number of pipes on each level and need to combine them to lead the water from
the house at the top of the screen to the storage tank at the bottom. For each
pipe water goes through, you get 20 points and if you fill the cross-pipe both
ways, you get 60 points. At end of each level, you are awarded depending on the
skill level:
* Beginner: 100 points
* Toolman: 100 points + number of pipes remaining
* Master plumber: 100 points + 2 x number of pipes remaining
Some of the levels also have obstacles where you cannot place pipes. The game
is playable with joystick/joypad: just move it and press buttons when you go to
Options -> Configure controls
WWW: http://home.gna.org/vodovod/
PR: ports/173881
Submitted by: nemysis (self)
Approved by: pawel (mentor)
REVERT: Add --force-fast-ra option. Another thanks to Uwe Schindler.
NEW:
+ Update Spanish transalation. Thanks to Vicente Soriano.
+ Add --ra-param option. Thanks to Vladislav Grishenko for
+ inspiration on this.
+ Add --add-subnet configuration, to tell upstream DNS
+ servers where the original client is. Thanks to DNSthingy
+ for sponsoring this feature.
+ Add --quiet-dhcp, --quiet-dhcp6 and --quiet-ra. Thanks to
+ Kevin Darbyshire-Bryant for the initial patch.
+ Allow A/AAAA records created by --interface-name to be the
+ target of --cname. Thanks to Hadmut Danisch for the
+ suggestion.
+ Avoid treating a --dhcp-host which has an IPv6 address
+ as eligable for use with DHCPv4 on the grounds that it has
+ no address, and vice-versa. Thanks to Yury Konovalov for
+ spotting the problem.
+ Do a better job caching dangling CNAMEs. Thanks to Yves
+ Dorfsman for spotting the problem.
Fix shebang lines of two Perl scripts.
- use PKGNAMESUFFIX instead LATEST_LINK
- whitespace cleanup
- svn mv */bugzilla to */bugzilla40
- add vuxml entry
4.4.1, 4.2.7, and 4.0.11 Security Advisory
Wednesday Oct 16th, 2013
Summary
=======
Bugzilla is a Web-based bug-tracking system used by a large number of
software projects. The following security issues have been discovered
in Bugzilla:
* A CSRF vulnerability in process_bug.cgi affecting Bugzilla 4.4 only
can lead to a bug being edited without the user consent.
* A CSRF vulnerability in attachment.cgi can lead to an attachment
being edited without the user consent.
* Several unfiltered parameters when editing flagtypes can lead to XSS.
* Due to an incomplete fix for CVE-2012-4189, some incorrectly filtered
field values in tabular reports can lead to XSS.
All affected installations are encouraged to upgrade as soon as
possible.
[1] even bugzilla40 gets upstream fixes an upgrade to bugzilla42/44 is recommend
Security: vid e135f0c9-375f-11e3-80b7-20cf30e32f6d
CVE-2013-1733
CVE-2013-1734
CVE-2013-1742
CVE-2013-1743
- Use options helpers
- Fix a problem when PYTHON and BUNDLED_READLINE options are active
PR: ports/183048
Submitted by: Luca Pizzamiglio <luca.pizzamiglio@gmail.com> (maintainer)
Changes:
* pkgclean: Detect and cleanup duplicated packages due to PKGNAME
renaming
* Misc typo fixes
* ports -m git
- Use --depth=1 to not download all history for the repository.
- Support -v to show output
Switch to USES=gmake.
STAGIFY.
Don't try to build when the default compiler uses libc++.
Initiate deorbit burn sequence.
Submitted by: John Marino <freebsd@marino.st> [1]
(as it has always been before using iconv.mk);
. bump PORTREVISION.
Reported by: Marko Cupać <marko.cupac@mimar.rs>
Tested by: Marko Cupać <marko.cupac@mimar.rs>
Approved by: garga (maintainer)