Add patches to a few ports to build with ruby 3.0, mostly -fdeclspec to
CFLAGS or CXXFLAGS.
Bump ports where the default version change causes a package change.
OK kmos@
Use _setjmp by default to use the setjmp xor cookie.
This was already done for powerpc and powerpc64 to work around a
segfault, but it seems to be a good practice on all arches.
ok gkoehler@
clang-11's __builtin_setjmp is broken, has chance of SIGSEGV during
"make build" on powerpc with ld.lld, or when passing a wrong option
(like "ruby -e" with no -e code) on powerpc64.
ok jeremy@ (maintainer)
* Disable the peephole optimizer on mips64 to avoid occasional crashes.
* Ensure sufficient alignment of builtin bytecode arrays so that
compiler.c can cast and access the data through struct ibf_header
without crashing (OpenBSD/mips64 requires strict alignment).
OK jeremy@
This comes from the Ruby fiber maintainer. It doesn't require compiling a
couple files without optimization, and it was able to get through a make
test run without crashing on sparc64, which uses the copy coroutine fiber
implementation.
OK kn@
Also add local patch to compile a couple of fiber-related
files with -O0, as that is also needed to prevent the crash
on sparc64.
Add a second distpatch to fix a regression in 2.7.2 causing
a crash when calling ffi_closure_free.
OK kn@
(which is not) throughout the ports Makefiles.
* Replace find|xargs with find -exec {} +
* Replace -exec {} \; with -exec {} + if applicable.
* Use the -delete operator to remove files and empty directories.
* Combine and tweak some find(1) invocations while here.
ok kn@ rsadowski@ espie@
* CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test
* CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)
* CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch?
* CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick.s Digest access authentication
* CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test
* CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)
* CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch?
* CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick.s Digest access authentication
* CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test
* CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)
* CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch?
* CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick.s Digest access authentication