Age | Commit message (Collapse) | Author | Files | Lines |
|
|
|
${VARBASE}/db/nsd.db on all platforms and use user/group nsd for the
daemon to run as. Install sample configuration without .sample
extension. Take maintainership. Bump revision.
|
|
|
|
|
|
|
|
|
|
for INSTALL_LIB. As the libraries are installed with the correct
ownership now (LIBOWN and LIBGRP), bumped the PKGREVISION.
|
|
|
|
|
|
|
|
so increment PKGREVISION.
|
|
(NetBSD Version 299000000, not 200040000
|
|
|
|
|
|
|
|
|
|
http://www.security.nnov.ru/Jdocument889.html
Patch from me, reviewed by Adrian Portelli
Bump pkgrevision.
|
|
A lot of changes and bug fixes, including fix for the following
security problem:
http://security.lss.hr/index.php?page=details&ID=LSS-2004-10-02
|
|
|
|
|
|
it still uses AF_INET6, sockaddr_in6, and getaddrinfo().)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Changes:
2.0.5:
======
- Fixed bug in Linux get_default_gateway function
introduced in 2.0.4, which would cause redirect-gateway
on Linux clients to fail.
- Restored easy-rsa/2.0 tree (backported from 2.1 beta
series) which accidentally disappeared in
2.0.2 -> 2.0.4 transition.
2.0.4:
======
- Security fix -- Affects non-Windows OpenVPN clients of
version 2.0 or higher which connect to a malicious or
compromised server. A format string vulnerability
in the foreign_option function in options.c could
potentially allow a malicious or compromised server
to execute arbitrary code on the client. Only
non-Windows clients are affected. The vulnerability
only exists if (a) the client's TLS negotiation with
the server succeeds, (b) the server is malicious or
has been compromised such that it is configured to
push a maliciously crafted options string to the client,
and (c) the client indicates its willingness to accept
pushed options from the server by having "pull" or
"client" in its configuration file (Credit: Vade79).
CVE-2005-3393
- Security fix -- Potential DoS vulnerability on the
server in TCP mode. If the TCP server accept() call
returns an error status, the resulting exception handler
may attempt to indirect through a NULL pointer, causing
a segfault. Affects all OpenVPN 2.0 versions.
CVE-2005-3409
- Fix attempt of assertion at multi.c:1586 (note that
this precise line number will vary across different
versions of OpenVPN).
- Added ".PHONY: plugin" to Makefile.am to work around
"make dist" issue.
- Fixed double fork issue that occurs when --management-hold
is used.
- Moved TUN/TAP read/write log messages from --verb 8 to 6.
- Warn when multiple clients having the same common name or
username usurp each other when --duplicate-cn is not used.
- Modified Windows and Linux versions of get_default_gateway
to return the route with the smallest metric
if multiple 0.0.0.0/0.0.0.0 entries are present.
2.0.3:
======
- openvpn_plugin_abort_v1 function wasn't being properly
registered on Windows.
- Fixed a bug where --mode server --proto tcp-server --cipher none
operation could cause tunnel packet truncation.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
and now bundled in ruby18-base pacakges.
|
|
Bump PKGREVISION.
|
|
|
|
25.10.2005 Skype for Linux version 1.2.0.18
* bugfix: fixed a bug in networking code that made Skype
vulnerable to remotely induced crash (Skype Security Bulletin
SKYPE-SB/2005-003)
22.09.2005 Skype for Linux version 1.2.0.17
* change: New multilingual EULA in Help.Licence
* change: Call quality improvements
* change: "Find in chat" engine rewritten
* change: Refreshing icons on start tab
* change: Cleaned up RPM packaging
* bugfix: Menu items not disabled when going offline
* bugfix: Crash when a new message was received
* bugfix: Crash when password changed
* bugfix: Crash when chat search string contained "+331234567"
* bugfix: Crash when chat search string contained emoticon
* bugfix: Auth requests from previous user being shown
* bugfix: Crash while history was loading
* bugfix: Find crash when searching for empty text
* bugfix: Auth request remaining on event panel after authorization
Only minimally startup tested as there is a font issue (seen in both old and
new versions) on my NetBSD-3 xorg system...
|
|
Changes for 1.1
* added Emil Skoldberg's Interix patch
* removed all changes prior to 1.0
* added listen-address
* added .cache processing
* started making html configurable
* gmap2cache now obsolete
|
|
|
|
|
|
|
|
Install documentation (only available in HTML). Bump PKGREVISION.
|
|
The OpenAFS Gatekeepers are pleased to announce the release of version
1.4.0 of OpenAFS. This version incorporates hundreds of enhancements
and improvements since the 1.2 series. Many bugs and programming
inefficiencies (some of which have been present since IBM's donation
of AFS to the open source community) have been eliminated, resulting
in a much more stable product. Improvements for Windows users are
particularly dramatic.
OpenAFS 1.4.0 also represents a significant step forward for Kerberos 5
integration. This release allows Kerberos 5 KDCs including Microsoft
Active Directory to be the source of AFS client authentication.
Changes under UNIX (tm) and *nix Operating Systems
- --------------------------------------------------
Increased Performance and Stability:
The addition of pthreaded servers and thread optimizations in the
RPC and RX libraries provide increased performance over the 1.2
release. Cache chunk locking has been refined, and native operating
system vnodes on Linux and MacOS X are now supported. Support for files
larger than two Gigabytes in the AFS file system is now available to
operating systems providing native support for large files. ntp,
rlogind, rsh and other unnecessary and potentially insecure services
have been removed.
Increased Server Efficiency in Handling Mobile Clients:
Use of multi-host probing has been improved, reducing the time a
server needs to timeout clients no longer accessible on the network.
Server load is reduced by new functionality allowing servers to queue
callback notifications for unreachable clients until the client contacts
the server.
Improved Administration:
Audit logs are available for all servers augmenting existing server
monitoring and debugging tools. All logs can be output to named pipes
allowing organizations to deploy custom filters. Groups of groups
(a.k.a. Supergroups) can now be created on the protection server
providing additional flexibility in the administration of user access.
The Kerberos 5 authentication tool, aklog, is now distributed as part
of OpenAFS.
Other New Features:
The new "vos copy" command allows an administrator to create a new
volume and copy the contents of an existing volume in one step. This
eliminates the need to perform a "vos dump" followed by a "vos restore".
The "vos convertROtoRW" command allows an administrator to convert an
existing RO replica into a new RW site in the event the current RW site
is down.
The -vattachpar file server option reduces file server startup time by
instructing the file server to attach volumes from multiple vice
partitions in parallel.
|
|
ruby18-base packages.
|
|
update comment and depend on appropriate version.
|
|
|
|
taken from http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/net-analyzer/ethereal/files/ethereal-0.10.13-fix-irc-loop-DoS-CVE-2005-3313.diff?hideattic=1
Also bump version to 0.10.13nb1.
|
|
|