Next | Query returned 76 messages, browsing 21 to 30 | Previous

History of commit frequency

CVS Commit History:


   2017-09-17 12:04:28 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
devel/libebml: update to 1.3.5

Released v1.3.5.
* The function EbmlMaster::CheckMandatory() will now only return
false if a mandatory element is missing for which there's no
default value in the specifications. This means that callers such
as EbmlMaster::UpdateSize() and by extension EbmlMaster::Render()
will not insist on all mandatory elements being present anymore,
but only those for which there's no default value.
* Added a template function `FindNextChild`. Patch by C.W. Betts.
* Fix reading and EBML element even though the ID was not found within
* Fixed an instance of undefined behavior in
EbmlElement::GetSemantic() due to binding a dereferenced null
pointer to a reference.
* Replaced the outdated address of the Free Software Foundation
with their current one.
   2017-08-16 22:21:18 by Thomas Klausner | Files touched by this commit (180)
Log message:
Follow some http redirects.
   2016-07-03 13:05:43 by Thomas Klausner | Files touched by this commit (3)
Log message:
Updated libebml to 1.3.4.

2016-07-02  Moritz Bunkus  <moritz@bunkus.org>

        * Released v1.3.4.

2015-11-21  Moritz Bunkus  <moritz@bunkus.org>

        * EbmlVersion.cpp: in order to enable deterministic builds the
        EbmlCodeDate variable has been set to "Unknown" instead of the
        date and time of compilation. Patch by Ed Schouten <ed@nuxi.nl>.

2015-11-18  Moritz Bunkus  <moritz@bunkus.org>

        * libebml_t.h: use C99-style integer typedefs instead of BSD-style
        ones. Patch by Ed Schouten <ed@nuxi.nl>.

2015-10-24  Moritz Bunkus  <moritz@bunkus.org>

        * EbmlBinary.h: add #include <cstdlib> for compilation with clang
        and libc++. Patch by Thomas Klausner <wiz@NetBSD.org>.
   2015-11-04 18:41:21 by Alistair G. Crooks | Files touched by this commit (78)
Log message:
Remove duplicate SHA512 digests that crept in.
   2015-11-03 04:29:40 by Alistair G. Crooks | Files touched by this commit (1995)
Log message:
Add SHA512 digests for distfiles for devel category

Issues found with existing distfiles:
	distfiles/eclipse-sourceBuild-srcIncluded-3.0.1.zip
	distfiles/fortran-utils-1.1.tar.gz
	distfiles/ivykis-0.39.tar.gz
	distfiles/enum-1.11.tar.gz
	distfiles/pvs-3.2-libraries.tgz
	distfiles/pvs-3.2-linux.tgz
	distfiles/pvs-3.2-solaris.tgz
	distfiles/pvs-3.2-system.tgz
No changes made to these distinfo files.

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
   2015-10-25 10:47:34 by Thomas Klausner | Files touched by this commit (2)
Log message:
Add upstream bug report URL.
   2015-10-25 10:44:10 by Thomas Klausner | Files touched by this commit (2)
Log message:
Update libebml to 1.3.3:

        * Released v1.3.3.

        * EbmlMaster::Read(): When the parser encountered a deeply nested
        element with an infinite size then a following element of an upper
        level was not propagated correctly. Instead the element with the
        infinite size was added into the EBML element tree a second time
        resulting in memory access after freeing it and multiple attempts
        to free the same memory address during destruction. Fixes the
        issue reported as Cisco TALOS-CAN-0037.

        * EbmlElement::ReadCodedSizeValue(): Fixed an invalid memory
        access. When reading a EBML variable length integer value a read
        access beyond the end of the available buffer was possible if
        fewer bytes were available than indicated by the first byte
        resulting in a heap information leak.

        * EbmlUnicodeString::UpdateFromUTF8(): Fixed an invalid memory
        access. When reading from a UTF-8 string in which the length
        indicated by a UTF-8 character's first byte exceeds the string's
        actual number of bytes the parser would access beyond the end of
        the string resulting in a heap information leak. Fixes the issue
        reported as Cisco TALOS-CAN-0036.
   2015-10-21 10:32:01 by Thomas Klausner | Files touched by this commit (2)
Log message:
Update libebml to 1.3.2:

2015-10-17  Moritz Bunkus  <moritz@bunkus.org>

        * Released v1.3.2.

2015-08-21  Steve Lhomme <robUx4@gmail.com>

        * EbmlElement::FindNextElement(): Handle EOF when reading the
        element size properly.

2015-06-15  Steve Lhomme <robUx4@gmail.com

        * Disable debug code for builds for the Windows App Store.

2015-06-12  Cristian Morales Vega <reddwarf@opensuse.org>

        * Update the license information: use latest official text for the
        LGPL.

2015-02-23  Steve Lhomme  <robux4@gmail.com>

        * EbmlString::ValidateSize(): only allow the same maximum size as
        EbmlBinary.
   2015-01-13 19:19:01 by Rumko | Files touched by this commit (1)
Log message:
devel/libebml: needs a C compiler to build

Ok@ salo
   2015-01-06 15:59:19 by Thomas Klausner | Files touched by this commit (7) | Package updated
Log message:
The last updates of libebml and libmatroska, despite only being X.Y.Z ->
X.Y.Z+1 updates, bumped the shared library major versions.

Do recursive bump for that.

Next | Query returned 76 messages, browsing 21 to 30 | Previous