summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2012-04-30update to 1.32.1drochner5-49/+27
This is a new major release.
2012-04-30update to 3.4.1drochner4-38/+80
This is a new major release.
2012-04-30update to 0.6.5drochner2-7/+6
change: minor bugfix
2012-04-30update to 2.38.1drochner3-88/+8
This is a new major release.
2012-04-30update to 2.32.1drochner4-15/+16
This is a new major release, corresponding to glib2-2.32
2012-04-30update to 2.36.1drochner4-17/+16
This is a new major release.
2012-04-30sync w/ base pkgdrochner2-10/+8
2012-04-30update to 2.26.1drochner4-19/+21
This is a new major release tree.
2012-04-30update to 1.30.0drochner3-28/+29
changes: -bugfixes -documentation fixes
2012-04-30Updated pkgtools/pkg_rolling-replace to 0.24.1gdt1-1/+2
2012-04-30Use " for PKGNAME_REQUIRED, so that ${pkg} is expanded.gdt2-4/+4
Resolves at least some issues with finding the right pyNN-foo, when replacing packages that don't match PYTHON_VERSION_DEFAULT. (This was a stray change in my tree not committed for a while, but it's been working ok.) Now 0.24.1.
2012-04-30needs glib2>=2.32drochner1-1/+2
2012-04-30update to 2.32.1drochner21-344/+338
This is the new major tree, needed for a number of Gnome pkgs. The optional "kqueue" patch isn't ready yet, so the "kqueue" option does not work atm.
2012-04-30Only available on MASTER_SITE_MOZILLA_ALL.obache1-2/+2
2012-04-30Disable GC_register_my_thread and GC_unregister_my_thread on NetBSD assbd2-1/+29
the version of boehm-gc bundled with gcc does not support NetBSD threads.
2012-04-30Add dm-download02.mozilla.org to MASTER_SITE_MOZILLA_ALL.obache1-1/+2
2012-04-30Add x11 and sdl options (sdl does not work yet).shattered3-5/+41
2012-04-30My stuff from this past weekend.dholland1-1/+8
2012-04-30Updated x11/xorg-cf-files to 1.0.4nb4sbd1-1/+2
2012-04-30The changes to patch-ai in rev1.3 need the PKGREVISION to be bumped.sbd1-2/+2
2012-04-30Remove gcc-go from PKG_SUGGESTED_OPTIONS as it seems to have some buildsbd1-2/+2
problems.
2012-04-30Bump PKGREVISION for previous.dholland1-2/+2
2012-04-30DESTDIR support. Fix problems building the database.dholland6-18/+87
2012-04-30Updated comms/asterisk16 to 1.6.2.24jnemeth1-1/+2
2012-04-30Update to Asterisk 1.6.2.24. This fixes AST-2012-004 and AST-2012-005.jnemeth2-16/+15
The 1.6.2 series went End of Life on April 21st 2012, so this was the last update. This package will be deleted in the not too distnat future. The Asterisk Development Team has announced security releases for Asterisk 1.6.2 , 1.8, and 10. The available security releases are released as versions 1.6.2.24, 1.8.11.1, and 10.3.1. The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the following two issues: * A permission escalation vulnerability in Asterisk Manager Interface. This would potentially allow remote authenticated users the ability to execute commands on the system shell with the privileges of the user running the Asterisk application. * A heap overflow vulnerability in the Skinny Channel driver. The keypad button message event failed to check the length of a fixed length buffer before appending a received digit to the end of that buffer. A remote authenticated user could send sufficient keypad button message events that th e buffer would be overrun. These issues and their resolution are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-004, AST-2012-005, and AST-2012-006, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.24 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf Thank you for your continued support of Asterisk!
2012-04-30Switch the qt4 option on by default, as it turns out it works and (todholland1-2/+3
my surprise) doesn't require PLIST additions. Ride the update as it was less than an hour ago.
2012-04-30Updated comms/asterisk10 to 10.3.1jnemeth1-1/+2
2012-04-30Update to Asterisk 10.3.1. This Fixes AST-2012-004, AST-2012-005,jnemeth2-10/+9
and AST-2012-006. The Asterisk Development Team has announced security releases for Asterisk 1.6.2 , 1.8, and 10. The available security releases are released as versions 1.6.2.24, 1.8.11.1, and 10.3.1. The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the following two issues: * A permission escalation vulnerability in Asterisk Manager Interface. This would potentially allow remote authenticated users the ability to execute commands on the system shell with the privileges of the user running the Asterisk application. * A heap overflow vulnerability in the Skinny Channel driver. The keypad button message event failed to check the length of a fixed length buffer before appending a received digit to the end of that buffer. A remote authenticated user could send sufficient keypad button message events that th e buffer would be overrun. In addition, the release of Asterisk 1.8.11.1 and 10.3.1 resolve the following issue: * A remote crash vulnerability in the SIP channel driver when processing UPDATE requests. If a SIP UPDATE request was received indicating a connected line update after a channel was terminated but before the final destruction of the associated SIP dialog, Asterisk would attempt a connected line update on a non-existing channel, causing a crash. These issues and their resolution are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-004, AST-2012-005, and AST-2012-006, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.3.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf * http://downloads.asterisk.org/pub/security/AST-2012-006.pdf Thank you for your continued support of Asterisk!
2012-04-30DESTDIR support.dholland3-2/+22
2012-04-30Fix build on NetBSD.dholland1-0/+7
2012-04-30Updated comms/asterisk18 to 1.8.11.1jnemeth1-1/+2
2012-04-30Update to Asterisk 1.8.11.1. This fixes AST-2012-004, AST-2012-005,jnemeth2-10/+9
and AST-2012-006. The Asterisk Development Team has announced security releases for Asterisk 1.6.2 , 1.8, and 10. The available security releases are released as versions 1.6.2.24, 1.8.11.1, and 10.3.1. The release of Asterisk 1.6.2.24, 1.8.11.1, and 10.3.1 resolve the following two issues: * A permission escalation vulnerability in Asterisk Manager Interface. This would potentially allow remote authenticated users the ability to execute commands on the system shell with the privileges of the user running the Asterisk application. * A heap overflow vulnerability in the Skinny Channel driver. The keypad button message event failed to check the length of a fixed length buffer before appending a received digit to the end of that buffer. A remote authenticated user could send sufficient keypad button message events that th e buffer would be overrun. In addition, the release of Asterisk 1.8.11.1 and 10.3.1 resolve the following issue: * A remote crash vulnerability in the SIP channel driver when processing UPDATE requests. If a SIP UPDATE request was received indicating a connected line update after a channel was terminated but before the final destruction of the associated SIP dialog, Asterisk would attempt a connected line update on a non-existing channel, causing a crash. These issues and their resolution are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2012-004, AST-2012-005, and AST-2012-006, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.6.2.24 http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.11.1 http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.3.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2012-004.pdf * http://downloads.asterisk.org/pub/security/AST-2012-005.pdf * http://downloads.asterisk.org/pub/security/AST-2012-006.pdf Thank you for your continued support of Asterisk!
2012-04-30updated aqsisdholland1-2/+1
2012-04-30Update to 1.8.1. Changes: 10 years of development.dholland22-1020/+416
Add missing DESTDIR support. Restriction: so far the GUI parts, which require qt4, are not built by default, and probably won't build yet if enabled.
2012-04-29Fix build with non-default PREFIX: tell it where to find liblzo. Otherwisedholland1-1/+3
it knows abotu /usr/pkg, looks there, and fails.
2012-04-29Updated mail/thunderbird10 to 10.0.4ryoon1-1/+3
Updated mail/thunderbird10-l10n to 10.0.4
2012-04-29Update to 10.0.4ryoon6-152/+2978
Patches from Bernd Ernesti on pkgsrc-users. Changelog: The following problems are fixed. * Security fixes * Using MAPI send with Thunderbird in offline mode will now work correctly * Language packs will now work for all releases of an ESR branch
2012-04-29Patch out an unnecessary configure test that blows up with the latestdholland3-10/+32
autoconf. While here, mop up some pkglint.
2012-04-29Note update of www/contao211-translations package to 201204290.taca1-1/+2
2012-04-29Update contao211-translations to 201204290.taca3-8/+8
Update Slovak language files.
2012-04-29Note update of devel/ruby-readline to 1.9.3p194nb1.taca1-1/+2
2012-04-29Don't enable "readline" option default if RUBY_VER is prior to 193.taca2-5/+13
Ruby 1.9.3 changes its license and solve the problem with GPL3 of readline license. But Ruby 1.9.2/1.8.7 dosen't solve this problem. If you want to use ruby-readline with GNU readline on ruby18 or ruby192, please explictly set "readline" PKG_OPTION. Fix PR pkg/41943. Bump PKGREVISION.
2012-04-29Note update of www/php-apc package to 3.1.10.taca1-1/+2
2012-04-29Update php-apc package to 3.1.10.taca4-42/+6
- Add PHP 5.4 support (Dmitry, Anatoliy, Pierre) - Fixed bug #22679: Fix apc_bin_dump for constants. Use IS_CONSTANT_TYPE_MASK to handle all the constants, including the unqalified ones (instead of ~IS_CONSTANT_INDEX check) - Fixed bug #23822, php crashes on apache restart
2012-04-29Note update of lang/pear package to 1.9.4nb3.taca1-1/+2
2012-04-29Update Archive_Tar which included this package to 1.3.10.taca2-7/+7
Archive_Tar 1.3.10 Changelog: * Fix Bug #13361: Unable to add() some files (ex. mp3) [mrook] * Fix Bug #19330: Class creates incorrect (non-readable) tar.gz file [mrook] Bump PKGREVISION.
2012-04-29Updated devel/xulrunner10 to 10.0.4ryoon1-1/+4
Updated www/firefox10 to 10.0.4 Updated www/firefox10-l10n to 10.0.4
2012-04-29Update to 10.0.4ryoon6-268/+270
Patches from Bernd Ernesti on pkgsrc-users. Changelog: The following problems are fixed. * Security fixes * extensions.checkCompatibility.* prefs didn't work as expected in ESR releases (734848) * Firefox ESR 10.0.3 opened "Whats New" page after update (737535)
2012-04-29Note update of www/termtter package to 1.11.0.taca1-1/+2
2012-04-29Update termtter to 1.11.0.taca2-6/+6
Changes are unavailable.