Commit graph

11141 commits

Author SHA1 Message Date
rillig
ca0e8e3ca1 lang/go: extend _VARGROUPS section in go-dep.mk 2019-09-10 20:01:06 +00:00
gutteridge
c5088084ff guile22: further packaging fixes
My earlier try at fixing Linux only worked with particular distros. To
get around this, just install a stub charset.alias file universally on
Linux. This is the simplest thing to do for now. While here, this is
also breaking on recent Darwin releases because the build scripting
expects GNU sed.
2019-09-10 03:47:27 +00:00
adam
df99f31028 rust: on Darwin, use proper shared library name instead of @rpath 2019-09-09 16:19:49 +00:00
maya
f1b47c9f3d llvm: bump GCC_REQD. configure will fail with GCC < 5.1. 2019-09-09 10:53:23 +00:00
maya
3659de2832 gcc{48,49,5,6,7,8}: In the case of a "system GCC", detect if the system
libgcc is newer than the one about to be installed. If so, don't install
the libgcc.

Having an older libgcc appear in the lookup may result in binaries not
running, as they need symbols from the newer libgcc.
Such a case is PR pkg/54506.

Leaves SunOS unchanged, by request from jperkin.
2019-09-08 14:47:52 +00:00
maya
e10763bf89 Add a new option 'always-libgcc', whether to install libgcc.
If the pkgsrc compiler is GCC, don't install libgcc.

Having an older libgcc is problematic: it may be missing symbols from
newer libgcc. This is what happened in PR pkg/54506.

Use this on gcc-aux and gcc5-aux: the libgcc_s.so they install is going
to be older in all the operating systems these packages support.
(Other GCC packages will require a more elaborate rule)

Leaving SmartOS unchanged, by request from jperkin.
2019-09-08 14:05:38 +00:00
maya
b3530c5fe3 gcc-aux: amend fixincludes in the bootstrap compiler on NetBSD
Prior to GCC 9, they were exceptionally fragile, and happened to break with
NetBSD 9.x.
2019-09-08 09:24:04 +00:00
gutteridge
76254491e5 guile22: build fix for most Linux distributions and Darwin
The file charset.alias is not defined as part of the installation
target if this is being built on Linux+glibc or Darwin, handle
accordingly.
2019-09-03 13:20:06 +00:00
rjs
01db3f7b9e Add Capstone module. 2019-09-02 22:16:53 +00:00
nia
b87826a283 mono6: get PAXCTL from environment 2019-09-02 16:41:01 +00:00
adam
231e2ea820 Rewrite PYTHON_VERSIONS_ACCEPTED to PYTHON_VERSIONS_INCOMPATIBLE 2019-09-02 13:33:22 +00:00
adam
435af01a8b Changed PYTHON_VERSIONS_INCOMPATIBLE to PYTHON_VERSIONS_ACCEPTED; needed for future Python 3.8 2019-09-02 13:19:35 +00:00
wiz
879b53ddaa smalltalk: switch from removed glut to freeglut.
Bump PKGREVISION.

Untested.
2019-09-01 13:06:25 +00:00
taca
0f58a4f829 lang/php71: update to 7.1.32
29 Aug 2019, PHP 7.1.32

- mbstring:
  . Fixed CVE-2019-13224 (don't allow different encodings for onig_new_deluxe) (stas)
2019-09-01 13:04:13 +00:00
taca
c14b53fdf3 lag/php73: update to 7.3.9
29 Aug 2019, PHP 7.3.9

- Core:
  . Fixed bug #78363 (Buffer overflow in zendparse). (Nikita)
  . Fixed bug #78379 (Cast to object confuses GC, causes crash). (Dmitry)
  . Fixed bug #78412 (Generator incorrectly reports non-releasable $this as GC
    child). (Nikita)

- Curl:
  . Fixed bug #77946 (Bad cURL resources returned by curl_multi_info_read()).
    (Abyr Valg)

- Exif:
  . Fixed bug #78333 (Exif crash (bus error) due to wrong alignment and
    invalid cast). (Nikita)

- FPM:
  . Fixed bug #77185 (Use-after-free in FPM master event handling).
    (Maksim Nikulin)

- Iconv:
  . Fixed bug #78342 (Bus error in configure test for iconv //IGNORE). (Rainer
    Jung)

- LiteSpeed:
  . Updated to LiteSpeed SAPI V7.5 (Fixed clean shutdown). (George Wang)

- MBString:
  . Fixed bug #78380 (Oniguruma 6.9.3 fixes CVEs). (CVE-2019-13224) (Stas)

- MySQLnd:
  . Fixed bug #78179 (MariaDB server version incorrectly detected). (cmb)
  . Fixed bug #78213 (Empty row pocket). (cmb)

- Opcache:
  . Fixed bug #77191 (Assertion failure in dce_live_ranges() when silencing is
    used). (Nikita)

- Standard:
  . Fixed bug #69100 (Bus error from stream_copy_to_stream (file -> SSL stream)
    with invalid length). (Nikita)
  . Fixed bug #78282 (atime and mtime mismatch). (cmb)
  . Fixed bug #78326 (improper memory deallocation on stream_get_contents()
    with fixed length buffer). (Albert Casademont)
  . Fixed bug #78346 (strip_tags no longer handling nested php tags). (cmb)
2019-09-01 13:03:17 +00:00
taca
a5c3e4386e lang/php72: update to 7.2.22
29 Aug 2019, PHP 7.2.22

- Core:
  . Fixed bug #78363 (Buffer overflow in zendparse). (Nikita)
  . Fixed bug #78379 (Cast to object confuses GC, causes crash). (Dmitry)

- Curl:
  . Fixed bug #77946 (Bad cURL resources returned by curl_multi_info_read()).
    (Abyr Valg)

- Exif:
  . Fixed bug #78333 (Exif crash (bus error) due to wrong alignment and
    invalid cast). (Nikita)

- Iconv:
  . Fixed bug #78342 (Bus error in configure test for iconv //IGNORE). (Rainer
    Jung)

- LiteSpeed:
  . Updated to LiteSpeed SAPI V7.5 (Fixed clean shutdown). (George Wang)

- MySQLnd:
  . Fixed bug #78179 (MariaDB server version incorrectly detected). (cmb)

- Opcache:
  . Fixed bug #77191 (Assertion failure in dce_live_ranges() when silencing is
    used). (Nikita)

- Standard:
  . Fixed bug #69100 (Bus error from stream_copy_to_stream (file -> SSL stream)
    with invalid length). (Nikita)
  . Fixed bug #78282 (atime and mtime mismatch). (cmb)
  . Fixed bug #78326 (improper memory deallocation on stream_get_contents()
    with fixed length buffer). (Albert Casademont)
2019-09-01 13:02:05 +00:00
nia
2a24ab5641 mono6: Give up and add cmake to USE_TOOLS.
While here, silcence some pkglint warnings.
2019-09-01 12:04:38 +00:00
markd
6d5fa937ed coq: patch to build with ocaml 4.08 2019-09-01 00:51:46 +00:00
markd
a32f7d85dd camlp5: update to 7.08
works with ocaml 4.08
2019-09-01 00:46:54 +00:00
rjs
d0f56fc4bd Prevent the portability check from failing. 2019-08-31 20:20:42 +00:00
nia
78ad98cf0e mono6: also disable btls-lib 2019-08-31 10:30:03 +00:00
nia
703b216b44 stalin: seems to only need MesaLib and glu 2019-08-30 18:12:29 +00:00
he
4c27d0de9b Update rust to version 1.37.0
Pkgsrc changes:
 * Add a patch to llvm to deal with const dli_saddr.
 * Adapt two other patches.
 * Cross-build currently fails, so i386, powerpc and sparc64 bootstrap
   kits for 1.37.0 are built natively.  Missing aarch64 hardware, so that's
   not available yet.
 * Bump bootstrap requirements to 1.36.0 except for armv7-unknown-netbsd-eabihf
   which I've not managed to cross-build.

Upstream changes:

Version 1.37.0 (2019-08-15)
==========================

Language
--------
- `#[must_use]` will now warn if the type is contained in a [tuple][61100],
  [`Box`][62228], or an [array][62235] and unused.
- [You can now use the `cfg` and `cfg_attr` attributes on
  generic parameters.][61547]
- [You can now use enum variants through type alias.][61682] e.g. You can
  write the following:
  ```rust
  type MyOption = Option<u8>;

  fn increment_or_zero(x: MyOption) -> u8 {
      match x {
          MyOption::Some(y) => y + 1,
          MyOption::None => 0,
      }
  }
  ```
- [You can now use `_` as an identifier for consts.][61347] e.g. You can write
  `const _: u32 = 5;`.
- [You can now use `#[repr(align(X)]` on enums.][61229]
- [The  `?`/_"Kleene"_ macro operator is now available in the
  2015 edition.][60932]

Compiler
--------
- [You can now enable Profile-Guided Optimization with the `-C profile-generate`
  and `-C profile-use` flags.][61268] For more information on how to use profile
  guided optimization, please refer to the [rustc book][rustc-book-pgo].
- [The `rust-lldb` wrapper script should now work again.][61827]

Libraries
---------
- [`mem::MaybeUninit<T>` is now ABI-compatible with `T`.][61802]

Stabilized APIs
---------------
- [`BufReader::buffer`]
- [`BufWriter::buffer`]
- [`Cell::from_mut`]
- [`Cell<[T]>::as_slice_of_cells`][`Cell<slice>::as_slice_of_cells`]
- [`DoubleEndedIterator::nth_back`]
- [`Option::xor`]
- [`Wrapping::reverse_bits`]
- [`i128::reverse_bits`]
- [`i16::reverse_bits`]
- [`i32::reverse_bits`]
- [`i64::reverse_bits`]
- [`i8::reverse_bits`]
- [`isize::reverse_bits`]
- [`slice::copy_within`]
- [`u128::reverse_bits`]
- [`u16::reverse_bits`]
- [`u32::reverse_bits`]
- [`u64::reverse_bits`]
- [`u8::reverse_bits`]
- [`usize::reverse_bits`]

Cargo
-----
- [`Cargo.lock` files are now included by default when publishing executable crates
  with executables.][cargo/7026]
- [You can now specify `default-run="foo"` in `[package]` to specify the
  default executable to use for `cargo run`.][cargo/7056]

Misc
----

Compatibility Notes
-------------------
- [Using `...` for inclusive range patterns will now warn by default.][61342]
  Please transition your code to using the `..=` syntax for inclusive
  ranges instead.
- [Using a trait object without the `dyn` will now warn by default.][61203]
  Please transition your code to use `dyn Trait` for trait objects instead.

[62228]: https://github.com/rust-lang/rust/pull/62228/
[62235]: https://github.com/rust-lang/rust/pull/62235/
[61802]: https://github.com/rust-lang/rust/pull/61802/
[61827]: https://github.com/rust-lang/rust/pull/61827/
[61547]: https://github.com/rust-lang/rust/pull/61547/
[61682]: https://github.com/rust-lang/rust/pull/61682/
[61268]: https://github.com/rust-lang/rust/pull/61268/
[61342]: https://github.com/rust-lang/rust/pull/61342/
[61347]: https://github.com/rust-lang/rust/pull/61347/
[61100]: https://github.com/rust-lang/rust/pull/61100/
[61203]: https://github.com/rust-lang/rust/pull/61203/
[61229]: https://github.com/rust-lang/rust/pull/61229/
[60932]: https://github.com/rust-lang/rust/pull/60932/
[cargo/7026]: https://github.com/rust-lang/cargo/pull/7026/
[cargo/7056]: https://github.com/rust-lang/cargo/pull/7056/
[`BufReader::buffer`]: https://doc.rust-lang.org/std/io/struct.BufReader.html#method.buffer
[`BufWriter::buffer`]: https://doc.rust-lang.org/std/io/struct.BufWriter.html#method.buffer
[`Cell::from_mut`]: https://doc.rust-lang.org/std/cell/struct.Cell.html#method.from_mut
[`Cell<slice>::as_slice_of_cells`]: https://doc.rust-lang.org/std/cell/struct.Cell.html#method.as_slice_of_cells
[`DoubleEndedIterator::nth_back`]: https://doc.rust-lang.org/std/iter/trait.DoubleEndedIterator.html#method.nth_back
[`Option::xor`]: https://doc.rust-lang.org/std/option/enum.Option.html#method.xor
[`RefCell::try_borrow_unguarded`]: https://doc.rust-lang.org/std/cell/struct.RefCell.html#method.try_borrow_unguarded
[`Wrapping::reverse_bits`]: https://doc.rust-lang.org/std/num/struct.Wrapping.html#method.reverse_bits
[`i128::reverse_bits`]: https://doc.rust-lang.org/std/primitive.i128.html#method.reverse_bits
[`i16::reverse_bits`]: https://doc.rust-lang.org/std/primitive.i16.html#method.reverse_bits
[`i32::reverse_bits`]: https://doc.rust-lang.org/std/primitive.i32.html#method.reverse_bits
[`i64::reverse_bits`]: https://doc.rust-lang.org/std/primitive.i64.html#method.reverse_bits
[`i8::reverse_bits`]: https://doc.rust-lang.org/std/primitive.i8.html#method.reverse_bits
[`isize::reverse_bits`]: https://doc.rust-lang.org/std/primitive.isize.html#method.reverse_bits
[`slice::copy_within`]: https://doc.rust-lang.org/std/primitive.slice.html#method.copy_within
[`u128::reverse_bits`]: https://doc.rust-lang.org/std/primitive.u128.html#method.reverse_bits
[`u16::reverse_bits`]: https://doc.rust-lang.org/std/primitive.u16.html#method.reverse_bits
[`u32::reverse_bits`]: https://doc.rust-lang.org/std/primitive.u32.html#method.reverse_bits
[`u64::reverse_bits`]: https://doc.rust-lang.org/std/primitive.u64.html#method.reverse_bits
[`u8::reverse_bits`]: https://doc.rust-lang.org/std/primitive.u8.html#method.reverse_bits
[`usize::reverse_bits`]: https://doc.rust-lang.org/std/primitive.usize.html#method.reverse_bits
[rustc-book-pgo]: https://doc.rust-lang.org/rustc/profile-guided-optimization.html
2019-08-29 14:09:56 +00:00
nia
f0ad385ed9 mono6: disable boringtls to try to help things on linux
the provider is Linux-only and is complaining it doesn't have CMake.
2019-08-29 12:19:44 +00:00
taca
c79867cd74 lang/ruby26: update to 2.6.4
Update lang/ruby26-base and lang/ruby26 to 2.6.4.

Ruby 2.6.4 (2019-08-28)

Ruby 2.6.4 has been released.

This release includes a security fix of rdoc. Please check the topics below
for details.

	* Multiple jQuery vulnerabilities in RDoc

See the commit logs for changes in detail.
2019-08-28 14:23:21 +00:00
taca
08d9a1f40e lang/ruby25: update to 2.5.6
Update ruby25-base/ruby25 to 2.5.6.

Ruby 2.5.6 (2019-08-28)

Ruby 2.5.6 has been released.

This release includes about 40 bug fixes after the previous release, and also includes a security fix. Please check the topics below for details.

	* Multiple jQuery vulnerabilities in RDoc

See the commit log for details.
2019-08-28 14:12:21 +00:00
taca
8d8f11c09d lang/ruby24-base: update to 2.4.7
2.4.7 (2019-08-28)

Ruby 2.4.7 has been released.

This release includes a security fix. Please check the topics below for
details.

* Multiple jQuery vulnerabilities in RDoc

Ruby 2.4 is now under the state of the security maintenance phase, until
the end of March of 2020. After that date, maintenance of Ruby 2.4 will be
ended. We recommend you start planning the migration to newer versions of
Ruby, such as 2.6 or 2.5.
2019-08-28 14:03:54 +00:00
schmonz
9e1cae5671 Set PKG_SUPPORTED_OPTIONS to empty string by default. Fixes the
following on macOS:

ERROR: This package has set PKG_FAIL_REASON:
ERROR: [bsd.options.mk] The package has no options, but includes this file.
2019-08-27 17:23:48 +00:00
jperkin
529dd3072c gcc7: Revert zlib change, it causes bootstrap issues.
It doesn't appear to be related to the failure that prompted it.  Bump
gcc7-libs twice as it had fallen behind gcc7.
2019-08-27 06:42:30 +00:00
jaapb
7a7f41b24c Removed more superfluous patches (oops!) from lang/ocaml 2019-08-27 06:23:50 +00:00
jaapb
61fd3cad14 Removed superfluous patch from lang/ocaml; revbump. 2019-08-27 05:37:38 +00:00
adam
010ac4f5fc clang: fix CMAKE_ARGS.Darwin 2019-08-26 14:56:21 +00:00
adam
c3aa699f5b py-uncompyle6: updated to 3.4.0
3.4.0:
The main change is to add a tree-transformation phase. This simplifies the
code a little and allows us to turn if ...: raise AssertionError into
assert, and many if ..: else if ... into if ... elif ..

Use options --show=before and --show=after to see the before the tree transformation phase and after the tree transformation phase.
2019-08-26 06:55:16 +00:00
adam
ad1de66fea py-spark-parser: updated to 1.8.9
1.8.9:
3.8 change from last release is needed in Python 3.7.4

1.8.8:
Changes for Python 3.7.4 and 3.8
2019-08-26 06:54:28 +00:00
maya
71fd38f59d mono6. 2019-08-25 16:37:28 +00:00
maya
bfcb7ac194 Add mono 6.0.0.313.
The Mono Project is an open development initiative sponsored by Ximian
that is working to develop an open source, Unix version of the Microsoft
.NET development platform.  Its objective is to enable Unix developers to
build and deploy cross-platform .NET Applications.  The project will
implement various technologies developed by Microsoft that have now been
submitted to the ECMA for standardization.
2019-08-25 16:37:01 +00:00
jaapb
5da7f4ee60 Updated lang/ocaml to 4.08.1.
4.08.1 is a bugfix release, fixing compilation failures in presence of the
-pack option, and dynlinking failures.

Highlights in 4.08.0 are:
* Binding operators (let*, let+, and*, etc). They can be used to
  streamline monadic code.
* open now applies to arbitrary module expression in structures and to
  applicative paths in signatures.
* A new notion of (user-defined) "alerts" generalizes the deprecated
  warning.
* New modules in the standard library: Fun, Bool, Int, Option, Result.
* A significant number of new functions in Float, including FMA support,
  and a new Float.Array submodule.
* Source highlighting for errors and warnings in batch mode.
* Many error messages were improved.
* Improved AFL instrumentation for objects and lazy values.
2019-08-24 10:54:23 +00:00
tnn
0ebae812d4 openjdk8: put back MASTER_SITE_LOCAL in the list
So the bootstrap kits can be found. Oops.
2019-08-23 18:52:23 +00:00
ryoon
92bb1100cf Update to 10.7.5
* GUI in Java was removed in 10.7.2 release.
* Fix build error related to readline with devel/readline. PR pkg/54484

Changelog:
10.7.2
   Fixing out-of-sink of file positions when mixing 'search' and 'seek'
   with 'read-line' on IO-streams introduced a new errror making
   the newlisp-10.x.x/examples/upload.cgi script fail.

10.7.3
   Supress loading of startup init.lsp when -h option is present. Before
   only the -n and -x options supressed init.lsp.

   Change in modules/gsl.lsp to make it work on locales using comma separator.

   Ability to use 'open', 'rename-file', 'delete-file', 'make-dir' and
   'remove-dir' with UTF16 filenames in UTF8 versions on Windows when
   using the UTF8 version of newLISP. The functions 'file-info', 'file?',
   'change-dir' and 'dir? already worked on UTF16 filenames when using the UTF8
   version of newLISP on Windows.

   Thanks to Michael Sabin who started the work a few years back writing the
   win-path.c file with functions translating between UTF8 and UTF16.

   When using the UTF8 version of newLISP on Windows in a command shell, that
   command shell program also should be able to handle/display UTF8 (not UTF16).
   On Windows and Linux the Java based frontend newLISP-GS handles UTF8.
   On Mac OS the terminal program handles UTF8.

   Fixed a wrong 'symbol protected message' when a protected symbol is
   part of a nested espression, but not a symbol with its content to be
   modified.

   New modules/postscript.lsp changes description of ps:drawto.

   Fixed flushing problem on 'print' to stdout on Mac OS and other BSDs.

   '(read-key true)' with the 'true' parameter is now non-blocking.

   (trim str) on some strings containing 0's would overrun memory and 0's
   where not trimmed from the left. All character <= 32 (space) should
   be trimmed from the left and right ends of the string buffer. When the
   entire string is valid ASCII or UTF-8 with no 0s, ‘trim’ behaves
   like in older versions.

10.7.4
   When starting newlisp in -http-safe server mode HTTP_PUT and HTTP_DELETE
   requests will not be served. This will cause 'write-file' and 'delete-file'
   in url syntax, 'put-url' and 'delete-url' functions issued from a newLISP
   client to return the text message "Server in safe mode".

   New file qa-specific-tests/qa-share.lsp .

   New guiserver.jar v 1.67 compiled with java 1.6
   Still problems on macOS, some unrelated to change to image/icon load change

   Added REQUEST_URI to environment variables in webserver mode.

   Removed code introduced in 10.7.2 to syncronize file poisitons of C FILE stream
   and raw file handle operations. Syncronization still seem s to work on cases
   tested, but may not work in all cases mixing 'read-line' and 'seek'.

   Changes for separately packaged Java Guiserver and elimination of installers.

   (rotate theList -offsetOfRotation) was buggy

10.7.5
   In getPutPostDeleteUrl(....) sock wasn't closed when returning with webError(..)

   compareLists() in nl-math.c did not take list lengths into account. Also update
   of qa-dot for relevant cases.
2019-08-23 13:41:31 +00:00
ast
a78506cdb0 Update rakudo, nqp, MoarVM to 2019.07.1 2019-08-22 22:33:15 +00:00
nia
7c13719206 libLLVM: Enable RTTI, needed for newer MesaLib. 2019-08-22 17:49:01 +00:00
nia
08104c3f19 llvm: Enable RTTI. Needed for MesaLib-19. 2019-08-22 14:49:25 +00:00
ryoon
edacf2bbcb Recursive revbump from boost-1.71.0 2019-08-22 12:22:48 +00:00
maya
581bc2b0bd Create a node.js REPLACE_* mk-fragment.
Extracting the code in devel/yarn to be used in another package, too.
2019-08-18 03:44:42 +00:00
adam
4df09907ad nodejs: updated to 10.16.3
Version 10.16.3 'Dubnium' (LTS):

Notable changes

This is a security release.

Node.js, as well as many other implementations of HTTP/2, have been found vulnerable to Denial of Service attacks. See https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md for more information.

Vulnerabilities fixed:

CVE-2019-9511 “Data Dribble”: The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.

CVE-2019-9512 “Ping Flood”: The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.

CVE-2019-9513 “Resource Loop”: The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU, potentially leading to a denial of service.

CVE-2019-9514 “Reset Flood”: The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.

CVE-2019-9515 “Settings Flood”: The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.

CVE-2019-9516 “0-Length Headers Leak”: The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory, potentially leading to a denial of service.

CVE-2019-9517 “Internal Data Buffering”: The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both, potentially leading to a denial of service.

CVE-2019-9518 “Empty Frames Flood”: The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU, potentially leading to a denial of service.
2019-08-16 15:18:16 +00:00
nia
f4241a4452 rust: Avoid using external llvm when external llvm isn't pkgsrc llvm.
Reported as a build failure in #pkgsrc by ng0.
2019-08-14 16:00:23 +00:00
bsiegert
2b7e432294 Recursive bump of all packages using Go after Go 1.12.8 update. 2019-08-14 15:45:31 +00:00
bsiegert
d9b2ddcd40 go112: update to 1.12.8 (security release).
net/http: Denial of Service vulnerabilities in the HTTP/2 implementation

net/http and golang.org/x/net/http2 servers that accept direct connections from
untrusted clients could be remotely made to allocate an unlimited amount of
memory, until the program crashes. Servers will now close connections if the
send queue accumulates too many control messages.

The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606.
Thanks to Jonathan Looney from Netflix for discovering and reporting these issues.

This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
golang.org/x/net/http2.

net/url: parsing validation issue

url.Parse would accept URLs with malformed hosts, such that the Host field
could have arbitrary suffixes that would appear in neither Hostname() nor
Port(), allowing authorization bypasses in certain applications. Note that URLs
with invalid, not numeric ports will now return an error from url.Parse.

The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me)
for discovering and reporting this issue.
2019-08-14 15:42:52 +00:00
bsiegert
a5773b6b72 go111: update to 1.11.13 (security release).
net/http: Denial of Service vulnerabilities in the HTTP/2 implementation

net/http and golang.org/x/net/http2 servers that accept direct connections from
untrusted clients could be remotely made to allocate an unlimited amount of
memory, until the program crashes. Servers will now close connections if the
send queue accumulates too many control messages.

The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606.
Thanks to Jonathan Looney from Netflix for discovering and reporting these issues.

This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
golang.org/x/net/http2.

net/url: parsing validation issue

url.Parse would accept URLs with malformed hosts, such that the Host field
could have arbitrary suffixes that would appear in neither Hostname() nor
Port(), allowing authorization bypasses in certain applications. Note that URLs
with invalid, not numeric ports will now return an error from url.Parse.

The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me)
for discovering and reporting this issue.
2019-08-14 15:17:41 +00:00
nia
097ce8f32c rust: Build against non-internal LLVM by default.
This should help with some people's problems with the rust builds being
excessively long, and if we ever run into compatibility problems between
rust's llvm-current and our shipped version it should be easy to switch
on the internal LLVM by default again.

I've been using this for some time with Firefox without problems.

Bump PKGREVISION.
2019-08-14 13:05:25 +00:00