head 1.3; access; symbols pkgsrc-2026Q1:1.3.0.36 pkgsrc-2026Q1-base:1.3 pkgsrc-2025Q4:1.3.0.34 pkgsrc-2025Q4-base:1.3 pkgsrc-2025Q3:1.3.0.32 pkgsrc-2025Q3-base:1.3 pkgsrc-2025Q2:1.3.0.30 pkgsrc-2025Q2-base:1.3 pkgsrc-2025Q1:1.3.0.28 pkgsrc-2025Q1-base:1.3 pkgsrc-2024Q4:1.3.0.26 pkgsrc-2024Q4-base:1.3 pkgsrc-2024Q3:1.3.0.24 pkgsrc-2024Q3-base:1.3 pkgsrc-2024Q2:1.3.0.22 pkgsrc-2024Q2-base:1.3 pkgsrc-2024Q1:1.3.0.20 pkgsrc-2024Q1-base:1.3 pkgsrc-2023Q4:1.3.0.18 pkgsrc-2023Q4-base:1.3 pkgsrc-2023Q3:1.3.0.16 pkgsrc-2023Q3-base:1.3 pkgsrc-2023Q2:1.3.0.14 pkgsrc-2023Q2-base:1.3 pkgsrc-2023Q1:1.3.0.12 pkgsrc-2023Q1-base:1.3 pkgsrc-2022Q4:1.3.0.10 pkgsrc-2022Q4-base:1.3 pkgsrc-2022Q3:1.3.0.8 pkgsrc-2022Q3-base:1.3 pkgsrc-2022Q2:1.3.0.6 pkgsrc-2022Q2-base:1.3 pkgsrc-2022Q1:1.3.0.4 pkgsrc-2022Q1-base:1.3 pkgsrc-2021Q4:1.3.0.2 pkgsrc-2021Q4-base:1.3 pkgsrc-2021Q3:1.2.0.8 pkgsrc-2021Q3-base:1.2 pkgsrc-2021Q2:1.2.0.6 pkgsrc-2021Q2-base:1.2 pkgsrc-2021Q1:1.2.0.4 pkgsrc-2021Q1-base:1.2 pkgsrc-2020Q4:1.2.0.2 pkgsrc-2020Q4-base:1.2; locks; strict; comment @// @; 1.3 date 2021.11.19.14.26.28; author taca; state Exp; branches; next 1.2; commitid FDAo2JYBMkCmFphD; 1.2 date 2020.11.08.23.55.44; author otis; state Exp; branches 1.2.8.1; next 1.1; commitid CEgorJvz8xjmU8vC; 1.1 date 2020.11.08.23.51.18; author otis; state Exp; branches; next ; commitid nFtKv3cyFGpPS8vC; 1.2.8.1 date 2021.11.23.22.47.04; author tm; state Exp; branches; next ; commitid f9ybbDMYiE0zjYhD; desc @@ 1.3 log @lang/php74: udpate to 7.4.26 This release contains security fix. 18 Nov 2021, PHP 7.4.26 - Core: . Fixed bug #81518 (Header injection via default_mimetype / default_charset). (cmb) - Date: . Fixed bug #81500 (Interval serialization regression since 7.3.14 / 7.4.2). (cmb) - MBString: . Fixed bug #76167 (mbstring may use pointer from some previous request). (cmb, cataphract) - MySQLi: . Fixed bug #81494 (Stopped unbuffered query does not throw error). (Nikita) - PCRE: . Fixed bug #81424 (PCRE2 10.35 JIT performance regression). (cmb) - Streams: . Fixed bug #54340 (Memory corruption with user_filter). (Nikita) - XML: . Fixed bug #79971 (special character is breaking the path in xml function). (CVE-2021-21707) (cmb) @ text @$NetBSD: patch-ext_intl_breakiterator_codepointiterator__internal.cpp,v 1.2 2020/11/08 23:55:44 otis Exp $ Use stdbool true/false macros. --- ext/intl/breakiterator/codepointiterator_internal.cpp.orig 2021-11-16 15:31:39.000000000 +0000 +++ ext/intl/breakiterator/codepointiterator_internal.cpp @@@@ -58,7 +58,7 @@@@ CodePointBreakIterator& CodePointBreakIt return *this; } - this->fText = utext_clone(this->fText, that.fText, FALSE, TRUE, &uec); + this->fText = utext_clone(this->fText, that.fText, false, true, &uec); //don't bother copying the character iterator, getText() is deprecated clearCurrentCharIter(); @@@@ -82,17 +82,17 @@@@ UBool CodePointBreakIterator::operator== #endif { if (typeid(*this) != typeid(that)) { - return FALSE; + return false; } const CodePointBreakIterator& that2 = static_cast(that); if (!utext_equals(this->fText, that2.fText)) { - return FALSE; + return false; } - return TRUE; + return true; } CodePointBreakIterator* CodePointBreakIterator::clone(void) const @@@@ -113,7 +113,7 @@@@ CharacterIterator& CodePointBreakIterato UText *CodePointBreakIterator::getUText(UText *fillIn, UErrorCode &status) const { - return utext_clone(fillIn, this->fText, FALSE, TRUE, &status); + return utext_clone(fillIn, this->fText, false, true, &status); } void CodePointBreakIterator::setText(const UnicodeString &text) @@@@ -132,7 +132,7 @@@@ void CodePointBreakIterator::setText(UTe return; } - this->fText = utext_clone(this->fText, text, FALSE, TRUE, &status); + this->fText = utext_clone(this->fText, text, false, true, &status); clearCurrentCharIter(); } @@@@ -284,7 +284,7 @@@@ CodePointBreakIterator &CodePointBreakIt } int64_t pos = utext_getNativeIndex(this->fText); - this->fText = utext_clone(this->fText, input, FALSE, TRUE, &status); + this->fText = utext_clone(this->fText, input, false, true, &status); if (U_FAILURE(status)) { return *this; } @ 1.2 log @php74: Document patches for ext/intl @ text @d1 1 a1 1 $NetBSD: patch-ext_intl_breakiterator_codepointiterator__internal.cpp,v 1.1 2020/11/08 23:51:18 otis Exp $ d5 1 a5 1 --- ext/intl/breakiterator/codepointiterator_internal.cpp.orig 2020-10-27 15:01:59.000000000 +0000 d16 2 a17 2 @@@@ -78,17 +78,17 @@@@ CodePointBreakIterator::~CodePointBreakI UBool CodePointBreakIterator::operator==(const BreakIterator& that) const d37 1 a37 1 @@@@ -109,7 +109,7 @@@@ CharacterIterator& CodePointBreakIterato d46 1 a46 1 @@@@ -128,7 +128,7 @@@@ void CodePointBreakIterator::setText(UTe d55 1 a55 1 @@@@ -280,7 +280,7 @@@@ CodePointBreakIterator &CodePointBreakIt @ 1.2.8.1 log @Pullup ticket #6541 - requested by taca lang/php74: security fix Revisions pulled up: - lang/php/phpversion.mk 1.345 - lang/php74/distinfo 1.33 - lang/php74/patches/patch-ext_intl_breakiterator_codepointiterator__internal.cpp 1.3 --- Module Name: pkgsrc Committed By: taca Date: Fri Nov 19 14:26:29 UTC 2021 Modified Files: pkgsrc/lang/php: phpversion.mk pkgsrc/lang/php74: distinfo pkgsrc/lang/php74/patches: patch-ext_intl_breakiterator_codepointiterator__internal.cpp Log Message: lang/php74: udpate to 7.4.26 This release contains security fix. 18 Nov 2021, PHP 7.4.26 - Core: . Fixed bug #81518 (Header injection via default_mimetype / default_charset). (cmb) - Date: . Fixed bug #81500 (Interval serialization regression since 7.3.14 / 7.4.2). (cmb) - MBString: . Fixed bug #76167 (mbstring may use pointer from some previous request). (cmb, cataphract) - MySQLi: . Fixed bug #81494 (Stopped unbuffered query does not throw error). (Nikita) - PCRE: . Fixed bug #81424 (PCRE2 10.35 JIT performance regression). (cmb) - Streams: . Fixed bug #54340 (Memory corruption with user_filter). (Nikita) - XML: . Fixed bug #79971 (special character is breaking the path in xml function). (CVE-2021-21707) (cmb) @ text @d1 1 a1 1 $NetBSD$ d5 1 a5 1 --- ext/intl/breakiterator/codepointiterator_internal.cpp.orig 2021-11-16 15:31:39.000000000 +0000 d16 2 a17 2 @@@@ -82,17 +82,17 @@@@ UBool CodePointBreakIterator::operator== #endif d37 1 a37 1 @@@@ -113,7 +113,7 @@@@ CharacterIterator& CodePointBreakIterato d46 1 a46 1 @@@@ -132,7 +132,7 @@@@ void CodePointBreakIterator::setText(UTe d55 1 a55 1 @@@@ -284,7 +284,7 @@@@ CodePointBreakIterator &CodePointBreakIt @ 1.1 log @php74: Fix build with ICU 68 @ text @d1 3 a3 1 $NetBSD$ @