Commit graph

8007 commits

Author SHA1 Message Date
wiz
e54b06d177 Add a comment for MAKE_JOBS_SAFE=no:
# --- ext/date/all ---
# make[2]: make[2]: don't know how to make ../../.ext/common/date. Stop
# make[2]: stopped in .../lang/ruby193-base/work/ruby-1.9.3-p550/ext/date
2014-11-01 01:25:06 +00:00
adam
d719101c50 Changes 8.6.2:
This is a bug-fix release.
2014-10-31 21:11:18 +00:00
ryoon
e470b7e219 Restore monolithic gcc48 and gcc48-libs.
* No objection on tech-pkg@ mailing list.
2014-10-31 14:22:20 +00:00
prlw1
9dcd3fc00c Rename vala to vala012 2014-10-29 09:18:50 +00:00
wiz
3a4035d024 Not MAKE_JOBS_SAFE (two tries with MAKE_JOBS=8 failed for me in a row). 2014-10-28 07:48:19 +00:00
drochner
1c9accd607 apply patch from upstream to fix possible overflow in "buffer"
object accesses (CVE-2014-7185)
bump PKGREV
2014-10-27 20:11:34 +00:00
taca
acdcfdb23f Update ruby21/ruby21-base package to 2.1.4.
Ruby 2.1.4 is released

Ruby 2.1.4 has been released.

This release includes security fixes for the following vulnerabilities:

    * CVE-2014-8080: Denial Of Service XML Expansion
    * Changed default settings of ext/openssl related to CVE-2014-3566

And there are some bug-fixes.

See tickets and ChangeLog for details.


Ruby 2.1.3 Released

We are pleased to announce the release of Ruby 2.1.3. This is a patchlevel
release of the stable 2.1 series.

This release contains a change of full GC timing to reduce memory consumption
(see Bug #9607), and many bugfixes.

See tickets and ChangeLog for details.
2014-10-27 16:29:57 +00:00
taca
e7ae34a2cd Update ruby200-base and related packages to 2.0.0-p594 (Ruby 2.0.0-p594).
Ruby 2.0.0-p594 Released

We are pleased to announce the release of Ruby 2.0.0-p594.

This release includes a security fix for DoS vulnerability of REXML.

* CVE-2014-8080: Denial Of Service XML Expansion

This release also includes the change of default settings of
ext/openssl. Insecure SSL/TLS options are now turn off by default.

* Changed default settings of ext/openssl

And, many bug fixes are also included. See tickets and ChangeLog for details.


Ruby 2.0.0-p576 Released

We are pleased to announce the release of Ruby 2.0.0-p576, to celebrate the
holding of RubyKaigi2014 in Japan now.

This release includes many bugfixes, such as:

* many fixes of memory leaks and using extra memory.
* many fixes of platform-specific issues (especially in build process).
* many document fixes.

See tickets and ChangeLog for details.
2014-10-27 16:20:16 +00:00
taca
d94a742394 Update ruby193-base and related packages to 1.9.3p550 (Ruby 1.9.3-p550).
Ruby 1.9.3-p550 Released

We are pleased to announce the release of Ruby 1.9.3-p550.

This release includes a security fix for DoS vulnerability of REXML.

    * CVE-2014-8080: Denial Of Service XML Expansion

This release also includes the change of default settings of
ext/openssl. Insecure SSL/TLS options are now turn off by default.

    * Changed default settings of ext/openssl

And, in addition, bandled jQuery for darkfish template of RDoc is also
updated.
2014-10-27 16:11:17 +00:00
fhajny
4c2149e598 Update nodejs to 0.10.33.
2014.10.20, Version 0.10.33 (Stable)
- openssl: Update to 1.0.1j (Addressing multiple CVEs)
- uv: Update to v0.10.29
- child_process: properly support optional args (cjihrig)
- crypto: Disable autonegotiation for SSLv2/3 by default
  (Fedor Indutny, Timothy J Fontaine, Alexis Campailla)
2014-10-23 22:04:51 +00:00
taca
e8f850cbf3 Add patch for CVE-2014-3668, CVE-2014-3669 and CVE-2014-3670.
Bump PKGREVISION.
2014-10-23 16:18:47 +00:00
alnsn
ca0ebeeb63 Change lua-5.1.pc file to link to -llua5.1. 2014-10-19 22:26:38 +00:00
taca
d163a3afe7 Update to php54 5.4.34.
16 Oct 2014, PHP 5.4.34

- Fileinfo:
  . Fixed bug #66242 (libmagic: don't assume char is signed). (ArdB)

- Core:
  . Fixed bug #67985 (Incorrect last used array index copied to new array after
    unset). (Tjerk)
  . Fixed bug #68044 (Integer overflow in unserialize() (32-bits only)).
    (CVE-2014-3669) (Stas)

- cURL:
  . Fixed bug #68089 (NULL byte injection - cURL lib). (Stas)

- EXIF:
  . Fixed bug #68113 (Heap corruption in exif_thumbnail()). (CVE-2014-3670)
    (Stas)

- OpenSSL:
  . Reverted fixes for bug #41631, due to regressions. (Stas)

- XMLRPC:
  . Fixed bug #68027 (Global buffer overflow in mkgmtime() function).
    (CVE-2014-3668) (Stas)
2014-10-18 14:29:04 +00:00
taca
374708f6d7 Update php55 to 5.5.18.
16 Oct 2014, PHP 5.5.18

- Core:
  . Fixed bug #67985 (Incorrect last used array index copied to new array after
    unset). (Tjerk)
  . Fixed bug #67739 (Windows 8.1/Server 2012 R2 OS build number reported
    as 6.2 (instead of 6.3)). (Christian Wenz)
  . Fixed bug #67633 (A foreach on an array returned from a function not doing
    copy-on-write). (Nikita)
  . Fixed bug #51800 (proc_open on Windows hangs forever). (Anatol)
  . Fixed bug #68044 (Integer overflow in unserialize() (32-bits only)).
    (CVE-2014-3669) (Stas)

- cURL:
  . Fixed bug #68089 (NULL byte injection - cURL lib). (Stas)

- EXIF:
  . Fixed bug #68113 (Heap corruption in exif_thumbnail()). (CVE-2014-3670)
    (Stas)

- FPM:
  . Fixed bug #65641 (PHP-FPM incorrectly defines the SCRIPT_NAME variable
    when using Apache, mod_proxy-fcgi and ProxyPass). (Remi)

- OpenSSL:
  . Revert regression introduced by fix of bug #41631

- Reflection:
  . Fixed bug #68103 (Duplicate entry in Reflection for class alias). (Remi)

- Session:
  . Fixed bug #67972 (SessionHandler Invalid memory read create_sid()). (Adam)

- XMLRPC:
  . Fixed bug #68027 (Global buffer overflow in mkgmtime() function).
    (CVE-2014-3668) (Stas)
2014-10-18 14:27:30 +00:00
taca
94055a59ae Update included pear Archive_Tar package to 1.3.13.
Release date: 2014-09-03 22:08 UTC
Release state: stable

Changelog:

* Fix Bug #20382: gzopen fix [mrook]


Bump PKGREVISION.
2014-10-14 16:27:48 +00:00
taca
0098c131eb clang 3.5 needs gcc 4.7 and later when build with gcc. 2014-10-14 16:26:00 +00:00
joerg
f4b5b6b151 Deal with systems providing execvpe. 2014-10-14 14:04:19 +00:00
jaapb
cae4bb438a Extra patch - syntactical change only, but needed for x11/ocaml-graphics 2014-10-13 13:24:45 +00:00
wiz
80ca574991 Update to 1.3.3:
go1.3.3 (released 2014/09/30) includes further bug fixes to cgo,
the runtime package, and the nacl port.
2014-10-12 14:51:03 +00:00
khorben
360914d754 Also look for the right path for the SSL certificate repository on NetBSD.
Fixes "go get code.google.com/p/..." for me, once security/mozilla-rootcerts
installed and configured (with the default settings).

Bumps PKGREVISION, since the package is modified.

ok bsiegert@
2014-10-11 16:41:47 +00:00
jaapb
f130e82ddf Changed package dependencies to reflect lablgtk name change. 2014-10-10 08:39:08 +00:00
jaapb
4c03ebf068 Revbump because of ocaml 4.02, added compilation patch (already in
repository upstream) and updated package to use ocaml.mk framework.
2014-10-09 22:19:01 +00:00
jaapb
6e2aeb9653 Updated package to latest version, 6.12. Package uses ocaml.mk.
Minor fixes for compatibility with ocaml 4.02.
2014-10-09 21:42:03 +00:00
jaapb
2962d3f252 Added camlp4 to SUBDIR 2014-10-09 20:40:47 +00:00
jaapb
3c35fdb3bf Re-added package lang/camlp4 - it was split off from the main ocaml
distribution in version 4.02.
2014-10-09 20:39:27 +00:00
jaapb
1e2c6eff15 Revbump for ocaml 4.02.0.
(Some packages omitted because they will be updated to new versions)
2014-10-09 19:14:03 +00:00
jaapb
b3f84848fb Update to ocaml 4.02.0. Main changes (apart from ocamldoc and bugfixes, see
also upstream changelog):
Language features:
- Attributes and extension nodes
- Generative functors
- Module aliases
* Alternative syntax for string literals {id|...|id} (can break comments)
- Separation between read-only strings (type string) and read-write byte
  sequences (type bytes). Activated by command-line option -safe-string.
Build system for the OCaml distribution:
- Use -bin-annot when building.
- Use GNU make instead of portable makefiles.
- Updated build instructions for 32-bit Mac OS X on Intel hardware.
Shedding weight:
* Removed Camlp4 from the distribution, now available as third-party software.
* Removed Labltk from the distribution, now available as a third-party library.
Type system:
* Keep typing of pattern cases independent in principal mode
- Allow opening a first-class module or applying a generative functor
  in the body of a generative functor. Allow it also in the body of
  an applicative functor if no types are created
* Module aliases are now typed in a specific way, which remembers their
  identity. In particular this changes the signature inferred by
  "module type of"
- Slight change in the criterion to distinguish private
  abbreviations and private row types: create a private abbreviation for
  closed objects and fixed polymorphic variants.
* Compare first class module types structurally rather than
  nominally. Value subtyping allows module subtyping as long as the internal
  representation is unchanged.
Compilers:
- More aggressive constant propagation, including float and
  int32/int64/nativeint arithmetic.  Constant propagation for floats
  can be turned off with option -no-float-const-prop, for codes that
  change FP rounding modes at run-time.
- New back-end optimization pass: common subexpression elimination (CSE).
  (Reuses results of previous computations instead of recomputing them.)
- New back-end optimization pass: dead code elimination.
  (Removes arithmetic and load instructions whose results are unused.)
- Optimization of sequences of string patterns
- Experimental native code generator for AArch64 (ARM 64 bits)
- Optimization of integer division and modulus by constant divisors
- Add "-open" command line flag for opening a single module before typing
* "-o" now sets module name to the output file name up to the first "."
  (it also applies when "-o" is not given, i.e. the module name is then
   the input file name up to the first ".")
* better sharing of structured constants
- new flag to keep locations in cmi files
- issue warning 3 when referring to a value marked with
  the [@@ocaml.deprecated] attribute
- a new format implementation based on GADTs
* Constant exception constructors no longer allocate
- avoid unnecessary boxing in let
- Better compilation of optional arguments with default values
- ocamlopt -opaque option for incremental native compilation
Toplevel interactive system:
- New "#show_*" directives
Runtime system:
- New configure option "-no-naked-pointers" to improve performance by
  avoiding page table tests during block darkening and the marking phase
  of the major GC.  In this mode, all out-of-heap pointers must point at
  things that look like OCaml values: in particular they must have a valid
  header.  The colour of said headers should be black.
- Fixed bug in native code version of [caml_raise_with_string] that could
  potentially lead to heap corruption.
- Blocks initialized by [CAMLlocal*] and [caml_alloc] are now filled with
  [Val_unit] rather than zero.
- Fixed a major performance problem on large heaps (~1GB) by making heap
  increments proportional to heap size by default
- Structural equality treats exception specifically
- efficient comparison/indexing of exceptions
- avoid using unsafe C library functions (strcpy, strcat, sprintf)
- An ISO C99-compliant C compiler and standard library is now assumed.
  (Plus special exceptions for MSVC.)  In particular, emulation code for
  64-bit integer arithmetic was removed, the C compiler must support a
  64-bit integer type.
Standard library:
* Add new modules Bytes and BytesLabels for mutable byte sequences.
- add List.sort_uniq and Set.of_list
- a faster version of "raise" which does not maintain the backtrace
- support "Unix.kill pid Sys.sigkill" under Windows
- speed improvement for Buffer
- efficient creation of uninitialized float arrays
- Improve documentation regarding finalisers and multithreading
- Trigger warning 3 for all values marked as deprecated in the documentation.
2014-10-09 19:08:28 +00:00
wiz
a85c5da6f1 Remove pkgviews: don't set PKG_INSTALLATION_TYPES in mk files. 2014-10-09 14:09:23 +00:00
wiz
cda18437be Remove pkgviews: don't set PKG_INSTALLATION_TYPES in Makefiles. 2014-10-09 14:05:50 +00:00
wiz
0bf1e512bd Remove another unneeded patch after update. 2014-10-09 09:32:39 +00:00
adam
0fe0ffa0c4 Python 3.4.2 has many bugfixes and other small improvements over 3.4.1. One new feature for Mac OS X users: the OS X installers are now distributed as signed installer package files compatible with the OS X Gatekeeper security feature. 2014-10-09 09:15:38 +00:00
ryoon
7ca7147014 Update to 7.0.67
Changelog:
7.0.67: http://www.oracle.com/technetwork/java/javase/7u67-relnotes-2251330.html
Bug Fixes

The following bug fix is included in this release:

Area: deploy/plugin
Synopsis: regression - java_arguments not accepted after update to 7u65

The regression is addressed in this release.

See 8050875.


7.0.65: http://www.oracle.com/technetwork/java/javase/7u65-relnotes-2229169.html
IANA Data 2014c

JDK 7u65 contains IANA time zone data version 2014c. For more information, refer to Timezone Data Versions in the JRE Software.

New Features and Changes

New Java Control Panel option to disable sponsors

Currently, to disable sponsor offers at the time of installation, the user can de-select the option during installation or can pass SPONSORS=0 as a commandline option.

In this release, a new Java Control Panel(JCP) option to disable sponsors is available. To use this option, go to JCP's "Advanced" tab, and check or uncheck "Suppress sponsor offers when updating Java".

This option is applicable to 32 and 64 bit Windows operating systems.
New JAXP processing limit property - maxElementDepth

A new property, maxElementDepth, is added to provide applications the ability to set limit on maximum element depth in an xml file that they parse. This may be helpful for applications that may use too much resources when processing an xml file with excessive element depth.

    Name: http://java.sun.com/xml/jaxp/properties/maxElementDepth
    Definition: Limit the maximum element depth
    Value: A positive integer. 0 is treated as no limit. Negative numbers are treated as 0.
    Defaule value: 0
    System property: jdk.xml.maxElementDepth

For more details, see Processing Limits from JAXP tutorial trail.

See 8031541 (not public).
Bug Fixes

This release contains fixes for security vulnerabilities. For more information, see Oracle Critical Patch Update Advisory.

For a list of bug fixes included in this release, see JDK 7u65 Bug Fixes page.

The following are some of the notable bug fixes in this release:

Area: client-libs/AWT
Synopsis: Using RMI from a restricted environment may cause a NullPointerException.

If an application uses RMI and runs in a restricted environment (ie. Java Plugin, Java Web Start), it may not work. In particular, if you run a UI from an RMI callback, a NullPointerException is likely to be thrown.

See 8019274.

Area: other-libs/corba
Synopsis: org.omg.CORBA.ORBSingletonClass loading no longer uses context class loader

The system property org.omg.CORBA.ORBSingletonClass is used to configure the system-wide/singleton ORB. The handling of this system property was changed in the 7u55 release to require that the system wide/singleton ORB be visible to the system class loader.

In this release, the handling of this system property has been reverted to match the behavior found in JDK versions prior to 7u55 release, i.e. the singleton ORB is once again located using the thread context class loader of the first thread, to call the no-argument ORB.init method. The change is made to support applications which depend on this behavior.

Note that this change is applicable to 8u20, 7u65, 6u85 and 5.0u75 releases. For JDK 9, the new behavior, where the system wide/singleton ORB needs to be visible to the system class loader, will continue.

See 8046603.
Known Issues

Area: xml/jax-ws
Synopsis: JAF initialization in SAAJ clashing with the one in javax.mail

After initialization of SAAJ components, the javax.mail library may fail to work under certain circumstances, which in turn could break the javax.mail's JAF setup.

A possible workaround is to re-add the javax.mail handler before using javax.mail API:
MailcapCommandMap mailMap = (MailcapCommandMap) CommandMap.getDefaultCommandMap();
mailMap.addMailcap("multipart/mixed;;x-java-content-handler=com.sun.mail.handlers.multipart_mixed");

See 8043129.
2014-10-07 18:07:07 +00:00
adam
243c29c4cc Revbump after updating libwebp and icu 2014-10-07 16:47:10 +00:00
wiz
8b765c474f Fix ``Please add a line "# used by foo/bar/Makefile" here.'' warnings. 2014-10-05 16:41:05 +00:00
joerg
4e503f1689 Two more cases for serialized GC and memory limits. 2014-10-04 22:47:32 +00:00
taca
70859bda54 Fix typo in comment in a patch file. 2014-10-02 08:59:26 +00:00
taca
a1f3100ee5 Fix typo in comment in a patch file. 2014-10-02 08:50:12 +00:00
wiz
ce32265c0e Add option for installing the static analyzer.
Default off since it depends on perl AND python.
2014-10-01 09:41:02 +00:00
adam
9710448feb Perl 5.20.1 has been released, this is the latest stable version of Perl.
Changes include performance enhancements and various bug fixes.

Perl 5.20.1 represents approximately 4 months of development since Perl 5.20.0 and contains approximately 12,000 lines of changes across 170 files from 36 authors.
2014-10-01 07:17:02 +00:00
taca
7f32b2ad60 Add fix for CVS-2014-4975 as ruby200-base and ruby21-base.
Bump PKGREVISION.
2014-09-30 10:40:08 +00:00
taca
1c9a0fda95 Update to php54 to 5.4.33, aprroved by wiz@.
18 Sep 2014, PHP 5.4.33

- Core:
  . Fixed bug #47358 (glob returns error, should be empty array()). (Pierre)
  . Fixed bug #65463 (SIGSEGV during zend_shutdown()). (Keyur Govande)
  . Fixed bug #66036 (Crash on SIGTERM in apache process). (Keyur Govande)

- OpenSSL:
  . Fixed bug #41631 (socket timeouts not honored in blocking SSL reads).
    (Daniel Lowrey)

- Date:
  . Fixed bug #66091 (memory leaks in DateTime constructor). (Tjerk)

- FPM:
  . Fixed #67606 (FPM with mod_fastcgi/apache2.4 is broken). (David Zuelke)

- GD:
  . Made fontFetch's path parser thread-safe. (Sara)

- Wddx:
  . Fixed bug #67873 (Segfaults in php_wddx_serialize_var). (Anatol, Remi)

- Zlib:
  . Fixed bug #67724 (chained zlib filters silently fail with large amounts of
    data). (Mike)
  . Fixed bug #67865 (internal corruption phar error). (Mike)
2014-09-30 08:16:10 +00:00
taca
47421e2dcc Update php55 to 5.5.17, approved by wiz@.
18 Sep 2014, PHP 5.5.17

- Core:
  . Fixed bug #47358 (glob returns error, should be empty array()). (Pierre)
  . Fixed bug #65463 (SIGSEGV during zend_shutdown()). (Keyur Govande)
  . Fixed bug #66036 (Crash on SIGTERM in apache process). (Keyur Govande)
  . Fixed bug #67878 (program_prefix not honoured in man pages). (Remi)

- COM:
  . Fixed bug #41577 (DOTNET is successful once per server run)
    (Aidas Kasparas)

- FPM:
  . Fixed #67606 (FPM with mod_fastcgi/apache2.4 is broken). (David Zuelke)

- OpenSSL:
  . Fixed bug #41631 (socket timeouts not honored in blocking SSL reads).
    (Daniel Lowrey)
  . Fixed bug #67850 (extension won't build if openssl compiled without SSLv3)
    (Daniel Lowrey)

- SPL:
  . Fixed bug #67813 (CachingIterator::__construct InvalidArgumentException
    wrong message). (tim_siebels_aurich at yahoo dot de)

- Date:
  . Fixed bug #66091 (memory leaks in DateTime constructor). (Tjerk)
  . Fixed bug #66985 (Some timezones are no longer valid in PHP 5.5.10).
    (Derick)
  . Fixed bug #67109 (First uppercase letter breaks date string parsing).
    (Derick)

- GD
  . Made fontFetch's path parser thread-safe. (Sara).

- MySQLi:
  . Fixed bug #67839 (mysqli does not handle 4-byte floats correctly). (Keyur)

- Zlib:
  . Fixed bug #67724 (chained zlib filters silently fail with large amounts of
    data). (Mike)
  . Fixed bug #67865 (internal corruption phar error). Mike
2014-09-30 08:14:25 +00:00
spz
22fb374174 Minimally invasive fix for CVE-2014-4330, also known as
https://www.lsexperts.de/advisories/lse-2014-06-10.txt,
a stack overflow vulnerability in Data::Dumper

Patches taken from
http://perl5.git.perl.org/perl.git/commitdiff/19be3be6968e2337bcdfe480693fff795ecd1304,
to be removed when updating to 5.20.1 (or later).

perl-5.20.0nb2 is fit for pkg_add -u replacement of perl-5.20.0nb1
2014-09-29 11:36:01 +00:00
asau
d740bbabb1 Make compiler wrapper add RPATH. 2014-09-29 00:55:00 +00:00
obache
b5a09e7a76 just for fun to modularize uim package, but that's all, useless for me. 2014-09-28 03:18:07 +00:00
wiz
d6bad2788b Update to 1.3.2 for a security fix:
We've just released Go version 1.3.2, a minor point release.

This release includes bug fixes to cgo and the crypto/tls package.
    https://golang.org/doc/devel/release.html#go1.3.minor

The crpyto/tls fix addresses a security bug that affects programs
that use crypto/tls to implement a TLS server from Go 1.1 onwards.
If the server enables TLS client authentication using certificates
(this is rare) and explicitly sets SessionTicketsDisabled to true
in the tls.Config, then a malicious client can falsely assert
ownership of any client certificate it wishes. This issue was
discovered internally and there is no evidence of exploitation.
2014-09-26 13:54:28 +00:00
obache
b6ca189b04 current bootstrap binary kit for SmartOS is built with ncurses5 2014-09-26 07:00:50 +00:00
jperkin
4006b7dde4 Don't define _XOPEN_SOURCE to a bogus value on SunOS. 2014-09-25 12:55:52 +00:00
jperkin
ed36357eb7 Remove NOT_FOR_BULK_PLATFORM for SunOS, it builds in under 10 minutes
on modern hardware.
2014-09-25 09:32:38 +00:00
jperkin
60eb65a9a5 Remove NOT_FOR_BULK_PLATFORM, builds fine for me. 2014-09-24 23:31:36 +00:00