Among changes:
- Switch KDE4_PREFIX to ${LOCALBASE}
- Remove now needless misc/kde4-shared-mime-info port
- Add stage support
- Remove ancient CONFLICTS (KDE 4.9 and less) and LATEST_LINK
- Squeeze MASTER_SITES/MASTER_SITE_SUBDIR
- Convert LIB_DEPENDS to new style
- Use options helpers
- Drop support for FreeBSD 7.x
- Remove Qt/KDE 3 related workarounds
- Remove local patches and use upstream version scheme for libraries
- sysutils/kdeadmin4, net/kdenetwork4, devel/kdesdk4,
and x11-clocks/kdetoys4 ports have been split.
- devel/kcachegrind is now a part of KDE SC [1]
- more logs in area51 repo...
New ports:
devel/kde-dev-scripts: KDE development scripts
devel/kde-dev-utils: KDE development utilities
games/klickety: Tetris themed solitaire
games/picmi: Single player logic-based puzzle game
textproc/libkomparediff2: Library to compare files and strings
The area51 repository features commits by Schaich Alonso, avilla, rakuco
and myself.
PR: ports/186491
Exp-run: by bdrewery
Approved by: beat (former maintainer) [1]
translations have been added (ca, da, el, en_GB, sl, pt_BR)
- Add stage support
- Update maintainer address
PR: based on ports/179681
Submitted by: RyoTa SimaMoto (maintainer)
- Require a new compiler to build Calligra.
- Make GTL really an option in Calligra.
- STAGEify.
- Use OPTIONS helpers.
- Set NO_ARCH for translation ports.
- Add translation port for Intelingua.
Calligra 2.7 release notes:
http://www.calligra.org/news/calligra-2-7-released
"Makefile", line 23: warning: "/bin/sh /usr/ports/russian/koi8r-ps/files/find-fontmap.sh" returned non-zero status
WARNING (russian/koi8r-ps): GhostScript not found in PATH
WARNING (russian/koi8r-ps): "Makefile", line 23: warning: "/bin/sh /usr/ports/russian/koi8r-ps/files/find-fontmap.sh" returned non-zero status
With hat: portmgr
. Use GhostScript itself to find the Fontmap.GS -- instead of trying to
parse the output of `gs -h'
. Other minor improvements to scripts.
Submitted by: pkg-fallout@
- Add zh-xmms to CONFLICTS.
- Convert USE_GNOME=desktopfileutils and USE_GMAKE to USES.
- Make USE_GL conditional on the SPEC option.
- Make gettext conditional on new NLS option.
- Only set USE_AUTOTOOLS for the RUSXMMS_PATCHES option.
- Remove LIBS from CONFIGURE_ENV. Set LDFLAGS instead.
- Add missing xorg dependencies.
- Add xmms_cv_newpcm_driver=yes to CONFIGURE_ARGS. The configure test
fails on recent version of FreeBSD but the code it enables is still
relevant. Without it you cannot select a different output device.
- Remove SUB_FILES. None of the files require substitutions.
- Remove IPV6 from OPTIONS_DEFAULT. It's implicit.
- Don't exclude SIMD option from amd64.
- Use option helpers like OPTIONS_SUB, opt_CONFIGURE_ENABLE, etc.
- Install stripped libraries when !defined(WITH_DEBUG).
- Use new style LIB_DEPENDS.
- Add aclocal, autoheader and libtoolize to USE_AUTOTOOLS to fully
regenerate the build infrastructure. This fixes a lot of warnings
and allows some patches to be removed.
- Add USE_OPENSSL for RUSXMMS_PATCHES option.
- Fix the SIMD option on all architectures by removing the post-extract
target.
- Remove the message about the RUSXMMS_PATCHES option. This is from
before there were option dialogs.
- Use the same cp command as in the script included with rusxmms instead
of INSTALL_DATA.
- Remove the ALSA test from configure with REINPLACE_CMD instead of a
patch (RUSXMMS_PATCHES case).
- Remove old libtool macros from acinclude.m4. Libtoolize adds new
macros.
- Remove MKDIR_P patching. No longer needed after running aclocal.
- Patch configure to disable ALSA (not RUSXMMS_PATCHES case).
- Fix po/Makefile.in.in with REINPLACE_CMD instead of a patch.
- Fix assembly source code files to support clang:
* Remove comments that begin with a single slash.
* Replace 'fist' instruction with 'fists' and 'fistp' with 'fistps'.
* Append '.section ".note.GNU-stack","",@progbits' to every file to
say they don't require an executable stack. These files are
compiled with -Wa,--noexecstack which clang supports but the ancient
binutils in FreeBSD base does not so without this change xmms runs
with an executable stack when compiled with base gcc.
- Support staging.
- Remove extra-patch-Visualization_Makefile.am. It's not needed when
passing VISUALIZATION_PLUGINS to configure.
- Rename patch-gcc41 to patch-General-ir-ir.c and modify it to keep the
variables static, but mark keepGoing volatile.
- Remove patch-aclocal.m4. Not needed when running aclocal.
- Remove patch-configure.in. The PTHREAD_LIBS related changes are no
longer needed and ALSA change is handled in the Makefile.
- Remove patch-ltmain.sh. Not needed with staging.
- Remove patch-po-Makefile.in.in. Handled in Makefile.
- Remove patch-xmms-config.in. Not 100% sure about this. It doesn't
affect xmms itself. Perhaps some plugins need it but I'd rather fix
those plugins then.
- Add patch-xmms-i18n.h.in. It's needed when NLS option is disabled.
- Remove pkg-message.in. All supported versions of FreeBSD have unzip
in base.
- Rename xmms.desktop.in to xmms.desktop to reflect that it doesn't
require substitutions.
- Adjust pkg-plist for OPTIONS_SUB, NLS option, staging and
USES=desktop-file-utils.
chinese/xmms, russian/xmms:
- Minor cleanups.
PR: ports/183165
Approved by: "Chris Petrik" <c.petrik.sosa@gmail.com> (maintainer)
- use PKGNAMESUFFIX instead LATEST_LINK
- whitespace cleanup
- svn mv */bugzilla to */bugzilla40
- add vuxml entry
4.4.1, 4.2.7, and 4.0.11 Security Advisory
Wednesday Oct 16th, 2013
Summary
=======
Bugzilla is a Web-based bug-tracking system used by a large number of
software projects. The following security issues have been discovered
in Bugzilla:
* A CSRF vulnerability in process_bug.cgi affecting Bugzilla 4.4 only
can lead to a bug being edited without the user consent.
* A CSRF vulnerability in attachment.cgi can lead to an attachment
being edited without the user consent.
* Several unfiltered parameters when editing flagtypes can lead to XSS.
* Due to an incomplete fix for CVE-2012-4189, some incorrectly filtered
field values in tabular reports can lead to XSS.
All affected installations are encouraged to upgrade as soon as
possible.
[1] even bugzilla40 gets upstream fixes an upgrade to bugzilla42/44 is recommend
Security: vid e135f0c9-375f-11e3-80b7-20cf30e32f6d
CVE-2013-1733
CVE-2013-1734
CVE-2013-1742
CVE-2013-1743