Next | Query returned 43 messages, browsing 1 to 10 | Previous

History of commit frequency

CVS Commit History:


   2018-02-13 16:09:52 by Havard Eidnes | Files touched by this commit (1) | Package updated
Log message:
Actually bump PKGREVISION for CVE-2017-1000232 as well.
   2018-02-13 16:08:11 by Havard Eidnes | Files touched by this commit (3) | Package updated
Log message:
Apply fix for CVE-2017-1000232 from
https://git.nlnetlabs.nl/ldns/commit/?id=3bdeed02
Also correct previous CVE, it's CVE-2017-100231...
Bump PKGREVISION.
   2018-02-13 15:59:15 by Havard Eidnes | Files touched by this commit (3) | Package updated
Log message:
Apply fix for CVE-2017-10002, via
https://git.nlnetlabs.nl/ldns/commit/?id=c8391790
Bump PKGREVISION.
   2016-07-09 08:39:18 by Thomas Klausner | Files touched by this commit (1068) | Package updated
Log message:
Bump PKGREVISION for perl-5.24.0 for everything mentioning perl.
   2016-03-05 12:29:49 by Jonathan Perkin | Files touched by this commit (1813) | Package updated
Log message:
Bump PKGREVISION for security/openssl ABI bump.
   2016-02-15 13:45:28 by Havard Eidnes | Files touched by this commit (2) | Package updated
Log message:
Enable the examples, some of them are a little more than mere examples.
Adjust PLIST accordingly.
Bump PKGREVISION.
   2015-11-04 01:35:47 by Alistair G. Crooks | Files touched by this commit (748)
Log message:
Add SHA512 digests for distfiles for net category

Problems found with existing digests:
	Package haproxy distfile haproxy-1.5.14.tar.gz
	159f5beb8fdc6b8059ae51b53dc935d91c0fb51f [recorded]
	da39a3ee5e6b4b0d3255bfef95601890afd80709 [calculated]

Problems found locating distfiles:
	Package bsddip: missing distfile bsddip-1.02.tar.Z
	Package citrix_ica: missing distfile citrix_ica-10.6.115659/en.linuxx86.tar.gz
	Package djbdns: missing distfile djbdns-1.05-test25.diff.bz2
	Package djbdns: missing distfile djbdns-cachestats.patch
	Package djbdns: missing distfile 0002-dnscache-cache-soa-records.patch
	Package gated: missing distfile gated-3-5-11.tar.gz
	Package owncloudclient: missing distfile owncloudclient-2.0.2.tar.xz
	Package poink: missing distfile poink-1.6.tar.gz
	Package ra-rtsp-proxy: missing distfile rtspd-src-1.0.0.0.tar.gz
	Package ucspi-ssl: missing distfile ucspi-ssl-0.70-ucspitls-0.1.patch
	Package waste: missing distfile waste-source.tar.gz

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
   2015-06-18 15:04:29 by Jonathan Perkin | Files touched by this commit (3)
Log message:
Fix for perl-5.22.
   2015-06-12 12:52:19 by Thomas Klausner | Files touched by this commit (3152)
Log message:
Recursive PKGREVISION bump for all packages mentioning 'perl',
having a PKGNAME of p5-*, or depending such a package,
for perl-5.22.0.
   2014-11-21 10:19:32 by Havard Eidnes | Files touched by this commit (5) | Package updated
Log message:
Update to version 1.6.17.

Pkgsrc changes:
 * adapt PLIST (1 new file installed)
 * fix name of patch file

Upstream changes:
1.6.17	2014-01-10
 * Fix ldns_dnssec_zone_new_frm_fp_l to allow the last parsed line of a
   zone to be an NSEC3 (or its RRSIG) covering an empty non terminal.
 * Add --disable-dane option to configure and check availability of the
   for dane needed X509_check_ca function in openssl.
 * bugfix #490: Get rid of type-punned pointer warnings.
   Thanks Adam Tkac.
 * Make sure executables are linked against libcrypto with the
   LIBSSL_LDFLAGS. Thanks Leo Baltus.
 * Miscellaneous prototype fixes. Thanks Dag-Erling Smørgrav.
 * README now shows preferred way to configure for examples and drill.
 * Bind to source address for resolvers. drill binds to source with -I.
   Thanks Bryan Duff.
 * -T option for ldns-dane that has specific exit status for PKIX
   validated connections without (secure) TLSA records.
 * Fix b{32,64}_{ntop,pton} detection and handling.
 * New RR type TKEY, but without operational practice.
 * New RR types HIP, NINFO, RKEY, CDS, EUI48, EUI64, URI, CAA and TA.
 * New output format flag (and accompanying functions) to print certain
   RR's as unknown type
 * -u and -U parameter for ldns-read-zone to mark/unmark a RR type
   for printing as unknown type
 * bugfix #504: GPOS RR has three rdata fields. Thanks Jelte Jansen.
 * bugfix #497: Properly test for EOF when reading key files with drill.
 * New functions: ldns_pkt_ixfr_request_new and
   ldns_pkt_ixfr_request_new_frm_str.
 * Use SNI with ldns-dane
 * bugfix #507: ldnsx Fix use of non-existent variables and not
   properly referring to instance variable.  Patch from shussain.
 * bugfix #508: ldnsx Adding NSEC3PARAM to known/allowable RR type
   dictionary.  Patch from shussain.
 * bugfix #517: ldns_resolver_new_frm_fp error when invoked using a NULL
   file pointer.
 * Fix memory leak in contrib/python: ldns_pkt.new_query.
 * Fix buffer overflow in fget_token and bget_token.
 * ldns-verify-zone NSEC3 checking from quadratic to linear performance.
   Thanks NIC MX (nicmexico.mx)
 * ldns-dane setup new ssl session for each new connect to prevent hangs
 * bugfix #521: drill trace continue on empty non-terminals with NSEC3
 * bugfix #525: Fix documentation of ldns_resolver_set_retry
 * Remove unused LDNS_RDF_TYPE_TSIG and associated functions.
 * Fix ldns_nsec_covers_name for zones with an apex only. Thanks Miek.
 * Configure option to build perl bindings: --with-p5-dns-ldns
   (DNS::LDNS is a contribution from Erik Ostlyngen)
 * bugfix #527: Move -lssl before -lcrypto when linking
 * Optimize TSIG digest function name comparison (Thanks Marc Buijsman)
 * Compare names case insensitive with ldns_pkt_rr_list_by_name and
   ldns_pkt_rr_list_by_name_and_type (thanks Johannes Naab)
 * A separate --enable for each draft RR type: --enable-rrtype-ninfo,
   --enable-rrtype-rkey, --enable-rrtype-cds, --enable-rrtype-uri and
   --enable-rrtype-ta
 * bugfix #530: Don't sign and verify duplicate RRs (Thanks Jelte Jansen)
 * bugfix #505: Manpage and usage output fixes (Thanks Tomas Hozza)
 * Adjust ldns_sha1() so that the input data is not modified (Thanks
   Marc Buijsman)
 * Messages to stderr are now off by default and can be reenabled with
   the --enable-stderr-msgs configure option.

Next | Query returned 43 messages, browsing 1 to 10 | Previous