Age | Commit message (Collapse) | Author | Files | Lines |
|
security update for apache22
- pkgsrc/www/apache22/Makefile 1.24 via patch
- pkgsrc/www/apache22/Makefile.common 1.7
- pkgsrc/www/apache22/PLIST 1.4
- pkgsrc/www/apache22/distinfo 1.9
- pkgsrc/www/apache22/patches/patch-ab removed
Module Name: pkgsrc
Committed By: xtraeme
Date: Mon Jan 21 15:07:11 UTC 2008
Modified Files:
pkgsrc/www/apache22: Makefile Makefile.common PLIST distinfo
Removed Files:
pkgsrc/www/apache22/patches: patch-ab
Log Message:
Update to 2.2.8, please check http://www.apache.org/dist/httpd/CHANGES_2.2.8
for the list of changes.
|
|
security update for apache2
- pkgsrc/devel/arp0/distinfo 1.3
- pkgsrc/www/apache2/Makefile.common 1.23, 1.24
- pkgsrc/www/apache2/distinfo 1.52
Module Name: pkgsrc
Committed By: taca
Date: Mon Jan 21 14:30:01 UTC 2008
Modified Files:
pkgsrc/www/apache2: Makefile.common
Log Message:
Start update of apr0 pacakge to 0.9.17 and apache2 package to 2.0.63.
---
Module Name: pkgsrc
Committed By: taca
Date: Mon Jan 21 14:33:46 UTC 2008
Modified Files:
pkgsrc/devel/apr0: distinfo
Log Message:
Update apr0 package to 0.9.17.2.0.63.
Changes with APR 0.9.17
*) Fix DSO-related crash on z/OS caused by incorrect memory
allocation. [David Jones <oscaremma gmail.com>]
*) Define apr_ino_t in such a way that it doesn't change definition
based on the library consumer's -D'efines to the filesystem.
[Lucian Adrian Grijincu <lucian.grijincu gmail.com>]
*) Cause apr_file_dup2() on Win32 to update the MSVCRT psuedo-stdio
handles for fd-based and FILE * based I/O. [William Rowe]
*) Revert Win32 to the 0.9.14 behavior of apr_proc_create() for any
of the three stdio streams which are not initialized, through either
apr_procattr_io_set() or apr_procattr_child_XXX_set(), when given a
procattr_t with one or two streams which were initialized through
apr_procattr_child_XXX_set(). Once again, these do not inherit the
parent process stdio stream to WIN32 child processes (passing
INVALID_HANDLE_VALUE instead) as on Unix. Note APR 1.3.0 adopts
the Unix behavior of inheriting any uninitialized streams as the
parent's corresponding stdio stream, in such cases. [William Rowe]
---
Module Name: pkgsrc
Committed By: taca
Date: Mon Jan 21 14:37:22 UTC 2008
Modified Files:
pkgsrc/www/apache2: Makefile distinfo
Log Message:
Update apache package to 2.0.63.
Changes with Apache 2.0.63
*) winnt_mpm: Resolve modperl issues by redirecting console mode stdout
to /Device/Nul as the server is starting up, mirroring unix MPM's.
PR: 43534 [Tom Donovan <Tom.Donovan acm.org>, William Rowe]
*) winnt_mpm: Restore Win32DisableAcceptEx On directive and Win9x platform
by recreating the bucket allocator each time the trans pool is cleared.
PR: 11427 #16 (follow-on) [Tom Donovan <Tom.Donovan acm.org>]
Changes with Apache 2.0.62 (not released)
*) SECURITY: CVE-2007-6388 (cve.mitre.org)
mod_status: Ensure refresh parameter is numeric to prevent
a possible XSS attack caused by redirecting to other URLs.
Reported by SecurityReason. [Mark Cox, Joe Orton]
*) SECURITY: CVE-2007-5000 (cve.mitre.org)
mod_imagemap: Fix a cross-site scripting issue. Reported by JPCERT.
[Joe Orton]
*) Introduce the ProxyFtpDirCharset directive, allowing the administrator
to identify a default, or specific servers or paths which list their
contents in other-than ISO-8859-1 charset (e.g. utf-8). [Ruediger Pluem]
*) log.c: Ensure Win32 resurrects its lost robust logger processes.
[William Rowe]
*) mpm_winnt: Eliminate wait_for_many_objects. Allows the clean
shutdown of the server when the MaxClients is higher then 257,
in a more responsive manner [Mladen Turk, William Rowe]
*) Add explicit charset to the output of various modules to work around
possible cross-site scripting flaws affecting web browsers that do not
derive the response character set as required by RFC2616. One of these
reported by SecurityReason [Joe Orton]
*) http_protocol: Escape request method in 405 error reporting.
This has no security impact since the browser cannot be tricked
into sending arbitrary method strings. [Jeff Trawick]
*) http_protocol: Escape request method in 413 error reporting.
Determined to be not generally exploitable, but a flaw in any case.
PR 44014 [Victor Stinner <victor.stinner inl.fr>]
---
Module Name: pkgsrc
Committed By: taca
Date: Mon Jan 21 14:38:29 UTC 2008
Modified Files:
pkgsrc/www/apache2: Makefile.common
Log Message:
Add comment that this file is used by devel/apr0/Makefile detected
by pkglint.
|
|
security update for drupal
- pkgsrc/www/drupal/Makefile 1.26
- pkgsrc/www/drupal/distinfo 1.19
Module Name: pkgsrc
Committed By: adrianp
Date: Fri Jan 11 12:37:11 UTC 2008
Modified Files:
pkgsrc/www/drupal: Makefile distinfo
Log Message:
Update to 5.6
This release fixes security vulnerabilities. Sites are urged to upgrade immediately. For more details, please see the security announcement:
SA-2008-005 - Drupal core - Cross site request forgery
SA-2008-006 - Drupal core - Cross site scripting (UTF8)
SA-2008-007 - Drupal core - Cross site scripting (register_globals)
In addition to this security vulnerability, the following bugs have been fixed since the 5.5 release:
173858 by Gábor Hojtsy: skip UTF-8 BOM when importing locale files
179164 by Heine: sort modules by name on the module admin page
199640 by webernet: (usability) add option to select no taxonomy term in multiselect forms, not to rely on browser trickery
199084 by chx: better conformance with ISO date formats in our xmlrpc code
173459 by Dave Cohen. Backport of #78487 by FredCK, forngren and bjaspan: document support in url() and l() and proper active class support for .
89218 by Gábor Hojtsy. Properly initialize a counter variable and fix poll editing.
64388 by Gábor Hojtsy. Add missing db_rewrite_sql(); not a security issue since it is a count() query.
200338 by m3avrck and quicksketch: fix transparent GIF resizing
194652 by Heine: specify explicit accept-charset for forms to avoid browser guessing
182410 by greggles: HTTP Basic authentication username and password was parsed in drupal_http_request() but then not used in the request
- Patch 201894 by David Rothstein: fixed typo in user output.
180126 by mmoreno, drewish and scor: add realpath() call to file_save_data(), so Windows will create temporary files properly
115689 by chx: new content types should not overwrite old ones. Backport by Pancho.
203727 by Arancaytar. More effectively use hook API.
204855 by webernet. Add missing * in documentation.
168315 by schuyler1d: previous active database name was not consistently returned in db_set_active()
- Patch 199955 by saxofaan: file_upload_max_size() returns results in bytes, not in mega bytes.
194579 patch by pwolanin: clear filter cache when allowed HTML tags configuration changes in an input format
#166433 by Ralf Stamm. Use correct menu item type for revsion confirm pages.
58806 by fwalch and wicksteedc. Do not override MENU_VISIBLE_IF_HAS_CHILDREN on editing.
Partial backport of 112715 to fix 124641.
Changes from 5.4 -> 5.5
Fixed missing missing brackets in a query in the user module.
Fixed taxonomy feed bug introduced by SA-2007-031
|
|
security update for horde
- pkgsrc/www/horde/Makefile 1.52
- pkgsrc/www/horde/distinfo 1.19
Module Name: pkgsrc
Committed By: adrianp
Date: Thu Jan 10 23:08:07 UTC 2008
Modified Files:
pkgsrc/www/horde: Makefile distinfo
Log Message:
Major changes compared to Horde 3.1.5 are:
* Fixed privilege escalation in the Horde API.
* Improved XSS filtering.
* Fixed locked portal blocks.
* Further improved webroot detection.
* Updated Japanese translation.
|
|
security update for php4
- pkgsrc/lang/php4/Makefile 1.80
- pkgsrc/lang/php4/Makefile.common 1.57
- pkgsrc/lang/php4/distinfo 1.67
- pkgsrc/lang/php4/patches/patch-aw removed
Module Name: pkgsrc
Committed By: adrianp
Date: Fri Jan 4 10:07:54 UTC 2008
Modified Files:
pkgsrc/www/php4: Makefile Makefile.common distinfo
Removed Files:
pkgsrc/www/php4/patches: patch-aw
Log Message:
Update to 4.4.8
Improved fix for MOPB-02-2007.
Fixed an integer overflow inside chunk_split(). Identified by Gerhard Wagner.
Fixed integer overlow in str[c]spn().
Fixed regression in glob when open_basedir is on introduced by 41655 fix.
Fixed money_format() not to accept multiple %i or %n tokens.
Addded "max_input_nesting_level" php.ini option to limit nesting level of input variables. Fix for MOPB-03-2007.
Fixed INFILE LOCAL option handling with MySQL - now not allowed when open_basedir or safe_mode is active.
Fixed session.save_path and error_log values to be checked against open_basedir and safe_mode (CVE-2007-3378).
Fixed bug 43010 (Fixed regression in imagearc with two equivelent angles).
Fixed bug 41765 (Recode crashes/does not work on amd64).
Fixed bug 41630 (segfault when an invalid color index is present in the image data).
Fixed bug 41628 (PHP settings leak between Virtual Hosts in Apache 1.3).
Fixed bug 38798 (OpenSSL init corrected in php5 but not in php4).
|
|
Skip an interpreter check for a python script (as the
REPLACE_PERL is ignored because no python dependency yet).
(Add a TODO for later: add an option for reStructuredText
support to depend on python-docutils.)
Bump PKGREVISION.
Noticed in bulk builds. Fixed this during freeze so it will be
built by some bulk builders and available with the upcoming quarterly
branch packages. This is a leaf package.
|
|
- Include seamonkey as a valid option in NETSCAPE_PREFERRED
|
|
* Using VARBASE.
* This package does not have share/doc/screws/examples.
Bump PKGREVISION.
|
|
Bump PKGREVISION.
|
|
|
|
"emul-fetch and emul-distinfo" is needed.
|
|
|
|
Changes in v9.25:
Security
* Fixed an issue where plug-ins could be used to allow cross domain
scripting, as reported by David Bloom. Details will be disclosed
at a later date.
* Fixed an issue with TLS certificates that could be used to execute
arbitrary code, as reported by Alexander Klink (Cynops GmbH).
Details will be disclosed at a later date.
* Rich text editing can no longer be used to allow cross domain
scripting, as reported by David Bloom. See our advisory.
* Prevented bitmaps from revealing random data from memory, as
reported by Gynvael Coldwind. Details will be disclosed at a
later date.
Miscellaneous
* Fixed a problem where malformed BMP files could cause Opera to
temporarily freeze.
For pkgsrc use, put back opera-distinfo target (to easily re-generate
checksums for supported platforms)
|
|
|
|
|
|
Done during 2007Q4 freeze because the old distfile is no longer available.
New audio/video options
* H.264/HE-AAC codec support
Improved Performance
* Multi-core support
* Multi-threaded video decoding
* Image scaling
* Flash Player cache
* Flash Media Server buffering
Universal Reach
* Full screen mode for Linux
* Accessibility support for the plugin
* Mac Os X Leopard support
Fixed in this version:
* On Linux, modal dialogs displayed by Flash Player stay in front of browser windows but do not prevent interaction with the browser as they should. (191331)
* On certain SUSE 9.2 installations using the standalone player only, trying to Open a browser from the standalone player with SeaMonkey open will cause the player to hang. (193383)
* On Linux, networking operations in the standalone player are currently slow. (193158)
* On Linux, when the mouse is hovering over Flash content, keyboard input is not sent to the browser. (194265)
* Full-screen mode is not supported in the Opera Browser on Macintosh systems. (189140)
* Full-screen mode is now supported on Linux.
* The plugin version of Flash Player does not fire flash.events.Event.RENDER when wmode is set as transparent. (198515)
* Full-screen can be used when wmode is set (202290)
* Passing large amounts of XML through External Interface is significantly faster (206828)
* ExternalInterface now works with HTML objects that contain dots within the object name (199614)
|
|
There are three types Mozilla mirrors.
(http://www.mozilla.org/mirroring.html)
* mozilla-current
contains only the current version of Firefox and Thunderbird
* mozilla-release
contains Firefox, Thunderbird, and Sunbird releases
* mozilla-all
complete archive
Define following variables for mozilla master sites:
MASTER_SITE_MOZILLA_ALL = mozilla-all
MASTER_SITE_MOZILLA = mozilla-release
and change some packages to use appropriate variable.
Update contents of MASTER_SITE_MOZILLA with master and primary mirrors
taken from http://www.mozilla.org/mirrors.html and add some sample definitions.
|
|
|
|
|
|
- Change the order of including files in Makefile to use REPLACE_PYTHON
properly.
- Remove shebang line from a library file which would never be executed
directly.
|
|
|
|
Fix build problem with these checks.
|
|
|
|
mod_auth_external allows you to use an external script for Apache authentication.
|
|
|
|
pkgsrc changes:
- Honor squidGuard's name.
- Use PKGINSTALL frame work.
- More integration to squid; common configuration and logging directories.
Now depends on squid package.
- Switch to use db4; it might be selectable by option.
- Install some examples of configuration.
Todo:
- LDAP support option.
- Installing documents.
- DESTDIR support.
Release 1.3
2007-09-19 Included configurable logging. New configure option --nolog
suppress all runtime logmessages. Start and stop is still logged.
Default behaviour is now to log the non debug messages except
when the runtime option -d is supplied to squidGuard. May need
some more finetuning in later versions. (bug 11)
Made some slight changes to the outdated FAQ file.
2007-09-13 Modified auth code to work with and without ldap (choosing
subroutine rfc1738_unescape or sgFindUser in sg.y.in)
2007-08-20 Corrected include statement in sg.h.in.
2007-07-16 Added patch by Marc Clayton to include a progressbar to the
build of the database files (bug 6).
2007-07-01 Added patch by Eric Harrison to enable full sed compliance
to rewrite statements (bug 7).
2007-06-02 Corrected missing evaluation of configure parameters for
logdir, dbhome and config file (bug 11).
2007-05-25 Added patch from satish to block urls entries that include
hostnames (bug 4).
2007-05-20 Fixed broken regex evaluation (bug 12)
Fixed a compile problem on some systems (bug 10).
2007-05-10 Corrected an issue with the fix for the double
slash vulnerability (incorrectly found double
slashes) (bug 1).
Release 1.2.1
2007-04-10 Fixed multiple slash bypass vulnerabilty.
2007-03-17 Fixed some bugs in squidGuard-simple.cgi and added a
German version of it.
2007-03-16 Fixed encoding bypass vulnerabilty.
2007-03-16 Updated y.tab.c.bison and y.tab.h.bison to the recent
version.
2007-02-02 Fixed bug in user authentication.
2007-01-20 Fixed some typos which broke compilation on Sun Solaris
when using the Sun CC compiler.
2007-01-12 Corrected unproper evaluated if-clause, which broke the
BerkeleyDB 2 compatibility.
Fixed minor typo in samples/Makefile.in.
2006-12-29 Replaced the sleepycat links from the configure program with
the oracle links.
Corrected typo in Makefile.in.
2006-12-16 Removed a stupid bug from the Makefile in the docs directory.
2006-12-10 Removed references to squidguard.org in Makefile.in in the
Doc directory (squidguard.org is down).
Added ISSUES.txt file about known problem with the current
code (any information that is missing and should go in there
is gladly welcomed).
2006-06-17 Release now supports LDAP queries for authentication:
Added Chris Frey's ldap patches and fixes (03, 05, 06,
07 and 10; Patches from:
http://www.netdirect.ca/software/category.php?cat=SquidGuard).
The LDAP feature can be included during the configure run
by setting --with-ldap. Per default ldap support will not
be compiled in.
Added a fix provided by Francesco Ranieri to solve an issue
with the (un)escaping of the authentication "domain%5cusername".
Patch Release 1.2.0p3
2005-12-09 Modfied configure Skript to allow to specify the name of
the useraccount the squid cache is using.
Modified Makefile.in that during the installation the
necessary squidGuard directories are created if they are
not existing. Additionally a default configuration file
will be copied to the default location for squidGuard unless
an old one is found there.
Patch Release 1.2.0p2
2005-10-13 Added Adam Gorski's bugfix to correct a a null pointer access
bug in logging.
Added Chris Freys bugfix a bug where it won't search the url
db if the domain db is empty.
Added Chris Frey's buffer overflow checks (except for commenting
out the part from line 446 to 470 in sgDb.c).
(Patches from:
http://www.netdirect.ca/software/category.php?cat=SquidGuard)
Patch Release 1.2.0p1
2005-10-11 Added support for Berkeley DB 4.x
|
|
- Move some common parameter to Makefile.common; squid's user, group and
data directory.
- Add LOGDIR to Makefile.common.
These changes have no functional change but make it possible for
squidGuard package to share parameters.
|
|
|
|
MailHost is Zope-integrated feature to send mail from Web applications,
but can not send Japanese mail correctly.
This "jaMailHost" product will solve this problem.
|
|
Zope needs a word splitter to search in text with ZCTextIndex.
This ejSplitter is one of Japanese splitters and can be used with
other Zope products.
|
|
- Add plone25, plone3 and zope210.
|
|
This package is based on new zope's framework.
Plone is a ready-to-run content management system that is built on the
powerful and free Zope application server. Plone is easy to set up,
extremely flexible, and provides you with a system for managing web
content that is ideal for project groups, communities, web sites,
extranets and intranets.
Plone 3 runs on Zope 2.10.x and has many improved features from Plone 2.5.
1. Inline editing
2. Working Copy support
3. Link and reference integrity checking
4. Automatic locking and unlocking
5. Easy collaboration and sharing
6. Versioning, history and reverting content
7. Upgraded visual HTML editor
8. Powerful workflow capabilities
9. Flexible authentication back-end
10. Full-text indexing of Word and PDF documents
11. Collections
12. Presentation mode for content
13. Support for the search engine Sitemap protocol
14. Support for multiple mark-up formats
15. Wiki support
16. Automatic previous/next navigation
17. Rules engine for content
18. Auto-generated tables of contents
19. Portlets engine
20. Professional support, development, hosting & training
|
|
This package based on new zope's framework and finally replace
zope25-CMFPlone pacakge.
Plone is a ready-to-run content management system that is built on the
powerful and free Zope application server. Plone is easy to set up,
extremely flexible, and provides you with a system for managing web
content that is ideal for project groups, communities, web sites,
extranets and intranets.
Plone 2.5.5 runs on Zope 2.9.x.
|
|
|
|
Zope is an exciting new object-based, open source web application
platform. It allows you to build powerful and dynamic web applications
easily. Zope comes with source code and is friendly to developers as
well as users.
Zope 2.10.x is needed to run Plone 3.
|
|
Zope 2.9.8 (2007/07/05)
Bugs fixed
- updated to ZODB 3.6.3
- updated to Zope 3.2.3 codebase
- Collector #1306: Missing acquisition context on local roles screen.
- The REQUEST no longer accepts holds after it has been closed.
- Collector #2153: Supporting unquoted cookies with spaces.
- Collector #2295: Comments in PythonScripts could lead to syntax
errors
- Collector #2307: ObjectCopiedEvent not dispatched to sublocations.
- Fixed ZClass test breakage due to non-pickleability of
'zope.interface.Implements'
N.B.: updated 'zope.interface' package to Zope 3.2 branch;
should be pinned to a tag or a release before releasing
2.9.8).
- Collector #2260: fixed a bug in Examples.zexp
- Collector #2321: Skip trusted proxies when extracting the client IP
address from the request.
- Collector #2318: Allow override of zopectl's control socket in
zope.conf
- Collector #2316: correctly unpack DateTimeIndex dates when browsing the
index.
- Collector #1866: a 304 HTTP status should not have a content length.
- Collector #2300: delimit *all* HTTP Response headers with CRLF.
Zope 2.9.7 (2007/03/25)
Bugs fixed
- Protected various security mutators with a new postonly decorator.
The decorator limits method publishing to POST requests only, and
is a backport from Zope 2.11's requestmethod decorator factory.
- Collector #2298: webdav.Resource.COPY and webdav.Resource.MOVE did
not send the expected copy/move events.
- Collector #2296: Fixed import of ZClass products, broken by removal
of BBB support for pasting objects whose meta_type info was
permission-free.
- Collector #2294: Protected DOS-able ControlPanel methods with the
same 'requestmethod' wrapper.
- Collector #2294: Protected various security mutators with a new
'postonly' decorator. The decorator limits method publishing to
POST requests only, and is a backport from Zope 2.11's requestmethod
decorator factory.
- Collector #2288: @ and + should not be quoted when forming
request URLs in BaseRequest and HTTPRequest
- Undeprectated 'zLOG' package, which is going to remain a
backward-compatibility shim for the Python logger.
- Collector #2263: 'field2ulines' did not convert empty string
correctly.
- Reverted backward-incompatible fix for Collector #2191.
- added Python 2.4.4 as optimal Python version to 'configure'
Zope 2.9.6 (2006-11-22)
Bugs fixed
- Collector #2191: extended DateTime parser for better support
to the ISO8601 specification.
- Reworking of _cached_result in Shared.DC.ZRDB.DA.DA:
- fixed KeyError reported in Collector #2212
- fixed two memory leaks that occurred under high load
- fixed broken cache keys for people using the obscure
Shared.DC.ZRDB.DA.DA.connection_hook
- fixed incorrect cache ordering resulting in newer results
being dumped when the cache became too large.
- Collector #2237: 'make' doesn't tell you to run 'make inplace'
before running 'make instance'.
- Collector #2235: A number of ZCatalog methods were doing boolean
evaluation of objects that implemented __len__ instead of checking
them against None. Replaced a number of "if not obj" with
"if obj is None".
- Collector #2218: fixed wrong logger argument in OFS/Cache.py
- Collector #2205: fixed wrong logger argument in ZRDB/Connection.py
- Collector #2208: rewriting/setting the 'charset' part of the
content-type HTTP header will be done only for 'text/*'
- Collector #2206: Set PYTHONPATH to include existing PYTHONPATH
in skel/bin/zopectl.in and skel/bin/runzope.in
Zope 2.9.5 (2006/10/03)
Bugs fixed
- Call setDefaultSkin on new requests created as the result of
ConflictError retries.
- Collector #2189: Fix logging of errors during product refresh.
- Collector #2185: Log username for FCGI requests.
- Collector #2152: Fixed MailHost documentation; simple_send does not
process or validate its arguments in any way.
- Collector #2175: ZTUtils.make_hidden_input did not escape double-quotes.
- Collector #1907: Moved 'alt' property from File to Image.
- Collector #1983: Specifying session-resolution-seconds >= 1200 caused
Zope startup to fail.
- Collector #2169: webdav.Resource.COPY did not send ObjectClonedEvent.
- Updated Five to bugfix release 1.3.7.
- Collector #2157: Expose name of broken class in SystemError raised
from '__getstate__' of a broken instance.
- Usage of 'urljoin' in 'webdav.davcmds' could lead to wrongly
constructed urls.
- Collector #2155: Fix wrong parameter being passed to
logger's error() method, with tests.
- Collector #2178: Fix ZopeTestCase doctest support for layers
- included Zope 3.2.2
|
|
|
|
Fix bug whereby mod_wsgi daemon process could hang when a request with
content greater than UNIX socket buffer size, was directed at a WSGI
application resource handler which in turn returned a response, greater
than UNIX socket buffer size, without first consuming the request content.
|
|
changes: "Some useful bug fixes."
|
|
changs:
-fixes a security issue with the LD_LIBRARY_PATH handling in the
starter script (CVE-2005-4791)
-translation updates
-minor bugfixes
|
|
|
|
Pointed out by wiz.
|
|
newline)
|
|
|
|
- Drop POST from the allowed list; this mistake has been here since 2003,
but it doesn't really matter as POST on a Subversion repository is an
invalid operation anyway.
|
|
In this case, simply remove REPLACE_RUBY_PAT because file under
${WRKSRC}/examples should be replaced.
|
|
|
|
|
|
|
|
server/reverse proxy and mail (IMAP/POP3) proxy.
|