math/calc: Update to 2.16.0.2 and add a "tiny" flavor
The "tiny" flavor reduces the footprint < 20K by statically-linking
the executable and installing nothing else (no help files, no advanced
loadable modules, etc.). This makes it a great option for most
bit/networking/back-of-the-envelope calculations in constrained
environments.
Changes: https://github.com/lcn2/calc/releases/tag/v2.16.0.2
textproc/rasqal: Various improvements
- Remove SF master site. It's no longer updated.
- Bring pkg-descr, COMMENT, and WWW in line with upstream.
- Depend on libgcrypt to support more SPARQL hash functions than MD5
and SHA1.
- Remove dependency on libpcre (deprecated). Use libc POSIX regular
expressions instead.
- Add --with-uuid-library=internal so we don't accidentally link with
libuuid.
- Strip the library.
- Enable tests.
- Add DOCS option.
- Enable MPFR option by default and turn the RADIO group into a SINGLE
so the "none" case can be described because it's nonconforming. XSD
requires 18 decimals and double precision only has 15.
- Pet portclippy.
PR: 280079
math/octave-forge-llms: fix build on non-x86
/usr/local/bin/mkoctfile -march=native -O2 fig2base64.cc fpng.cpp
c++: error: unsupported option '-march=' for target 'powerpc64le-unknown-freebsd15.0'
Also use __BYTE_ORDER__ instead of __BYTE_ORDER (which is undefined).
devel/electron38: Update to 38.7.2
While here:
- switch to use USE_ELECTRON features of electron.mk for specifying
node package manager, pre-fetching necessary node modules, and
extracting the node modules into appropriate directories
- use USES=display for starting/stopping display server on testing
- specify TEST_ENV instead of listing env vars in test target
Changelog: https://github.com/electron/electron/releases/tag/v38.7.2
security/dropbear: update to 2025.89
Changelog:
- Security: Avoid privilege escalation via unix stream forwarding in Dropbear
server. Other programs on a system may authenticate unix sockets via
SO_PEERCRED, which would be root user for Dropbear forwarded connections,
allowing root privilege escalation.
Reported by Turistu, and thanks for advice on the fix.
This is tracked as CVE-2025-14282, and affects 2024.84 to 2025.88.
It is fixed by dropping privileges of the dropbear process after
authentication. Unix stream sockets are now disallowed when a
forced command is used, either with authorized_key restrictions or
"dropbear -c command".
In previous affected releases running with "dropbear -j" (will also disable
TCP fowarding) or building with localoptions.h/distrooptions.h
"#define DROPBEAR_SVR_LOCALSTREAMFWD 0" is a mitigation.
[38 lines not shown]