The OpenJDK SDK software includes tools useful for developing and
testing programs written in the Java programming language and
running on the Java platform.
okay ian@ looks good sthen@
Sharness is a portable shell library to write, run, and analyze
automated tests for Unix programs. Since all tests output TAP,
the Test Anything Protocol, they can be run with any TAP harness.
Comment:
UDisks2 service implementation for OpenBSD
Description:
A UDisks2 service implementation for OpenBSD forked from FreeBSD
(bsdutils/bsdisks).
OpenBSDisks2 provides a simple DBus org.freedesktop.UDisks2 service.
It only provides readable properties for the UDisks2.Drive,
UDisks2.Block and UDisks2.Filesystem interfaces.
UDisks2 is an abstraction for enumerating disk and storage devices and
performing operations on them.
Maintainer: Rafael Sadowski <rsadowski@openbsd.org>
WWW: https://github.com/sizeofvoid/openbsdisks2
Test, feedack and OK namn@
Use OpenSSL 1.1.1 code path that uses SSL_CTX_up_ref() instead of
handrolling it. This way mosquitto will continue to build after
an upcoming libssl bump.
===> Faking installation for qemu-6.0.0
env: bash: No such file or directory
env: bash: No such file or directory
env: bash: No such file or directory
env: bash: No such file or directory
(GIT="git" "/pobj/qemu-6.0.0/qemu-6.0.0/scripts/git-submodule.sh" ignore )
env: bash: No such file or directory
Remove much of the patching to force the OpenSSL 1.0.x code path.
This way the code uses accessors and will continue building when
we switch some structs in libssl to opaque.
This adds and removes some symbols in wkhtmltox, so bump major.
ok Frank Groeneveld (maintainer)
Remove two #if defined(LIBRESSL_VERSION_NUMBER) to take the OpenSSL 1.1.1
code path. This way swi-prolog will continue building once we will have
made some structs opaque in libssl.
ok edd (maintainer)
Fixes many issues reported (with fixes) last year by Qualys, details will be
available later at https://www.qualys.com/2021/05/04/21nails/21nails.txt
Local vulnerabilities
- CVE-2020-28007: Link attack in Exim's log directory
- CVE-2020-28008: Assorted attacks in Exim's spool directory
- CVE-2020-28014: Arbitrary PID file creation
- CVE-2020-28011: Heap buffer overflow in queue_run()
- CVE-2020-28010: Heap out-of-bounds write in main()
- CVE-2020-28013: Heap buffer overflow in parse_fix_phrase()
- CVE-2020-28016: Heap out-of-bounds write in parse_fix_phrase()
- CVE-2020-28015: New-line injection into spool header file (local)
- CVE-2020-28012: Missing close-on-exec flag for privileged pipe
- CVE-2020-28009: Integer overflow in get_stdinput()
Remote vulnerabilities
- CVE-2020-28017: Integer overflow in receive_add_recipient()
- CVE-2020-28020: Integer overflow in receive_msg()
- CVE-2020-28023: Out-of-bounds read in smtp_setup_msg()
- CVE-2020-28021: New-line injection into spool header file (remote)
- CVE-2020-28022: Heap out-of-bounds read and write in extract_option()
- CVE-2020-28026: Line truncation and injection in spool_read_header()
- CVE-2020-28019: Failure to reset function pointer after BDAT error
- CVE-2020-28024: Heap buffer underflow in smtp_ungetc()
- CVE-2020-28018: Use-after-free in tls-openssl.c
- CVE-2020-28025: Heap out-of-bounds read in pdkim_finish_bodyhash()
The following modules are currently available:
- qttranslations
- qttools
- qtsvg
- qtshadertools
- qtquicktimeline
- qtquickcontrols2
- qtquick3d
- qtdeclarative
- qtbase
- qt5compat
- qtwayland (not ported, depends on wayland)
- qtdoc (not ported, is not worth the effort)
Further modules will follow in later Qt versions. Some patches come form
x11/qt5. With tb@'s help, I married QtBase with LibreSSL again. We are now on
our own again as Gentoo no longer follows this path. From the port perspective,
I have decided on the following points:
- Prefix all Qt6 ports with qt6-*.
- Rename all imported qt tools with the -qt6 suffix like we do with qt5.
This makes it easier to use several versions at the same time.
- x11/qt6 is based on x11/qt5. I have tried to make many things simpler
and cleaner.
- Qt6 switched to cmake as build system and needs help with *FLAGS.
OK landry, Merci!