This module brings support for a sort of plugin architecture based on
Params::CallbackRequest to Mason. Mason then executes code before
executing any components. This approach allows you to carry out logical
processing of data submitted from a form, to affect the contents of the
Mason request arguments (and thus the %ARGS hash in components), and even
to redirect or abort the request before Mason handles it.
The HTTP::BrowserDetect object does a number of tests on an HTTP user
agent string. The results of these tests are available via methods of
the object.
Params::CallbackRequest provides functional and object-oriented callbacks
to method and function parameters. Callbacks may be either code references
provided to the new() constructor, or methods defined in subclasses of
Params::Callback. Callbacks are triggered either for every call to the
Params::CallbackRequest execute() method, or by specially named keys in
the parameters to execute().
Test::Class provides a simple way of creating classes and objects
to test your code in an xUnit style.
Built using Test::Builder it is designed to work with other
Test::Builder based modules (Test::More, Test::Differences,
Test::Exception, etc.)
This module provides a shared cache, using a memory mapped file. Very
useful for mod_perl applications. If routines are provided which interact
with the underlying data, access to the cache is completely transparent,
and the module handles all the details of refreshing cache contents, and
updating underlying data, if necessary.
This fixes lots of bugs and at least the security issues noticed in
CAN-2005-0021 and CAN-2005-0022.
based on a diff from "Andrey N. Oktyabrski" <ano at antora.ru>
A bug exists in the code that parses responses from Gopher servers.
The bug results in a buffer overflow if a Gopher server returns a
line longer than 4096 bytes. The overflow results in memory
corruption and usually crashes Squid.
CAN-2005-0094
A bug exists in the code that parses WCCP messages. An attacker
that sends a malformed WCCP messages, with a spoofed source address
matching Squid's "home router" can crash Squid.
CAN-2005-0095
Update to 0.6.14; from new maintainer Jacob Meuser <jakemsr@jakemsr.com>.
Notable changes:
- new import module for bktr(4) devices, import_bktr
- new import module for audio(4) devices, import_sunau
- export profiles
- better error checking
- uses YV12/I420 colorspace by default instead of RGB
- uses external ffmpeg/libavcodec
- optimized memcpy on i386
- many small bugs fixed