Commit graph

19014 commits

Author SHA1 Message Date
Thomas Zander
a3377806e5 MFH: r359687
Add vuln entries for mplayer and mencoder for CVE-2014-4610
(integer overflow in ffmpeg's lzo code)

Approved by:	portmgr(miwi), mentors (implicit)
2014-06-28 13:14:00 +00:00
Koop Mast
b8b480ecc4 MFH: r357772
Document dbus local dos

Approved by:	portmgr (miwi)
2014-06-14 14:10:12 +00:00
Rene Ladan
b8bfc20b5c MFH: r357427
Document new vulnerabilities in www/chromium < 35.0.1916.153

Submitted by:	Carlos Jacobo Puga Medina <cpm@fbsd.es>
Obtained from:	http://www.googlechromereleases.blogspot.nl/

Also merge entries for mozilla, openssl, gnutls (2), mumble (2), and
linux-flashplugin

Approved by: portmgr (erwin)
2014-06-11 08:30:01 +00:00
Bryan Drewery
f442a5656b MFH: r356401
- Update to 3.1.25

  This fixes a security issue:
    http://www.gnutls.org/security.html#GNUTLS-SA-2014-3

Security:	027af74d-eb56-11e3-9032-000c2980a9f3
2014-06-05 17:59:31 +00:00
Bryan Drewery
ccf86e45ef MFH: r356632
Update to 1.0.1h.

Approved by:	so (ports-security@ blanket)
Security:	5ac53801-ec2e-11e3-9cf3-3c970e169bc2
2014-06-05 17:56:13 +00:00
Bryan Drewery
6b910f4097 MFH: r352928
- Security patch
Security: CVE-2014-0198
Security: http://seclists.org/oss-sec/2014/q2/232
Security: https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321
Obtained from:	OpenBSD
2014-06-05 17:55:38 +00:00
Bryan Drewery
7d58e9457e MFH: r356535
Patch CVE-2014-3466 to prevent memory corruption due to server hello parsing.

Skipped PORTREVISION 5 which made several framework updates not needed here.

Obtained from:  688ea6428a
Security:       CVE-2014-3466, 9733c480-ebff-11e3-970b-206a8a720317
2014-06-05 17:54:33 +00:00
Koop Mast
efd1fe640d MFH: r355040
Document a bunch of openjpeg vulnabilities.

Approved by:	portmgr (erwin@)
2014-05-24 17:37:04 +00:00
Antoine Brodin
22a2e91227 MFH: r354745
- Fix build with clang

Reported by:	pkg-fallout
Approved by:	portmgr (self)
2014-05-21 14:14:43 +00:00
Antoine Brodin
3ff578725c MFH: r354691
xmllint from new libxml2 seems to be stricter than it used to be
Disable it so that man pages can be generated

Submitted by:	maintainer
Approved by:	portmgr (self)
2014-05-21 08:26:43 +00:00
Rene Ladan
2efb4b3692 MFH: r354686
Document new vulnerabilities in www/chromium < 35.0.1916.114

Obtained from:	http://googlechromereleases.blogspot.nl/

Approved by:	portmgr (erwin)
2014-05-21 05:31:27 +00:00
Johan van Selst
d7ffd4f3a0 MFH: r354346
Add missing run-time dependency

Submitted by:	des
Approved by:	portmgr (erwin)
2014-05-17 20:17:25 +00:00
Rene Ladan
03b941c732 MFH: r354037
Describe new vulnerabilities in www/chromium < 34.0.1847.137

Obtained from:	http://googlechromereleases.blogspot.nl/

Also merge entries for:
- libXfont < 1.4.7_3
- libxml2 < 2.8.0_5
- openssl >= 1.0.1 < 1.0.1_12
- qt4-xml < 4.8.6
- strongswan < 5.1.3
- mohawk < 2.0.12
- chromium < 34.0.1847.132
- mozilla/firefox < 29.0 / 24.5.0 (esr), seamonkey < 2.26, thunderbird < 24.5

Approved by:	portmgr (erwin)
2014-05-14 11:41:40 +00:00
Li-Wen Hsu
990ea362d5 MFH: r351931
Document Django 2014-04-21 vulnerabilty

MFH: r351932

- Update to 1.6.3

Security:	59e72db2-cae6-11e3-8420-00e0814cab4e

MFH: r351933

- Update to 1.5.6

Security:	59e72db2-cae6-11e3-8420-00e0814cab4e

MFH: r351934

- Update to 1.4.11

Security:	59e72db2-cae6-11e3-8420-00e0814cab4e

MFH: r351935

- Update to 20140423 snapshot

Security:	59e72db2-cae6-11e3-8420-00e0814cab4e

MFH: r351938

Fix Django package names

Submitted by:	mat

MFH: r351944

- Add missing distinfo [1]
- Trim unneeded PYDISTUTILS_PKGNAME

Notified by:	swills [1]

MFH: r352013

Add back pakcage ranges for people have ancient packages

Notified by:	mat

Approved by:	portmgr (mat)
2014-04-24 16:20:30 +00:00
Pietro Cerutti
998983a54e MFH: r351375
- Unbreak by disabling MD2 and RC5

Reported by:	pkg-fallout
Approved by:    portmgr
2014-04-23 12:12:39 +00:00
Bryan Drewery
d24cbd8bd5 MFH: r351191
- fix a 4 year old "use-after-free" problem
https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest
http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse
http://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/008_openssl.patch
Obtained from:	OpenBSD
2014-04-23 01:42:11 +00:00
Bryan Drewery
217362f6f9 MFH: r350193
Move message to pkg-message
2014-04-08 14:10:00 +00:00
Bryan Drewery
544a9ccda2 MFH: r350192
Add missed warning from r350191
2014-04-08 14:09:19 +00:00
Bryan Drewery
dd836ce6f0 MFH: r350191
- Update to 0.2.18 [1]
- Remove need for npm at install time [2]
- No longer bundle deps [2]
- Add big warning on how little this project should be trusted

4 versions since previous 0.2.0 had security fixes, some of which were
regresions from the chain. Non-security-marked fixes not listed here, see
changelog [1].

  0.2.4 (2014-03-29)
    SECURITY NOTICE
    This release was flawed since it did not pull it dependencies with it.
  0.2.7 (2014-03-29)
    SECURITY BUGFIX
    The previous releases, v0.2.5 and v0.2.6, had broken verification for
    website proofs. Fixed with an upgrade to proofs v0.0.15
  0.2.13 (2014-04-01)
    SECURITY BUGFIX
    Don't show the GPG script used to generated keys when specifying -d, since
    it contains the users's password
  0.2.14 (2014-04-02)
    SECURITY BUGFIX
    Sanity-check the server's proof text, in case it's cheating. Check to make
    sure that the only plausible proof is the one that we made, and that others
    aren't coming along for the ride. This check comes via keybase-proofs
    @v0.0.20.

Changelog [1]:	https://github.com/keybase/node-client/compare/v0.2.0...v0.2.18#diff-2
Submitted by:	thierry [2]
2014-04-08 14:08:12 +00:00
Bryan Drewery
35e361a798 MFH: r350612
Add mingw32-openssl.
2014-04-08 14:04:16 +00:00
Bryan Drewery
7bf9b367dc MFH: r350560
Add more information for OpenSSL bug
2014-04-08 02:28:25 +00:00
Bryan Drewery
f5d856aa59 MFH: r350559
- Sort references
- Add link to heartbleed.com that has a lot of useful information
2014-04-08 02:27:43 +00:00
Bryan Drewery
7262a12b70 MFH: r350550
- Document Openssl vulnerabilities

Security:	CVE-2014-0160
Security:	CVE-2014-0076
Security:	https://www.openssl.org/news/secadv_20140407.txt
2014-04-07 22:08:12 +00:00
Bryan Drewery
fae1406099 MFH: r350548
- Update to 1.0.1g

Changes:
  - Fix for CVE-2014-0160
  - Add TLS padding extension workaround for broken servers.
  - Fix for CVE-2014-0076

Security:	CVE-2014-0160
Security:	CVE-2014-0076
Security:	https://www.openssl.org/news/secadv_20140407.txt
With hat:	portmgr
2014-04-07 21:48:07 +00:00
Antoine Brodin
5476a67b95 MFH: r350421
Distfile rerolled with a license file and some examples
Approved by:	portmgr (self)
2014-04-07 17:10:53 +00:00
Mathieu Arnold
75060a9d29 MFH: r350089
Fix SoftHSM's umask handling (upstream patch)

Approved by:	maintainer
Obtained from:	https://github.com/opendnssec/SoftHSMv1/pull/11
Sponsored by:	Absolight
2014-04-04 10:48:45 +00:00
Alex Dupre
2d2a20b90e Fix all mod_php entries.
Please don't use the range <range><ge>0</ge></range>.
2014-04-01 08:46:41 +00:00
Antoine Brodin
be56622693 Update to 2.1.0.2 2014-03-31 17:57:50 +00:00
Dirk Meyer
ae1515c459 - add missing LIB_DEPENDS for forbidden option GMP 2014-03-30 19:37:22 +00:00
Carlo Strub
b1240ac8d6 Update to 0.2.7 2014-03-30 15:56:12 +00:00
Pawel Pekala
cdd26ae9f7 Update to version 1.777
PR:		ports/188021
Submitted by:	maintainer
2014-03-29 16:41:25 +00:00
Lars Engels
45e8cac944 Add an entry for CVE-2014-2386 2014-03-29 12:00:53 +00:00
Sunpoet Po-Chuan Hsieh
8041a4eac3 - Update to 0.14
Changes:	http://search.cpan.org/dist/IO-Async-SSL/Changes
2014-03-29 08:54:19 +00:00
Brendan Fabeny
8fbf37ec53 Add an entry for CVE-2014-2270, and correct the indentation
in the entry for CVE-2014-1943
2014-03-29 08:30:51 +00:00
Gabor Pali
8b1c971497 - Reroll and update bootstrap Haskell compilers to GHC 7.6.3 on 8.x and
9.x in order to prevent run-time breakage after the recent changes in
  libiconv
- Bump port revision for lang/ghc and all dependents, as a consequence

Obtained from:	FreeBSD Haskell
2014-03-29 00:52:54 +00:00
Dirk Meyer
2f6d449998 - reset GREP_OPTIONS
PR:		188030
2014-03-28 18:23:44 +00:00
Alex Dupre
b175cf634e Fix mod_php5 entry. 2014-03-28 12:11:17 +00:00
Bryan Drewery
203239ffae Add new port security/keybase.
Keybase.io CLI client.

  Keybase will be a public directory of publicly auditable public
  keys. All paired, for convenience, with unique usernames.

WWW: https://keybase.io
2014-03-28 00:00:42 +00:00
Matthias Andree
7b74753e36 Sort reference entries in 36f9ac43-b2ac-11e3-8752-080027ef73ec
mail/trojita information leak.

This should really be in the DTD or at least "make validate" if it's
official requirement...

Submitted by:	remko
2014-03-27 19:50:32 +00:00
Renato Botelho
6161a9f3c9 Support stage 2014-03-27 18:37:25 +00:00
Emanuel Haupt
e0a17d558f - Support staging
- Use curly brackets
- Remove an obsolete warning about potentially overwriting existing binaries
2014-03-27 12:53:16 +00:00
Antoine Brodin
0c186dcad5 - Stage support
- Use USE_OCAMLFIND_PLIST instead of doing it manually
2014-03-26 22:36:46 +00:00
Antoine Brodin
1809968b52 Stage support 2014-03-26 21:53:01 +00:00
Antoine Brodin
b0f417a9b5 Stage support 2014-03-26 21:32:39 +00:00
Alex Dupre
7c2af9fa63 Update to 0.9.35 release with support for PHP 5.4+.
PR:		ports/187925
Submitted by:	Reko Turja <reko.turja@liukuma.net>
2014-03-26 13:20:50 +00:00
Alex Dupre
3a4c21aab6 Update to v13.11.08 release. 2014-03-26 13:18:13 +00:00
Hajimu UMEMOTO
0e27ad08e5 Fix build with enabling SQLITE on recent 10-STABLE and later.
Spotted by:	Marc Fournier <scrappy__at__hub.org>
2014-03-25 14:55:39 +00:00
Guido Falsi
cabf98d829 Bump PORTREVISION, forgotten in previous commit.
Noticed by:	mat
2014-03-25 12:15:53 +00:00
Dirk Meyer
596ac59201 - update to 1.0.23
Reported by:	Benjamin Podszun
2014-03-25 11:05:16 +00:00
Guido Falsi
f11cff3167 - Really disable iconv support when LIBICONV option is not selected [1]
This fixes build on 10 and head when libiconv is installed and
  LIBICONV option is disabled

While here:

- Convert to USES gmake and USES tar [2]
- Convert to new LIB_DEPENDS format [2]

Reported by:	Mike Harding <mvharding@gmail.com> (via email)
Approved by:	portmgr (bapt, implicit) [1]
Approved by:	implicit portmgr@ blanket approval [2]
2014-03-25 07:24:41 +00:00