summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2006-08-10Add security fix for Secunia Advisory SA21403 from PHP's CVS repository.taca3-3/+85
Bump PKGREVISION.
2006-08-10Note removal of teTeX2.minskim1-1/+4
2006-08-10Remove teTeX2.minskim31-16932/+1
2006-08-10Remove references to teTeX2.minskim4-25/+12
2006-08-10Note removal of dvipng and tex-textpos.minskim1-1/+3
2006-08-10Remove redundant packages. They are included in teTeX3.minskim10-151/+1
2006-08-10Remove teTeX2 from TEX_ACCEPTED, because the teTeX2 packages will be removedminskim25-50/+50
shortly.
2006-08-10Correct dependency handling; from Brook Milligan in private mail.wiz1-1/+17
2006-08-09note cook update from 2.22 to 2.26.mrg1-1/+2
2006-08-09update cook from 2.22 to 2.26. besides fixing GCC4 builds, many of themrg3-21/+8
changes since 2.22 include: * A bug has been fixed in the tell-position flag. It wasn't actually giving the file name and line number when executing commands if you used the "set tell-position" variants, only the -tell-position command line option. * A bug has been fixed in the cook -fp-update command, it would segfault in some cases. * A bug has been fixed in the cookbook include file processing. * A bug has been fixed in the negative flag setting (comamnd line options and "set" clauses). * The find_command command now copes better with directories it is not allowed to access. * A Java cookbook has been added to to the distribution. * A bug has been fixed in the execution of some commands. If any words of the command had spaces in them, it did not pass it to a shell to be executed, but instead constructed a command of a different shape than the user expected. * A bug has been fixed on Linux (and it only ever ocurred on Linux) where cook would suddenly stop for no reason with exit status 1. Turns out that sometimes fflush(stderr) returns an EAGAIN error. * A bug has been fixed which caused the cook -script option to produce invalid shell scripts when a recipe body contained no statements. * A bug has been fixed in the graph file pair generation, used to generate warnings about dangerous #include-cooked contents. * There is a new tell-position setting, so that when Cook prints a command it is about to run, it includes the file name and line nunmber of the command. This can be useful when debugging cookbooks. * A bug has been fixed in the output line wrapping. Once again it adapts to the window width. * A major problem with parallel execution and hangs has been fixed. The table indexed by process ID was now growing correctly.
2006-08-09Updated net/smokeping to 2.0.9adrianp2-3/+3
2006-08-09Update to smokeping-2.0.9adrianp8-47/+67
Package changes include: - pkglintification - move to options.mk smokeping changes include: * remove the FPing 'timeout' variable, since it never really did anything * Curl.pm: new variables 'follow_redirects' and 'include_redirects' * make buggy_perl_version test work on perl 5.8.7 too ... * AnotherDNS.pm: added option 'require_answers' for testing For a full list see: http://people.ee.ethz.ch/~oetiker/webtools/smokeping/pub/CHANGES ok'ed bouyer@
2006-08-09Updated net/mrtg to 2.14.5adrianp2-3/+3
2006-08-09Update to 2.14.5adrianp7-61/+67
Package changes include: - pkglintification - move to options.mk - add in extra option for building with snmpv3 support (not tested) - tidy up MESSAGE (no more html docs) MRTG changes include: * updated SNMP_util.pm and Net_SNMP_util.pm * new: clonedirectory function * Updated SNMP_Session to 1.08 * SNMP v3 support added Net::SNMP library required for this For a full list see: http://people.ee.ethz.ch/~oetiker/webtools/mrtg/pub/CHANGES Addresses PR# 32811 ok'ed bouyer@
2006-08-09mail/sendmail{,libmilter} -> 8.13.8tv1-1/+3
2006-08-09Update to 8.13.8. Changes:tv2-6/+6
8.13.8/8.13.8 2006/08/09 Fix a regression in 8.13.7: if shared memory is activated, then the server can erroneously report that there is insufficient disk space. Additionally make sure that an internal variable is set properly to avoid those misleading errors. Based on patch from Steve Hubert of University of Washington. Fix a regression in 8.13.7: the PidFile could be removed after the process that forks the daemon exited, i.e., if sendmail -bd is invoked. Problem reported by Kan Sasaki of Fusion Communications Corp. and Werner Wiethege. Avoid opening qf files if QueueSortOrder is "none". Patch from David F. Skoll. Avoid a crash when finishing due to referencing a freed variable. Problem reported and diagnosed by Moritz Jodeit. CONTRIB: cidrexpand now deals with /0 by issuing the entire IPv4 range (0..255). LIBMILTER: The "hostname" argument of the xxfi_connect() callback previously was the equivalent of {client_ptr}. However, this did not match the documentation of the function, hence it has been changed to {client_name}. See doc/op/op.* about these macros.
2006-08-09Note mail/clamav security update.salo1-1/+2
2006-08-09Security update to version 0.88.4salo2-6/+6
Changes: - libclamav/upx.c: fix possible heap overflow See http://www.clamav.net/security/0.88.4.html for details. - libclamav/tnef.c: handle trailing newline at the end of winmail.dat, bug reported by Menno Smits <menno*netboxblue.com> - freshclam/manager.c: fix possible infinite loop when read() fails in get_database(), spotted by Everton da Silva Marques <everton*lab.ipaccess.diveo.net.br>
2006-08-09+net/queryperftv1-1/+2
2006-08-09Add queryperf-2.1, an updated version of the contrib tool shipped withtv5-1/+55
BIND. From its DESCR: This is queryperf, a DNS server query performance testing tool. It is primarily intended for measuring the performance of authoritative DNS servers, but it has also been used for measuring caching server performance. This document describes the use of queryperf for authoritative server performance testing. NOTE: This version of queryperf has been modified by Nominum. It implements a slow-start algorithm which lessens the risk of network buffer overflows, particularly when testing recursive servers with high values for the -q option.
2006-08-09Note security/heimdal PKGREVISION bump: security fixes.salo1-1/+2
2006-08-09Security fix for SA21436:salo7-3/+254
"A security issue has been reported in Heimdal, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. The security issue is caused due to missing checks for whether the "setuid()" call has succeeded in the bundled rcp application. This may be exploited to perform certain actions with root privileges if the "setuid()" call fails due to e.g. resource limits." http://secunia.com/advisories/21436/ http://www.pdc.kth.se/heimdal/advisory/2006-08-08/ Bump PKGREVISION.
2006-08-09add some __attribute__((__used__)) if GCC 4. now some static variablesmrg4-21/+130
only referenced in asm() are no longer not-emited.
2006-08-09Added www/ap2-auth-radius version 1.5.7adrianp2-2/+4
2006-08-09Specify this is for apache 2.xadrianp1-1/+1
2006-08-09This is the Apache 2.x RADIUS authentication module. It allows any Apache 2.xadrianp5-0/+79
web-server to become a RADIUS client for authentication and accounting requests. You will, however, need to supply your own RADIUS server to perform the actual authentication.
2006-08-09Note security/mit-krb5 PKGREVISION bump: security fixes.salo1-1/+2
2006-08-09Security fixes for SA21402:salo9-3/+199
"A security issue has been reported in Kerberos, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. The security issue is caused due to missing checks for whether the "setuid()" call has succeeded in the bundled krshd and v4rcp applications. This can be exploited to disclose or manipulate the contents of arbitrary files or execute arbitrary code with root privileges if the "setuid()" call fails due to e.g. resource limits." http://secunia.com/advisories/21402/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-001-setuid.txt Bump PKGREVISION.
2006-08-09Fix include file so that it doesn't conflict with code. Variable 'nib' thatdarcy3-3/+17
was declared external is only used in one place and is declared static in that file (quill0p.c).
2006-08-09Use PKGREVISION for PKGREVISION bumps.wiz1-2/+3
2006-08-09Add in PAM supportadrianp10-53/+68
Fix mySQL PLIST Fix all PLISTs to avoid a nightmare when the nb number is changed Bump to nb1
2006-08-09Drop .ORDER declarations since pkgsrc doesn't support "make -j ...".jlam4-10/+4
2006-08-09Only acquire the localbase lock after acquiring root privileges. Thisjlam1-3/+9
fixes "make install" using just-in-time su-to-root.
2006-08-09ffmpeg, not ffmpeq (hi ben!)salo1-2/+2
2006-08-09Updated mail/dovecot to 1.0rc6nb2.ghen1-1/+2
2006-08-09Add --with-ioloop=best to CONFIGURE_ARGS and bump PKGREVISION. The defaultghen1-2/+3
I/O loop method was changed from kqueue(2) to poll(2) in 1.0rc2, which has been reported to cause problems on *BSD. --with-ioloop=best selects kqueue on platforms that implement it (*BSD), and poll on others. You can use "dovecot --build-options" to see what your binary has been compiled with.
2006-08-09Fix PLIST in ffmpeg. Addresses PR#34173ben3-4/+7
2006-08-09add a SO_REUSEPORT to make this workdrochner2-1/+23
2006-08-09Update net/tcpick to version 2.1. Addresses PR#34166ben5-11/+12
2006-08-09MACHINE_ARCH on amd64 is x86_64.rjs1-2/+2
2006-08-09Update dovecot to 1.0rc6nb1abs1-4/+11
- Use (the newly defined) SSLDIR so we use .../certs & .../private rather than .../certs/certs and .../certs/private - Update ssl_cert_file & ssl_key_file in example dovecot.conf to match SSLDIR - Update mkcert.sh to also match SSLDIR
2006-08-09some apps (dovecot) need the SSLDIR rather than SSLCERTS & SSLKEYSabs1-10/+10
2006-08-09ap-auth-script updated to 1.10.wiz2-3/+3
2006-08-09Update to 1.10:wiz2-7/+17
Bug fixes and support for apache2. XXX: compilation for apache2 works, but installation fails -- if you know apxs, please take a look: apxs:Error: Sorry, cannot determine bootstrap symbol name. apxs:Error: Please specify one with option `-n'.
2006-08-09- rxvt-unicode.wiz1-2/+1
2006-08-09+ udpcast.wiz1-1/+2
2006-08-09+ udpcastwiz1-1/+2
2006-08-09Initial import of udpcast-20060619, requested in PR 34171:wiz5-0/+50
UDPcast is a file transfer tool that can send data simultaneously to many destinations on a LAN. This can for instance be used to install entire classrooms of PC's at once. The advantage of UDPcast over using other methods (nfs, ftp, whatever) is that UDPcast uses Ethernet's multicast abilities: it won't take longer to install 15 machines than it would to install just 2.
2006-08-09make this build with GCC 4.1.mrg2-1/+14
2006-08-09Note addition of p5-Mail-Webmail-Gmail and p5-GMail-IMAPD.jmmv1-1/+3