summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2019-12-19Spell include path correctly, even though it is not actually used.joerg2-4/+4
2019-12-19Needs pkg-config.joerg1-2/+2
2019-12-19Uses Python 2 syntax.joerg1-1/+3
2019-12-19Add missing errno.hjoerg2-1/+14
2019-12-19Package makefile is spelled with lower case m.joerg1-1/+3
2019-12-19Fix compatability with regex restrictions in current Perl. Bumpjoerg3-3/+20
revision.
2019-12-19Deal with bind vs std::bind conflict.joerg3-4/+32
2019-12-19Add missing dependency for lrelease.joerg1-1/+2
2019-12-19Avoid using a non-literal string as format string.joerg2-6/+6
2019-12-19Add missing py-test-runner dependency.joerg1-1/+2
2019-12-19Deal with the kqueue type change in NetBSD.joerg2-1/+25
2019-12-19Force extraction with bsdtar, pax-as-tar leaves around too much garbage.joerg1-1/+3
2019-12-19Uses backtrace(3), so pull in libexecinfo. Add missing network headers.joerg4-2/+27
2019-12-19Don't hardcode /usr/bin/gcc.joerg2-3/+12
2019-12-19Don't install PIC libs to avoid different PLISTs depending on thejoerg6-16/+16
NetBSD version.
2019-12-19PYTHON_VERSIONS_ACCEPTED must be set before including the Pythonjoerg1-3/+3
fragments.
2019-12-19Needs to be build as gnu++03. Doesn't work yet due to PaX mprotectjoerg1-2/+2
restrictions.
2019-12-19Ignore unknown warnings and deprecation attributes with clang.joerg1-3/+3
2019-12-19Fix parallel build.joerg2-1/+17
2019-12-19Needs libXmu, which used to be pulled in by Mesa.joerg1-1/+2
2019-12-19Uses C++ extensions, so go with gnu++03.joerg1-2/+2
2019-12-19When using std::setlocale, also include <clocale> on all systems.joerg2-1/+17
2019-12-19Add missing errno.h. Explicitly load atomic in switch.joerg3-9/+31
2019-12-19Add dependencies formerly pulled in by Mesa.joerg1-1/+3
2019-12-19Add missing <string>.joerg3-1/+27
2019-12-19Fix ctype use.joerg4-3/+40
2019-12-19Add missing bdftopcf dependency.joerg1-2/+2
2019-12-19Add missing dependency on generated files. Build as C++03.joerg3-11/+14
2019-12-19Needs py-test-runner.joerg1-1/+2
2019-12-19Build shared module as PIC. Bump revision.joerg4-2/+31
2019-12-19Needs docbook-xsl.joerg1-1/+2
2019-12-19Don't depend on TRUE/FALSE, they are gone in newer PostgreSQL.joerg2-1/+35
2019-12-19Requires C++03 to build.joerg1-3/+3
2019-12-19Uses old Python syntax.joerg1-1/+3
2019-12-19Don't buildlink py-dbus, it might not even be the correct version.joerg1-2/+1
2019-12-19gns3-gui: fix permissions of installed filesmarkd1-1/+5
2019-12-19gns3-server: fix install for python != 3.7.markd1-3/+8
Also fix permissions of installed files
2019-12-19ns: modern compilers fussy about unsigned charmarkd1-1/+7
2019-12-19nam: modern compilers fussy about unsigned charmarkd1-1/+7
2019-12-19Don't touch RLIMIT_STACK for now, see https://gnats.netbsd.org/51158kim3-10/+13
2019-12-19Note update of the "mutt" package to version 1.13.2tron1-1/+2
2019-12-19mutt: Update to version 1.13.2tron2-7/+7
Changes since version 1.13.1: ! Bug fix release. Update during freeze approved by gdt@
2019-12-19doc: Updated games/nethack to 3.6.4rhialto1-1/+2
2019-12-19games/nethack: security update to 3.6.4.rhialto2-7/+7
https://www.nethack.org/security/index.html: NetHack: Privilege escalation/remote code execution/crash in configuration parsing Severity: High Affected versions: 3.6.0, 3.6.1, 3.6.2, 3.6.3 First Patched Version: 3.6.4 Basic Information: A buffer overflow issue exists when reading very long lines from a NetHack configuration file (usually named .nethackrc). This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files. All users are urged to upgrade to NetHack 3.6.4 as soon as possible. Additional information related to this advisory, if any, will be made available at https://nethack.org/security.
2019-12-19Updated www/py-django, www/py-django2adam1-1/+3
2019-12-19py-django2: updated to 2.2.9adam2-7/+7
Django 2.2.9 fixes a security issue and a data loss bug in 2.2.8. CVE-2019-19844: Potential account hijack via password reset form By submitting a suitably crafted email address making use of Unicode characters, that compared equal to an existing user email when lower-cased for comparison, an attacker could be sent a password reset token for the matched account. In order to avoid this vulnerability, password reset requests now compare the submitted email using the stricter, recommended algorithm for case-insensitive comparison of two identifiers from Unicode Technical Report 36, section 2.11.2(B)(2). Upon a match, the email containing the reset token will be sent to the email address on record rather than the submitted address. Bugfixes * Fixed a data loss possibility in SplitArrayField. When using with ArrayField(BooleanField()), all values after the first True value were marked as checked instead of preserving passed values
2019-12-19py-django: updated to 1.11.27adam2-7/+7
Django 1.11.27 fixes a security issue and a data loss bug in 1.11.26. CVE-2019-19844: Potential account hijack via password reset form By submitting a suitably crafted email address making use of Unicode characters, that compared equal to an existing user email when lower-cased for comparison, an attacker could be sent a password reset token for the matched account. In order to avoid this vulnerability, password reset requests now compare the submitted email using the stricter, recommended algorithm for case-insensitive comparison of two identifiers from Unicode Technical Report 36, section 2.11.2(B)(2). Upon a match, the email containing the reset token will be sent to the email address on record rather than the submitted address. Bugfixes * Fixed a data loss possibility in SplitArrayField. When using with ArrayField(BooleanField()), all values after the first True value were marked as checked instead of preserving passed values
2019-12-19Fix patch or sys/loadavg.hnros2-13/+13
The patch for including sys/loadavg.h included the file in the section where getloadavg isn't used so the patch did nothing. Include it in the right place to fix it.
2019-12-19grep: Avoid conflict with sys/limits.h guard.jperkin2-1/+19
2019-12-19devel/py-importlib-metadata: fix files' permissiontaca1-1/+4
Fix file's permission to pass build under CHECK_PERMS is yes, i.e. PKG_DEVELOPER is on. Distfile of importlib-metadata 0.23, 1.1.0, 1.2.0 and 1.3.0 are contains world writable permission of files. Adam, why did you remove post-extract part?