Commit graph

307928 commits

Author SHA1 Message Date
joerg
d9b06a8ec6 Don't depend on TRUE/FALSE, they are gone in newer PostgreSQL. 2019-12-19 22:11:27 +00:00
joerg
ff0e5aca41 Requires C++03 to build. 2019-12-19 22:10:35 +00:00
joerg
180cc7220d Uses old Python syntax. 2019-12-19 22:10:10 +00:00
joerg
19744bb61b Don't buildlink py-dbus, it might not even be the correct version. 2019-12-19 22:09:49 +00:00
markd
0ec0a39163 gns3-gui: fix permissions of installed files 2019-12-19 21:22:02 +00:00
markd
58d345caec gns3-server: fix install for python != 3.7.
Also fix permissions of installed files
2019-12-19 21:19:43 +00:00
markd
afc7a68db9 ns: modern compilers fussy about unsigned char 2019-12-19 21:15:39 +00:00
markd
53c63fc8ce nam: modern compilers fussy about unsigned char 2019-12-19 21:14:02 +00:00
kim
061cab795f Don't touch RLIMIT_STACK for now, see https://gnats.netbsd.org/51158 2019-12-19 16:59:44 +00:00
tron
018f762f62 Note update of the "mutt" package to version 1.13.2 2019-12-19 15:45:03 +00:00
tron
27fd2804ee mutt: Update to version 1.13.2
Changes since version 1.13.1:
! Bug fix release.

Update during freeze approved by gdt@
2019-12-19 15:44:40 +00:00
rhialto
bb96c80a6b doc: Updated games/nethack to 3.6.4 2019-12-19 14:42:22 +00:00
rhialto
d8d2624fa0 games/nethack: security update to 3.6.4.
https://www.nethack.org/security/index.html:

NetHack: Privilege escalation/remote code execution/crash in
configuration parsing

Severity: High
Affected versions: 3.6.0, 3.6.1, 3.6.2, 3.6.3
First Patched Version: 3.6.4

Basic Information:
A buffer overflow issue exists when reading very long lines from a
NetHack configuration file (usually named .nethackrc).

This vulnerability affects systems that have NetHack installed suid/sgid
and shared systems that allow users to upload their own configuration
files.

All users are urged to upgrade to NetHack 3.6.4 as soon as possible.

Additional information related to this advisory, if any, will be made
available at https://nethack.org/security.
2019-12-19 14:41:59 +00:00
adam
2c0217ce69 Updated www/py-django, www/py-django2 2019-12-19 13:40:53 +00:00
adam
2c1ed8c30a py-django2: updated to 2.2.9
Django 2.2.9 fixes a security issue and a data loss bug in 2.2.8.

CVE-2019-19844: Potential account hijack via password reset form

By submitting a suitably crafted email address making use of Unicode characters, that compared equal to an existing user email when lower-cased for comparison, an attacker could be sent a password reset token for the matched account.

In order to avoid this vulnerability, password reset requests now compare the submitted email using the stricter, recommended algorithm for case-insensitive comparison of two identifiers from Unicode Technical Report 36, section 2.11.2(B)(2). Upon a match, the email containing the reset token will be sent to the email address on record rather than the submitted address.

Bugfixes
* Fixed a data loss possibility in SplitArrayField. When using with ArrayField(BooleanField()), all values after the first True value were marked as checked instead of preserving passed values
2019-12-19 13:40:36 +00:00
adam
c3ffce2407 py-django: updated to 1.11.27
Django 1.11.27 fixes a security issue and a data loss bug in 1.11.26.

CVE-2019-19844: Potential account hijack via password reset form

By submitting a suitably crafted email address making use of Unicode characters, that compared equal to an existing user email when lower-cased for comparison, an attacker could be sent a password reset token for the matched account.

In order to avoid this vulnerability, password reset requests now compare the submitted email using the stricter, recommended algorithm for case-insensitive comparison of two identifiers from Unicode Technical Report 36, section 2.11.2(B)(2). Upon a match, the email containing the reset token will be sent to the email address on record rather than the submitted address.

Bugfixes
* Fixed a data loss possibility in SplitArrayField. When using with ArrayField(BooleanField()), all values after the first True value were marked as checked instead of preserving passed values
2019-12-19 13:39:50 +00:00
nros
dc6e34576d Fix patch or sys/loadavg.h
The patch for including sys/loadavg.h included the file in the section where
getloadavg isn't used so the patch did nothing. Include it in the right
place to fix it.
2019-12-19 12:52:28 +00:00
jperkin
e30f99bbe9 grep: Avoid conflict with sys/limits.h guard. 2019-12-19 09:36:33 +00:00
taca
b8b5b50987 devel/py-importlib-metadata: fix files' permission
Fix file's permission to pass build under CHECK_PERMS is yes, i.e.
PKG_DEVELOPER is on.

Distfile of importlib-metadata 0.23, 1.1.0, 1.2.0 and 1.3.0 are contains
world writable permission of files.

Adam, why did you remove post-extract part?
2019-12-19 01:12:59 +00:00
taca
4ca5c31791 doc: update drupal packages
www/drupal7	7.69
	www/drupal8	8.7.11
2019-12-19 00:40:21 +00:00
taca
e2e65320b0 www/drupal8: update to 8.7.11
Update durpal8 to 8.7.11, security release.


8.7.11	(2019-12-18)

Release notes

Maintenance and security release of the Drupal 8 series.

This release fixes security vulnerabilities.  Sites are urged to upgrade
immediately after reading the notes below and the security announcement.
2019-12-19 00:39:29 +00:00
taca
21c62bd390 www/drupal7: update to 7.69
Update drupal7 to 7.69, security release.


7.69 (2019-12-18)

Release notes

Maintenance and security release of the Drupal 7 series.

This release fixes security vulnerabilities. Sites are urged to upgrade
immediately after reading the notes below and the security announcement.
2019-12-19 00:38:39 +00:00
kim
4f18f8f89c Fix setrlimit(3): Invalid argument
The new code that unlimits many resources appears to have been problematic
on a number of fronts. Fetched the current version of src/limits.c from
the sudo hg repo. RLIMIT_STACK (i.e. "3") is no longer set to RLIM_INFINITY.

Added code to output the name of the limit instead of its number.
2019-12-18 15:56:10 +00:00
joerg
176c884715 py-django != py-djangorestframework 2019-12-18 15:43:44 +00:00
tsutsui
c928985d1a doc: Updated graphics/libsixel to 1.8.3 2019-12-18 14:02:25 +00:00
tsutsui
a035867f07 libsixel: update to 1.8.3. (security fixes)
Upstream changes:

v1.8.3
* Security fix for CVE-2018-19757 (#79), NULL pointer dereference problem,
  reported by @nluedtke and fixed by @knok (#91, #94).

* Security fix for CVE-2018-19762 (#81), heap-based buffer overflow problem,
  reported by @nluedtke and fixed by @knok (#92).

* Security fix for CVE-2018-19756 (#80), heap-based buffer over-read problem,
  reported by @nluedtke and fixed by @knok (#93).

* Security fix for CVE-2018-19763 (#82), heap-based buffer over-read problem,
  reported by @nluedtke and fixed by @knok (#95).

* Security fix for CVE-2018-19761, illegal address access, fixed by @knok (#96).

* Security fix for CVE-2018-19759, heap-based buffer over-read problem, fixed by @knok (#98).

* Security fix for CVE-2018-3753 (#83), infinite loop problem,
  reported by @cool-tomato and fixed by @knok (#99).

* Security fix for CVE-2018-19759 (#102),
  heap-based buffer over-read that will cause a denial of service.
  reported and fixed by @YourButterfly. (#106)

* Security fix for CVE-2019-19635 (#103), heap-based buffer overflow,
  reported and fixed by @YourButterfly. (#106)

* Security fix for CVE-2019-19636 (#104) and CVE-2019-19637 (#105), integer overflow problem.
  reported and fixed by @YourButterfly. (#106)

* gif loader: check LZW code size (Issue #75), Thanks to @HongxuChen.
              7808a06b88

* core: Fix a global-buffer-overflow problem (Issue #72), Thanks to @fgeek.
        c868b59ec8

* core: Fix unexpected hangs/performance issues (Issue #76), Thanks to @HongxuChen.
        88561b7a81
        2d3d9ffe8a
        c9363cd1d5
2019-12-18 14:02:10 +00:00
wiz
54b977a56e doc: Updated mail/neomutt to 20191129 2019-12-18 13:48:19 +00:00
wiz
b691bb6c8a neomutt: update to 20191129.
Leaf package.

2019-11-29  Richard Russon  <rich@flatcap.org>
* Features
  - Add raw mailsize expando (%cr)
* Bug Fixes
  - Avoid double question marks in bounce confirmation msg
  - Fix bounce confirmation
  - fix new-mail flags and behaviour
  - fix: browser <descend-directory>
  - fix ssl crash
  - fix move to trash
  - fix flickering
  - Do not check hidden mailboxes for new mail
  - Fix new_mail_command notifications
  - fix crash in examine_mailboxes()
  - fix crash in mutt_sort_threads()
  - fix: crash after sending
  - Fix crash in tunnel's conn_close
  - fix fcc for deep dirs
  - imap: fix crash when new mail arrives
  - fix colour 'quoted9'
  - quieten messages on exit
  - fix: crash after failed mbox_check
  - browser: default to a file/dir view when attaching a file
* Changed Config
  - Change $write_bcc to default off
* Translations
  - 100% Portuguese (Brazil)
  -  92% Polish
* Docs
  - Add a bit more documentation about sending
  - Clarify $write_bcc documentation.
  - Update documentation for raw size expando
  - docbook: set generate.consistent.ids to make generated html reproducible
* Build
  - fix build/tests for 32-bit arches
  - tests: fix test that would fail soon
  - tests: fix context for failing idna tests
2019-12-18 13:47:58 +00:00
bouyer
8ff78ecc65 Disable opengl for qemu-xen, to workaround an issue with epoxy and newer
x11-links
http://mail-index.netbsd.org/tech-pkg/2019/11/02/msg022228.html
2019-12-18 13:37:39 +00:00
gdt
c38919e798 doc: fix typo in frozen branch name 2019-12-18 13:36:41 +00:00
ryoon
cc43a388eb Close conditional with .endif 2019-12-18 13:14:50 +00:00
wiz
d2c369279b openjdk11: remove MAKE_JOBS_SAFE=no on NetBSD
This workaround didn't help. NetBSD is supposedly fixed now.
2019-12-18 12:59:10 +00:00
mef
c13143c9e2 Updated editors/emacs-snapshot 2019-12-18 12:47:02 +00:00
joerg
f3db7b3cb2 Fix missing dependency. 2019-12-18 12:45:55 +00:00
mef
78317e62ec (editors/emacs-snapshot) Makefile.common is not used for now 2019-12-18 12:44:54 +00:00
joerg
0a73e56fa7 Use external libuv. 2019-12-18 12:44:39 +00:00
joerg
e3a1df21f0 Resolve conflict with STL. 2019-12-18 12:43:40 +00:00
joerg
86841845e2 Fix rpath in DSO, don't test on runtime due to $DESTDIR. 2019-12-18 12:42:04 +00:00
joerg
ec8ee45ae1 Fix build with libc++ having less namespace pollution. 2019-12-18 12:40:22 +00:00
joerg
2a14f3d84e Deal with stricter constness of OpenSSL 1.1. 2019-12-18 12:39:09 +00:00
mef
4638b440b7 (editors/emacs-snapshot) Updated 25.0.x to 27.0.50
- currently almost the same as wip/emacs-git
2019-12-18 12:38:48 +00:00
joerg
a5a024f03e Explicitly depend on libXmu. 2019-12-18 12:38:38 +00:00
joerg
3d03e85b85 Add one more header to the fixup list. 2019-12-18 12:38:13 +00:00
joerg
ee406e3e95 Don't force -latomic unconditionally with clang. 2019-12-18 12:36:51 +00:00
minskim
4017e4a517 devel/py-line_profiler: Fix build with python38
Regenerate .c files with recent Cython.
2019-12-18 04:49:47 +00:00
schmonz
e35c80c83f doc: Updated textproc/libhighlight to 3.54 2019-12-18 01:34:39 +00:00
schmonz
ec99145862 Update to 3.54 (during the freeze, for the bugfixes). From the changelog:
- fixed default colour output in BBCode
  (https://gitlab.com/saalen/highlight/issues/134)
- fixed corner case in sh.lang
- fixed syntax tests with UTF-8 input
  (https://gitlab.com/saalen/highlight/issues/123)
- added support for Bash in outhtml_codefold.lua plug-in
- added ballerina.lang
- added block strings to java.lang
- added author hints in themes and language definitions
- added C++20 reserved words in c.lang
- added editorconfig file and validated all files accordingly (thanks to
  Tristano Ajmone)
- CLI: fixed `--list-scripts` with `-d` or HIGHLIGHT_DATADIR env variable
  (https://gitlab.com/saalen/highlight/issues/139)
- GUI W32: replaced multibyte path trace window by startup hint if
  NtfsDisable8dot3NameCreation is set
- GUI: removed AsciiDoc instruction lines from the README popup window
2019-12-18 01:34:33 +00:00
minskim
3f49c3be72 textproc/word2vec: Fix a typo in COMMENT 2019-12-18 00:47:22 +00:00
sevan
7a00a3eff8 Update to wtf-20191214
featuring more acronyms since last update
2019-12-17 21:56:25 +00:00
gdt
472299c9bb sysutils/xen: Explain security/recommended status in DESCR 2019-12-17 20:26:04 +00:00