summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2015-01-30+ gst-plugins1-omxjmcneill1-1/+2
2015-01-30Import gst-omx-1.2.0 as multimedia/gst-plugins1-omx.jmcneill4-0/+54
This module contains a plugin that wraps available OpenMAX IL components and makes them available as standard GStreamer elements.
2015-01-30Updated misc/dialog to 1.2.20150125wiz2-3/+3
2015-01-30Update to 1.2.20150125:wiz2-6/+6
2015/01/25 + suppress highlighting of character which denotes an abbreviation or shortcut for the OK/Cancel and other buttons for these widgets, which use abbreviations for the list shown on the screen: buildlist, checklist/radiobox, menubox, treeview (Debian #775295). + add grid up/left and down/right bindings in editbox.c as synonyms for field prev and next, respectively when handling the OK/Cancel buttons (Debian #775294).
2015-01-30Updated devel/bison to 3.0.4wiz2-3/+3
2015-01-30Update to 3.0.4:wiz3-28/+6
* Noteworthy changes in release 3.0.4 (2015-01-23) [stable] ** Bug fixes *** C++ with Variants (lalr1.cc) Fix a compiler warning when no %destructor use $$. *** Test suites Several portability issues in tests were fixed.
2015-01-30+ bison-3.0.4, clamav-0.98.6, dialog-1.2.20150125, libreoffice4-4.4.0,wiz1-2/+6
libreoffice4-bin-4.4.0.
2015-01-29bump BUILDLINK_API_DEPENDS.raspberrypi-userlandjmcneill1-2/+2
2015-01-29Updated graphics/glu to 7.11.2nb1nat1-1/+2
2015-01-29Fix segfaults and crashing for applications that use libGLU.nat1-1/+2
Bump PKGREVISION. This commit was approved by wiz@
2015-01-29Fix segfaults and crashing with applications that use libGLU.nat2-1/+51
This commit was approved by wiz@
2015-01-29Remove cargo cult patch (chunk) pointing towiz8-44/+12
%%LOCALBASE%%/lib/browser_plugins/symlinks/gecko. Nothing installs any files there, nor does is this directory created by anything.
2015-01-29pkgsrc does not use the b2g installer, remove corresponding patches.wiz3-31/+1
2015-01-29There is no point in having Android packaging patches in pkgsrc. (yet?)wiz3-31/+1
2015-01-29Explicitly disable inotify support on SunOS whilst it is Linux-specific.jperkin1-1/+6
2015-01-29Updated comms/asterisk to 11.15.1jnemeth1-1/+2
2015-01-29Update to Asterisk 11.15.1: this is a security fix.jnemeth3-10/+11
pkgsrc change: adapt to splitting up of speex The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available security releases are released as versions 1.8.28.cert-4, 1.8.32.2, 11.6-cert10, 11.15.1, 12.8.1, and 13.1.1. The release of these versions resolves the following security vulnerabilities: * AST-2015-001: File descriptor leak when incompatible codecs are offered Asterisk may be configured to only allow specific audio or video codecs to be used when communicating with a particular endpoint. When an endpoint sends an SDP offer that only lists codecs not allowed by Asterisk, the offer is rejected. However, in this case, RTP ports that are allocated in the process are not reclaimed. This issue only affects the PJSIP channel driver in Asterisk. Users of the chan_sip channel driver are not affected. * AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability CVE-2014-8150 reported an HTTP request injection vulnerability in libcURL. Asterisk uses libcURL in its func_curl.so module (the CURL() dialplan function), as well as its res_config_curl.so (cURL realtime backend) modules. Since Asterisk may be configured to allow for user-supplied URLs to be passed to libcURL, it is possible that an attacker could use Asterisk as an attack vector to inject unauthorized HTTP requests if the version of libcURL installed on the Asterisk server is affected by CVE-2014-8150. For more information about the details of these vulnerabilities, please read security advisory AST-2015-001 and AST-2015-002, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.32.2 http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.15.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2015-001.pdf * http://downloads.asterisk.org/pub/security/AST-2015-002.pdf Thank you for your continued support of Asterisk!
2015-01-29Updated comms/asterisk10 to 10.12.4nb6jnemeth1-1/+2
2015-01-29Update to Asterisk 10.12.4rc6.jnemeth2-3/+4
This update is just to accomodate the speex splitup. Note that Asterisk 10.x is dead upstream and should not be used anymore. This package will be removed at some point.
2015-01-29Add upstream bug report URL.wiz2-3/+4
2015-01-29Updated comms/asterisk18 to 1.8.32.2jnemeth1-1/+2
2015-01-29Use upstream patch.wiz7-195/+23
2015-01-29Update to asterisk 1.8.32.2: this is a security fix.jnemeth3-10/+11
pkgsrc change: adapt to splitting up of speex The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available security releases are released as versions 1.8.28.cert-4, 1.8.32.2, 11.6-cert10, 11.15.1, 12.8.1, and 13.1.1. The release of these versions resolves the following security vulnerabilities: * AST-2015-001: File descriptor leak when incompatible codecs are offered Asterisk may be configured to only allow specific audio or video codecs to be used when communicating with a particular endpoint. When an endpoint sends an SDP offer that only lists codecs not allowed by Asterisk, the offer is rejected. However, in this case, RTP ports that are allocated in the process are not reclaimed. This issue only affects the PJSIP channel driver in Asterisk. Users of the chan_sip channel driver are not affected. * AST-2015-002: Mitigation for libcURL HTTP request injection vulnerability CVE-2014-8150 reported an HTTP request injection vulnerability in libcURL. Asterisk uses libcURL in its func_curl.so module (the CURL() dialplan function), as well as its res_config_curl.so (cURL realtime backend) modules. Since Asterisk may be configured to allow for user-supplied URLs to be passed to libcURL, it is possible that an attacker could use Asterisk as an attack vector to inject unauthorized HTTP requests if the version of libcURL installed on the Asterisk server is affected by CVE-2014-8150. For more information about the details of these vulnerabilities, please read security advisory AST-2015-001 and AST-2015-002, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.32.2 http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.15.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2015-001.pdf * http://downloads.asterisk.org/pub/security/AST-2015-002.pdf Thank you for your continued support of Asterisk!
2015-01-29Fix build with clang and on NetBSD/current.joerg8-3/+321
2015-01-29Fix rpath-link use.joerg2-1/+53
2015-01-29Don't kill attributes when building with clang.joerg2-3/+12
2015-01-29Limit memory used by the Queens test program.joerg2-3/+12
2015-01-29After speex update, depend on speexdsp.joerg1-1/+2
2015-01-29Updated graphics/p5-RRDTool-OO to 0.35wiz1-1/+2
2015-01-29Update to 0.35, from Kai-Uwe Eckhardt <kuehro@gmx.de> in private mail.wiz2-8/+7
0.35 (07/20/2014) (ms) Fix for [rt.cpan.org #97322], now rounding results to cope with floating point inaccuracies in rrdtool. Reported by Andreas König. 0.34 (06/26/2014) (ms) Added disable_rrdtool_tag option as suggested by Sun Guonian. 0.33 (07/08/2013) (ms) Florian Eckert reported that graph() modified 2nd level entries of the options array passed to it. Used Storable::clone in OO.pm to make a deep copy first. 0.32 (03/06/2012) (ms) [rt.cpan.org #63351] Applied modified patch by Jonas Wagner to fix stacked graphs with no legend. (ms) Implements RRDs::xport and returns a Perl structure instead of basic xport array (Remi Ferrand, Fabien Wernli).
2015-01-29Add upstream bug report URLs.wiz8-15/+35
2015-01-29Updated emulators/mess to 0.158wiz1-1/+2
2015-01-29Updated emulators/mame to 0.158wiz1-1/+2
2015-01-29Update to 0.158: the usual changes.wiz2-3/+6
2015-01-29Update to 0.158. The usual changes.wiz11-31/+235
2015-01-29Updated archivers/cabextract to 1.5wiz1-1/+2
2015-01-29Update to 1.5:wiz2-6/+6
New in 1.5 * cabextract replaces bad Unicode characters in filenames with the standard Unicode replacement character * wince_rename now puts files under the correct installation path * Several crashes and hangs were found by Debian project members using the afl (American fuzzy lop) tool to generate corrupt cabinet files. These crashes and hangs have been fixed.
2015-01-29Updated devel/p5-ExtUtils-CBuilder to 0.28.02.20mef1-1/+9
Updated devel/p5-Exporter-Tiny to 0.043.01 Updated devel/p5-ExtUtils-Command to 1.20 Updated devel/p5-ExtUtils-CppGuess to 0.08 Updated devel/p5-ExtUtils-Helpers to 0.022 Updated devel/p5-ExtUtils-ModuleMaker to 0.52 Updated devel/p5-ExtUtils-ModuleMaker-TT to 0.94 Updated devel/p5-ExtUtils-XSpp to 0.18
2015-01-29Update 0.16.02 to 0.18mef2-8/+8
pkglint warns WARN: Makefile:3: The package is being downgraded from 0.1602 to 0.18. should look PKGNAME instead of DISTNAME ? ---------------------- 0.18 Wed Sep 18 10:00:00 CEST 2013 - Upgrade to stable release. 0.17_02 Wed Aug 28 22:35:02 CEST 2013 - Fixed getters for typemaps using %output_list annotation. 0.17_01 Sat Aug 10 08:20:11 CEST 2013 - Added standard XS typemap for objects (disabled by default for backwards compatibility).x - Allow specifying XS typemap code in the XS++ typemap declaration. - Generate accessors for member variables. - Handle multiple function/method annotations (used by plugins). - Updated plugin interface (should be backwards-compatible). 0.1700 Sun Feb 10 12:00:00 CET 2013 - %alias feature for aliasing XS++ wrappers. 0.1603 Fri Dec 28 12:03:09 CEST 2012 - Fix blead-perl warning about unescaped { in regexps. - Use ExtUtils::Typemaps instead of ExtUtils::Typemap (which had to be renamed). - Somewhat improved examples.
2015-01-29Update to 0.94mef2-7/+6
-------------- 0.94 2013-11-06 13:48:39 America/New_York - converted to dzil for modern boilerplate and META generation - marked as 'unmaintained'
2015-01-29Update to 0.52mef2-7/+6
-------------- 0.52 July 4, 2014 Move version control from Subversion to git. Establish development repository at https://github.com/jkeenan/extutils-modulemaker. Adapt code to prevent warnings to be added in Perl 5.22.
2015-01-29add wsmouse mousewheel supportjmcneill2-8/+16
2015-01-29Update to 0.022mef2-7/+6
--------------- 0.022 2014-03-07 13:27:09CET+0100 Europe/Amsterdam Cleaned up remains of former functions Skip IO layers on <5.8 for 5.6 compatability Don't swallow pl2bat exceptions
2015-01-29Update 0.07 to 0.08mef2-7/+6
------------------- ChangeLog unknown.
2015-01-29initialize keysym->unicode in wskbd input pathjmcneill2-6/+18
2015-01-29Update 1.18 to 1.20mef2-6/+6
------------------- 1.20 Thu, Jan 8, 2015 - Skip some tests on Haiku as well 1.19 Sat, Dec 27, 2014 - Late load required modules
2015-01-29Update 0.042 to 0.043.01mef2-7/+7
------------------------ 0.043_01 2014-11-09 [ Documentation ] - Restructure documentation. [ Other ] - Support { -as => CODE } to programatically rename functions.
2015-01-29Update 0.28.02.16 to 0.28.02.20mef2-7/+7
------------------------------- 0.280220 - 2014-09-27 Fixed: - Added missing 'use Config' from 'android.pm' (thanks Debian community) 0.280219 - 2014-09-01 Fixed: - Fixed regression on Android (thanks to Brian Fraser) 0.280218 - 2014-09-01 Fixed: - Mispelled 'starup' key in BCC support was fixed. #79574 - Fixed the version in the PM file (thanks to Jim Keenan) 0.280217 - 2014-08-22 Fixed: - Quoted perl path for Windows support #98245 [Alberto Simoes]
2015-01-29reported to upstreamobache2-3/+6
2015-01-29Updated lang/clang to 3.5.1adam2-3/+3