Date: Thu, 10 Nov 2022 23:36:50 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 267702] [NEW PORT] editors/xemacs-devel Revival of the XEmacs port Message-ID: <bug-267702-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D267702 Bug ID: 267702 Summary: [NEW PORT] editors/xemacs-devel Revival of the XEmacs port Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: jaakko.salomaa@iki.fi Created attachment 238007 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D238007&action= =3Dedit Port content I'm intent on reviving the XEmacs port. This port is built from the latest = VCS sources at https://foss.heptapod.net/xemacs/xemacs and the extension packag= es under https://foss.heptapod.net/xemacs ; I'm personally a XEmacs developer,= and have been developing XEmacs to make it work under modern BSD systems. See https://foss.heptapod.net/xemacs/xemacs/-/commit/9526b810710ae79f344c1b97a1= 6ae4b3a490a449 , for example, for my efforts to remove brk(2) dependency. The reason PORTEPOCH is defined in the Makefile is that otherwise the build will fail on a=20 =3D=3D=3D> xemacs-devel-21.5.b34.20221108 has known vulnerabilities: xemacs-devel-21.5.b34.20221108 is vulnerable: emacs -- movemail format string vulnerability CVE: CVE-2005-0100 WWW: https://vuxml.FreeBSD.org/freebsd/3e3c860d-7dae-11d9-a9e7-0001020eed82.html --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-267702-7788>