devel/ruby-getopt: update to 1.7.1
1.7.0 (2026-02-13)
* Added the NEGATABLE option so you can do --no-whatever.
* A few warnings were cleaned up, along with rubocop updates.
* Some administrative stuff, updated Rakefile, Gemfile, etc.
1.7.1 (2026-05-20)
* Fixed short option parsing so aliases like -? work again. Thanks go to
swabianeagle for the spot.
devel/ruby-console: update to 1.35.1
1.35.0 (2026-05-19)
* Align decimals in elapsed time display. (#84)
* Fix handling of Errno::ENODEV errors when calculating the width of a
terminal that was been re-opened to File::NULL
1.35.1 (2026-05-19)
* Add missing context files to gemspec.
* Fix gem metadata.
doc: Updated mail/roundcube and related packages to 1.6.16
mail/roundcube
mail/roundcube-plugin-enigma
mail/roundcube-plugin-password
mail/roundcube-plugin-zipdownload
mail/roundcube: update to 1.6.16
1.6.16 (2026-05-14)
This is a security update to the LTS version 1.6 of Roundcube Webmail.
It provides fixes to recently reported security vulnerabilities:
* Fix stored XSS/HTML/CSS injection in subject field of the draft restore
dialog, reported by zazy
* Fix CSS injection bypass in HTML sanitizer via SVG <animate
attributeName="style">, reported by wooseokdotkim
* Fix pre-auth SQL injection in virtuser_query plugin via preg_replace
backslash escape bypass, reported by skull
* Fix SSRF bypass via specific local address URLs
* Fix local/private URL fetch bypass when remote resources were not allowed,
reported by Orange Cyberdefense Vulnerability Disclosure Team
* Fix bypass of remote image blocking via CSS var(), reported by Geame
* Fix pre-auth arbitrary file delete via redis/memcache session poisoning
bypass, reported by valent1
[24 lines not shown]
callout(9): tweak
Don't change the name of the argument when explaining callout_pending.
Don't do manual "code hilighing".
Format the paper reference properly (and add missing information).
p5-Crypt-DSA: update to 1.20.
1.20 -- Fri May 15 19:00:36 ADT 2026
- This module is now makred as deprecated. Crypt-DSA-GMP is a possible replacement.
- Improve the call to IPC::Open3::open3
- Security Fix CVE-2026-8704: replace two arg open
- Security Fix CVE-2026-8700: replace rand()
- Add a security policy
- Add use warnings
- Fixes #86424: typo fix
p5-HTTP-Tiny: update to 0.094.
0.094 2026-05-17 10:31:00+02:00 Europe/Brussels
- No changes from 0.093-TRIAL
0.093 2026-05-11 17:18:12+02:00 Europe/Brussels (TRIAL RELEASE)
- fix to prevent invalid characters in all headers, and prevent header
smuggling (CVE-2026-7010)