Bulk builders suffer without this, and we already have a sligt
idea what's going wrong (new thread receives a signal before
__tfork returns and then it fails in sigreturn).
I hope to find some time to work on a regression test for this
problem (which isn't related at all to ghc).
* Skip symlinks when using mbox
* Update FSF address in file headers
* Update COPYING to latest gpl-2.0.txt
* Improve error message if home directory cannot be determined
* Honour HOME environment variable
* MIME types are allowed to have "+" characters in them.
* Fix deficiencies in the parsing of mbox From lines
* Include the existing -x flag in the help message
And others, while there, USE_GROFF is not needed.
Maintainer timeout
OK okan@, aja@ and sthen@ (look fine but without testing)
* the \r character was not handled correctly
* Added support for flexible tabize wished
* some highlighting mistakes were introduced by the last
bugfix.
Tested on i386. While here USE_GROFF is not needed.
OK okan@, aja@
VERSION variable (pointed by sthen@), now autossh use configure.
With this fixes:
- updated option string up to OpenSSH 5.6
- when using -f, set gate_time to 0; the assumption is that
it is being used for infrastructure (i.e. in a system startup),
has been tested, and bombing out just because the remote end is
not up is not the desired behaviour.
- add AUTOSSH_MAXLIFETIME
- fix poll flags so not checking for writable when write done
- compile time TOUCH_PIDFILE option to touch pid file on connection test.
Maintainer drop the maintainership, so I take care of this now.
OK aja@, okan@.
igal2 (the successor of igal) is a quick and easy program for placing
your images online with just one command-line. It generates a pretty
good-looking set of W3-compliant static HTML slides even with its
default settings. The slide show preloads the next image with JavaScript
- ideal for slower links.
ok sthen@
http://arduino.cc/blog/2011/10/04/arduino-1-0/
- various changes related to this port:
* adjust sketch extensions from .pde to .ino
* deal better with different arduino variants
* adjust template to get it compiling/linking again
tested by various
* A permission escalation vulnerability in Asterisk Manager Interface. This
would potentially allow remote authenticated users the ability to execute
commands on the system shell with the privileges of the user running the
Asterisk application.
* A heap overflow vulnerability in the Skinny Channel driver. The keypad
button message event failed to check the length of a fixed length buffer
before appending a received digit to the end of that buffer. A remote
authenticated user could send sufficient keypad button message events that
the buffer would be overrun.
* A remote crash vulnerability in the SIP channel driver when processing UPDATE
requests. If a SIP UPDATE request was received indicating a connected line
update after a channel was terminated but before the final destruction of the
associated SIP dialog, Asterisk would attempt a connected line update on a
non-existing channel, causing a crash.