Age | Commit message (Collapse) | Author | Files | Lines |
|
Bump PKGREVISION.
|
|
|
|
|
|
|
|
|
|
|
|
shortly.
|
|
|
|
|
|
changes since 2.22 include:
* A bug has been fixed in the tell-position flag. It wasn't actually
giving the file name and line number when executing commands if you
used the "set tell-position" variants, only the -tell-position command
line option.
* A bug has been fixed in the cook -fp-update command, it would
segfault in some cases.
* A bug has been fixed in the cookbook include file processing.
* A bug has been fixed in the negative flag setting (comamnd line
options and "set" clauses).
* The find_command command now copes better with directories it is not
allowed to access.
* A Java cookbook has been added to to the distribution.
* A bug has been fixed in the execution of some commands. If any words
of the command had spaces in them, it did not pass it to a shell to be
executed, but instead constructed a command of a different shape than
the user expected.
* A bug has been fixed on Linux (and it only ever ocurred on Linux)
where cook would suddenly stop for no reason with exit status 1. Turns
out that sometimes fflush(stderr) returns an EAGAIN error.
* A bug has been fixed which caused the cook -script option to produce
invalid shell scripts when a recipe body contained no statements.
* A bug has been fixed in the graph file pair generation, used to
generate warnings about dangerous #include-cooked contents.
* There is a new tell-position setting, so that when Cook prints a
command it is about to run, it includes the file name and line nunmber
of the command. This can be useful when debugging cookbooks.
* A bug has been fixed in the output line wrapping. Once again it
adapts to the window width.
* A major problem with parallel execution and hangs has been fixed.
The table indexed by process ID was now growing correctly.
|
|
|
|
Package changes include:
- pkglintification
- move to options.mk
smokeping changes include:
* remove the FPing 'timeout' variable, since it never really did anything
* Curl.pm: new variables 'follow_redirects' and 'include_redirects'
* make buggy_perl_version test work on perl 5.8.7 too ...
* AnotherDNS.pm: added option 'require_answers' for testing
For a full list see:
http://people.ee.ethz.ch/~oetiker/webtools/smokeping/pub/CHANGES
ok'ed bouyer@
|
|
|
|
Package changes include:
- pkglintification
- move to options.mk
- add in extra option for building with snmpv3 support (not tested)
- tidy up MESSAGE (no more html docs)
MRTG changes include:
* updated SNMP_util.pm and Net_SNMP_util.pm
* new: clonedirectory function
* Updated SNMP_Session to 1.08
* SNMP v3 support added Net::SNMP library required for this
For a full list see:
http://people.ee.ethz.ch/~oetiker/webtools/mrtg/pub/CHANGES
Addresses PR# 32811
ok'ed bouyer@
|
|
|
|
8.13.8/8.13.8 2006/08/09
Fix a regression in 8.13.7: if shared memory is activated, then
the server can erroneously report that there is
insufficient disk space. Additionally make sure that
an internal variable is set properly to avoid those
misleading errors. Based on patch from Steve Hubert
of University of Washington.
Fix a regression in 8.13.7: the PidFile could be removed after
the process that forks the daemon exited, i.e., if
sendmail -bd is invoked. Problem reported by Kan Sasaki
of Fusion Communications Corp. and Werner Wiethege.
Avoid opening qf files if QueueSortOrder is "none". Patch from
David F. Skoll.
Avoid a crash when finishing due to referencing a freed variable.
Problem reported and diagnosed by Moritz Jodeit.
CONTRIB: cidrexpand now deals with /0 by issuing the entire IPv4
range (0..255).
LIBMILTER: The "hostname" argument of the xxfi_connect() callback
previously was the equivalent of {client_ptr}. However,
this did not match the documentation of the function, hence
it has been changed to {client_name}. See doc/op/op.*
about these macros.
|
|
|
|
Changes:
- libclamav/upx.c: fix possible heap overflow
See http://www.clamav.net/security/0.88.4.html for details.
- libclamav/tnef.c: handle trailing newline at the end of winmail.dat,
bug reported by Menno Smits <menno*netboxblue.com>
- freshclam/manager.c: fix possible infinite loop when read() fails
in get_database(), spotted by Everton da Silva Marques
<everton*lab.ipaccess.diveo.net.br>
|
|
|
|
BIND. From its DESCR:
This is queryperf, a DNS server query performance testing tool.
It is primarily intended for measuring the performance of
authoritative DNS servers, but it has also been used for measuring
caching server performance. This document describes the use of
queryperf for authoritative server performance testing.
NOTE: This version of queryperf has been modified by Nominum. It
implements a slow-start algorithm which lessens the risk of network
buffer overflows, particularly when testing recursive servers
with high values for the -q option.
|
|
|
|
"A security issue has been reported in Heimdal, which potentially can be
exploited by malicious, local users to perform certain actions with
escalated privileges.
The security issue is caused due to missing checks for whether the
"setuid()" call has succeeded in the bundled rcp application. This may
be exploited to perform certain actions with root privileges if the
"setuid()" call fails due to e.g. resource limits."
http://secunia.com/advisories/21436/
http://www.pdc.kth.se/heimdal/advisory/2006-08-08/
Bump PKGREVISION.
|
|
only referenced in asm() are no longer not-emited.
|
|
|
|
|
|
web-server to become a RADIUS client for authentication and accounting
requests. You will, however, need to supply your own RADIUS server to
perform the actual authentication.
|
|
|
|
"A security issue has been reported in Kerberos, which potentially can
be exploited by malicious, local users to perform certain actions with
escalated privileges.
The security issue is caused due to missing checks for whether the
"setuid()" call has succeeded in the bundled krshd and v4rcp
applications. This can be exploited to disclose or manipulate the
contents of arbitrary files or execute arbitrary code with root
privileges if the "setuid()" call fails due to e.g. resource limits."
http://secunia.com/advisories/21402/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-001-setuid.txt
Bump PKGREVISION.
|
|
was declared external is only used in one place and is declared static in
that file (quill0p.c).
|
|
|
|
Fix mySQL PLIST
Fix all PLISTs to avoid a nightmare when the nb number is changed
Bump to nb1
|
|
|
|
fixes "make install" using just-in-time su-to-root.
|
|
|
|
|
|
I/O loop method was changed from kqueue(2) to poll(2) in 1.0rc2, which has
been reported to cause problems on *BSD. --with-ioloop=best selects kqueue
on platforms that implement it (*BSD), and poll on others. You can use
"dovecot --build-options" to see what your binary has been compiled with.
|
|
|
|
|
|
|
|
|
|
- Use (the newly defined) SSLDIR so we use .../certs & .../private
rather than .../certs/certs and .../certs/private
- Update ssl_cert_file & ssl_key_file in example dovecot.conf to match SSLDIR
- Update mkcert.sh to also match SSLDIR
|
|
|
|
|
|
Bug fixes and support for apache2.
XXX: compilation for apache2 works, but installation fails -- if you
know apxs, please take a look:
apxs:Error: Sorry, cannot determine bootstrap symbol name.
apxs:Error: Please specify one with option `-n'.
|
|
|
|
|
|
|
|
UDPcast is a file transfer tool that can send data simultaneously
to many destinations on a LAN. This can for instance be used to
install entire classrooms of PC's at once. The advantage of UDPcast
over using other methods (nfs, ftp, whatever) is that UDPcast uses
Ethernet's multicast abilities: it won't take longer to install 15
machines than it would to install just 2.
|
|
|
|
|