From the PR submitter:
- Update to 20100608
- Support amd64 natively
- Update DISTFILES location to use Sourceforge
- Add LICENSE_FILE
- Ensure add-local-cross script is executable
- Clean up old patches, replace trivial patches by REINPLACE_CMD
- Mark SMLNJ option as broken for now.
- Mark jobs unsafe.
From myself:
- Unexpire.
- Add stage support
- Add USE_GCC=any
- Convert to USES
- New LIB_DEPENDS format
- Remove pre-FreeBSD 7.0 compatibility
- Pass maintainership to submitter
PR: ports/177406
Submitted by: Timothy Beyer <beyert@cs.ucr.edu>
Approved by: previous maintainer timeout (11 months)
deskutils/kdepim4:
- Add depedency on coreutils, kleopatra needs md5sum and sha1sum programs [1]
misc/kdehier4:
- add tests directory (r343428 commit to Templates/BSD.local.dist)
security/kwallet:
- moved to security/kwalletmanager (renamed upstream)
x11/kdelibs:
- remove workaround, which is not needed after global fix in
Mk/bsd.kde4.mk (r315373)
PR: ports/187259 [1]
Submitted by: Tobias Berner <tcberner@gmail.com>
I don't know when the skip-bootstrap logic stopped working, but I'm
reasonably sure it did once. Apparently PREFIX isn't defined at the
time of the "if exists" evaluation. Using LOCALBASE instead will allow
the compiler to build using the compiler on the system rather than
the older bootstrap compiler. The bug was discovered while trying to
move gcc-aux to a gcc49 base.
Alberto Villa (avilla@) has done all the hard work to create Qt 5 ports.
Trivial update from 5.2.0-beta1 to 5.2.1 by me.
Special thanks for Adriaan de Groot <groot@kde.org> for his assistance for
Qt-5.2.0 update.
Approved by: portmgr (bapt) (for Mk/bsd.port.mk)
- Replace USE_GMAKE by USES=gmake.
- Remove setting for FreeBSD 7.x and earlier which we no longer support.
Approved by: portmgr (generic pre-approval)
A vulnerability was reported [1] in Python's socket module, due to a
boundary error within the sock_recvfrom_into() function, which could be
exploited to cause a buffer overflow.
This could be used to crash a Python application that uses the
socket.recvfrom_info() function or, possibly, execute arbitrary code
with the permissions of the user running vulnerable Python code.
This vulnerable function, socket.recvfrom_into(), was introduced in
Python 2.5. Earlier versions are not affected by this flaw. This is
fixed in upstream branches for version 2.7, 3.1, 3.2 and 3.3.
[1] http://bugs.python.org/issue20246
MFH: 2014Q1
Security: 8e5e6d42-a0fa-11e3-b09a-080027f2d077
and was originally created 2008-03-01, thirteen months before the upstream
release of GCC 4.4.0. Even lang/gcc45 has been gone for more than two
years now.
Recommend the generic lang/gcc as a replacement.
2014-02-26 www/trac-hierwiki: Runtime is broken, doesn't support Trac>0.11
2014-02-27 net-p2p/microdc2: Broken for more than 6 month
2014-02-27 www/openvrml: Broken for more than 6 month
2014-02-27 science/peekabot: Broken for more than 6 month
2014-02-27 misc/xbiso: Broken for more than 6 month
2014-02-27 net/hornetq: Broken for more than 6 month
2014-02-27 sysutils/slmon: Broken for more than 6 month
2014-02-27 www/trac-revtree: Broken for more than 6 months
2014-02-27 security/crack: Broken for more than 6 month
2014-02-27 sysutils/graphicboot: Broken for more then 6 month
2014-02-27 graphics/kgraphviewer: Broken for more than 6 month
2014-02-27 sysutils/ckl: Broken for more than 6 month
2014-02-27 japanese/trac: Broken for more than 6 month
2014-02-27 lang/opa: Broken for more than 6 month
2014-02-27 sysutils/mmore: Broken for more than 6 month
2014-02-27 www/trac-announcer: Broken for more than 6 month