archivers/urbackup-{client,server}: Fix segfault (cryptopp)
- Add -DCRYPTOPP_DISABLE_ASM to CXXFLAGS on i386 and amd64, as
cryptopp-8.7.0 build with this option by default on i386 and amd64.
(5a19c08: security/cryptopp: Update to 8.7.0)
PR: 266531, 278163, 278859
MFH: 2024Q2
(cherry picked from commit 577ac1f839b1b164bd42af7c94a15be017b5e1d7)
net/keycloak: Update to 24.0.4
ChangeLog: https://www.keycloak.org/2024/05/keycloak-2404-released.html
Enhancements
#27508 Use new remote-store options in HA guides
#28429 Add details to error messages, especially around refresh tokens
#28729 Emphasize the need for setting container limit docs
#28880 Upgrade to Quarkus 3.8.4 dist/quarkus
#29183 Minor corrections to High Availability Guide docs
Bugs
#16345 Unable to delete realm names with invalid URL characters admin/api
#22617 kc export fails when using User Federation (LDAP) with file-based Vault
enabled import-export
#24568 iframe for frontend logout gets blocked if a custom CSP header is used
core
[31 lines not shown]
multimedia/pipe-viewer: Update to 0.5.0
ChangeLog: https://github.com/trizen/pipe-viewer/blob/0.5.0/Changes
* Fixed the "400 Bad Request" error when playing a video.
* Fixed the support for related videos.
* Fixed the launch of the Gtk3 version on older versions of Perl.
* When there are no non-split URLs available, return split URLs.
PR: 278858
Reported by: DtxdF at disroot.org (maintainer)
devel/gum: update to 0.14.0
ChangeLog: https://github.com/charmbracelet/gum/releases/tag/v0.14.0
* Use Huh for Gum Choose
* Use Huh for Gum Confirm
* Use Huh for Gum File
* Use Huh for Gum Input
* Use Huh for Gum Write
* fix(spin): Output Pipes if Timeout Occurs
* Document gum log --time
* feat(spin): Add support for --show-error for the spinner. (rebase #440)
PR: 278864
Reported by: dave at bitboss.ca (maintainer)
dns/unbound: Uodate to 1.20.0
ChangeLog: https://nlnetlabs.nl/news/2024/May/08/unbound-1.20.0-released/
Summary of the DNSBomb vulnerability CVE-2024-33655.
The DNSBomb attack, via specially timed DNS queries and answers, can cause a
Denial of Service on resolvers and spoofed targets.
Unbound itself is not vulnerable for DoS, rather it can be used to take part in
a pulsing DoS amplification attack.
PR: 278870
Reported by: jaap at NLnetLabs.nl (maintainer)
Security: CVE-2024-33655
security/doas: update to 6.3p12
6.3p11:
* Cleaned up error checking for temporary files, removed redundant check.
* Fixed status check for copy and editor launch.
6.3p12:
* Make sure doasedit can work when target file to edit has a leading slash
character. ie A full path name is used.
* Update doas.1 manual page to indicate problems with piping input
on Linux when processes are launched by doas.
Upstream release announcement:
https://github.com/slicer69/doas/releases/tag/6.3p11https://github.com/slicer69/doas/releases/tag/6.3p12
PR: 278897
MFH: 2024Q2
(cherry picked from commit e05da69d0d3fc274c73a0fbc4f312da3b9265b90)
security/doas: update to 6.3p12
6.3p11:
* Cleaned up error checking for temporary files, removed redundant check.
* Fixed status check for copy and editor launch.
6.3p12:
* Make sure doasedit can work when target file to edit has a leading slash
character. ie A full path name is used.
* Update doas.1 manual page to indicate problems with piping input
on Linux when processes are launched by doas.
Upstream release announcement:
https://github.com/slicer69/doas/releases/tag/6.3p11https://github.com/slicer69/doas/releases/tag/6.3p12
PR: 278897
MFH: 2024Q2