freeradius2/patches: patch-src_modules_rlm__pap_rlm__pap.c
Log Message:
Add a patch to fix CVS-2014-2015, a buffer overflow vulnerability.
Patch taken from
https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a
|
|
|
|
net/wireshark: security update
Revisions pulled up:
- net/wireshark/Makefile 1.118
- net/wireshark/distinfo 1.74
-------------------------------------------------------------------
Module Name: pkgsrc
Committed By: tron
Date: Wed Apr 23 18:10:37 UTC 2014
Modified Files:
pkgsrc/net/wireshark: Makefile distinfo
Log Message:
Update "wireshark" package to version 1.10.7. Changes since 1.10.6:
- Bug Fixes
The following vulnerabilities have been fixed.
* wnpa-sec-2014-06
The RTP dissector could crash. (Bug 9885)
Versions affected: 1.10.0 to 1.10.6
CVE-2014-2907
The following bugs have been fixed:
* RTP not decoded inside the conversation in v.1.10.1 (Bug 9021)
* SIP/SDP: disabled second media stream disables all media
streams (Bug 9835)
* Lua: trying to get/access a Preference before its
registered causes a segfault (Bug 9853)
* Some value_string strings contain newlines. (Bug 9878)
* Tighten the NO_MORE_DATA_CHECK macros (Bug 9932)
* Fix crash when calling "MAP Summary" dialog when no file is
open (Bug 9934)
* Fix comparing a sequence number of TCP fragment when its
value wraps over uint32_t limit (Bug 9936)
- Updated Protocol Support
ANSI A, DVB-CI, GSM DTAP, GSM MAP, IEEE 802.11, LCSAP, LTE RRC,
MAC LTE, Prism, RTP, SDP, SIP, and TCP
To generate a diff of this commit:
cvs rdiff -u -r1.117 -r1.118 pkgsrc/net/wireshark/Makefile
cvs rdiff -u -r1.73 -r1.74 pkgsrc/net/wireshark/distinfo
|
|
|
|
archivers/libarchive: security patch
Revisions pulled up:
- archivers/libarchive/Makefile 1.40
- archivers/libarchive/files/libarchive/archive_read_support_format_iso9660.c 1.4
- archivers/libarchive/files/libarchive/archive_read_support_format_tar.c 1.4
---
Module Name: pkgsrc
Committed By: he
Date: Thu Apr 3 13:05:15 UTC 2014
Modified Files:
pkgsrc/archivers/libarchive: Makefile
pkgsrc/archivers/libarchive/files/libarchive:
archive_read_support_format_iso9660.c
archive_read_support_format_tar.c
Log Message:
Apply fixes for CVE-2011-1777 and CVE-2011-1778 (add check for
buffer overflows in handling iso9660 and tar images), despite
Joerg telling me I should have better things to spend my time on.
Fixes pulled from
https://bugzilla.redhat.com/show_bug.cgi?id=705849
Bump PKGREVISION.
|
|
emulators/suse131_libjson: security update
Revisions pulled up:
- emulators/suse131_libjson/Makefile 1.2
- emulators/suse131_libjson/distinfo 1.2
---
Module Name: pkgsrc
Committed By: obache
Date: Wed Apr 23 12:54:23 UTC 2014
Modified Files:
pkgsrc/emulators/suse131_libjson: Makefile distinfo
Log Message:
Apply Security Update: openSUSE-SU-2014:0558-1
update for json-c
This json-c update fixes the following two security issue:
- bnc#870147: Fixed buffer overflow if size_t is larger
than int (CVE-2013-6370).
- bnc#870147: Fixed possible hash collision DoS
(CVE-2013-6371).
Bump PKGREVISION.
|
|
|
|
|
|
mail/imapsync: security update
Revisions pulled up:
- mail/imapsync/Makefile 1.14
- mail/imapsync/distinfo 1.6
---
Module Name: pkgsrc
Committed By: abs
Date: Tue Apr 22 08:18:46 UTC 2014
Modified Files:
pkgsrc/mail/imapsync: Makefile distinfo
Log Message:
Updated mail/imapsync to 1.584
revision 1.584
date: 2014/02/05 00:40:59; author: gilles; state: Exp; lines: +77 -50
Debug. Print separator given by NAMESPACE even when --sep1 oe --sep2 is used.
Debug. Prints prefix given by NAMESPACE even when --prefix1 or
--prefix2 is used.
(Preparation for advising not to use --prefix unless suggested)
----------------------------
revision 1.583
date: 2014/02/04 03:04:35; author: gilles; state: Exp; lines: +15 -11
Bug fix. --ssl1 --tls2 was buggy because of default SSL_VERIFY_PEER.
"Can not go to tls encryption on [localhost]:Unable to start TLS:
Cannot determine peer hostname for
verificationerror:00000000:lib(0):func(0):reason(0)"
----------------------------
revision 1.582
date: 2014/01/24 01:43:19; author: gilles; state: Exp; lines: +20 -12
Bugfix. Check if going to tls is ok, exit otherwise with explicit error message.
Thanks to Dennis Schridde for reporting this ugly bug.
----------------------------
revision 1.581
date: 2014/01/15 02:42:06; author: gilles; state: Exp; lines: +41 -15
Added --debugmaxlinelength
Added --minmaxlinelength to select messages with long lines only.
----------------------------
revision 1.580
date: 2013/12/25 02:52:36; author: gilles; state: Exp; lines: +51 -27
Added --skipcrossduplicates to avoid copying messages that are already
copied in another folder.
Added --debugcrossduplicates to print which messages (UIDs) are
skipped with --skipcrossduplicates (and in what other folders they
are).
----------------------------
revision 1.579
date: 2013/12/18 13:53:19; author: gilles; state: Exp; lines: +9 -8
--maxmessagespersecond, value can be float like 3.2
----------------------------
revision 1.578
date: 2013/12/17 02:14:09; author: gilles; state: Exp; lines: +73 -9
Added --maxbytespersecond to limit byte transfer rate.
Added --maxmessagespersecond to limit messages tranfer rate (office365
throttle limitation).
----------------------------
revision 1.577
date: 2013/12/05 05:57:51; author: gilles; state: Exp; lines: +28 -10
Added tests to play with win32 \\?\C:\TEMP syntax and try to solve
long path bug.
----------------------------
revision 1.576
date: 2013/11/19 14:37:24; author: gilles; state: Exp; lines: +19 -14
Added --debugmemory option that prints memory consumption after each
message is copied.
----------------------------
revision 1.575
date: 2013/11/06 13:55:38; author: gilles; state: Exp; lines: +12 -7
Do not append message if the fetch failed.
----------------------------
revision 1.574
date: 2013/10/28 16:22:04; author: gilles; state: Exp; lines: +16 -8
Added --create_folder_old in case users want the old behavior of
create_folder().
----------------------------
revision 1.573
date: 2013/10/28 14:44:10; author: gilles; state: Exp; lines: +48 -7
Bugfix. Applied patch for create_folder() and nested folders. Thanks
to Erik Torsner.
----------------------------
revision 1.572
date: 2013/10/27 02:04:01; author: gilles; state: Exp; lines: +13 -8
Bug fix. Final statistics were avoided for newly created folders.
----------------------------
revision 1.571
date: 2013/10/25 14:34:27; author: gilles; state: Exp; lines: +58 -20
Added --folderfirst <string> : Sync this folder first. --folderfirst "Work"
Added --folderlast <string> : Sync this folder last. --folderlast
"[Gmail]/All Mail"
--folderlast <string> : then this one, etc.
----------------------------
revision 1.570
date: 2013/10/25 12:52:02; author: gilles; state: Exp; lines: +7 -7
--delete2foldersonly Junk example.
----------------------------
revision 1.569
date: 2013/10/16 21:58:17; author: gilles; state: Exp; lines: +125 -39
Fixed bug on Windows with --tmpdir "E:\TEMP". The colon was badly
converted to _, ending with "E_\TEMP".
The fix also automatically moves the old cache to the new one if the
new does not exist yet.
Fix. Example for --delete2foldersonly "/Junk$/" in help message.
----------------------------
revision 1.568
date: 2013/09/28 02:43:51; author: gilles; state: Exp; lines: +25 -13
Bug fix. On Win32 trailing blanc in cache dir name raized an error.
Blanc now move to underscore _.
----------------------------
revision 1.567
date: 2013/09/18 20:38:10; author: gilles; state: Exp; lines: +8 -7
Fixed a warning when RFC822.SIZE is null or undef.
----------------------------
revision 1.566
date: 2013/09/13 13:23:41; author: gilles; state: Exp; lines: +11 -12
Added --authmech EXTERNAL. Not tested yet.
----------------------------
revision 1.565
date: 2013/09/13 01:16:20; author: gilles; state: Exp; lines: +8 -6
Fusemail success.
RackSpace success.
|
|
|
|
misc/libreoffice4: build fix
Revisions pulled up:
- misc/libreoffice4/distinfo 1.12
- misc/libreoffice4/patches/patch-bridges_source_cpp__uno_gcc3__linux__intel_share.hxx deleted
- misc/libreoffice4/patches/patch-bridges_source_cpp__uno_gcc3__linux__intel_uno2cpp.cxx deleted
---
Module Name: pkgsrc
Committed By: tsutsui
Date: Sun Apr 13 15:57:21 UTC 2014
Modified Files:
pkgsrc/misc/libreoffice4: distinfo
Removed Files:
pkgsrc/misc/libreoffice4/patches:
patch-bridges_source_cpp__uno_gcc3__linux__intel_share.hxx
patch-bridges_source_cpp__uno_gcc3__linux__intel_uno2cpp.cxx
Log Message:
Remove broken and untested libc++ patches. PR/48716
- these patches break build on i386, even on pkgsrc-2014Q1
- these patches have no patch comment and it's fatal on pkglint
- these patches have never been sent to upstream even before 4.2.2.1 update
- the wrong patch committer has ignored the PR for a week
|
|
|
|
mail/thunderbird: build fix
www/firefox24: build fix
Revisions pulled up:
- www/firefox24/mozilla-common.mk 1.7
---
Module Name: pkgsrc
Committed By: ryoon
Date: Sat Apr 19 23:21:42 UTC 2014
Modified Files:
pkgsrc/www/firefox24: mozilla-common.mk
Log Message:
Fix PR pkg/48726 for NetBSD 6.*
* Update sqlite3 requimenent version
|
|
www/firefox: bug fix
Revisions pulled up:
- www/firefox/Makefile 1.160 via patch
- www/firefox/distinfo 1.137 via patch
- www/firefox/patches/patch-browser_app_nsBrowserApp.cpp deleted
---
Module Name: pkgsrc
Committed By: ryoon
Date: Sat Apr 19 23:16:39 UTC 2014
Modified Files:
pkgsrc/www/firefox: Makefile distinfo
Removed Files:
pkgsrc/www/firefox/patches: patch-browser_app_nsBrowserApp.cpp
Log Message:
Bump PKGREVISION
* Do not set plugin environmental variable
|
|
|
|
net/rsync: security patch
Revisions pulled up:
- net/rsync/Makefile 1.93
- net/rsync/distinfo 1.39
- net/rsync/patches/patch-authenticate.c 1.1
-------------------------------------------------------------------
Module Name: pkgsrc
Committed By: tron
Date: Fri Apr 18 23:29:39 UTC 2014
Modified Files:
pkgsrc/net/rsync: Makefile distinfo
Added Files:
pkgsrc/net/rsync/patches: patch-authenticate.c
Log Message:
Add security patch from Samba GIT repository to address remote DoS
vulnerability in rsync's daemon mode (CVE-2014-2855).
To generate a diff of this commit:
cvs rdiff -u -r1.92 -r1.93 pkgsrc/net/rsync/Makefile
cvs rdiff -u -r1.38 -r1.39 pkgsrc/net/rsync/distinfo
cvs rdiff -u -r0 -r1.1 pkgsrc/net/rsync/patches/patch-authenticate.c
|
|
|
|
pkgtools/x11-links: bug fix update
Revisions pulled up:
- mk/buildlink3/bsd.buildlink3.mk 1.225
- pkgtools/x11-links/Makefile 1.153-1.154
- pkgtools/x11-links/buildlink3.mk 1.54-1.55
- pkgtools/x11-links/files/xorg.dri2proto 1.1
- pkgtools/x11-links/files/xorg.fontconfig 1.9
- pkgtools/x11-links/files/xorg.freetype2 1.13-1.14
- pkgtools/x11-links/files/xorg.libXrandr 1.9
- pkgtools/x11-links/files/xorg.libxcb 1.8
- pkgtools/x11-links/files/xorg.pixman 1.11
- pkgtools/x11-links/files/xorg.xcb-util 1.5
- pkgtools/x11-links/files/xorg.xf86driproto 1.5
- pkgtools/x11-links/xorg.mk 1.25
---
Module Name: pkgsrc
Committed By: ryoon
Date: Mon Mar 31 09:19:34 UTC 2014
Modified Files:
pkgsrc/pkgtools/x11-links: Makefile buildlink3.mk
pkgsrc/pkgtools/x11-links/files: xorg.fontconfig xorg.freetype2
xorg.libXrandr xorg.libxcb xorg.pixman xorg.xcb-util
Log Message:
Update to 0.85
* Support NetBSD current (6.99.38 at least)'s new native xorg
---
Module Name: pkgsrc
Committed By: tron
Date: Mon Mar 31 10:52:14 UTC 2014
Modified Files:
pkgsrc/pkgtools/x11-links/files: xorg.freetype2
Log Message:
Sort contents (no changes to binary package).
---
Module Name: pkgsrc
Committed By: obache
Date: Thu Apr 17 01:57:31 UTC 2014
Modified Files:
pkgsrc/mk/buildlink3: bsd.buildlink3.mk
Log Message:
Stop USE_BUINTIN.pkg=3Dno escalation from IGNORE_PKG.pkg=3DYES.
affect to result of pkgtools/x11-links, normal build v.s. pbulk.
---
Module Name: pkgsrc
Committed By: obache
Date: Thu Apr 17 02:03:12 UTC 2014
Modified Files:
pkgsrc/pkgtools/x11-links: Makefile xorg.mk
pkgsrc/pkgtools/x11-links/files: xorg.xf86driproto
Added Files:
pkgsrc/pkgtools/x11-links/files: xorg.dri2proto
Log Message:
Split dri2proto from xf86driproto for xorg.
Fixes for the case USE_BUILTIN.xf86dirproto=3DNO and
USE_BUILTIN.dri2proto=3DYES.
Bump version to 0.86.
---
Module Name: pkgsrc
Committed By: obache
Date: Thu Apr 17 09:50:36 UTC 2014
Modified Files:
pkgsrc/pkgtools/x11-links: buildlink3.mk
Log Message:
Bump required version to latest 0.86.
|
|
|
|
www/curl: build fix
Revisions pulled up:
- www/curl/distinfo 1.94
- www/curl/patches/patch-lib_hostcheck.c 1.1
---
Module Name: pkgsrc
Committed By: wiz
Date: Mon Mar 31 08:45:21 UTC 2014
Modified Files:
pkgsrc/www/curl: distinfo
Added Files:
pkgsrc/www/curl/patches: patch-lib_hostcheck.c
Log Message:
Add missing header for DragonflyBSD.
PR 48691 by David Shao.
|
|
|
|
textproc/p5-YAML-LibYAML: security patch
Revisions pulled up:
- textproc/p5-YAML-LibYAML/Makefile 1.15
- textproc/p5-YAML-LibYAML/distinfo 1.10
- textproc/p5-YAML-LibYAML/patches/patch-LibYAML_scanner.c 1.1
- textproc/p5-YAML-LibYAML/patches/patch-LibYAML_yaml__private.h 1.1
---
Module Name: pkgsrc
Committed By: obache
Date: Mon Apr 14 13:22:20 UTC 2014
Modified Files:
pkgsrc/textproc/p5-YAML-LibYAML: Makefile distinfo
Added Files:
pkgsrc/textproc/p5-YAML-LibYAML/patches: patch-LibYAML_scanner.c
patch-LibYAML_yaml__private.h
Log Message:
Apply patch to internal LibYAML for CVE-2013-6393 and CVE-2014-2525.
Bump PKGREVISION.
|
|
databases/mysql56-client: security update
databases/mysql56-server: update to keep in sync with with "mysql56-client"
Revisions pulled up:
- databases/mysql56-client/Makefile.common 1.14
- databases/mysql56-client/distinfo 1.14
- databases/mysql56-server/PLIST 1.9
---
Module Name: pkgsrc
Committed By: adam
Date: Mon Mar 31 10:32:13 UTC 2014
Modified Files:
pkgsrc/databases/mysql56-client: Makefile.common distinfo
pkgsrc/databases/mysql56-server: PLIST
Log Message:
Changes 5.6.17:
Functionality Added or Changed
Incompatible Change: The AES_ENCRYPT() and AES_DECRYPT() functions now permit control of the block encryption mode and take an optional initialization vector argument:
The new block_encryption_mode system variable controls the mode for block-based encryption algorithms. Its default value is aes-128-ecb, which signifies encryption using a key length of 128 bits and ECB mode.
An optional init_vector argument provides an initialization vector for encryption modes that require it:
AES_ENCRYPT(str,key_str[,init_vector])
AES_DECRYPT(crypt_str,key_str[,init_vector])
A random string of bytes to use for the initialization vector can be produced by calling the new RANDOM_BYTES() function.
For more information, see Encryption and Compression Functions.
These changes make statements that use AES_ENCRYPT() or AES_DECRYPT() unsafe for statement-based replication and they cannot be stored in the query cache. Queries that use RANDOM_BYTES() are unsafe for statement-based replication and cannot be stored in the query cache.
Incompatible Change: The ERROR_FOR_DIVISION_BY_ZERO, NO_ZERO_DATE, and NO_ZERO_IN_DATE SQL modes now are deprecated and setting the sql_mode value to include any of them generates a warning. In MySQL 5.7, these modes do nothing. Instead, their effects are included in the effects of strict SQL mode (STRICT_ALL_TABLES or STRICT_TRANS_TABLES). The motivation for the change in MySQL 5.7 is to reduce the number of SQL modes with an effect dependent on strict mode and make them part of strict mode itself.
To make advance preparation for an upgrade to MySQL 5.7, see SQL Mode Changes in MySQL 5.7. That discussion provides guidelines to assess whether your applications will be affected by the SQL mode changes in MySQL 5.7.
InnoDB: MySQL now supports rebuilding regular and partitioned InnoDB tables using online DDL (ALGORITHM=INPLACE) for the following operations:
OPTIMIZE TABLE
ALTER TABLE ... FORCE
ALTER TABLE ... ENGINE=INNODB (when run on an InnoDB table)
Online DDL support reduces table rebuild time and permits concurrent DML, which helps reduce user application downtime. For additional information, see Overview of Online DDL.
On Solaris, mysql_config --libs now includes -R/path/to/library so that libraries can be found at runtime.
mysql_install_db provides a more informative diagnostic message when required Perl modules are missing.
The IGNORE clause for ALTER TABLE is now deprecated and will be removed in a future version of MySQL. ALTER IGNORE TABLE causes problems for replication, prevents online ALTER TABLE for unique index creation, and causes problems with foreign keys (rows removed in the parent table).
Bugs Fixed
|
|
databases/mysql55-client: security update
databases/mysql56-server: update to keep in sync with with "mysql55-client"
Revisions pulled up:
- databases/mysql55-client/Makefile 1.16
- databases/mysql55-client/Makefile.common 1.35
- databases/mysql55-client/distinfo 1.32
- databases/mysql55-client/patches/patch-libmysql_CMakeLists.txt 1.2
- databases/mysql55-server/Makefile 1.20
- databases/mysql55-server/PLIST 1.28
---
Module Name: pkgsrc
Committed By: adam
Date: Mon Mar 31 08:03:23 UTC 2014
Modified Files:
pkgsrc/databases/mysql55-client: Makefile Makefile.common distinfo
pkgsrc/databases/mysql55-client/patches: patch-libmysql_CMakeLists.txt
pkgsrc/databases/mysql55-server: Makefile PLIST
Log Message:
Changes 5.5.37:
Functionality Added or Changed
On Solaris, mysql_config --libs now includes -R/path/to/library so that libraries can be found at runtime.
Bugs Fixed
InnoDB: A regression introduced by Bug 14329288 would result in a performance degradation when a compressed table does not fit into memory.
InnoDB: The maximum value for innodb_thread_sleep_delay is now 1000000 microseconds. The previous maximum value (4294967295 microseconds on 32-bit and 18446744073709551615 microseconds on 64-bit) was unnecessarily large. Because the maximum value of innodb_thread_sleep_delay is limited by the value set for innodb_adaptive_max_sleep_delay (when set to a non-zero value), the maximum value for innodb_thread_sleep_delay is now the same as the maximum value for innodb_adaptive_max_sleep_delay.
InnoDB: In debug builds, creating a unique index on a binary column, with input data containing duplicate keys, would cause an assertion.
InnoDB: InnoDB would fail to start when innodb_data_file_path specified the data file size in kilobytes by appending K to the size value.
InnoDB: An insert buffer merge would cause an assertion error due to incorrectly handled ownership information for externally stored BLOBs.
InnoDB: Assertion failure in thread thread_num in file ibuf0ibuf.cc line 4080
InnoDB: Failing assertion: rec_get_deleted_flag(rec, page_is_comp(page))
InnoDB: Decreasing the auto_increment_increment value would have no affect on the next auto-increment value.
Replication: The server did not handle correctly the insertion of a row larger than 4 GB when using row-based replication.
Replication: When using row-based replication, an additional auto-increment column on the slave version of a table was not updated correctly; a zero was inserted instead.
Replication: Statements involving the Performance Schema tables should not be written to the binary log, because the content of these tables is applicable only to a given MySQL Server instance, and may differ greatly between different servers in a replication topology. The database administrator should be able to configure (INSERT, UPDATE, or DELETE) or flush (TRUNCATE TABLE) performance schema tables on a single server without affecting others. However, when replicating from a MySQL 5.5 master to a MySQL 5.5 or later slave, warnings about unsafe statements updating Performance Schema tables were elevated to errors. For MySQL 5.6 and later slaves, this prevented the simultaneous use of performance_schema and GTIDs (see Replication with Global Transaction Identifiers, in the MySQL 5.6 Manual).
This fix causes all updates on tables in the performance_schema database to be filtered on the master and not replicated, regardless of the type of logging that is in effect. Prior to this fix, statements using were handled by being marked as unsafe for replication, which caused warnings during execution; the statements were nonetheless written to the binary log, regardless of the logging format in effect.
Existing replication behavior for tables in the INFORMATION_SCHEMA database is not changed by this fix.
For more information, see MySQL Performance Schema.
Compilation failed if MySQL was configured with CFLAGS set to include a -Werror option with an argument.
A shared libmysqld embedded server library was not built on Linux.
While printing the server version, the mysql client did not check for buffer overflow in a string variable.
Contraction information in a collation could be mishandled, resulting in incorrect decisions about whether a character is part of a contraction, and miscalculation of contraction weights.
DROP TRIGGER succeeded even with the read_only system variable enabled.
Updating the Performance Schema setup_instruments table on a replication master caused a slave to exit.
Due to a race condition, it was possible for two threads to end up with the same query ID for different queries.
When run by root, mysqld --help --verbose exited with a nonzero error code after displaying the help message.
MySQL client programs from a Community Edition distribution could not connect using SSL to a MySQL server from an Enterprise Edition. This was due to a difference in certificate handling by yaSSL and OpenSSL (used for Community and Enterprise, respectively). OpenSSL expected a blank certificate to be sent when not all of the --ssl-ca, --ssl-cert, and --ssl-key options were specified, and yaSSL did not do so. To resolve this, yaSSL has been modified to send a blank certificate when an option is missing.
A deadlock error occurring during subquery execution could cause an assertion to be raised.
The Performance Schema stage/sql/Waiting to get readlock instrument is no longer used and has been removed.
For system variables that take a string value, SET statements permitted an unquoted value, but values that contained dots were parsed incorrectly and only part of the value was assigned. For example, SET GLOBAL slow_query_log_file = my_slow.log assigned the value my_slow. Now such values must be quoted or an error occurs.
On Windows, mysql_install_db.pl could be run only from within the bin directory under the installation directory.
|
|
print/a2ps: security patch
Revisions pulled up:
- print/a2ps/Makefile 1.77
- print/a2ps/distinfo 1.15
- print/a2ps/patches/patch-CVE-2014-0466_1 1.1
- print/a2ps/patches/patch-CVE-2014-0466_2 1.1
---
Module Name: pkgsrc
Committed By: tez
Date: Tue Apr 8 19:32:11 UTC 2014
Modified Files:
pkgsrc/print/a2ps: Makefile distinfo
Added Files:
pkgsrc/print/a2ps/patches: patch-CVE-2014-0466_1 patch-CVE-2014-0466_2
Log Message:
Add fix for CVE-2014-0466 from
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742902
|