summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2014-05-14Pullup ticket #4404 - requested by obachetron2-10/+10
emulators/suse131_openssl: security update Revisions pulled up: - emulators/suse131_openssl/Makefile 1.8 - emulators/suse131_openssl/distinfo 1.8 --- Module Name: pkgsrc Committed By: obache Date: Wed May 14 09:31:44 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: Apply openSUSE Security Update: openSUSE-SU-2014:0635-1 update for openssl Description: - Fixed bug[ bnc#876282], CVE-2014-0198 openssl: OpenSSL NULL pointer dereference in do_ssl3_write Add file: CVE-2014-0198.patch Bump PKGREVISION.
2014-05-14Pullup ticket #4400 - requested by obachetron2-10/+10
emulators/suse131_libpng: security update Revisions pulled up: - emulators/suse131_libpng/Makefile 1.4 - emulators/suse131_libpng/distinfo 1.4 --- Module Name: pkgsrc Committed By: obache Date: Thu May 8 12:46:36 UTC 2014 Modified Files: pkgsrc/emulators/suse131_libpng: Makefile distinfo Log Message: Apply openSUSE Security Update: openSUSE-SU-2014:0618-1 update for libpng12 Description: This libpng12 update fixes the following two security issues. - bnc#873123: Fixed integer overflow leading to a heap-based buffer overflow in png_set_sPLT() and png_set_text_2() (CVE-2013-7354). - bnc#873124: Fixed integer overflow leading to a heap-based buffer overflow in png_set_unknown_chunks() (CVE-2013-7353). Bump PKGREVISION.
2014-05-14Pullup tickets #4403.tron1-1/+3
2014-05-14Pullup ticket #4403 - requested by obachetron2-6/+6
multimedia/adobe-flash-plugin11: security update Revisions pulled up: - multimedia/adobe-flash-plugin11/Makefile 1.29 - multimedia/adobe-flash-plugin11/distinfo 1.27 --- Module Name: pkgsrc Committed By: obache Date: Wed May 14 09:22:18 UTC 2014 Modified Files: pkgsrc/multimedia/adobe-flash-plugin11: Makefile distinfo Log Message: Update adobe-flash-plugin11 to 11.2.202.359 for APSB14-14.
2014-05-09pullup 4402spz1-2/+3
2014-05-09Pullup ticket #4402 - requested by tronspz3-3/+28
databases/openldap-server: security patch Revisions pulled up: - databases/openldap-server/Makefile 1.41 - databases/openldap/distinfo 1.95 - databases/openldap/patches/patch-libraries_librewrite_session.c 1.1 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: tron Date: Fri May 9 08:12:00 UTC 2014 Modified Files: pkgsrc/databases/openldap: distinfo pkgsrc/databases/openldap-server: Makefile Added Files: pkgsrc/databases/openldap/patches: patch-libraries_librewrite_session.c Log Message: Add patch from OpenLDAP GIT repository to fix CVE-2013-4449 (SA55238). To generate a diff of this commit: cvs rdiff -u -r1.94 -r1.95 pkgsrc/databases/openldap/distinfo cvs rdiff -u -r1.40 -r1.41 pkgsrc/databases/openldap-server/Makefile cvs rdiff -u -r0 -r1.1 \ pkgsrc/databases/openldap/patches/patch-libraries_librewrite_session.c
2014-05-07pullup #4399 addendumspz1-1/+4
2014-05-07Pullup ticket #4399 addendum - requested by tronspz1-1/+4
mail/thunderbird: restore dropped enigmail distinfo Revisions pulled up: - mail/thunderbird/distinfo 1.140 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: tron Date: Tue May 6 19:26:57 UTC 2014 Modified Files: pkgsrc/mail/thunderbird: distinfo Log Message: Re-add checksum for "enigmail-1.6.tar.gz". Problem found by wizd(8). To generate a diff of this commit: cvs rdiff -u -r1.139 -r1.140 pkgsrc/mail/thunderbird/distinfo
2014-05-07pullup #4399spz1-1/+3
2014-05-07Pullup ticket #4399 - requested by tronspz2-9/+6
mail/thunderbird: security update Revisions pulled up: - mail/thunderbird/Makefile 1.136 - mail/thunderbird/distinfo 1.139 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: tron Date: Tue May 6 16:03:38 UTC 2014 Modified Files: pkgsrc/mail/thunderbird: Makefile distinfo Log Message: Update "thunderbird" package to version 24.5.0. The following security problems were fixed in this release: - MFSA 2014-46 Use-after-free in nsHostResolve - MFSA 2014-44 Use-after-free in imgLoader while resizing images - MFSA 2014-43 Cross-site scripting (XSS) using history navigations - MFSA 2014-42 Privilege escalation through Web Notification API - MFSA 2014-38 Buffer overflow when using non-XBL object as XBL - MFSA 2014-37 Out of bounds read while decoding JPG images - MFSA 2014-35 Privilege escalation through Mozilla Maintenance Service Installer - MFSA 2014-34 Miscellaneous memory safety hazards To generate a diff of this commit: cvs rdiff -u -r1.135 -r1.136 pkgsrc/mail/thunderbird/Makefile cvs rdiff -u -r1.138 -r1.139 pkgsrc/mail/thunderbird/distinfo
2014-05-05Pullup tickets #4396, #4397 and #4398.tron1-1/+7
2014-05-05Pullup ticket #4398 - requested by obachetron2-9/+10
emulators/suse131_mozilla-nss: security update Revisions pulled up: - emulators/suse131_mozilla-nss/Makefile 1.2-1.3 - emulators/suse131_mozilla-nss/distinfo 1.2-1.3 --- Module Name: pkgsrc Committed By: obache Date: Fri Apr 4 10:08:21 UTC 2014 Modified Files: pkgsrc/emulators/suse131_mozilla-nss: Makefile distinfo Log Message: Update suse131_mozilla-nss RPM to 3.15.5-16.1 from openSUSE-SU-2014:0448-1. Changes in mozilla-nss: - update to 3.15.5 * required for Firefox 28 * export FREEBL_LOWHASH to get the correct default headers (bnc#865539) New functionality * Added support for the TLS application layer protocol negotiation (ALPN) extension. Two SSL socket options, SSL_ENABLE_NPN and SSL_ENABLE_ALPN, can be used to control whether NPN or ALPN (or both) should be used for application layer protocol negotiation. * Added the TLS padding extension. The extension type value is 35655, which may change when an official extension type value is assigned by IANA. NSS automatically adds the padding extension to ClientHello when necessary. * Added a new macro CERT_LIST_TAIL, defined in certt.h, for getting the tail of a CERTCertList. Notable Changes * bmo#950129: Improve the OCSP fetching policy when verifying OCSP responses * bmo#949060: Validate the iov input argument (an array of PRIOVec structures) of ssl_WriteV (called via PR_Writev). Applications should still take care when converting struct iov to PRIOVec because the iov_len members of the two structures have different types (size_t vs. int). size_t is unsigned and may be larger than int. Bump PKGREVISION. --- Module Name: pkgsrc Committed By: obache Date: Sat May 3 02:19:27 UTC 2014 Modified Files: pkgsrc/emulators/suse131_mozilla-nss: Makefile distinfo Log Message: Apply Security Update: openSUSE-SU-2014:0599-1 update for MozillaFirefox Description: This is also a mozilla-nss update to version 3.16: * required for Firefox 29 * bmo#903885 - (CVE-2014-1492) In a wildcard certificate, the wildcard character should not be embedded within the U-label of an internationalized domain name. See the last bullet point in RFC 6125, Section 7.2. * Supports the Linux x32 ABI. To build for the Linux x32 target, set the environment variable USE_X32=1 when building NSS. New Functions: * NSS_CMSSignerInfo_Verify New Macros * TLS_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_3DES_EDE_CBC_SHA, etc., cipher suites that were first defined in SSL 3.0 can now be referred to with their official IANA names in TLS, with the TLS_ prefix. Previously, they had to be referred to with their names in SSL 3.0, with the SSL_ prefix. Notable Changes: * ECC is enabled by default. It is no longer necessary to set the environment variable NSS_ENABLE_ECC=1 when building NSS. To disable ECC, set the environment variable NSS_DISABLE_ECC=1 when building NSS. * libpkix should not include the common name of CA as DNS names when evaluating name constraints. * AESKeyWrap_Decrypt should not return SECSuccess for invalid keys. * Fix a memory corruption in sec_pkcs12_new_asafe. * If the NSS_SDB_USE_CACHE environment variable is set, skip the runtime test sdb_measureAccess. * The built-in roots module has been updated to version 1.97, which adds, removes, and distrusts several certificates. * The atob utility has been improved to automatically ignore lines of text that aren't in base64 format. * The certutil utility has been improved to support creation of version 1 and version 2 certificates, in addition to the existing version 3 support. Bump PKGREVISION.
2014-05-05Pullup ticket #4397 - requested by obachetron2-10/+10
emulators/suse131_libcurl: security update Revisions pulled up: - emulators/suse131_libcurl/Makefile 1.4 - emulators/suse131_libcurl/distinfo 1.4 --- Module Name: pkgsrc Committed By: obache Date: Sat May 3 02:13:44 UTC 2014 Modified Files: pkgsrc/emulators/suse131_libcurl: Makefile distinfo Log Message: Apply Security Update: openSUSE-SU-2014:0598-1 update for curl Description: This curl update fixes two security issues: - bnc#868627: Fixed wrong re-use of connections (CVE-2014-0138). - bnc#868629: Fixed IP address wildcard certificate validation (CVE-2014-0139). Bump PKGREVISION.
2014-05-05Pullup ticket #4396 - requested by obachetron2-10/+10
emulators/suse131_openssl: security update Revisions pulled up: - emulators/suse131_openssl/Makefile 1.6-1.7 - emulators/suse131_openssl/distinfo 1.6-1.7 --- Module Name: pkgsrc Committed By: obache Date: Wed Apr 23 13:14:42 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: Apply Security Update: openSUSE-SU-2014:0560-1 update for openssl This is an openssl version update to 1.0.1g. - The main reason for this upgrade was to be clear about the TLS heartbeat problem know as "Heartbleed" (CVE-2014-0160). That problem was already fixed in our previous openssl update. Bump PKGREVISION. --- Module Name: pkgsrc Committed By: obache Date: Sat May 3 02:10:06 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: Apply Security Update: openSUSE-SU-2014:0592-1 OpenSSL: Fixed a use-after-free race condition in OpenSSL's read buffer. Description: A use-after-free race condition in OpenSSL's read buffer was fixed that could cause connections to drop (CVE-2010-5298). Bump PKGREVISION.
2014-05-01Pullup tickets #4393, #4394 and #4395.tron1-1/+8
2014-05-01Pullup ticket #4395 - requested by gdttron1-1/+1
archivers/libarchive: build fix Revisions pulled up: - archivers/libarchive/files/libarchive/archive_read_support_format_iso9660.c 1.5 --- Module Name: pkgsrc Committed By: adam Date: Mon Apr 7 18:40:05 UTC 2014 Modified Files: pkgsrc/archivers/libarchive/files/libarchive: archive_read_support_format_iso9660.c Log Message: Non-void function must return a value
2014-05-01Pullup ticket #4394 - requested by wentron2-6/+6
www/mediawiki: security update Revisions pulled up: - www/mediawiki/Makefile 1.39 - www/mediawiki/distinfo 1.28 --- Module Name: pkgsrc Committed By: wen Date: Thu May 1 16:10:05 UTC 2014 Modified Files: pkgsrc/www/mediawiki: Makefile distinfo Log Message: Update to 1.22.6 Upstream changes: MediaWiki 1.22.6[edit | edit source] This is a security release of the MediaWiki 1.22 branch. Changes since 1.22.5[edit | edit source] (bug 63251) SECURITY: Escape sortKey in pageInfo. MediaWiki 1.22.5[edit | edit source] This is a security and maintenance release of the MediaWiki 1.22 branch. Changes since 1.22.4[edit | edit source] (bug 62497) SECURITY: Add CSRF token on Special:ChangePassword. (bug 62467) Set a title for the context during import on the cli. Fix custom local MediaWiki:Helppage values. mediawiki.js: Fix documentation breakage. (bug 58153) Make MySQLi work with non standard port. (bug 53887) Reintroduced a link to help pages in the default sidebar, that any sysop can customize by editing MediaWiki:Sidebar locally. The link now points to a mediawiki.org page which is guaranteed to exist. Nothing needs to be done on your end, but remember to adjust MediaWiki:Sidebar for the needs of your wikis. Everyone can help with the shared documentation by translating: https://www.mediawiki.org/wiki/Special:Translate/agg-Help_pages . (bug 53888) Corrected a regression in 1.22 which introduced red links on the login page. If you previously installed 1.22.x and have created a local page to make the red link blue, write its title as in MediaWiki:helplogin-url if you didn't already. Otherwise, you don't need to do anything, but you can translate the help page at https://www.mediawiki.org/wiki/Help:Logging_in
2014-05-01Pullup ticket #4393 - requested by ryoontron3-31/+28
lang/sun-jdk7: security update lang/sun-jre7: security update Revisions pulled up: - lang/sun-jdk7/distinfo 1.15 - lang/sun-jre7/Makefile.common 1.6 - lang/sun-jre7/distinfo 1.17 --- Module Name: pkgsrc Committed By: ryoon Date: Wed Apr 30 23:12:48 UTC 2014 Modified Files: pkgsrc/lang/sun-jdk7: distinfo pkgsrc/lang/sun-jre7: Makefile.common distinfo Log Message: Update to 7.0.55 Changelog: JavaFX Release Notes JavaFX is now part of JDK. JDK 7u55 release includes JavaFX version 2.2.55. New Features and Changes The frequency of some security dialogs has been reduced on systems that run the same RIA multiple times. See 8029649. Using "*" in Caller-Allowable-Codebase Attribute. If a stand-alone asterisk (*), or asterisk as part of a top level domain such as (*.org), is specified as the value for the Caller-Allowable-Codebase attribute, then calls from JavaScript code to the RIA will show a security warning. An option to remember the choice is also provided, and if the user selects the option to remember the choice to run the RIA, no further warning messages are shown for the same RIA, when run with JavaScript from the same source. For more information, see JAR File Manifest Attributes for Security documentation. See 8033707. Disabling Sponsor Offers in the Java Installer During the installation of Java, users may be presented with the option of downloading and installing sponsor offers, such as browser add-ons, or security software. With 7u55 and later releases of Java, sponsor offers can be bypassed entirely by using "SPONSORS=0" as an option, when installing Java via the command line: Manually download the 32bit online installer for 7u55 to your local machine. Click the Windows Start Button/Menu. From the available Menu choices, select the 'Search box' and enter the text "command" in it. A list of matches will appear. Select 'Command Prompt' from the available Programs list. Navigate to the folder containing the downloaded installer, e.g.: cd c:\Users\<username>\Downloads To start the installation, in the Command Prompt window type: jre-7u55-windows-i586-iftw.exe SPONSORS=0 The option to disable sponsors will persist across all future updates and re-installs of Java. Note that sponsor offers, and therefore this functionality, is only applicable to online 32bit JRE installers and Auto Update mechanisms for the Windows operating system. Bug Fixes Bug Id Category Sub-Category Description JDK-7190349 client-libs 2d [macosx] Text (Label) is incorrectly drawn with a rotated g2d JDK-8013569 client-libs 2d [macosx] JLabel preferred size incorrect on retina displays with non-default font size JDK-6571600 client-libs java.awt JNI use results in UnsatisfiedLinkError looking for libmawt.so JDK-8025588 client-libs java.awt [macosx] Frozen AppKit thread in 7u40 JDK-5049299 core-libs java.lang (process) Use posix_spawn, not fork, on S10 to avoid swap exhaustion JDK-8020191 core-libs java.lang System.getProperty( " os.name " ) returns " Windows NT (unknown) " on Windows 8.1 JDK-8030822 core-libs java.time (tz) Support tzdata2013i JDK-8019853 core-libs java.util.logging Break logging and AWT circular dependency JDK-8026474 deploy deployment_toolkit deployJava.js versioncheck doesn't work in IE11 JDK-8028691 deploy plugin loading browser proxy via config script should not trigger JAR download JDK-8029649 deploy plugin Reduce dialog frequency when app is run multiple times JDK-8033705 deploy plugin Array out of bounds exception in PluginMain.performSSVValidation JDK-8033779 deploy plugin JRE 7u51 Plugin Failing to Run Older JRE Version < 1.6.0 JDK-8029922 deploy webstart 32-bit only Java Web Start apps fail to run on 32- and 64-bit JRE configs JDK-8031579 deploy webstart Spurious Missing Manifest Permissions Attribute Warning When Launching versioned Java Web Start app JDK-8024830 hotspot compiler SEGV in org.apache.lucene.codecs.compressing.CompressingTermVectorsReader.get JDK-8035618 other-libs corba:rmi-iiop Four api/org_omg/CORBA TCK tests fail under plugin only
2014-04-30Pullup ticket #4392.tron1-1/+3
2014-04-30Pullup ticket #4392 - requested by obachetron2-6/+6
multimedia/adobe-flash-plugin11: security update Revisions pulled up: - multimedia/adobe-flash-plugin11/Makefile 1.28 - multimedia/adobe-flash-plugin11/distinfo 1.26 --- Module Name: pkgsrc Committed By: obache Date: Wed Apr 30 01:33:41 UTC 2014 Modified Files: pkgsrc/multimedia/adobe-flash-plugin11: Makefile distinfo Log Message: Update adobe-flash-plugin11 to 11.2.202.356 for APSB14-13.
2014-04-30Revert commit wrongly on branch.gdt1-9/+6
2014-04-30On Darwin, support osxfuse, and drop support for macfuse.gdt1-6/+9
No change for !=Darwin. This fixes at least some fuse-using packages. (Proposed on tech-pkg on April 6, no objections received.)
2014-04-29Pullup tickets #4389, #4390 and #4391.tron1-1/+7
2014-04-29Pullup ticket #4391 - requested by tacatron2-6/+6
www/drupal7: security update Revisions pulled up: - www/drupal7/Makefile 1.25 - www/drupal7/distinfo 1.18 --- Module Name: pkgsrc Committed By: taca Date: Sat Apr 26 09:29:35 UTC 2014 Modified Files: pkgsrc/www/drupal7: Makefile distinfo Log Message: Update drupal7 to 7.27. Drupal 7.27, 2014-04-16 ---------------------- - Fixed security issues (information disclosure). See SA-CORE-2014-002.
2014-04-29Pullup ticket #4390 - requested by tacatron2-6/+6
www/drupal6: security update Revisions pulled up: - www/drupal6/Makefile 1.46 - www/drupal6/distinfo 1.30 --- Module Name: pkgsrc Committed By: taca Date: Sat Apr 26 09:29:03 UTC 2014 Modified Files: pkgsrc/www/drupal6: Makefile distinfo Log Message: Update drupal6 to 6.31. Drupal 6.31, 2014-04-16 ---------------------- - Fixed security issues (information disclosure). See SA-CORE-2014-002.
2014-04-29Pullup ticket #4389 - requested by hetron3-3/+30
net/freeradius2: security patch Revisions pulled up: - net/freeradius2/Makefile 1.35 - net/freeradius2/distinfo 1.16 - net/freeradius2/patches/patch-src_modules_rlm__pap_rlm__pap.c 1.1 --- Module Name: pkgsrc Committed By: he Date: Sun Apr 27 12:10:56 UTC 2014 Modified Files: pkgsrc/net/freeradius2: Makefile distinfo Added Files: pkgsrc/net/freeradius2/patches: patch-src_modules_rlm__pap_rlm__pap.c Log Message: Add a patch to fix CVS-2014-2015, a buffer overflow vulnerability. Patch taken from https://github.com/FreeRADIUS/freeradius-server/commit/0d606cfc29a
2014-04-27#4387spz1-1/+3
2014-04-27Pullup ticket #4387 - requested by tronspz2-6/+6
net/wireshark: security update Revisions pulled up: - net/wireshark/Makefile 1.118 - net/wireshark/distinfo 1.74 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: tron Date: Wed Apr 23 18:10:37 UTC 2014 Modified Files: pkgsrc/net/wireshark: Makefile distinfo Log Message: Update "wireshark" package to version 1.10.7. Changes since 1.10.6: - Bug Fixes The following vulnerabilities have been fixed. * wnpa-sec-2014-06 The RTP dissector could crash. (Bug 9885) Versions affected: 1.10.0 to 1.10.6 CVE-2014-2907 The following bugs have been fixed: * RTP not decoded inside the conversation in v.1.10.1 (Bug 9021) * SIP/SDP: disabled second media stream disables all media streams (Bug 9835) * Lua: trying to get/access a Preference before its registered causes a segfault (Bug 9853) * Some value_string strings contain newlines. (Bug 9878) * Tighten the NO_MORE_DATA_CHECK macros (Bug 9932) * Fix crash when calling "MAP Summary" dialog when no file is open (Bug 9934) * Fix comparing a sequence number of TCP fragment when its value wraps over uint32_t limit (Bug 9936) - Updated Protocol Support ANSI A, DVB-CI, GSM DTAP, GSM MAP, IEEE 802.11, LCSAP, LTE RRC, MAC LTE, Prism, RTP, SDP, SIP, and TCP To generate a diff of this commit: cvs rdiff -u -r1.117 -r1.118 pkgsrc/net/wireshark/Makefile cvs rdiff -u -r1.73 -r1.74 pkgsrc/net/wireshark/distinfo
2014-04-24Pullup ticket #4388.tron1-1/+3
2014-04-24Pullup ticket #4388 - requested by hetron3-53/+94
archivers/libarchive: security patch Revisions pulled up: - archivers/libarchive/Makefile 1.40 - archivers/libarchive/files/libarchive/archive_read_support_format_iso9660.c 1.4 - archivers/libarchive/files/libarchive/archive_read_support_format_tar.c 1.4 --- Module Name: pkgsrc Committed By: he Date: Thu Apr 3 13:05:15 UTC 2014 Modified Files: pkgsrc/archivers/libarchive: Makefile pkgsrc/archivers/libarchive/files/libarchive: archive_read_support_format_iso9660.c archive_read_support_format_tar.c Log Message: Apply fixes for CVE-2011-1777 and CVE-2011-1778 (add check for buffer overflows in handling iso9660 and tar images), despite Joerg telling me I should have better things to spend my time on. Fixes pulled from https://bugzilla.redhat.com/show_bug.cgi?id=705849 Bump PKGREVISION.
2014-04-23Pullup ticket #4386 - requested by obachetron2-9/+10
emulators/suse131_libjson: security update Revisions pulled up: - emulators/suse131_libjson/Makefile 1.2 - emulators/suse131_libjson/distinfo 1.2 --- Module Name: pkgsrc Committed By: obache Date: Wed Apr 23 12:54:23 UTC 2014 Modified Files: pkgsrc/emulators/suse131_libjson: Makefile distinfo Log Message: Apply Security Update: openSUSE-SU-2014:0558-1 update for json-c This json-c update fixes the following two security issue: - bnc#870147: Fixed buffer overflow if size_t is larger than int (CVE-2013-6370). - bnc#870147: Fixed possible hash collision DoS (CVE-2013-6371). Bump PKGREVISION.
2014-04-23Pullup ticket #4386.tron1-1/+3
2014-04-22Pullup ticket #4385.tron1-1/+3
2014-04-22Pullup ticket #4385 - requested by abstron2-11/+11
mail/imapsync: security update Revisions pulled up: - mail/imapsync/Makefile 1.14 - mail/imapsync/distinfo 1.6 --- Module Name: pkgsrc Committed By: abs Date: Tue Apr 22 08:18:46 UTC 2014 Modified Files: pkgsrc/mail/imapsync: Makefile distinfo Log Message: Updated mail/imapsync to 1.584 revision 1.584 date: 2014/02/05 00:40:59; author: gilles; state: Exp; lines: +77 -50 Debug. Print separator given by NAMESPACE even when --sep1 oe --sep2 is used. Debug. Prints prefix given by NAMESPACE even when --prefix1 or --prefix2 is used. (Preparation for advising not to use --prefix unless suggested) ---------------------------- revision 1.583 date: 2014/02/04 03:04:35; author: gilles; state: Exp; lines: +15 -11 Bug fix. --ssl1 --tls2 was buggy because of default SSL_VERIFY_PEER. "Can not go to tls encryption on [localhost]:Unable to start TLS: Cannot determine peer hostname for verificationerror:00000000:lib(0):func(0):reason(0)" ---------------------------- revision 1.582 date: 2014/01/24 01:43:19; author: gilles; state: Exp; lines: +20 -12 Bugfix. Check if going to tls is ok, exit otherwise with explicit error message. Thanks to Dennis Schridde for reporting this ugly bug. ---------------------------- revision 1.581 date: 2014/01/15 02:42:06; author: gilles; state: Exp; lines: +41 -15 Added --debugmaxlinelength Added --minmaxlinelength to select messages with long lines only. ---------------------------- revision 1.580 date: 2013/12/25 02:52:36; author: gilles; state: Exp; lines: +51 -27 Added --skipcrossduplicates to avoid copying messages that are already copied in another folder. Added --debugcrossduplicates to print which messages (UIDs) are skipped with --skipcrossduplicates (and in what other folders they are). ---------------------------- revision 1.579 date: 2013/12/18 13:53:19; author: gilles; state: Exp; lines: +9 -8 --maxmessagespersecond, value can be float like 3.2 ---------------------------- revision 1.578 date: 2013/12/17 02:14:09; author: gilles; state: Exp; lines: +73 -9 Added --maxbytespersecond to limit byte transfer rate. Added --maxmessagespersecond to limit messages tranfer rate (office365 throttle limitation). ---------------------------- revision 1.577 date: 2013/12/05 05:57:51; author: gilles; state: Exp; lines: +28 -10 Added tests to play with win32 \\?\C:\TEMP syntax and try to solve long path bug. ---------------------------- revision 1.576 date: 2013/11/19 14:37:24; author: gilles; state: Exp; lines: +19 -14 Added --debugmemory option that prints memory consumption after each message is copied. ---------------------------- revision 1.575 date: 2013/11/06 13:55:38; author: gilles; state: Exp; lines: +12 -7 Do not append message if the fetch failed. ---------------------------- revision 1.574 date: 2013/10/28 16:22:04; author: gilles; state: Exp; lines: +16 -8 Added --create_folder_old in case users want the old behavior of create_folder(). ---------------------------- revision 1.573 date: 2013/10/28 14:44:10; author: gilles; state: Exp; lines: +48 -7 Bugfix. Applied patch for create_folder() and nested folders. Thanks to Erik Torsner. ---------------------------- revision 1.572 date: 2013/10/27 02:04:01; author: gilles; state: Exp; lines: +13 -8 Bug fix. Final statistics were avoided for newly created folders. ---------------------------- revision 1.571 date: 2013/10/25 14:34:27; author: gilles; state: Exp; lines: +58 -20 Added --folderfirst <string> : Sync this folder first. --folderfirst "Work" Added --folderlast <string> : Sync this folder last. --folderlast "[Gmail]/All Mail" --folderlast <string> : then this one, etc. ---------------------------- revision 1.570 date: 2013/10/25 12:52:02; author: gilles; state: Exp; lines: +7 -7 --delete2foldersonly Junk example. ---------------------------- revision 1.569 date: 2013/10/16 21:58:17; author: gilles; state: Exp; lines: +125 -39 Fixed bug on Windows with --tmpdir "E:\TEMP". The colon was badly converted to _, ending with "E_\TEMP". The fix also automatically moves the old cache to the new one if the new does not exist yet. Fix. Example for --delete2foldersonly "/Junk$/" in help message. ---------------------------- revision 1.568 date: 2013/09/28 02:43:51; author: gilles; state: Exp; lines: +25 -13 Bug fix. On Win32 trailing blanc in cache dir name raized an error. Blanc now move to underscore _. ---------------------------- revision 1.567 date: 2013/09/18 20:38:10; author: gilles; state: Exp; lines: +8 -7 Fixed a warning when RFC822.SIZE is null or undef. ---------------------------- revision 1.566 date: 2013/09/13 13:23:41; author: gilles; state: Exp; lines: +11 -12 Added --authmech EXTERNAL. Not tested yet. ---------------------------- revision 1.565 date: 2013/09/13 01:16:20; author: gilles; state: Exp; lines: +8 -6 Fusemail success. RackSpace success.
2014-04-22Pullup ticket #4384.tron1-1/+3
2014-04-22Pullup ticket #4384 - requested by tsutsuitron3-74/+1
misc/libreoffice4: build fix Revisions pulled up: - misc/libreoffice4/distinfo 1.12 - misc/libreoffice4/patches/patch-bridges_source_cpp__uno_gcc3__linux__intel_share.hxx deleted - misc/libreoffice4/patches/patch-bridges_source_cpp__uno_gcc3__linux__intel_uno2cpp.cxx deleted --- Module Name: pkgsrc Committed By: tsutsui Date: Sun Apr 13 15:57:21 UTC 2014 Modified Files: pkgsrc/misc/libreoffice4: distinfo Removed Files: pkgsrc/misc/libreoffice4/patches: patch-bridges_source_cpp__uno_gcc3__linux__intel_share.hxx patch-bridges_source_cpp__uno_gcc3__linux__intel_uno2cpp.cxx Log Message: Remove broken and untested libc++ patches. PR/48716 - these patches break build on i386, even on pkgsrc-2014Q1 - these patches have no patch comment and it's fatal on pkglint - these patches have never been sent to upstream even before 4.2.2.1 update - the wrong patch committer has ignored the PR for a week
2014-04-21Pullup tickets #4381 and #4383.tron1-1/+6
2014-04-21Pullup ticket #4383 - requested by ryoontron1-2/+2
mail/thunderbird: build fix www/firefox24: build fix Revisions pulled up: - www/firefox24/mozilla-common.mk 1.7 --- Module Name: pkgsrc Committed By: ryoon Date: Sat Apr 19 23:21:42 UTC 2014 Modified Files: pkgsrc/www/firefox24: mozilla-common.mk Log Message: Fix PR pkg/48726 for NetBSD 6.* * Update sqlite3 requimenent version
2014-04-21Pullup ticket #4381 - requested by ryoontron3-15/+3
www/firefox: bug fix Revisions pulled up: - www/firefox/Makefile 1.160 via patch - www/firefox/distinfo 1.137 via patch - www/firefox/patches/patch-browser_app_nsBrowserApp.cpp deleted --- Module Name: pkgsrc Committed By: ryoon Date: Sat Apr 19 23:16:39 UTC 2014 Modified Files: pkgsrc/www/firefox: Makefile distinfo Removed Files: pkgsrc/www/firefox/patches: patch-browser_app_nsBrowserApp.cpp Log Message: Bump PKGREVISION * Do not set plugin environmental variable
2014-04-19#4380spz1-1/+3
2014-04-19Pullup ticket #4380 - requested by tronspz3-2/+81
net/rsync: security patch Revisions pulled up: - net/rsync/Makefile 1.93 - net/rsync/distinfo 1.39 - net/rsync/patches/patch-authenticate.c 1.1 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: tron Date: Fri Apr 18 23:29:39 UTC 2014 Modified Files: pkgsrc/net/rsync: Makefile distinfo Added Files: pkgsrc/net/rsync/patches: patch-authenticate.c Log Message: Add security patch from Samba GIT repository to address remote DoS vulnerability in rsync's daemon mode (CVE-2014-2855). To generate a diff of this commit: cvs rdiff -u -r1.92 -r1.93 pkgsrc/net/rsync/Makefile cvs rdiff -u -r1.38 -r1.39 pkgsrc/net/rsync/distinfo cvs rdiff -u -r0 -r1.1 pkgsrc/net/rsync/patches/patch-authenticate.c
2014-04-17Pullup ticket #4379.tron1-1/+3
2014-04-17Pullup ticket #4379 - requested by obachetron12-23/+101
pkgtools/x11-links: bug fix update Revisions pulled up: - mk/buildlink3/bsd.buildlink3.mk 1.225 - pkgtools/x11-links/Makefile 1.153-1.154 - pkgtools/x11-links/buildlink3.mk 1.54-1.55 - pkgtools/x11-links/files/xorg.dri2proto 1.1 - pkgtools/x11-links/files/xorg.fontconfig 1.9 - pkgtools/x11-links/files/xorg.freetype2 1.13-1.14 - pkgtools/x11-links/files/xorg.libXrandr 1.9 - pkgtools/x11-links/files/xorg.libxcb 1.8 - pkgtools/x11-links/files/xorg.pixman 1.11 - pkgtools/x11-links/files/xorg.xcb-util 1.5 - pkgtools/x11-links/files/xorg.xf86driproto 1.5 - pkgtools/x11-links/xorg.mk 1.25 --- Module Name: pkgsrc Committed By: ryoon Date: Mon Mar 31 09:19:34 UTC 2014 Modified Files: pkgsrc/pkgtools/x11-links: Makefile buildlink3.mk pkgsrc/pkgtools/x11-links/files: xorg.fontconfig xorg.freetype2 xorg.libXrandr xorg.libxcb xorg.pixman xorg.xcb-util Log Message: Update to 0.85 * Support NetBSD current (6.99.38 at least)'s new native xorg --- Module Name: pkgsrc Committed By: tron Date: Mon Mar 31 10:52:14 UTC 2014 Modified Files: pkgsrc/pkgtools/x11-links/files: xorg.freetype2 Log Message: Sort contents (no changes to binary package). --- Module Name: pkgsrc Committed By: obache Date: Thu Apr 17 01:57:31 UTC 2014 Modified Files: pkgsrc/mk/buildlink3: bsd.buildlink3.mk Log Message: Stop USE_BUINTIN.pkg=3Dno escalation from IGNORE_PKG.pkg=3DYES. affect to result of pkgtools/x11-links, normal build v.s. pbulk. --- Module Name: pkgsrc Committed By: obache Date: Thu Apr 17 02:03:12 UTC 2014 Modified Files: pkgsrc/pkgtools/x11-links: Makefile xorg.mk pkgsrc/pkgtools/x11-links/files: xorg.xf86driproto Added Files: pkgsrc/pkgtools/x11-links/files: xorg.dri2proto Log Message: Split dri2proto from xf86driproto for xorg. Fixes for the case USE_BUILTIN.xf86dirproto=3DNO and USE_BUILTIN.dri2proto=3DYES. Bump version to 0.86. --- Module Name: pkgsrc Committed By: obache Date: Thu Apr 17 09:50:36 UTC 2014 Modified Files: pkgsrc/pkgtools/x11-links: buildlink3.mk Log Message: Bump required version to latest 0.86.
2014-04-15Pullup ticket #4377.tron1-1/+3
2014-04-15Pullup ticket #4377 - requested by asautron2-1/+23
www/curl: build fix Revisions pulled up: - www/curl/distinfo 1.94 - www/curl/patches/patch-lib_hostcheck.c 1.1 --- Module Name: pkgsrc Committed By: wiz Date: Mon Mar 31 08:45:21 UTC 2014 Modified Files: pkgsrc/www/curl: distinfo Added Files: pkgsrc/www/curl/patches: patch-lib_hostcheck.c Log Message: Add missing header for DragonflyBSD. PR 48691 by David Shao.
2014-04-14Pullup tickets #4373, #4374 and #4375.tron1-1/+11
2014-04-14Pullup ticket #4375 - requested by obachetron4-2/+55
textproc/p5-YAML-LibYAML: security patch Revisions pulled up: - textproc/p5-YAML-LibYAML/Makefile 1.15 - textproc/p5-YAML-LibYAML/distinfo 1.10 - textproc/p5-YAML-LibYAML/patches/patch-LibYAML_scanner.c 1.1 - textproc/p5-YAML-LibYAML/patches/patch-LibYAML_yaml__private.h 1.1 --- Module Name: pkgsrc Committed By: obache Date: Mon Apr 14 13:22:20 UTC 2014 Modified Files: pkgsrc/textproc/p5-YAML-LibYAML: Makefile distinfo Added Files: pkgsrc/textproc/p5-YAML-LibYAML/patches: patch-LibYAML_scanner.c patch-LibYAML_yaml__private.h Log Message: Apply patch to internal LibYAML for CVE-2013-6393 and CVE-2014-2525. Bump PKGREVISION.
2014-04-14Pullup ticket #4374 - requested by tacatron3-11/+96
databases/mysql56-client: security update databases/mysql56-server: update to keep in sync with with "mysql56-client" Revisions pulled up: - databases/mysql56-client/Makefile.common 1.14 - databases/mysql56-client/distinfo 1.14 - databases/mysql56-server/PLIST 1.9 --- Module Name: pkgsrc Committed By: adam Date: Mon Mar 31 10:32:13 UTC 2014 Modified Files: pkgsrc/databases/mysql56-client: Makefile.common distinfo pkgsrc/databases/mysql56-server: PLIST Log Message: Changes 5.6.17: Functionality Added or Changed Incompatible Change: The AES_ENCRYPT() and AES_DECRYPT() functions now permit control of the block encryption mode and take an optional initialization vector argument: The new block_encryption_mode system variable controls the mode for block-based encryption algorithms. Its default value is aes-128-ecb, which signifies encryption using a key length of 128 bits and ECB mode. An optional init_vector argument provides an initialization vector for encryption modes that require it: AES_ENCRYPT(str,key_str[,init_vector]) AES_DECRYPT(crypt_str,key_str[,init_vector]) A random string of bytes to use for the initialization vector can be produced by calling the new RANDOM_BYTES() function. For more information, see Encryption and Compression Functions. These changes make statements that use AES_ENCRYPT() or AES_DECRYPT() unsafe for statement-based replication and they cannot be stored in the query cache. Queries that use RANDOM_BYTES() are unsafe for statement-based replication and cannot be stored in the query cache. Incompatible Change: The ERROR_FOR_DIVISION_BY_ZERO, NO_ZERO_DATE, and NO_ZERO_IN_DATE SQL modes now are deprecated and setting the sql_mode value to include any of them generates a warning. In MySQL 5.7, these modes do nothing. Instead, their effects are included in the effects of strict SQL mode (STRICT_ALL_TABLES or STRICT_TRANS_TABLES). The motivation for the change in MySQL 5.7 is to reduce the number of SQL modes with an effect dependent on strict mode and make them part of strict mode itself. To make advance preparation for an upgrade to MySQL 5.7, see SQL Mode Changes in MySQL 5.7. That discussion provides guidelines to assess whether your applications will be affected by the SQL mode changes in MySQL 5.7. InnoDB: MySQL now supports rebuilding regular and partitioned InnoDB tables using online DDL (ALGORITHM=INPLACE) for the following operations: OPTIMIZE TABLE ALTER TABLE ... FORCE ALTER TABLE ... ENGINE=INNODB (when run on an InnoDB table) Online DDL support reduces table rebuild time and permits concurrent DML, which helps reduce user application downtime. For additional information, see Overview of Online DDL. On Solaris, mysql_config --libs now includes -R/path/to/library so that libraries can be found at runtime. mysql_install_db provides a more informative diagnostic message when required Perl modules are missing. The IGNORE clause for ALTER TABLE is now deprecated and will be removed in a future version of MySQL. ALTER IGNORE TABLE causes problems for replication, prevents online ALTER TABLE for unique index creation, and causes problems with foreign keys (rows removed in the parent table). Bugs Fixed
2014-04-14Pullup ticket #4373 - requested by tacatron6-24/+24
databases/mysql55-client: security update databases/mysql56-server: update to keep in sync with with "mysql55-client" Revisions pulled up: - databases/mysql55-client/Makefile 1.16 - databases/mysql55-client/Makefile.common 1.35 - databases/mysql55-client/distinfo 1.32 - databases/mysql55-client/patches/patch-libmysql_CMakeLists.txt 1.2 - databases/mysql55-server/Makefile 1.20 - databases/mysql55-server/PLIST 1.28 --- Module Name: pkgsrc Committed By: adam Date: Mon Mar 31 08:03:23 UTC 2014 Modified Files: pkgsrc/databases/mysql55-client: Makefile Makefile.common distinfo pkgsrc/databases/mysql55-client/patches: patch-libmysql_CMakeLists.txt pkgsrc/databases/mysql55-server: Makefile PLIST Log Message: Changes 5.5.37: Functionality Added or Changed On Solaris, mysql_config --libs now includes -R/path/to/library so that libraries can be found at runtime. Bugs Fixed InnoDB: A regression introduced by Bug 14329288 would result in a performance degradation when a compressed table does not fit into memory. InnoDB: The maximum value for innodb_thread_sleep_delay is now 1000000 microseconds. The previous maximum value (4294967295 microseconds on 32-bit and 18446744073709551615 microseconds on 64-bit) was unnecessarily large. Because the maximum value of innodb_thread_sleep_delay is limited by the value set for innodb_adaptive_max_sleep_delay (when set to a non-zero value), the maximum value for innodb_thread_sleep_delay is now the same as the maximum value for innodb_adaptive_max_sleep_delay. InnoDB: In debug builds, creating a unique index on a binary column, with input data containing duplicate keys, would cause an assertion. InnoDB: InnoDB would fail to start when innodb_data_file_path specified the data file size in kilobytes by appending K to the size value. InnoDB: An insert buffer merge would cause an assertion error due to incorrectly handled ownership information for externally stored BLOBs. InnoDB: Assertion failure in thread thread_num in file ibuf0ibuf.cc line 4080 InnoDB: Failing assertion: rec_get_deleted_flag(rec, page_is_comp(page)) InnoDB: Decreasing the auto_increment_increment value would have no affect on the next auto-increment value. Replication: The server did not handle correctly the insertion of a row larger than 4 GB when using row-based replication. Replication: When using row-based replication, an additional auto-increment column on the slave version of a table was not updated correctly; a zero was inserted instead. Replication: Statements involving the Performance Schema tables should not be written to the binary log, because the content of these tables is applicable only to a given MySQL Server instance, and may differ greatly between different servers in a replication topology. The database administrator should be able to configure (INSERT, UPDATE, or DELETE) or flush (TRUNCATE TABLE) performance schema tables on a single server without affecting others. However, when replicating from a MySQL 5.5 master to a MySQL 5.5 or later slave, warnings about unsafe statements updating Performance Schema tables were elevated to errors. For MySQL 5.6 and later slaves, this prevented the simultaneous use of performance_schema and GTIDs (see Replication with Global Transaction Identifiers, in the MySQL 5.6 Manual). This fix causes all updates on tables in the performance_schema database to be filtered on the master and not replicated, regardless of the type of logging that is in effect. Prior to this fix, statements using were handled by being marked as unsafe for replication, which caused warnings during execution; the statements were nonetheless written to the binary log, regardless of the logging format in effect. Existing replication behavior for tables in the INFORMATION_SCHEMA database is not changed by this fix. For more information, see MySQL Performance Schema. Compilation failed if MySQL was configured with CFLAGS set to include a -Werror option with an argument. A shared libmysqld embedded server library was not built on Linux. While printing the server version, the mysql client did not check for buffer overflow in a string variable. Contraction information in a collation could be mishandled, resulting in incorrect decisions about whether a character is part of a contraction, and miscalculation of contraction weights. DROP TRIGGER succeeded even with the read_only system variable enabled. Updating the Performance Schema setup_instruments table on a replication master caused a slave to exit. Due to a race condition, it was possible for two threads to end up with the same query ID for different queries. When run by root, mysqld --help --verbose exited with a nonzero error code after displaying the help message. MySQL client programs from a Community Edition distribution could not connect using SSL to a MySQL server from an Enterprise Edition. This was due to a difference in certificate handling by yaSSL and OpenSSL (used for Community and Enterprise, respectively). OpenSSL expected a blank certificate to be sent when not all of the --ssl-ca, --ssl-cert, and --ssl-key options were specified, and yaSSL did not do so. To resolve this, yaSSL has been modified to send a blank certificate when an option is missing. A deadlock error occurring during subquery execution could cause an assertion to be raised. The Performance Schema stage/sql/Waiting to get readlock instrument is no longer used and has been removed. For system variables that take a string value, SET statements permitted an unquoted value, but values that contained dots were parsed incorrectly and only part of the value was assigned. For example, SET GLOBAL slow_query_log_file = my_slow.log assigned the value my_slow. Now such values must be quoted or an error occurs. On Windows, mysql_install_db.pl could be run only from within the bin directory under the installation directory.
2014-04-14Pullup ticket #4372 - requested by tacatron4-3/+39
print/a2ps: security patch Revisions pulled up: - print/a2ps/Makefile 1.77 - print/a2ps/distinfo 1.15 - print/a2ps/patches/patch-CVE-2014-0466_1 1.1 - print/a2ps/patches/patch-CVE-2014-0466_2 1.1 --- Module Name: pkgsrc Committed By: tez Date: Tue Apr 8 19:32:11 UTC 2014 Modified Files: pkgsrc/print/a2ps: Makefile distinfo Added Files: pkgsrc/print/a2ps/patches: patch-CVE-2014-0466_1 patch-CVE-2014-0466_2 Log Message: Add fix for CVE-2014-0466 from https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742902