medians and set medians of Strings and Unicodes. Becuase it's implemented
in C, it's much faster than corresponding Python library functions and
methods.
WWW: http://trific.ath.cx/resources/python/levenshtein/
PR: ports/102702
Submitted by: Aron Stansvik <elvstone@gmail.com>
stuff. Announce messages:
2.8.2.3: This one contains two fixes:
- cookie login on IIS with IE6
- switching from scripts/setup.php to the main script in case of
register_globals enabled
2.8.2.4:
Sorry for 2.8.2.3 which broke the setup script. Now fixed in 2.8.2.4.
Changelog:
https://sourceforge.net/project/shownotes.php?release_id=441457
PR: ports/102403
Submitted by: Matthew Seaman (maintainer)
ftpsync.pl synchronizes a local directory tree and a remote FTP directory
tree. It was initally written to automize web publishing, but might be
useful for some other purposes, like mirroring not-too-large public sites,
data replication, and more.
WWW: http://ftpsync.sourceforge.net/
Author: Christoph Lechleitner <ibcl@users.sourceforge.net>
JComboBox is a composite widget that contains a text Label or Entry, a
Button, and a popup Listbox. It performs the same sort of tasks that can be
accomplished by several other Composite widgets. Some such as BrowseEntry
and Optionmenu are part of the standard Tk distribution, and there are many
others available in CPAN.
JComboBox borrows features from the Java Swing component bearing the same
name, but falls short of being a true clone. Many of the methods and the
general look and feel should be familiar to java developers. JComboBox also
combines several features offered by many of the other "Combo Box"
implementations, and works in two modes: editable and readonly.
In readonly mode, JComboBox offers similar functionality to Optionmenu. It
is basically a labeled button that activates a popup list. An item from the
list is displayed on the Button when selected.
When editable, JComboBox somewhat resembles BrowseEntry. That is, the
widget is composed of an Entry widget with a Button to the right of it. As
in the editable mode, the Button activates a popup Listbox from which a
single item can be selected.
WWW: http://search.cpan.org/dist/Tk-JComboBox/
Author: Rob Seegel <RobSeegel@comcast.net>
Justification: sysutils/namefix dep
gcc-3.4 is used [1]. This fixes the build on FreeBSD 4.x.
- Install libboost_serialization.so as libboost_serialization.so.3 and
create a symlink. [2]
Reported by: many [1], bmah [2]
PR: ports/102524
This class module binds one or more subroutines of your devising to a Perl
variable. All variables can have FETCH, STORE and DESTROY callbacks.
Additionally, arrays can define CLEAR, DELETE, EXISTS, EXTEND, FETCHSIZE,
POP, PUSH, SHIFT, SPLICE, STORESIZE and UNSHIFT callbacks, and hashes can
define CLEAR, DELETE, EXISTS, FIRSTKEY and NEXTKEY callbacks.
With Tie::Watch you can:
* alter a variable's value
* prevent a variable's value from being changed
* invoke a Perl/Tk callback when a variable changes
* trace references to a variable
WWW: http://search.cpan.org/dist/Tie-Watch/
Author: Steve Lidie <sol0@Lehigh.EDU>
Justification: x11-toolkits/p5-Tk-JComboBox dep, sysutils/namefix recursive dep
file provided by Novell):
glibc-2.3.4-23.4
This update fixes a problem when debugging threaded programs using gdb.
The symptom would be that 'info threads' returns empty in every case.
Everyone who debugs should update.
coreutils-5.3.0-10.2
Fix a bug in the cp and mv utilities that cause them to terminate with
a segmentation fault when copying extended attributes fails.
libtiff-3.7.1-7.8,
This update of libtiff is the result of a source-code audit done by
Tavis Ormandy. It fixes various bugs that can lead to denial-of-service
conditions as well as to remote code execution while parsing a tiff image.
(CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462, CVE-2006-3463,
CVE-2006-3464, CVE-2006-3465)
giflib-4.1.3-5.2
This update fixes the following security issues:
- specially crafted GIF files could crash applications
(CVE-2005-2974).
- specially crafted GIF files could overwrite memory which
potentially allowed to execute arbitrary code (CVE-2005-3350).
freetype2-2.1.9-4.4
This security update fixes crashes in the PCF handling of freetype2
which might be used to crash freetype2 using applications or even
to execude code in them.
This issue is tracked by the Mitre CVE ID CVE-2006-3467.
gtk2-2.6.4-6.3
This update fixes the following security problem: a heap overflow in the XPM
reader allowed attackers to execute arbitrary code via specially crafted XPM
images (CVE-2005-3186, CVE-2005-2976).
kdelibs3-3.4.0-20.10
This update contain a fix for kdelibs3.
The package contained libraries or applications having an internal empty
rpath / runpath. This problem leads to programs searching shared libaries
in the current directory.
arts-1.4.0-10.2
The KDE soundserver aRts lacked checks around some setuid() calls. This
could potentially be used by a local attacker to gain root
privileges. (CVE-2006-2916)
Add linux_base-8 to CONFLICTS.
Set PORTREVISION to 4.
Remove deprecation.
bzip2 could crash or run into an enless loop when decompressing
certain specially crafted archives. This problem has been fixed.
(CAN-2005-1260)
An advisory is at
<url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1260>.
Update the coreutils RPM (description from the INDEX file provided by Novell):
Fix a bug in the cp and mv utilities that cause them to terminate
with a segmentation fault when copying extended attributes fails.
Update the zlib RPM:
The previous zlib update for CAN-2005-2096 fixed a flaw in zlib that
could allow a carefully crafted compressed stream to crash an
application. While the original patch corrected the reported
overflow, Markus Oberhumer discovered additional ways a stream could
trigger an overflow. This update fixes those problems as well.
This issue is tracked by the Mitre CVE ID CAN-2005-1849.
Since only zlib 1.2.x is affected, older SUSE products are not
affected by this problem.
--<url:http://www.novell.com/linux/security/advisories/2005_43_zlib.html>
Add linux_base-8 and linux_base-suse-9.3 to CONFLICTS.
Remove quotes from RESTRICTED line (portlint).
Remove deprecation.
Remove duplicate $FreeBSD$ tag.
Increment PORTREVISION to 2.
Using any locale with UTF-8 encoding leads to an endless loop
if after a quote a tabluator completion is tried.
Update the bzip2 RPM (description from the INDEX file provided by Novell):
bzip2 could crash or run into an enless loop when decompressing
certain specially crafted archives. This problem has been fixed.
(CAN-2005-1260)
An advisory is at
<url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1260>.
Update the coreutils RPM (description from the INDEX file provided by Novell):
Fix a bug in the cp and mv utilities that cause them to terminate
with a segmentation fault when copying extended attributes fails.
Update the libacl RPM (description from the INDEX file provided by Novell):
When specifying multiple files, the X pseudo permission was handled
wrong. (X evaluates to x if any acl entry contains x, and - otherwise.)
Update the ncurses RPM (description from the INDEX file provided by Novell):
Make resizing of the terminal work even with threaded curses programs
Update the zlib RPM:
The previous zlib update for CAN-2005-2096 fixed a flaw in zlib that
could allow a carefully crafted compressed stream to crash an
application. While the original patch corrected the reported
overflow, Markus Oberhumer discovered additional ways a stream could
trigger an overflow. This update fixes those problems as well.
This issue is tracked by the Mitre CVE ID CAN-2005-1849.
Since only zlib 1.2.x is affected, older SUSE products are not
affected by this problem.
--<url:http://www.novell.com/linux/security/advisories/2005_43_zlib.html>
Add linux_base-8, linux_base-suse-9.2 and linux_base-suse-9.3 to CONFLICTS.
Remove quotes from RESTRICTED line (portlint).
Remove deprecation.
Increment PORTREVISION to 2.
PR: 102707