some existing COMPILER lines with arch restrictions etc. In the usual
case this is now using "COMPILER = base-clang ports-gcc base-gcc" on
ports with c++ libraries in WANTLIB.
This is basically intended to be a noop on architectures using clang
as the system compiler, but help with other architectures where we
currently have many ports knocked out due to building with an unsuitable
compiler -
- some ports require c++11/newer so the GCC version in base that is used
on these archirtectures is too old.
- some ports have conflicts where an executable is built with one compiler
(e.g. gcc from base) but a library dependency is built with a different
one (e.g. gcc from ports), resulted in mixing incompatible libraries in the
same address space.
devel/gmp is intentionally skipped as it's on the path to building gcc -
the c++ library there is unused in ports (and not built by default upstream)
so intending to disable building gmpcxx in a future commit.
a new libmysqlclient non-blocking API which utilizes co-routines. The X86
specific GCC ASM co-routine support hid the fact that there was an issue.
The only fallback code so far is POSIX user contexts which OpenBSD does not
support.
Input from and Ok sthen@ jasper@
http://jabberstudio.org/projects/jabberd2/releases/view.php?id=826
* Sending a stanza before an stanza during a SASL negotiation can
cause a c2s segfault. Leading to a remote DoS
http://jabberstudio.org/projects/jabberd2/releases/view.php?id=802
* fixed SASL anonymous, bug#126
* fixed edge cases with new dynamic jid code
* fixed incorrect free order in c2s, byg#125
* corrected debug logging, bug#119
* fixed s2s bus error on 64-bit architectures, bug#122
* fixed c2s collisions due to long jids, bug#118
* fixed error response to iq result, bug#110
* fixed roster pushing packets without id, bug#73
* applied new dynamic jid patch, bug#100
* fixed double free of nad in c2s and s2s, bug#97
* major memory enhancement, made jid structure dynamically allocated, bug#100
* fixed glibc error with custom sql statements, bug#106
* fixed segfault with keepalives, bug#102
From: maintainer Gerardo Santana Gomez Garrido
Fix a buffer overflow that could be used to perform a DoS attack
and possible code execution.
From: Gerardo Santana Gomez Garrido <santana@openbsd.org.mx>