in PLISTs to avoid a conflict with "COMPILER" used in bsd.port.mk,
remove a hackish workaround, and allow COMPILER to be used as intended.
Use COMPILER to build with ports-gcc on !base-clang arches, needed with
-wx on these arches.
ok cwen@
environment, which will reduce complexity in java.port.mk when jdk 11 is
added. direction agreed with kurt@.
- switch all MODJAVA_VER to at least 1.8 (we don't currently have any
version earlier than this anyway).
- drop MODJAVA_JRERUN, the separate jre package will be going away with
jdk 11.
- bump changed ports
With this all the python ports using pytest do not need to setup their
own do-test taret. Instead "MODPY_PYTEST = Yes" does the job.
from Kurt Mosiejczuk
ok kn@
If needed this allows to overwrite it.
I looks like python preferes C.UTF-8. But Ingo pointed out that on
OpenBSD en_US.UTF-8 is prefered and the former is just a link to the later.
from Kurt Mosiejczuk
ok sthen@
CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
Fixes the following vulnerabilities in rubygems:
CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
Fixes the following vulnerabilities in rubygems:
CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in verbose
CVE-2019-8322: Escape sequence injection vulnerability in gem owner
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors