summaryrefslogtreecommitdiff
path: root/net
AgeCommit message (Collapse)AuthorFilesLines
2011-03-03Pullup ticket #3368 - requested by tacasbd2-6/+6
net/samba35 security fix. Revisions pulled up: - net/samba35/Makefile 1.2 - net/samba35/distinfo 1.2 --- Module Name: pkgsrc Committed By: taca Date: Mon Feb 28 14:34:56 UTC 2011 Modified Files: pkgsrc/net/samba35: Makefile distinfo Log Message: Update samba35 pacakge to 3.5.7. Release Announcements ===================== Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to address CVE-2011-0719. o CVE-2011-0719: All current released versions of Samba are vulnerable to a denial of service caused by memory corruption. Range checks on file descriptors being used in the FD_SET macro were not present allowing stack corruption. This can cause the Samba code to crash or to loop attempting to select on a bad file descriptor set. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated (guest connection). Currently we do not believe this flaw is exploitable beyond a crash or causing the code to loop, but on the advice of our security reviewers we are releasing fixes in case an exploit is discovered at a later date. Changes ------- o Jeremy Allison <jra at samba.org> * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open.
2011-03-02Pullup ticket 3372 - requested by sbdspz1-2/+2
build fix for Linux Revisions pulled up: - pkgsrc/net/samba35/Makefile 1.3 ----------------------------------------------------------------------------- Module Name: pkgsrc Committed By: sbd Date: Tue Mar 1 11:28:59 UTC 2011 Modified Files: pkgsrc/net/samba35: Makefile Log Message: Add --with-cifsumount to CONFIGURE_ARGS on Linux systems in order to build umount.cifs To generate a diff of this commit: cvs rdiff -u -r1.2 -r1.3 pkgsrc/net/samba35/Makefile
2011-03-02Pullup ticket 3371 - requested by tronspz4-66/+6
security update Revisions pulled up: - pkgsrc/net/wireshark/Makefile 1.60 - pkgsrc/net/wireshark/distinfo by patch Files deleted: pkgsrc/net/wireshark/patches/patch-af pkgsrc/net/wireshark/patches/patch-ag ----------------------------------------------------------------------------- Module Name: pkgsrc Committed By: tron Date: Wed Mar 2 00:09:15 UTC 2011 Modified Files: pkgsrc/net/wireshark: Makefile distinfo Removed Files: pkgsrc/net/wireshark/patches: patch-af patch-ag Log Message: Update "wireshark" package to version 1.4.4. Changes since 1.4.3: - Bug Fixes The following vulnerabilities have been fixed. See the security advisory for details and a workaround. o Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that Wireshark could free an uninitialized pointer while reading a malformed pcap-ng file. (Bug 5652) Versions affected: 1.2.0 to 1.2.14 and 1.4.0 to 1.4.3. CVE-2011-0538 o Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that a large packet length in a pcap-ng file could crash Wireshark. (Bug 5661) Versions affected: 1.2.0 to 1.2.14 and 1.4.0 to 1.4.3. o Wireshark could overflow a buffer while reading a Nokia DCT3 trace file. (Bug 5661) Versions affected: 1.2.0 to 1.2.14 and 1.4.0 to 1.4.3. CVE-2011-0713 o Paul Makowski working for SEI/CERT discovered that Wireshark on 32 bit systems could crash while reading a malformed 6LoWPAN packet. (Bug 5661) Versions affected: 1.4.0 to 1.4.3. o joernchen of Phenoelit discovered that the LDAP and SMB dissectors could overflow the stack. (Bug 5717) Versions affected: 1.2.0 to 1.2.14 and 1.4.0 to 1.4.3. (Prior versions including 1.0.x are also affected.) o Xiaopeng Zhang of Fortinet's Fortiguard Labs discovered that large LDAP Filter strings can consume excessive amounts of memory. (Bug 5732) Versions affected: 1.2.0 to 1.2.14 and 1.4.0 to 1.4.3. (Prior versions including 1.0.x are also affected.) The following bugs have been fixed: o A TCP stream would not always be recognized as the same stream. (Bug 2907) o Wireshark Crashing by pressing 2 Buttons. (Bug 4645) o A crash can occur in the NTLMSSP dissector. (Bug 5157) o The column texts from a Lua dissector could be mangled. (Bug 5326) (Bug 5630) o Corrections to ANSI MAP ASN.1 specifications. (Bug 5584) o When searching in packet bytes, the field and bytes are not immediately shown. (Bug 5585) o Malformed Packet: ULP reported when dissecting ULP SessionID PDU. (Bug 5593) o Wrong IEI in container of decode_gtp_mm_cntxt. (Bug 5598) o Display filter does not work for expressions of type BASE_DEC, BASE_DEC_HEX and BASE_HEX_DEC. (Bug 5606) o NTLMSSP dissector may fail to compile due to space embedded in C comment delimiters. (Bug 5614) o Allow for name resolution of link-scope and multicast IPv6 addresses from local host file. (Bug 5615) o DHCPv6 dissector formats DUID_LLT time incorrectly. (Bug 5627) o Allow for IEEE 802.3bc-2009 style PoE TLVs. (Bug 5639) o Various fixes to the HIP packet dissector. (Bug 5646) o Display "Day of Year" for January 1 as 1, not 0. (Bug 5653) o Accommodate the CMake build on Ubuntu 10.10. (Bug 5665) o E.212 MCC 260 Poland update according to local national regulatory. (Bug 5668) o IPP on ports other than 631 not recognized. (Bug 5677) o Potential access violation when writing to LANalyzer files. (Bug 5698) o IEEE 802.15.4 Superframe Specification - Final CAP Slot always 0. (Bug 5700) o Peer SRC and DST AS numbers are swapped for cflow. (Bug 5702) o dumpcap: -q option behavior doesn't match documentation. (Bug 5716) - Updated Protocol Support ANSI MAP, BitTorrent, DCM, DHCPv6, DTAP, DTPT, E.212, GSM Management, GTP, HIP, IEEE 802.15.4, IPP, LDAP, LLDP, Netflow, NTLMSSP, P_Mul, Quake, Skinny, SMB, SNMP, ULP - New and Updated Capture File Support LANalyzer, Nokia DCT3, Pcap-ng To generate a diff of this commit: cvs rdiff -u -r1.59 -r1.60 pkgsrc/net/wireshark/Makefile cvs rdiff -u -r1.41 -r1.42 pkgsrc/net/wireshark/distinfo cvs rdiff -u -r1.1 -r0 pkgsrc/net/wireshark/patches/patch-af \ pkgsrc/net/wireshark/patches/patch-ag
2011-03-01Pullup ticket #3367 - requested by tacasbd2-7/+6
net/samba33 security fix. Revisions pulled up: - net/samba33/Makefile 1.13 - net/samba33/distinfo 1.6 --- Module Name: pkgsrc Module Name: pkgsrc Committed By: taca Date: Mon Feb 28 14:34:09 UTC 2011 Modified Files: pkgsrc/net/samba33: Makefile distinfo Log Message: Update samba33 pacakge to 3.3.15. Release Announcements ===================== Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to address CVE-2011-0719. o CVE-2011-0719: All current released versions of Samba are vulnerable to a denial of service caused by memory corruption. Range checks on file descriptors being used in the FD_SET macro were not present allowing stack corruption. This can cause the Samba code to crash or to loop attempting to select on a bad file descriptor set. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated (guest connection). Currently we do not believe this flaw is exploitable beyond a crash or causing the code to loop, but on the advice of our security reviewers we are releasing fixes in case an exploit is discovered at a later date. Changes ------- o Jeremy Allison <jra at samba.org> * BUG 7949: Fix DoS in Winbind and smbd with many file descriptors open.
2011-02-23Pullup ticket #3363 - requested by tacatron6-98/+21
net/bind97: security update Revisions pulled up: - net/bind97/Makefile 1.6 - net/bind97/PLIST 1.4 - net/bind97/distinfo 1.6 - net/bind97/files/named9.sh 1.2 - net/bind97/patches/patch-ac 1.3 - net/bind97/patches/patch-ae 1.2 --- Module Name: pkgsrc Committed By: taca Date: Wed Feb 16 17:43:22 UTC 2011 Modified Files: pkgsrc/net/bind97: Makefile PLIST distinfo pkgsrc/net/bind97/files: named9.sh pkgsrc/net/bind97/patches: patch-ac patch-ae Log Message: Update bind97 package to 9.7.3. * also sync rc scrpt with base system. Bug Fixes 9.7.3 * BIND now builds with threads disabled in versions of NetBSD earlier than 5.0 and with pthreads enabled by default in NetBSD versions 5.0 and higher. Also removes support for unproven-pthreads, mit-pthreads and ptl2. [RT #19203] * Added a regression test for fix 2896/RT #21045 ("rndc sign" failed to properly update the zone when adding a DNSKEY for publication only). [RT #21324] * "nsupdate -l" now gives error message if "session.key" file is not found. [RT #21670] * HPUX now correctly defaults to using /dev/poll, which should increase performance. [RT #21919] * If named is running as a threaded application, after an "rndc stop" command has been issued, other inbound TCP requests can cause named to hang and never complete shutdown. [RT #22108] * After an "rndc reconfig", the refresh timer for managed-keys is ignored, resulting in managed-keys not being refreshed until named is restarted. [RT #22296] * An NSEC3PARAM record placed inside a zone which is not properly signed with NSEC3 could cause named to crash, if changed via dynamic update. [RT #22363] * "rndc -h" now includes "loadkeys" option. [RT #22493] * When performing a GSS-TSIG signed dynamic zone update, memory could be leaked. This causes an unclean shutdown and may affect long-running servers. [RT #22573] * A bug in NetBSD and FreeBSD kernels with SO_ACCEPTFILTER enabled allows for a TCP DoS attack. Until there is a kernel fix, ISC is disabling SO_ACCEPTFILTER support in BIND. [RT #22589] * When signing records, named didn't filter out any TTL changes to DNSKEY records. This resulted in an incomplete key set. TTL changes are now dealt with before signing. [RT #22590] * Corrected a defect where a combination of dynamic updates and zone transfers incorrectly locked the in-memory zone database, causing named to freeze. [RT #22614] * Don't run MX checks (check-mx) when the MX record points to ".". [RT #22645] * DST key reference counts can now be incremented via dst_key_attach. [RT #22672] * The IN6_IS_ADDR_LINKLOCAL and IN6_IS_ADDR_SITELOCAL macros in win32 were updated/corrected per current Windows OS. [RT #22724] * "dnssec-settime -S" no longer tests prepublication interval validity when the interval is set to 0. [RT #22761] * isc_mutex_init_errcheck() in phtreads/mutex.c failed to destroy attr. [RT #22766] * The Kerberos realm was being truncated when being pulled from the the host prinicipal, make krb5-self updates fail. [RT #22770] * named failed to preserve the case of domain names in RDATA which is not compressible when writing master files. [RT #22863] * The man page for dnssec-keyfromlabel incorrectly had "-U" rather than the correct option "-I". [RT #22887] * The "rndc" command usage statement was missing the "-b" option. [RT #22937] * There was a bug in how the clients-per-query code worked with some query patterns. This could result, in rare circumstances, in having all the client query slots filled with queries for the same DNS label, essentially ignoring the max-clients-per-query setting. [RT #22972] * The secure zone update feature in named is based on the zone being signed and configured for dynamic updates. A bug in the ACL processing for "allow-update { none; };" resulted in a zone that is supposed to be static being treated as a dynamic zone. Thus, name would try to sign/re-sign that zone erroneously. [RT #23120]
2011-02-16Pullup ticket #3355 - requested by tacasbd5-104/+33
Revisions pulled up: - pkgsrc/net/bind96/Makefile 1.18 - pkgsrc/net/bind96/PLIST 1.7 - pkgsrc/net/bind96/distinfo 1.11 - pkgsrc/net/bind96/patches/patch-ad 1.5 - pkgsrc/net/bind96/patches/patch-am 1.3 ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: taca Date: Wed Feb 9 16:24:14 UTC 2011 Modified Files: pkgsrc/net/bind96: Makefile PLIST distinfo pkgsrc/net/bind96/patches: patch-ad patch-am Log Message: Update bind96 package to 9.6.3. 9.6.3 * BIND now builds with threads disabled in versions of NetBSD earlier than 5.0 and with pthreads enabled by default in NetBSD versions 5.0 and higher. Also removes support for unproven-pthreads, mit-pthreads and ptl2. [RT #19203] * HPUX now correctly defaults to using /dev/poll, which should increase performance. [RT #21919] * If named is running as a threaded application, after an "rndc stop" command has been issued, other inbound TCP requests can cause named to hang and never complete shutdown. [RT #22108] * When performing a GSS-TSIG signed dynamic zone update, memory could be leaked. This causes an unclean shutdown and may affect long-running servers. [RT #22573] * A bug in NetBSD and FreeBSD kernels with SO_ACCEPTFILTER enabled allows for a TCP DoS attack. Until there is a kernel fix, ISC is disabling SO_ACCEPTFILTER support in BIND. [RT #22589] * Corrected a defect where a combination of dynamic updates and zone transfers incorrectly locked the in-memory zone database, causing named to freeze. [RT #22614] * Don't run MX checks (check-mx) when the MX record points to ".". [RT #22645] * DST key reference counts can now be incremented via dst_key_attach. [RT #22672] * isc_mutex_init_errcheck() in phtreads/mutex.c failed to destroy attr. [RT #22766] * The Kerberos realm was being truncated when being pulled from the the host prinicipal, make krb5-self updates fail. [RT #22770] * named failed to preserve the case of domain names in RDATA which is not compressible when writing master files. [RT #22863] * There was a bug in how the clients-per-query code worked with some query patterns. This could result, in rare circumstances, in having all the client query slots filled with queries for the same DNS label, essentially ignoring the max-clients-per-query setting. [RT #22972]
2011-02-11Pullup ticket #3351 - requested by drochnersbd4-2/+62
wireshark security patches Revisions pulled up: - pkgsrc/net/wireshark/Makefile 1.59 - pkgsrc/net/wireshark/distinfo 1.41 - pkgsrc/net/wireshark/patches/patch-af 1.1 - pkgsrc/net/wireshark/patches/patch-ag 1.1 ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: drochner Date: Thu Feb 10 11:00:57 UTC 2011 Modified Files: pkgsrc/net/wireshark: Makefile distinfo Added Files: pkgsrc/net/wireshark/patches: patch-af patch-ag Log Message: add two patches from upstream: -fix possible free() of an uninitialized pointer when reading a malformed pcap-ng file (CVE-2011-0538) -add length check in pcap-ng reader bump PKGREV
2011-01-19Pullup ticket #3328 - requested by drochnersbd2-6/+6
tor security update Revisions pulled up: - pkgsrc/net/tor/Makefile 1.77 - pkgsrc/net/tor/distinfo 1.47 ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: drochner Date: Mon Jan 17 14:06:54 UTC 2011 Modified Files: pkgsrc/net/tor: Makefile distinfo Log Message: update to 0.2.1.29 changes: -Fix a heap overflow (probably allows remote code execution) (CVE-2011-0427) -Prevent a denial-of-service attack by disallowing any zlib-compressed data whose compression factor is implausibly high -Zero out a few more keys in memory before freeing them -bugfixes -Update to the January 1 2011 Maxmind GeoLite Country db -Introduce output size checks on all of our decryption functions
2011-01-18Revert commit on release branch.gdt1-3/+3
2011-01-18Fix HOMEPAGE per Thomas Mueller's report on pkgsrc-users.gdt1-3/+3
2011-01-12Pullup ticket #3320 - requested by tronsbd3-51/+6
net/wireshark security update Revisions pulled up: - net/wireshark/Makefile 1.57 - net/wireshark/distinfo 1.39 - net/wireshark/patches/patch-SA42767 deleted ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: tron Date: Wed Jan 12 00:16:31 UTC 2011 Modified Files: pkgsrc/net/wireshark: Makefile distinfo Removed Files: pkgsrc/net/wireshark/patches: patch-SA42767 Log Message: Update "wireshark" package to version 1.4.3. Changes since 1.4.2: - Bug Fixes The following vulnerabilities have been fixed. See the security advisory for details and a workaround. - FRAsse discovered that the MAC-LTE dissector could overflow a buffer. (Bug 5530) Versions affected: 1.2.0 to 1.2.13 and 1.4.0 to 1.4.2. - FRAsse discovered that the ENTTEC dissector could overflow a buffer. (Bug 5539) Versions affected: 1.2.0 to 1.2.13 and 1.4.0 to 1.4.2. CVE-2010-4538 - The ASN.1 BER dissector could assert and make Wireshark exit prematurely. (Bug 5537) Versions affected: 1.4.0 to 1.4.2. The following bugs have been fixed: - AMQP failed assertion. (Bug 4048) - Reassemble.c leaks memory for GLIB > 2.8. (Bug 4141) - Fuzz testing reports possible dissector bug: TCP. (Bug 4211) - Wrong length calculation in new_octet_aligned_subset_bits() (PER dissector). (Bug 5393) - Function dissect_per_bit_string_display might read more bytes than available (PER dissector). (Bug 5394) - Cannot load wpcap.dll & packet.dll from Wireshark program directory. (Bug 5420) - Wireshark crashes with Copy -> Description on date/time fields. (Bug 5421) - DHCPv6 OPTION_CLIENT_FQDN parse error. (Bug 5426) - Information element Error for supported channels. (Bug 5430) - Assert when using ASN.1 dissector with loading a 'type table'. (Bug 5447) - Bug with RWH parsing in Infiniband dissector. (Bug 5444) - Help->About Wireshark mis-reports OS. (Bug 5453) - Delegated-IPv6-Prefix(123) is shown incorrect as X-Ascend-Call-Attempt-Limit(123). (Bug 5455) - "tshark -r file -T fields" is truncating exported data. (Bug 5463) - gsm_a_dtap: incorrect "Extraneous Data" when decoding Packet Flow Identifier. (Bug 5475) - Improper decode of TLS 1.2 packet containing both CertificateRequest and ServerHelloDone messages. (Bug 5485) - LTE-PDCP UL and DL problem. (Bug 5505) - CIGI 3.2/3.3 support broken. (Bug 5510) - Prepare Filter in RTP Streams dialog does not work correctly. (Bug 5513) - Wrong decode at ethernet OAM Y.1731 ETH-CC. (Bug 5517) - WPS: RF bands decryption. (Bug 5523) - Incorrect LTP SDNV value handling. (Bug 5521) - LTP bug found by randpkt. (Bug 5323) - Buffer overflow in SNMP EngineID preferences. (Bug 5530) - Updated Protocol Support AMQP, ASN.1 BER, ASN.1 PER, CFM, CIGI, DHCPv6, Diameter, ENTTEC, GSM A GM, IEEE 802.11, InfiniBand, LTE-PDCP, LTP, MAC-LTE, MP2T, RADIUS, SAMR, SCCP, SIP, SNMP, TCP, TLS, TN3270, UNISTIM, WPS - New and Updated Capture File Support Endace ERF, Microsoft Network Monitor, VMS TCPtrace.
2011-01-10Fix build on DragonFly. PK#44356 from Peter Avalosmarkd2-5/+5
2011-01-07Reset PKGREVISION because of base php5/php53 version's updates.taca1-2/+1
2011-01-07Fixes builtin libpcap detection for DragonFly, another fix for PR#44333.obache1-5/+2
Public headers had been moved to subdir since 0.9.6, not only recent Darwin. Let to look at pcap/pcap.h first, then pcap.h in all cases.
2011-01-06remove unwanted patches since last update.obache2-49/+0
2011-01-05Satify pkglint needs and switch to .tar.bz2adam2-23/+23
2011-01-04Add patch from the Wireshark SVN repository to fix the securitytron3-2/+47
vulnerability reported in SA42767 which affects the ENTTEC dissector.
2011-01-03Set LICENSE.wiz1-1/+2
2011-01-03Update to dhcpcd-5.2.10 with the following change:roy2-9/+6
* -r, --request option now works again
2011-01-03Fixes patch for DragonFly BSD for if_wavelan_ieee.h's path.obache13-29/+29
PR#44321 by Sascha Wildner. Still broken for 2.8.2, because `struct wi_req' is disabled in the include file, but it was changed in DragonFly master.
2011-01-01Update net/py-boto from 1.6b to 1.9b. Changes include:gson3-8/+180
- Support for RDS, BootFromEBS, Spot Instances, and more - Fixes Issue 251, a problem with POST when using Eucalyptus - Fixes serious S3 issue (245) and issue 243 and 244 - Adds support for Autoscale, CloudWatch, ELB. - Adds support for new SQS features Also, added 26 to PYTHON_VERSIONS_ACCEPTED.
2011-01-01Fixes for DragonFly-2.8.2.obache2-4/+27
2011-01-01Using xgettext, msguniq, msgmerge and msgfmt.obache1-1/+3
2011-01-01Add DragonFly support.obache6-14/+57
(for patch-ad, NetBSD support is already in, reuse for DragonFly).
2011-01-01Fixes last commitobache1-4/+2
* This package is not DESTDIR ready (need pwlib to be ready first). * "do-install" must be changed to "post-install", or INSTALL_DIRS will not errect.
2010-12-31include <sys/socket.h> additionally for socket related things.obache4-1/+40
fixes build failure on DragonFly.
2010-12-31Fixes build on DragonFly.obache3-3/+53
2010-12-31Add checksums for patch-a{a,b}. Hi abs!wiz1-1/+3
2010-12-27* Add dependency on bind for dig and nslookup, bind had been removed fromobache1-3/+10
DragonFly base. * check_dhcp also installed as suid root. while here use ${SETUID_ROOT_PERMS}. * marked as DESTDIR ready (not user-destdir, for the previous reason). Bump PKGREVISION.
2010-12-26Pull memory statistics properly, and fix an overflow in the CPU statistics.sekiya4-29/+170
("netbsdelf3", indeed ... )
2010-12-25Use "curl" for fetching the distribution file as the downlod URLtron1-2/+8
uses HTTPS.
2010-12-25* let to use selected PYTHONBIN and PYTHONCONFIG exactly.obache5-19/+43
* set TEST_TARGET * fixes for DragonFly.
2010-12-24Fix path to itself.wiz1-2/+2
2010-12-23Set LICENSE.wiz1-1/+2
2010-12-23Update "youtube-dl" package to version 20101209:tron2-8/+8
This release fixes support for YouTube after the recent site changes that broke the program. In addition, it adds support for depositfiles.com, fixes a few minor bugs, and adds a few minor features
2010-12-23Mechanically replace references to graphics/jpeg with the suitabledsainty7-14/+14
alternative from mk/jpeg.buildlink3.mk This allows selection of an alternative jpeg library (namely the x86 MMX, SSE, SSE2 accelerated libjpeg-turbo) via JPEG_DEFAULT=libjpeg-turbo, and follows the current standard model for alternatives (fam, motif, fuse etc). The mechanical edits were applied via the following script: #!/bin/sh for d in */*; do [ -d "$d" ] || continue for i in "$d/"Makefile* "$d/"*.mk; do case "$i" in *.orig|*"*"*) continue;; esac out="$d/x" sed -e 's;graphics/jpeg/buildlink3\.mk;mk/jpeg.buildlink3.mk;g' \ -e 's;BUILDLINK_PREFIX\.jpeg;JPEGBASE;g' \ < "$i" > "$out" if cmp -s "$i" "$out"; then rm -f "$out" else echo "Edited $i" mv -f "$i" "$i.orig" && mv "$out" "$i" fi done done
2010-12-22Update pear-Net_Socket package to 1.0.10.taca2-6/+6
1.0.10 2010-10-15 14:52 UTC Changelog: QA release - Configurable newline sequence (PEAR Bug #14181) - Make $size parameter to gets() optional (PEAR Bug #14433) - Don't overwrite $errstr set by fsockopen (PEAR Bug #14448) - Avoid an infinite loop if fwrite() returns 0 (PEAR Bug #14619) - CS cleanup (PEAR Bug #14803)
2010-12-22Upadte pear-Net_SMTP package to 1.4.4.taca2-6/+6
1.4.4 2010-10-21 16:53 UTC Changelog: Corrected a problem with SMTP servers that don't support the SIZE feature. (Bug 17942) 1.4.3 2010-10-11 01:14 UTC Changelog: - Reduce peak memory usage when sending large files. (Request 17887) - Adding support for proxy authentication. (Request 17358)
2010-12-22Update pear-Net_IDNA2 package to 0.1.1.taca2-7/+6
0.1.1 2010-12-09 17:35 UTC * Added initial support for IDNA2008. This is needed for characters like the German "Eszett" which would otherwise be turned into "ss" during nameprep. Use $n->setParams('version', '2008') to use the "new" IDNA-encoding. Default is still IDNA2003 for backwards-compatibility. Further aspects of IDNA2008-encoding (for example some checks) should be added later according to RFCs. * #16466: Unit tests (testcaseses from draft-josefsson-idn-test-vectors; thanks to Daniel) * Unit tests (coverage, refactoring/cleanup, more tests) * #17542: URIs get mangled when decoding (UTF8-fix) * Codingstyle fixes * fixed handling of URLs with more than a domain-name (fixed opposite of parse_url()) * Added specialized and spl exceptions * #17533: Releases and roles do not seem to work.
2010-12-22Update pear-Net_DIME package to 1.0.2.taca2-6/+6
1.0.2 2010-10-25 14:11 UTC Changelog: Automatically built QA release
2010-12-22Fix divide-by-zero error in CPU performance statistics.sekiya3-3/+44
Inspired by Red Hat Bugzilla Bug #501210.
2010-12-21Update to 0.2.1.28, resolving CVE-2010-1676.gdt2-6/+6
Changes in version 0.2.1.28 - 2010-12-17 o Major bugfixes: - Fix a remotely exploitable bug that could be used to crash instances of Tor remotely by overflowing on the heap. Remote-code execution hasn't been confirmed, but can't be ruled out. Everyone should upgrade. Bugfix on the 0.1.1 series and later. o Directory authority changes: - Change IP address and ports for gabelmoo (v3 directory authority). o Minor features: - Update to the December 1 2010 Maxmind GeoLite Country database.
2010-12-20fix build on solaris per PR#43938tez1-1/+3
2010-12-17Bump PKGREVISION from icu shlib major bump.obache4-6/+8
2010-12-15Fix 'intfMask != NULL' assertion on NetBSD when mdnsd encounters an IPv6jmcneill3-10/+14
address; patch-ac changed the distribution source to not pull in netinet/in_var.h on NetBSD but that is where SIOCGIFNETMASK_IN6 comes from so bring it back in. Bump pkg revision.
2010-12-15Expand the information in the description and install messageheas2-4/+19
2010-12-13Add quviryoon1-1/+2
2010-12-13Import quvi-0.2.10 as net/quvi.ryoon5-0/+99
The quvi is a command line tool for parsing video download links. It supports Youtube and other similar video websites. libquvi is a library for parsing video download links with C API. It is written in C and intended to be a cross-platform library. You can see the list of supported sites from 'quvi --support'.
2010-12-132.2.19:wiz2-7/+6
2.2.19 Sat Dec 11 2010 Toni Gundogdu Changes: - Set <http://clive.sourceforge.net> as new WWW home - Add man1/clive.1.pod, manify from this from now on - Youtube: Extend format aliases to match quvi IDs - Remove myubo support: dead site - Backup ChangeLog as ChangeLog.pre-gitlog - Generate ChangeLog from gitlog - Rename Evisor.pm to Gaskrank.pm - Rename tests - Remove dangling (and broken) ehrensenf, cctv support - Exclude network tests, can still be found in the repo - gzip release tarball from now on Bugfixes: - Liveleak.pm: token/ID parsing - Youtube.pm: Unknown error (http/404) [#1]
2010-12-12Update to 2.2.18:wiz2-6/+6
2.2.18 Tue Nov 30 2010 legatvs Changes: - Change google test URL - Accept dailymotion swf URLs (related b#3115846)