summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2013-01-03Note update of the "milter-greylist" package to version 4.4.1.tron2-3/+3
2013-01-03Update "milter-greylist" package to version 4.4.1.tron4-26/+41
Major changes since 4.2.7: - Allow comparison of msgsize, rcptcount & spamd, against values from LDAP - localaddr option so that Postifix user can use spf self - Allow filtering header and body against LDAP or CURL gathered properties - Add format string to report last matching LDAP or CURL propery - Add a addfooter action clause in ACL, to add mail a footer - Allow per-dacl maxpeek setting, set by maxpeer action clause in racl - Add LDAP or CURL gathered property substitution in format strings - Add continue type ACL - p0f v3 support - Fix spamd hang if message contains NULL (Enrico Scholz) - Send the queueid to spamd (Petar Bogdanovic) - Ratelimit on SMTP sessions and data size - New tarpit feature (Kouhei Sutou) - Make SpamAssassin headers Sendmail-like (Petar Bogdanovic) - Merge autowhite and greylist databases (Rudy Eschauzier) - Make LDAP querries timeout configurable - Make MX sync timeout peer-configurable (Attila Bruncsak) This update is largely based on a patch submitted by Richard Palo in PR pkg/47369.
2013-01-03Note the end of the freeze in pkgsrc now that we have the new pkgsrc-2012Q4 ↵agc2-11/+4
branch.
2013-01-03update comms/asterisk10 to 10.11.1jnemeth1-1/+3
update comms/asterisk18 to 1.8.19.1
2013-01-03de to Asterisk 1.8.19.1; this is a security fix to fix AST-2012-14jnemeth2-10/+9
and AST-2012-015. Approved for commit during freeze by: agc The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones, and 11.1.1. The release of these versions resolve the following two issues: * Stack overflows that occur in some portions of Asterisk that manage a TCP connection. In SIP, this is exploitable via a remote unauthenticated session; in XMPP and HTTP connections, this is exploitable via remote authenticated sessions. * A denial of service vulnerability through exploitation of the device state cache. Anonymous calls had the capability to create devices in Asterisk that would never be disposed of. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-014 and AST-2012-015, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf Thank you for your continued support of Asterisk!
2013-01-03Upgrade to Asterisk 10.11.1; this is a security fix to fix AST-2012-14jnemeth2-10/+9
and AST-2012-015. Approved for commit during freeze by: agc The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones, and 11.1.1. The release of these versions resolve the following two issues: * Stack overflows that occur in some portions of Asterisk that manage a TCP connection. In SIP, this is exploitable via a remote unauthenticated session; in XMPP and HTTP connections, this is exploitable via remote authenticated sessions. * A denial of service vulnerability through exploitation of the device state cache. Anonymous calls had the capability to create devices in Asterisk that would never be disposed of. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-014 and AST-2012-015, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf Thank you for your continued support of Asterisk!
2013-01-03Updated comms/asterisk to 11.1.1jnemeth1-1/+2
2013-01-03Upgrade to Asterisk 11.1.1; this is a security fix to fix AST-2012-14jnemeth2-10/+9
and AST-2012-015. Approved for commit during freeze by: agc The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.11 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.11-cert10, 1.8.19.1, 10.11.1, 10.11.1-digiumphones, and 11.1.1. The release of these versions resolve the following two issues: * Stack overflows that occur in some portions of Asterisk that manage a TCP connection. In SIP, this is exploitable via a remote unauthenticated session; in XMPP and HTTP connections, this is exploitable via remote authenticated sessions. * A denial of service vulnerability through exploitation of the device state cache. Anonymous calls had the capability to create devices in Asterisk that would never be disposed of. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-014 and AST-2012-015, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.1.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-014.pdf * http://downloads.asterisk.org/pub/security/AST-2012-015.pdf Thank you for your continued support of Asterisk!
2013-01-03Remove ftp.opendylan.org, no ping some time.ryoon1-3/+2
2013-01-02When using USE_PKGSRC_GCC_RUNTIME, ensure the fortran wrapper uses thejperkin1-1/+2
custom specs file too, so that the correct runtime is used.
2013-01-02Updated net/aria2 to 1.16.1ryoon2-3/+3
2013-01-02Update to 16.0.1ryoon2-6/+6
Changelog: aria2 1.16.1 ============ Release Note ------------ This release adds the ability to persist GID across sessions. The GID will be saved with --save-session. There are several restrictions how GID is persisted. See the manual for details. For this change, now GID is 64 bits binary data and represented by 16 characters hex string in RPC query. The disk cache feature was added, which may reduce disk activity. The console readout was redesigned. The warning displayed when --file-allocation=falloc is used on MinGW32 build was removed as a bug. Changes ------- * mingw32: Re-open files with read-only mode enabled on seeding On Mingw32 build, if aria2 opens file with GENERIC_WRITE access right, some programs cannot open the file aria2 is seeding. To avoid this situation, re-open files with read-only enabled when seeding is about to begin. * Save gid option with --save-session option * Added --gid option This option sets GID manually. aria2 identifies each download by the ID called GID. The GID must be hex string of 16 characters, thus [0-9a-zA-Z] are allowed and leading zeros must not be stripped. The GID all 0 is reserved and must not be used. The GID must be unique, otherwise error is reported and the download is not added. This option is useful when restoring the sessions saved using --save-session option. If this option is not used, new GID is generated by aria2. * Use 64 bits random bytes as GID This change replaces the current 64 bit sequential GID with 64 bits random bytes GID in an attempt to support persistent GID. Internally, the GID is stored as uint64_t. For human representation and RPC interface, GID is represented as 16 bytes hex string. For console readout, 16 bytes are too long, so it is abbreviated to first 6 bytes. When querying GID in RPC calls, user can speicfy the prefix of GID as long as the prefix is shared by more than 1 GID entries. * Fixed BitfieldMan::getOffsetCompletedLength overflow on 32-bit systems * mingw32: Use HANDLE only for MinGW32 build * Changed console readout, making it more compact "SIZE:" is removed because it is obvious. SEEDING, SEED, SPD and UP are now replaced with SEED, SD, DL and UL respectively. * Compact readout when more than 1 simultaneous downloads are going on If more than 1 simultaneous downloads are going on, use more compact format in readout. Currently, at most 5 download stats are displayed. util::abbrevSize() is rewritten to support "Gi" unit and provides more compact abbreviation. * Console color output Log level and download result string is now colored. * Logger: Simplified console output and change level format in log The date and time are now removed from console output. The log level is now formatted as "[LEVEL]". * Start to find faster host before the number of missing segments becomes 1 The old implementation starts to find faster host when the number of missing segment becomes 1. Because of --min-split-size option, before the number of missing segment becomes 1, the number of connection becomes 1 and it can be slow. In this case, we have to wait until the last segment is reached. The new implementation starts to find faster host when the remaining length is less than --min-split-size * 2, to mitigate the problem stated above. * Removed warning when --file-allocation=falloc is used in MinGW32 build The warning was just a mistake. SetFilePointerEx + SetEndOfFile actually allocate disk space. * Write data in 4K aligned offset in write with disk cache enabled This greatly reduces disk activity especially on Win + NTFS. Not so much difference on Linux. * mingw32: Removed FSCTL_SET_SPARSE set * Added --disk-cache option This option enables disk cache. If SIZE is 0, the disk cache is disabled. This feature caches the downloaded data in memory, which grows to at most SIZE bytes. The cache storage is created for aria2 instance and shared by all downloads. The one advantage of the disk cache is reduce the disk seek time because the data is written in larger unit and it is reordered by the offset of the file. If the underlying file is heavily fragmented it is not the case.
2013-01-02Updated graphics/fotoxx to 13.01ryoon1-1/+2
2013-01-02Disable-libudev as pkg-config can not find libudev.pc.sbd1-1/+2
2013-01-02Fix build errors with NetBSD 5's gcc.ryoon4-1/+76
2013-01-02Updated graphics/blender to 2.65aryoon2-3/+3
2013-01-02Update to 2.65aryoon6-1316/+1166
* Fix build on NetBSD current, repoted by dholland@ Fix NetBSD version conditional and link to libexecinfo Changelog: * More features * 200 over bug fixes
2013-01-01Fix path to bashjoerg1-2/+7
2013-01-01Needs pkg-configjoerg1-2/+2
2013-01-01Updated textproc/mdoclint to 1.18jnemeth1-1/+2
2013-01-01allow 2013 in man pagesjnemeth2-5/+4
2013-01-01new file for 2013jnemeth1-0/+8
2012-12-31Fix build on Linux (CentOS 6.3).ryoon2-4/+4
Add workaround not to try toinclude util.h on Linux. Configure should handle util.h properly.
2012-12-31Remove PLIST.Linux as they are currently nonported.sbd1-3/+0
2012-12-31buildlink with converters/libiconv as same condition of Makefile.obache1-1/+4
fixes buildlink of packages depending on this package for SunOS and Darwin.
2012-12-31require -liconv for the case using libiconv.obache1-1/+2
PR 47180.
2012-12-31Updated multimedia/mjpegtools to 2.0.0nb1sbd1-1/+2
2012-12-31Add PLIST.Linuxsbd2-1/+7
Bump PKGREVISION
2012-12-31Remove unused Makefile.common.ryoon1-39/+0
This package includes parent meta-pkg's Makefile.common.
2012-12-31Remove leftover references to gcc3-ada and gcc34-ada.dholland2-31/+14
2012-12-31Note update of www/geeklog package to 1.8.2.taca1-1/+2
2012-12-31Update geeklog to 1.8.2. (This is leaf package.)taca3-7/+10
Geeklog History/Changes: Dec 30, 2012 (1.8.2) ------------ - A remote service user now bypasses current password check when account is deleted (bug #0001417) [Tom] - Fixed Twitter OAuth login error after Twitter deactived some old URLs (bug #0001497) [Tom] - $dbconfig_path was not escaped in the install script (bug #0001457, patch provided by mystral-kk) - COM_stripslashes will now handle arrays; this was a problem during re-authentication after a security token expired (bug #0001413) [suprsidr] - The comment count for a story could be wrong if there was a different object with the same id and a comment (bug #0001414) [Tom] - Feeds with the full story text still had a '...' at the end (bug #0001431) [Jeff Rivett, Tom] - Allow MIME type application/x-gzip-compressed when uploading a plugin for installation (bug #0001405) [Dirk] - Fixed compatibility with MySQL 5.5 (bugs #0001410, #0001456). This also raises the minimum supported MySQL version to 4.1.2 [Dirk, Tom]
2012-12-31Specify a valid homedir for munin user, so that cron(8) does notjym1-2/+2
bail out trying to chdir(2) to a nonexistent $HOME when exec'ing munin-cron. ok joerg@
2012-12-31webkit directly requires libXdamagesbd1-1/+2
2012-12-31Use ${PKGGNUDIR} and ${PKGMANDIR} in INSTALLATION_DIRS.sbd5-10/+10
2012-12-31Use ${PKGGNUDIR} and ${PKGMANDIR} where appropriate.sbd1-3/+5
2012-12-30Updated textproc/p5-Text-vCard to 2.13.kleink1-1/+2
2012-12-30Update p5-Text-vCard to 2.13:kleink2-6/+6
2.13 Thu 20 Dec 2012 19:34:44 GMT - Under the newer combined RFC6350 - every END:VCARD must be followed by \r\n (including last one)- reported by ysth - Fix for tests, should now work under Perl 5.17.6 - Ron Savage
2012-12-30Use "bison" instead of "yacc" to fix the build problem under Solaristron1-2/+2
reported by Richard Palo in PR pkg/47369.
2012-12-30Add missing comment to patch file.tron2-3/+5
2012-12-30Fix Object.h conflictadam2-1/+16
2012-12-30avoid to overwrite `libarchive.pc' from buildlink.obache1-2/+2
PR 47279.
2012-12-30Add required standard headers.dholland4-28/+110
XXX: this package should be terminated with prejudice
2012-12-30xkbsetdholland1-1/+2
2012-12-30Update REPLACE_PERL line; set perl USE_TOOLS to perl:run because thedholland1-3/+4
perl script is installed. Fixes build failure. Bump PKGREVISION.
2012-12-30Not MAKE_JOBS_SAFE.dholland1-1/+2
2012-12-30Honor PKGMANDIR.dholland2-1/+15
2012-12-30Needs msgfmt, seen in today's Linux build.dholland1-2/+2
2012-12-30Updated lang/sun-jre6 to 6.0.37nb1sbd1-1/+2
2012-12-30Add back PLIST conditionals.sbd2-2/+14
Bump PKGREVISION