--
This release fixes a bug that could lead to a remote crash.
Users using irssi on non x86 arches are urged to upgrade.
Also fixes a bug in window layout restoring queries that could
also cause a crash in all arches.
Based on submission from Robert Nagy <thuglife@bsd.hu> with mods
from me.
Quagga is a routing software suite, providing implementations of OSPFv2,
OSPFv3, RIP v1 and v2, RIPv3 and BGPv4 for Unix platforms, particularly
FreeBSD and Linux and also NetBSD, to mention a few. Quagga is a fork of
GNU Zebra which was developed by Kunihiro Ishiguro. The Quagga tree aims
to build a more involved community around Quagga than the current
centralized model of GNU Zebra.
WWW: http://www.quagga.net/
* Performance improvement. While it depends, approximately this version
is 4%-30% faster than the previous release. (client/server)
* A bug, which prevents cvsync from removing temporary files, has
been fixed. To remove files left over, you may want to remove
the scanfile and rerun cvsync just after upgrading. (client)
* A new option `-l' has been added to the server. It writes the log
into a specified file. (server)
* A new keyword `base' has been added. It specifies a base-prefix
used for relative pathnames in the following keywords: 'distfile',
'refuse', and 'scanfile'. It must be an absolute pathname.
(client/server/cvscan)
OpenVPN is an easy-to-use, robust, and highly configurable VPN (Virtual
Private Network) daemon which can be used to securely link two or more
private networks using an encrypted tunnel over the internet.
WWW: http://openvpn.sourceforge.net/
from Jorge A. Cortes Montiel <jcortes at bsdcoders dot org>
ifstat is a tool to report network interfaces bandwidth just like
vmstat/iostat do for other system counters.
WWW: http://gael.roualland.free.fr/ifstat/
Jonny Robertson reported that Zebra can be remotely crashed if a Zebra
password has been enabled and a remote attacker can connect to the Zebra
telnet management port. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0795 to this issue.
from http://rhn.redhat.com/errata/RHSA-2003-307.html
Bump package name.
ok itojun@ margarida@
A remotely exploitable buffer overrun has been reported in Epic.
This issue may reportedly be exploited by a malicious server that
supplies an overly long nickname in a CTCP messages, potentially
allowing for execution of arbitrary code in the context of the
client user.
It may be also be possible for a malicious client to send such a
message, but it is likely that the server will limit the length.
ok brad@