2013-05-31 14:42:58 by Thomas Klausner | Files touched by this commit (2880) |
Log message:
Bump all packages for perl-5.18, that
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package
Like last time, where this caused no complaints.
|
2012-10-28 07:31:10 by Aleksej Saushev | Files touched by this commit (600) |
Log message:
Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.
|
2012-10-03 23:59:10 by Thomas Klausner | Files touched by this commit (2798) |
Log message:
Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.
I hope that's all of them.
|
2012-01-18 15:49:19 by Adam Ciarcinski | Files touched by this commit (1) |
Log message:
Revbump after updating db5
|
2010-09-16 10:06:18 by Adam Ciarcinski | Files touched by this commit (27) |
Log message:
Revbump after updating databases/db5
|
2010-06-02 15:11:54 by Adam Ciarcinski | Files touched by this commit (1) | ![Package updated](https://pkgsrc.se/images/update.gif) |
Log message:
Fix building with db5; updated to patch-20091019
|
2010-06-02 15:11:00 by Adam Ciarcinski | Files touched by this commit (2) | ![Package updated](https://pkgsrc.se/images/update.gif) |
Log message:
Fix building with db5; updated to patch-20091019
|
2010-02-26 11:28:35 by Thomas Klausner | Files touched by this commit (59) |
Log message:
Reset maintainer for developers who gave back their commit bit.
|
2010-02-19 22:10:25 by Joerg Sonnenberger | Files touched by this commit (1) |
Log message:
Fix ownership. Bump revision.
|
2009-10-17 03:50:39 by Takahiro Kambe | Files touched by this commit (2) |
Log message:
Add official patch-20091015, quote from Readme.Patch-20091015.
Bump PKGREVISION.
Introduction:
=============
This patch fixes one buffer overflow problem in sgLog.c when overlong URLs
are requested. SquidGuard will then go into emergency mode were no blocking
occurs. This is not required in this situation.
The URLs must be build with a overlong sequence of slashes (/).
ATTENTION: While squidGuard will no longer go into emergeny mode when one
overlong URL is passed to it, it is possible to use the overlong URL to
bypass the filter. This vulnerability is not fixed by this patch!
You can check if this vulnerability is actually exploited on your system
by checking the logfile squidGuard.log for the following warning (provided
you have not used the option --with-nolog=yes with configure before compiling
squidguard):
Warning: Possible bypass attempt. Found multiple slashes where only one is expected:
|