Commit graph

17939 commits

Author SHA1 Message Date
Bryan Drewery
220facfb8e - Fix build
- Update to 1.6.0

PR:		ports/177758
Submitted by:	Petr Rehor <prehor@gmail.com> (maintainer)
2013-08-22 02:37:47 +00:00
Sunpoet Po-Chuan Hsieh
ee0456d513 - Cleanup Makefile header 2013-08-21 17:42:57 +00:00
Vanilla I. Shu
85fca52ebb Fix pkg-plist. 2013-08-21 17:07:20 +00:00
Vanilla I. Shu
cc84602885 Add p5-CryptX, crypto toolkit. 2013-08-21 14:43:47 +00:00
Sunpoet Po-Chuan Hsieh
c9cf6c6113 - Convert to new perl framework 2013-08-21 14:08:06 +00:00
Rene Ladan
c49d4ce4ac Document new vulnerabilities in www/chromium < 29.0.1547.57
Obtained from:	http://googlechromereleases.blogspot.nl/
2013-08-21 09:29:44 +00:00
Olli Hauer
56b7b51e42 - fix pkg-plist (ja) 2013-08-21 07:42:01 +00:00
Olli Hauer
c18edf2f37 - update to 6.4.0
- remove patches for EOL FreeBSD releases
- convert to OPTIONS

Changelog:
http://nmap.org/changelog.html
2013-08-21 04:57:14 +00:00
Koop Mast
dc7ab3f9b0 Fix multiple security issues in the bundled libav version by replacing it
with a newer version.

Reported by:	Jan Beich <jbeich@tormail.org>
2013-08-20 15:36:43 +00:00
Andrej Zverev
e22cb3e0ce - Convert to new perl5 framework
Approved by:	bdrewery@ (maintainer)
2013-08-20 11:43:44 +00:00
Rui Paulo
f7ad576cca Use GCC 4.2+ on armv6.
Reviewed by:	umq
Approved by:	umq
2013-08-20 05:31:34 +00:00
Anton Berezin
17597283fc Update to 0.23.
Changes:	http://search.cpan.org/dist/RadiusPerl/Changes
2013-08-19 20:45:58 +00:00
Mathieu Arnold
5f20fb8f86 Update to 0.9.6 2013-08-19 13:48:21 +00:00
Anton Berezin
27e59af026 Update to 1.10.
Changes:	http://search.cpan.org/dist/Crypt-IDEA/changes
2013-08-19 13:33:09 +00:00
Jun Kuriyama
ce99cacd0f - Upgrade to 2.0.21 (minor improvements). 2013-08-19 13:29:42 +00:00
Mathieu Arnold
0341a9f0e4 Update to 2.33 2013-08-19 12:40:53 +00:00
Mathieu Arnold
c5fc0329cf Update to 2.14 2013-08-19 12:40:28 +00:00
Mathieu Arnold
29f1295197 Update to 0.06 2013-08-19 12:40:02 +00:00
Mathieu Arnold
cb90a1659a Update to 0.131750 2013-08-19 12:39:27 +00:00
Mathieu Arnold
7e4431cc54 Update to 0.9.1.1.1. 2013-08-19 12:35:44 +00:00
Mathieu Arnold
65af5efda8 Update to 0.9.60. 2013-08-19 12:35:00 +00:00
Mathieu Arnold
4acfb17f72 Update to 0.33. 2013-08-19 12:33:15 +00:00
Mathieu Arnold
ee2ab8a9ab Update to 2.07. 2013-08-19 09:01:00 +00:00
Stanislav Sedov
59aae10fcc - Correct lcms2 VuXML entry: only versions before 2.5 are vulnerable.
PR:		ports/181384
Reported by:	Derek Schrock <dereks@lifeofadishwasher.com>
2013-08-19 08:07:02 +00:00
Ashish SHUKLA
379da32f9e - Update modified date of VuXML entry which was missed in r317985
Reported by:	remko
2013-08-18 10:41:10 +00:00
Sunpoet Po-Chuan Hsieh
eff1514804 - Update USE_PYTHON
- Do not use easyinstall
- Do not installed zipped egg [1]
- Bump PORTREVISION for package change
- Cleanup Makefile header

Requested by:	olgeni [1]
Tested by:	olgeni
2013-08-18 03:15:35 +00:00
Gerald Pfeifer
41e60477bd Replace USE_GCC=4.6+ and USE_GCC=4.4+ by USE_GCC=yes.
Right now this is a noop in the former case and a noop in the latter
case unless lang/gcc44 has been installed explicitly.

This puts a bit more emphasis on standardizing on a canonical version
"current" GCC and makes it easier to update that canonical version
by changing the default in Mk/bsd.gcc.mk and updating the lang/gcc port.

That is, USE_GCC=yes means "use a decent/modern version of GCC" without
having to worry about details.

Approved by:	portmgr (bdrewery)
2013-08-17 16:27:24 +00:00
Antoine Brodin
325ea40973 Update python-registry to 0.2.7 2013-08-17 08:49:49 +00:00
Remko Lodder
5b750bca79 Correct latest entry, properly indent the paragraphs
and sort the url list alphabetically.
2013-08-17 08:36:30 +00:00
Brendan Fabeny
73059db992 Amend 689c2bf7-0701-11e3-9a25-002590860428 so that it doesn't overlap with
80771b89-f57b-11e2-bf21-b499baab0cbe, but keep both entries rather than
augmenting the old one, because I've cited the new one in a commit message.
2013-08-17 08:24:35 +00:00
Brendan Fabeny
4ce32e9298 Update security/libgcrypt to 1.5.3 [1], and document the latest gnupg
and libgcrypt vulnerability

PR:		181231
Submitted by:	Hirohisa Yamaguchi (maintainer) [1]
Security:	http://www.vuxml.org/freebsd/689c2bf7-0701-11e3-9a25-002590860428.html
2013-08-17 07:56:12 +00:00
Brad Davis
beeccba037 - Update puppet to 3.2.4 which fixes CVE-2013-4761 and CVE-2013-4956
Approved by:	swills@
Security:	2b2f6092-0694-11e3-9e8e-000c29f6ae42
2013-08-16 17:54:41 +00:00
Remko Lodder
e82c192b18 Correct polarssl entry, the lines were way to long, indentation was
incorrect, and the topic description does not need too many details
since that is explained in the description itself.

Also correct the url's since c comes before u ;-)

Prodded by:	stas
2013-08-16 05:35:00 +00:00
Stanislav Sedov
1f8bb4dc02 - Fix ordering of references.
Reported by:	remko
2013-08-15 19:54:22 +00:00
Stanislav Sedov
9c2bca2d9f - Add lcms2 DoS vulnerability entry.
Hat: secteam
2013-08-15 19:02:34 +00:00
Alex Kozlov
d4041784dc - Remove MAKE_JOBS_SAFE variable
Approved by:	portmgr (bdrewery)
2013-08-14 22:35:50 +00:00
Dirk Meyer
702abdca4e - update to 1.0.22 2013-08-14 21:12:06 +00:00
Matthias Andree
d8d9871e4e Fix regression from my earlier commit r324675 which caused a
"make fetch" failure on non-POSIX-compliant SHELL:

1. Replace ${SHELL} by ${SH} so the fetchwrapper.sh gets executed with a
   POSIX-compliant shell (such as /bin/sh)

2. Just because it's meant that way, add an svn:executable=* property
   on files/fetchwrapper.sh.

PR:		ports/181252
Reported by:	Mike Harding (private email)
2013-08-14 17:28:32 +00:00
Emanuel Haupt
192975256b Update to 1.3.2 2013-08-14 12:44:56 +00:00
Johan van Selst
d13974de60 Note that parallel builds do not work
While here, update Perl dependency style and WWW

PR:		ports/181275
Submitted by:	mat
2013-08-14 08:32:53 +00:00
Alexey Dokuchaev
430c83ad89 Use correct installation commands for header file and library. 2013-08-14 03:58:16 +00:00
Alexey Dokuchaev
5fa3334496 - Unbreak parallel (-jX) builds by fixing yacc'ed targets dependencies;
unfortunately, doing it correctly requires GNU make (for order-only
  prerequisites)
- Standardize Makefile header, define LICENSE (MIT)
- Install somewhat more complete set of portdocs
- Install manpages relative to MANPREFIX
- While here, convert to OptionsNG, utilize PORTDOCS, remove pkg-plist,
  and generally cleanup port's Makefile
2013-08-14 03:54:53 +00:00
Matthias Andree
ed87d0ff92 Update to new version 1.2.8, fixing security issues (denial of service).
Fix fetching, by bypassing splash screen (adds files/fetchwrapper.sh).

Approved by:	jase (maintainer)
Security:	72bf9e21-03df-11e3-bd8d-080027ef73ec
Security:	CVE-2013-4623
2013-08-13 17:17:15 +00:00
Frederic Culot
341a499bf6 - Update to 1.6.1
Changes:	http://pypi.python.org/pypi/keyring/1.6.1#changes
PR:		ports/181247
Submitted by: 	Douglas William Thrift <douglas@douglasthrift.net> (maintainer)
2013-08-13 15:00:47 +00:00
Matthias Andree
c51af7a6be Add CVE Id, which was not in the advisory,
but on <https://polarssl.org/security>.
2013-08-13 06:20:27 +00:00
Matthias Andree
6421943e6a Record PolarSSL < 1.2.8 infinite loop denial of service.
Note: the port has not yet been upgraded, and the fix then needs to be merged
to the 9.2 ports branch before release.
2013-08-13 06:17:32 +00:00
Brendan Fabeny
a582c52d89 Update to 0.2.4.16-rc 2013-08-13 03:39:37 +00:00
Antoine Brodin
5e46505535 Update python-registry to 0.2.6 2013-08-10 11:51:31 +00:00
Matthias Andree
9145f8cde9 Prevent packaging stuff to be pulled from the tree a day after release. 2013-08-10 09:20:09 +00:00
Xin LI
12cdec36f5 Add a link to the advisory.
Submitted by:	remko
2013-08-09 20:52:29 +00:00
Sunpoet Po-Chuan Hsieh
6aa36a6744 - Update to 1.3.3
- Remove leading indefinite article from COMMENT
- Pet portlint: remove ABI version number from LIB_DEPENDS
- Cleanup Makefile header

Changes:	http://pecl.php.net/package-changelog.php?package=gnupg
2013-08-09 17:22:27 +00:00
Xin LI
7027b5a896 Document Samba DoS vulnerability. 2013-08-09 17:22:16 +00:00
Antoine Brodin
aba57212b5 - Remove article from COMMENT
- Do not use PYTHON_SITELIBDIR in DEPENDS
- Add missing OPTIONS_DEFINE
- Remove LICENSE from PORTDOCS
- Remove unneeded line from plist
2013-08-09 15:51:28 +00:00
Olivier Duchateau
a0a7af1b5e - Update to 0.23 2013-08-09 12:16:33 +00:00
Alexey Dokuchaev
b8851b154c - Unbreak parallel builds by fixing targets' dependencies
- Cleanup port's Makefile slightly while I am here
2013-08-09 02:11:20 +00:00
Ryan Steinmetz
f82694aa19 - Fix build under 10-CURRENT when using OpenSSL, chasing r254107 (OpenSSL bugfix for RT #2984)
- Add security/ca_root_nss as a dependency to fix GnuTLS build
- Do not bump PORTREVISION

Reported by:	gnn@
2013-08-08 23:58:12 +00:00
Ryan Steinmetz
81b171d3bf - Install manpages, regardless of what PORTDOCS is set to [1]
- Update MASTER_SITES [1]
- Update WWW [1]
- Honor PORTEXAMPLES
- Pacify portlint(1)
- Do not bump PORTREVISION

PR:		ports/180373 [1]
Submitted by: 	"r4721@tormail.org" <r4721@tormail.org> [1]
2013-08-08 23:24:39 +00:00
Florian Smeets
48f9528b90 - update firefox to 23.0
- update firefox-esr, thunderbird and libxul to 17.0.8
- update seamonkey to 2.20
- fix plist for *-i18n

Security:		0998e79d-0055-11e3-905b-0025905a4771
In collaboration with:	Jan Beich <jbeich@tormail.org>
2013-08-08 18:42:03 +00:00
Matthias Andree
65de6df531 Add one more reference for PuTTY 0.59-0.61 vuln CVE-2011-4607. 2013-08-07 16:26:12 +00:00
Matthias Andree
2dca42dc97 More references for PuTTY < 0.63 vulnerabilities. 2013-08-07 16:22:29 +00:00
Matthias Andree
a6428e5e5a Upgrade PuTTY to new 0.63 beta upstream release, adding vulnerability info.
Quoting the upstream's change log:

- Security fix: prevent a nefarious SSH server or network attacker from
  crashing PuTTY at startup in three different ways by presenting a maliciously
  constructed public key and signature.
- Security fix: PuTTY no longer retains the private half of users' keys in
  memory by mistake after authenticating with them.
- Revamped the internal configuration storage system to remove all fixed
  arbitrary limits on string lengths. In particular, there should now no longer
  be an unreasonably small limit on the number of port forwardings PuTTY can
  store.
- Port-forwarded TCP connections which close one direction before the other
  should now be reliably supported, with EOF propagated independently in the
  two directions. This also fixes some instances of port-forwarding data
  corruption (if the corruption consisted of losing data from the very end of
  the connection) and some instances of PuTTY failing to close when the session
  is over (because it wrongly thought a forwarding channel was still active
  when it was not).
- The terminal emulation now supports xterm's bracketed paste mode (allowing
  aware applications to tell the difference between typed and pasted text, so
  that e.g. editors need not apply inappropriate auto-indent).
- You can now choose to display bold text by both brightening the foreground
  colour and changing the font, not just one or the other.  - PuTTYgen will now
  never generate a 2047-bit key when asked for 2048 (or more generally n−1 bits
  when asked for n).
- Some updates to default settings: PuTTYgen now generates 2048-bit keys by
  default (rather than 1024), and PuTTY defaults to UTF-8 encoding and 2000
  lines of scrollback (rather than ISO 8859-1 and 200).
- Unix: PSCP and PSFTP now preserve the Unix file permissions, on copies in
  both directions.
- Unix: dead keys and compose-character sequences are now supported.
- Unix: PuTTY and pterm now permit font fallback (where glyphs not present in
  your selected font are automatically filled in from other fonts on the
  system) even if you are using a server-side X11 font rather than a Pango
  client-side one.
- Bug fixes too numerous to list, mostly resulting from running the code
  through Coverity Scan which spotted an assortment of memory and resource
  leaks, logic errors, and crashes in various circumstances.

Security:	4b448a96-ff73-11e2-b28d-080027ef73ec
Security:	CVE-2013-4206
Security:	CVE-2013-4207
Security:	CVE-2013-4208
Security:	CVE-2013-4852
2013-08-07 16:11:17 +00:00
Andrej Zverev
ca70e439c2 - Convert to new perl framework
per port extra changes:
devel/p5-Perl-Version remove outage PERL_LEVEL check
devel/p5-Devel-LeakTrace-Fast remove perl version requiment 5.12.0- (no need in current version)

Approved by:	lth@ (maintainer)
2013-08-07 13:20:32 +00:00
Brendan Fabeny
bd0fca35b5 Make the torrc log domain(s) and level(s) user-configurable in security/tor, as
was done for security/tor-devel in r322977; remove some problematic mirrors;
update Makefile idioms (gmake, LIB_DEPENDS, etc.); attempt to remove leftovers
in /var during deinstallation [1]

Reported by:	miwi [1]
2013-08-07 12:54:37 +00:00
Alexey Dokuchaev
aa8db30ef9 Adjust NVidia driver version ranges after r304966 to remedy false positives. 2013-08-07 08:41:51 +00:00
Andrej Zverev
2c25cf429d - Convert to new perl framework
- Trim Makefile header

Approved by:	wen@ (maintainer)
2013-08-06 08:50:49 +00:00
Olli Hauer
ac22a002c2 - secuity update for typo3 ports
- some small Makefile cleanups
- add vuxml entry

Vulnerability Types: Cross-Site Scripting, Remote Code Execution
 Overall Severity: Critical

Vulnerable subcomponent: Third Party Libraries used for audio and video playback
 Affected Versions: All versions from 4.5.0 up to the development branch of 6.2
 Vulnerability Type: Cross-Site Scripting
 Severity: Medium

Vulnerable subcomponent: Backend File Upload / File Abstraction Layer
 Vulnerability Type: Remote Code Execution by arbitrary file creation
 Affected Versions: All versions from 6.0.0 up to the development branch of 6.2
 Severity: Critical

PR:		ports/180951
		ports/180952
		ports/180953
Submitted by:	Helmut Ritter <freebsd-ports@charlieroot.de> (maintainer)
Security:	http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-002/
		CVE-2011-3642
		CVE-2013-1464
2013-08-05 21:56:56 +00:00
Andrej Zverev
43f0c9f153 - Convert to new perl framework
- Trim Makefile header

Approved by:	tobez@ (maintainer)
2013-08-05 15:05:29 +00:00
Michael Landin
0c2e25d1f0 - change AUTHOR email 2013-08-04 13:04:54 +00:00
Matthew Seaman
9aacd678d3 - Security update of databases/phpmyadmin to 4.0.5
ChangeLog: http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/4.0.5/phpMyAdmin-4.0.5-notes.html/download
SecurityAdvisory: http://www.phpmyadmin.net/home_page/security/PMASA-2013-10.php

- Deprecate databases/phpmyadmin35

This version is vulnerable to the 'clickjacking protection bypass'
problem fixed in 4.0.5, but the development team will not be
publishing a fix. "We have no solution for 3.5.x, due to the proposed
solution requiring JavaScript. We don't want to introduce a dependency
to JavaScript in the 3.5.x family."

Therefore deprecate this port and set expiry for one month.  Please
upgrade to 4.0.5 instead.

Security:	17326fd5-fcfb-11e2-9bb9-6805ca0b3d42
2013-08-04 12:13:50 +00:00
Rene Ladan
dcd32429b1 Add new vulnerabilities for www/chromium < 28.0.1500.95
Obtained from:	http://googlechromereleases.blogspot.nl/
2013-08-03 14:56:41 +00:00
Mathieu Arnold
62a41b423b - Convert to new perl framework
- Remove MAKE_JOBS_SAFE=yes, it's the default.
2013-08-03 13:44:00 +00:00
Antoine Brodin
61ebf63b31 Convert regripper to USES=perl5 2013-08-03 09:23:18 +00:00
Andrej Zverev
99ad912735 - Convert to new perl framework
- Trim Makefile header
2013-08-03 08:45:51 +00:00
Mathieu Arnold
4063eccdf2 - Convert to new perl framework
- Trim Makefile header
2013-08-02 21:38:09 +00:00
Mathieu Arnold
4819ca343b - Convert to new perl framework
- Trim Makefile header
- Remove MAKE_JOBS_SAFE=yes, it's the default.
2013-08-02 18:52:07 +00:00
Andrej Zverev
0aad97bb5c - Convert to new perl framework 2013-08-02 18:21:05 +00:00
Mathieu Arnold
13bdf03c6e Convert my ports to the new perl order. 2013-08-02 17:16:28 +00:00
Michael Landin
fdb2b34219 - change MASTER_SITE
Submitted by:	Niilo Kajander <nk@kajander.fi>
2013-08-02 13:23:34 +00:00
Sofian Brabez
d1b0133592 - Update to 1.11.0 2013-08-02 08:19:28 +00:00
Baptiste Daroussin
c1a6c67499 Fix build without gcc 2013-08-01 21:39:42 +00:00
Baptiste Daroussin
ed7057c1e5 Properly fix build with clang
Fix build without gcc
2013-08-01 21:25:35 +00:00
Remko Lodder
6ce9fb0223 Modify the latest puppet entry. Because the matching of the version everything
below 3.2.2 was a match, including all 2.7.x versions. It also appears that
there is no puppet27 version, just puppet-2.7.x and puppet-3.2.x instead.

Bump modification date.

PR:		180958
Submitted by:	Kan Sasaki <sasaki@fcc.ad.jp>
2013-08-01 18:43:48 +00:00
Hiroki Sato
ffe28a82cc Revert LIB_DEPENDS change in the previous commit. This was accidentally
included.
2013-07-31 16:01:03 +00:00
Hiroki Sato
f6342437c7 - Fix LIB_DEPENDS.
- Style cleanups.
- Take maintainership.
2013-07-31 15:45:20 +00:00
Philippe Audeoud
4503c12acd - Update to 1.953
- Use new perl5 framework
- Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.953/Changes
2013-07-31 14:39:18 +00:00
Hiroki Sato
1ad6282266 - Unbreak clang build.
- Remove PORTEXAMPLES.  pkg-plist was broken due to it[*].
- Add extra patches for EMULATOR option.
- Create /var/run/{tpm,ima} in rc.d/tcsd script.

Spotted by:	antoine [*]
2013-07-31 13:59:04 +00:00
Antoine Brodin
e4ceaa901b Unbreak after trousers update 2013-07-31 11:48:47 +00:00
Antoine Brodin
814a6997a0 yara-editor:
- bring in upstream fixes, including the fix for crash on 1st launch
- mark that it is not ready for python 3 yet
- no need to patch the shellbang, distutils do this already
2013-07-31 09:24:32 +00:00
Alexey Dokuchaev
f683aceac0 - Unbreak parallel (-jX) builds (have to use GNU make)
- Respect CC and CFLAGS in a less intrusive way
- Minor cleanups; remove dead WWW link from pkg-descr
2013-07-31 08:33:56 +00:00
Antoine Brodin
9ed1e705d8 Update python-registry to 0.2.5.1 2013-07-30 19:03:06 +00:00
Baptiste Daroussin
f6dbe8d9fc Fix build with clang by forcing standard gnu89
While here trim header
OptionsNG
2013-07-30 12:27:03 +00:00
Baptiste Daroussin
9d867e6d89 Mark as broken, the packaging is a total mess, a fix is WIP. 2013-07-30 09:44:01 +00:00
Baptiste Daroussin
5d65ddf31f Fix build with clang
While here trim headers
2013-07-30 08:52:40 +00:00
Antoine Brodin
0698535d6c Add missing run depends to metasploit 2013-07-29 21:13:34 +00:00
Matthew Seaman
943783d0d5 Now that PMSA-2013-{9,11-15} have been published, borrow from them to
expand on the original rather sketchy entries.

Sort URL references[1]

Submitted by:	remko [1]
2013-07-29 19:17:27 +00:00
Palle Girgensohn
d50f3a6ca4 Move /var/cache/shibboleth to /var/db/shibboleth, since /var/cache has mode 750
and cannot be read by the www user. According to hier(7):
   db/   misc. automatically generated system-specific database files
so /var/db seems like the best choice
2013-07-29 14:49:11 +00:00
Vanilla I. Shu
05fcae2f97 Add libscrypt 1.1, c library for the scrypt key derivation function.
PR:		ports/180903
Submitted by:	Horia Racoviceanu <horia@racoviceanu.com>
2013-07-28 16:51:54 +00:00
Matthew Seaman
87373d972a Security update: multiple vulnerabilities in databases/phpmyadmin and
databases/phpmyadmin35

 - update phpmyadmin to 4.0.4.2

ChangeLog: http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/4.0.4.2/phpMyAdmin-4.0.4.2-notes.html/view

 - update phpmyadmin35 to 3.5.8.2

ChangeLog: http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/3.5.8.2/phpMyAdmin-3.5.8.2-notes.html/view

 - vuxml

The PMSA references shown have not been published yet, hence no CVE
numbers and a lack of detail in the descriptions.  Yes, PMSA-2013-10
is missing from the sequence.  According to the security alert e-mail:

   "For more details, see the upcoming PMASA-2013-8 to PMASA-2013-15 (minus
    PMASA-2013-10 which is reserved for a future advisory)."
2013-07-28 15:38:44 +00:00
Alexey Dokuchaev
f875fa2b38 Try to unbreak parallel builds by calling make(1) correctly. 2013-07-28 08:45:58 +00:00
Remko Lodder
f89b3d36d0 Add entry for wordpress < 3.5.2
Requested by:	Patrick Oonk
2013-07-27 17:36:19 +00:00
John Marino
9d823abcef security/courier(passd,passwd,userinfo): Unbreak fetch and cleanup
The maintainer provided a new download location for his three ports after
a site reorganization broke fetching for two of them.  In addition to
updating the MASTER_SITES, other cleanups where performed:

  * Trim Headers
  * Convert USE_GMAKE to USES+=gmake
  * Convert NOPORTDOCS to options DOCS
  * Removed unterminated string in courierpassd makefile
  * Removed empty strings in courierpassd makefile

PR:		ports/179670
Approved by:	bapt / culot (mentors, implicit)
2013-07-27 16:45:26 +00:00
Alexey Dokuchaev
829c0acfbc Remove defunct URIs from MASTER_SITES and WWW line, switch to SourceForge
for the time being.  Update the COMMENT to match the official description.

NB: v0.4.2 is pretty ancient (ca. 2004 according to sf.net), and there is
0.4.7-2 available (as of 2013-01-05).
2013-07-27 14:11:19 +00:00
Alexey Dokuchaev
48482990e3 Add forgotten file in previous commit. 2013-07-27 13:32:10 +00:00
Alexey Dokuchaev
627a8b98b4 - Fix parallel build (-jX) by calling make(1) correctly and fixing targets
dependencies; respect CFLAGS in a better way
- Define LICENSE (GPLv2) and remove it from portdocs
- Unbreak the build against Clang (remove one inline statement)
- Cleanup the port, pkg-message, and pkg-descr while here
- Do not mention ancient versions of FreeBSD in pkg-message

Reported by:	pointyhat-west
2013-07-27 13:30:52 +00:00
Remko Lodder
0cf457b5fb Add additional reference, bump modified date. 2013-07-27 13:24:18 +00:00
Alexey Dokuchaev
be5de261d4 - Make the port parallel build (-jX) safe
- Convert NOPORTDOCS -> PORT_OPTIONS:MDOCS

Reported by:	pointyhat-west
2013-07-27 12:00:24 +00:00
Hiroki Sato
2915c6da80 Update to 0.3.10. 2013-07-27 04:24:14 +00:00
Xin LI
31071be527 Document BIND denial of service vulnerability 2013-07-26 23:22:36 +00:00
Rene Ladan
66fee90926 KDE3 and QT3 expired on 2013-07-01, remove these ports.
Unfortunately, this also affects some ports using QT3 as a GUI toolkit.

Changes to infrastructure files:
- bsd.kde.mk : obsolete, remove
- bsd.qt.mk : note that a CONFLICTS_BUILD line can probably go after a while
- CHANGES : document the removals from bsd.port.mk
- KNOBS : remove KDE and QT (KDE4 and QT4 should be used instead)
- MOVED : add the removed ports

PR:		ports/180745
Submitted by:	rene
Approved by:	portmgr (bapt)
Exp-run by:	bapt
2013-07-26 19:19:20 +00:00
Nicola Vitale
efa1f30c1b ed25519ll is a low-level wrapper for the Ed25519 public key signature
system. It uses Extension() to compile a shared library that is not a
Python extension module, and then uses ctypes to talk to the library. With
luck it will only be necessary to compile ed25519ll once for each
platform, reusing its shared library across Python versions.

This wrapper also contains a reasonably performat pure-Python
fallback. Unlike the reference implementation, the Python implementation
does not contain protection against timing attacks.

WWW: http://bitbucket.org/dholth/ed25519ll/

Build logs:	http://goo.gl/zv5y7K
2013-07-26 12:44:03 +00:00
Remko Lodder
4155837099 Cleanup last entry. Properly indent the entry and
make sure that after a period on the end of a line
we follow with two spaces.

hat:	    secteam
2013-07-26 11:06:44 +00:00
Andrej Zverev
b9cf423050 - switch simple inline replacement from perl to sed
and remove where is no need in this anymore.
- trim Makefile header

Approved by:  bapt@ (portmrg@)
2013-07-26 10:46:37 +00:00
Jun Kuriyama
f9c20db575 Add an entry for security/gnupg1. 2013-07-25 22:56:06 +00:00
Benjamin Kaduk
e3d11f460c Update to 1.6.5
This is a security release by upstream, and requires configuration changes
in addition to the software update.  See UPDATING.

Reviewed by:	ports-security (zi, remko)
Approved by:	hrs (mentor, ports committer)
2013-07-25 18:29:27 +00:00
Hiroki Sato
e15cf4ef53 Add WWW: line.
Suggested by:	Ronald Klop
2013-07-25 15:49:05 +00:00
Hiroki Sato
a78adc05c2 - Update to 0.4.2.
- Take maintainership.
2013-07-25 15:30:11 +00:00
Jun Kuriyama
e373498283 - Upgrade to 1.4.14.
Security: http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html

I'll write vuxml entry later.
2013-07-25 13:12:27 +00:00
Hiroki Sato
28e7e75bfe - Add WWW: line to pkg-descr.
- Style cleanups.
- Take maintainership.
2013-07-25 11:13:50 +00:00
Hiroki Sato
3326a8cc13 - Fix build on -CURRENT.
- Take maintainership.
2013-07-25 10:49:53 +00:00
Lev A. Serebryakov
26252acebd Add <url></url> to references.
Submitted by:	Remko Lodder <remko@FreeBSD.org>
2013-07-24 20:59:28 +00:00
Lev A. Serebryakov
c24d6a1a61 Update:
devel/subversion to 1.8.1
   devel/subversion16 to 1.7.11

 These releases fix CVE-2013-4131
 http://subversion.apache.org/security/CVE-2013-4131-advisory.txt

Approved by:	Olli Hauer <ohauer@FreeBSD.org> for devel/subversion17
Security:	CVE-2013-4131
2013-07-24 17:18:50 +00:00
Frederic Culot
612a8c8a97 - Update to 4.7.0
Changes:	https://community.rapid7.com/docs/DOC-2362
PR:		ports/180782
Submitted by:	JR Aquino <tanawts@gmail.com> (maintainer)
2013-07-24 12:21:37 +00:00
Emanuel Haupt
ea0f02dfeb Remove MAKE_JOBS_SAFE which is now default. 2013-07-24 08:19:07 +00:00
Bryan Drewery
7078805210 - Update whitespace for 2fbfd455-f2d0-11e2-8a46-000d601460a4
Requested by:	remko
2013-07-23 10:32:22 +00:00
Olivier Duchateau
645728e87f Various helpers to deal with untrusted sources.
WWW: ttps://github.com/mitsuhiko/itsdangerous/
2013-07-22 17:18:01 +00:00
Veniamin Gvozdikov
862c06b489 - Changed my email
- Trim Makefile headers and positions name and surname within

Approved by:	eadler, rm (mentors)
2013-07-22 14:34:22 +00:00
Hiroki Sato
7aa420f1e3 Remove MAKE_JOBS_SAFE since it is now enabled by default. 2013-07-22 14:02:17 +00:00
Hiroki Sato
e8f2ce4e21 - Fix build breakage.
- Add LICENSE.

Reported by:	miwi
2013-07-22 13:45:29 +00:00
Bryan Drewery
ced89103ad - Update suPHP to 0.7.2
- Document possible privilege escalation

Approved by:	maintainer timeout
Security:	2fbfd455-f2d0-11e2-8a46-000d601460a4
2013-07-22 13:24:05 +00:00
Olli Hauer
08adb108c3 - change apache24 version from 2.4.5 to 2.4.6 (2.4.5 was not released)
- add http://www.apache.org/dist/httpd/Announcement2.4.html as reference

requested by remko@
2013-07-21 18:54:51 +00:00
John Marino
2d60de8ed2 security/libsparkcrypto: Optionally generate documentation
It was not possible to generate libsparkcrypto documentation before the
textproc/adabrowse port was created.  Now that AdaBrowse is available,
add a "DOCS" options to generate the documentation.

While here, convert USE_GMAKE to USES+=gmake and fix DESTDIR to work
properly instead of installing during the build phase.  The Makefile
also had to altered to install the documentation as well.

Approved by:	bapt (mentor)
2013-07-21 14:31:45 +00:00
Olli Hauer
b132b94c6b - update to apache24-2.4.6
- new modules: mod_cache_socache, mod_macro and mod_proxy_wstunnel

- add enty to vuxml

SECURITY: CVE-2013-1896 (cve.mitre.org)
 mod_dav: Sending a MERGE request against a URI handled by mod_dav_svn with
 the source href (sent as part of the request body as XML) pointing to a
 URI that is not configured for DAV will trigger a segfault.

SECURITY: CVE-2013-2249 (cve.mitre.org)
 mod_session_dbd: Make sure that dirty flag is respected when saving
 sessions, and ensure the session ID is changed each time the session
 changes. This changes the format of the updatesession SQL statement.
 Existing configurations must be changed.

Changelog:
http://www.apache.org/dist/httpd/CHANGES_2.4.6

with hat apache@

Security:	ca4d63fb-f15c-11e2-b183-20cf30e32f6d
2013-07-20 17:11:54 +00:00
Steve Wills
5d8d6e6eb6 - Update to 0.4.94 2013-07-19 15:52:15 +00:00
Greg Larkin
d0942740f0 - Only disable automatic cron job installation when installing from the
port, not the package.
2013-07-18 21:52:19 +00:00
Greg Larkin
cd05cb5126 - Added an option to control installation of the crontab file. The
option defaults to yes during interactive installation, and the crontab
  file is not installed during non-interactive installation.

Requested by:	espen@tagestad.no (via email)
2013-07-18 20:55:32 +00:00
Baptiste Daroussin
09a705d84b Mark as broken:
main.c: In function 'main':
main.c:360: warning: passing argument 1 of 'smfi_setconn' discards qualifiers from pointer target type
main.c:398: error: 'false' undeclared (first use in this function)
main.c:398: error: (Each undeclared identifier is reported only once
main.c:398: error: for each function it appears in.)
*** [amavisd_milter-main.o] Error code 1

Reported by:	pkg-fallout
2013-07-18 09:58:52 +00:00
Xin LI
a9d6bb6990 Document gallery3 multiple vulnerabilities. 2013-07-17 22:09:58 +00:00
Eitan Adler
aceccabd30 Add missing citation
Requested by:	remko
2013-07-17 22:07:22 +00:00
Wesley Shields
88f91d3078 Chase security/yara change back to using pcre. 2013-07-17 16:54:52 +00:00
Wesley Shields
efb1712107 Cleanup /var/db/sudo if it is empty. This eliminates leftovers when building
the package.
2013-07-17 13:36:10 +00:00
Martin Wilke
c867a08551 - Update to 0.9.5 2013-07-17 04:02:02 +00:00
Martin Matuska
d7599bf7a5 Update Horde_Auth 2.0.5 -> 2.0.6 2013-07-16 23:49:05 +00:00
Martin Matuska
b864c5b83f Horde package update:
Horde_ActiveSync 2.5.3 -> 2.5.5
Horde_Auth 2.0.4 -> 2.0.5
Horde_Cache 2.2.0 -> 2.2.1
Horde_Cli 2.0.3 -> 2.0.4
Horde_Compress 2.0.3 -> 2.0.4
Horde_Compress_Fast 1.0.1 -> 1.0.2
Horde_Core 2.6.1 -> 2.6.2
Horde_Dav 1.0.0 -> 1.0.1
Horde_HashTable 1.0.0 -> 1.0.1
Horde_Icalendar 2.0.6 -> 2.0.7
Horde_Image 2.0.4 -> 2.0.5
Horde_Mail 2.0.5 -> 2.0.6
Horde_Memcache 2.0.1 -> 2.0.3
Horde_Mime 2.2.2 -> 2.2.3
Horde_Prefs 2.4.1 -> 2.5.0
Horde_Vfs 2.1.0 -> 2.1.1
horde-base 5.1.1 -> 5.1.2
horde-content 2.0.2 -> 2.0.3
horde-groupware 5.1.0 -> 5.1.1
horde-imp 6.1.2 -> 6.1.3
horde-ingo 3.1.1 -> 3.1.2
horde-kronolith 4.1.1 -> 4.1.2
horde-mnemo 4.1.0 -> 4.1.1
horde-nag 4.1.0 -> 4.1.1
horde-trean 1.0.2 -> 1.0.3
horde-turba 4.1.0 -> 4.1.1
horde-webmail 5.1.0 -> 5.1.1
2013-07-16 23:00:57 +00:00
Eitan Adler
3e61d7e801 Remove now excess verbiage.
Reviewed by:	bapt
2013-07-16 21:59:48 +00:00
Wesley Shields
891de2ff7f Switch back to pcre. Most other environments are using yara with pcre and
there are too many differences in behavior when using re2.

I'm bumping PORTREVISION here because the port is bumped so infrequently
that I don't want to wait for a more significant change to get this port
back in line with the rest of the yara using world.
2013-07-16 18:52:04 +00:00
Dag-Erling Smørgrav
1dbe7f201b Add two more PHP entries for issues which have already been fixed. 2013-07-16 18:10:12 +00:00
Grzegorz Blach
d9bd84778e Add new port security/please:
Please aims to be little sudo without bells and whistles. Only pam
authentication and executing command.

Approved by:	crees (mentor)
2013-07-16 17:54:53 +00:00
Martin Wilke
800d78b28b - Unbreak build after autotool update 2013-07-16 14:56:10 +00:00
Frederic Culot
097cfd95b3 - Update to 1.08
- Trim Makefile's header
- Remove leading article from COMMENT
- Take maintainership

Changes:	http://search.cpan.org/dist/Data-Password/Changes
2013-07-16 13:42:20 +00:00
Jason Helfman
db49a4aaea Orthrus is a C library and user interfaces for RFC 2289,
"A One-Time Password System (OTP)", also known as OPIE or S/Key.

WWW: http://code.google.com/p/orthrus

PR:		ports/180571
Submitted by:	gavin@16degrees.com.au
2013-07-16 06:30:29 +00:00
Ade Lovett
b3b33257e5 - Update devel/automake to 1.14
- Update devel/gettext to 0.18.3
- Fix known-broken (from exp-runs) ports
- Clean up a lot of cruft in the devel/gettext port itself,
  based on work from tijl@

PR:		178883
Submitted by:	ade
Sponsored by:	Wadsworth 6X
2013-07-16 05:42:36 +00:00
Eitan Adler
0834685815 Update to 11.2r202.291
PR:		ports/179502
Submitted by:	Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp>
2013-07-15 21:06:36 +00:00
Xin LI
0fd34f0bfa Document squid 3.x denial of service vulnerability. 2013-07-15 18:25:19 +00:00
Martin Wilke
0793ce7ca5 - Update to 0.5.14
PR:		180520
Submitted by:	Ports Fury
2013-07-15 14:51:29 +00:00
Carlo Strub
0eb5d3916e Adjust version numbers for OTRS vulnerabilities 2013-07-15 09:26:36 +00:00
Carlo Strub
c061910f6b re-add pkg-message properly 2013-07-15 09:20:33 +00:00
Carlo Strub
9557c63c34 some additional clarifications in the pkg-message file of obfsproxy 2013-07-15 07:49:54 +00:00
Carlo Strub
e6c5f3b473 Move security/pyobfsproxy to security/obfsproxy which was the port of the
legacy C version of obfsproxy and recently renamed upstream.
2013-07-15 07:40:06 +00:00
Eitan Adler
163d2698f2 Add missing modified dates from r321329.
I had this sitting for a bit, but forgot to test & commit.

Requested by:	remko
2013-07-14 22:03:55 +00:00
Carlo Strub
9ff176782f Update to 0.2.2
PR:		ports/179893 ports/179928
2013-07-14 20:38:13 +00:00
Ryan Steinmetz
bc0e97ce46 - Clarify instructions for auditdistd configuration 2013-07-14 13:49:06 +00:00
Ryan Steinmetz
38fc0fb04c - Remove reference to tripwiresecurity.com [1]
- Pacify portlint(1)

Reported by:	William Arbaugh <waa@cs.umd.edu> [1]
Approved by:	cy@ (maintainer)
2013-07-14 13:44:58 +00:00
Brendan Fabeny
b8aeedab97 Update to 0.2.4.15-rc; make the tor rc.d script log level
configurable (as requested by R. Kolar); minor cosmetic changes
2013-07-14 06:42:45 +00:00
Renato Botelho
4e3dd6c86c Fix error message that is showing a wrong dir
Reported by:	Will McCutcheon <will@toyingwithfate.com>
2013-07-13 20:40:50 +00:00
Steve Wills
fc5b28bfb0 - Update to 3.1.1 2013-07-13 19:44:38 +00:00
Guido Falsi
1429a8c4ba Update to 0.4.2
PR:		ports/180450
Submitted by: 	csosstudy <csosstudy@gmail.com> (maintainer)
2013-07-13 11:16:05 +00:00
John Marino
b49a1ce6e2 security/dmitry: Replace MASTER_SITES to restore fetching
PR:		ports/179651
Approved by:	maintainer timeout (>3 weeks), bapt (mentor)
2013-07-12 22:51:34 +00:00
Steve Wills
430d8ad06d - Update to 0.16.1
PR:		ports/179875
Approved by:	Jr Aquino <tanawts@gmail.com> (maintainer)
2013-07-12 19:48:55 +00:00
Baptiste Daroussin
92048bc102 Mark as jobs unsafe 2013-07-12 16:32:07 +00:00
Baptiste Daroussin
283b36e5db Mark jobs unsafe
Convert to USES=gmake
2013-07-12 16:26:50 +00:00
Dmitry Marakasov
daffe00d4a - Trim Makefile headers
- Drop ABI versions from LIB_DEPENDS
- OptionsNG
- Pet portlint
- Switch to dynamic plist where useful
- Canonicalize patch names
- Fix DOS line endings in patch files
2013-07-12 15:01:45 +00:00
Sunpoet Po-Chuan Hsieh
51498efaeb - Update to 20110724.002
- Cleanup Makefile header
2013-07-12 14:31:56 +00:00
John Marino
5feebd9c74 Replace John Marino email address with FreeBSD version
While I'm here, also trim the headers on a couple of ports and remove
a reference to the Dragonlace mirror which is down indefinitely.

Approved by:	bapt (mentor)
2013-07-12 13:40:50 +00:00
Baptiste Daroussin
cfcc8c6c9a Mark jobs unsafe
Trim headers
Convert to USES=gmake
2013-07-12 13:20:04 +00:00
Xin LI
51436e338d Wrap long lines. No content change. 2013-07-11 21:28:39 +00:00
Carlo Strub
68eeaf2e3f Security vulnerabilities in libzrtp
Security:	04320e7d-ea66-11e2-a96e-60a44c524f57
2013-07-11 20:35:19 +00:00
Steve Wills
c5fbdbef6e - Document ruby vulnerability 2013-07-11 20:17:33 +00:00
Sunpoet Po-Chuan Hsieh
c2d1a14c7c - Update to 7.31.0
- Bump PORTREVISION for ftp/curl shlib change
- Add TEST_DEPENDS
- Convert to new options framework
- Adjust options:
  - Add COOKIES
  - Add CYASSL, NSS, POLARSSL, THREADED_RESOLVER, TLS_SRP [1]
  - Add GSSAPI and SPNEGO [2]
  - Remove KERBEROS4
  - Rename LIBIDN to IDN
  - Remove TRACKMEMORY [1]
- Sort option handler
- Add SLAVEDIRS: ftp/curl-hiphop
- Cosmetic change
- Cleanup Makefile header
- While I'm here, fix typo (PORTREVSION) in x11-wm/ede/Makefile

Changes:	http://curl.haxx.se/changes.html
PR:		ports/172325 (-exp run), ports/177369 (based on) [1]
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp> [1], hrs (via email) [2]
Exp run by:	miwi
2013-07-11 16:26:26 +00:00
Rene Ladan
b9ef730527 Remove expired ports:
2013-07-11 databases/embedded_innodb: The Embedded InnoDB project was terminated a few years ago
2013-07-11 print/lyx16: Unmaintained upstream, upgrading to the 2.x series is advised
2013-07-11 security/py-crack: Superseded by security/py-cracklib
2013-07-11 09:33:29 +00:00
Carlo Strub
51d58f52f3 Add vulnerability on otrs
Security:	e3e788aa-e9fd-11e2-a96e-60a44c524f57
2013-07-11 07:50:26 +00:00
Baptiste Daroussin
f3dc0c6f27 Reset maintainer (email is bouncing)
While here:
- Trim headers
- Convert to USES where applicable
- Bump klamav portrevision (pkgconfig is not a run dep anymore)
2013-07-11 05:53:09 +00:00
Matthias Andree
c893c9e130 Remove expired security/openvpn20 port.
It is recommended to migrate to security/openvpn.
2013-07-10 22:28:30 +00:00
Olli Hauer
5183b40651 - update to apache-2.2.25
- update vuxml with additional CVE-2013-1896 entry

Changes with Apache 2.2.25
  http://www.apache.org/dist/httpd/CHANGES_2.2.25

  *) SECURITY: CVE-2013-1896 (cve.mitre.org)
     mod_dav: Sending a MERGE request against a URI handled by mod_dav_svn with
     the source href (sent as part of the request body as XML) pointing to a
     URI that is not configured for DAV will trigger a segfault. [Ben Reser
     <ben reser.org>]

  *) SECURITY: CVE-2013-1862 (cve.mitre.org)
     mod_rewrite: Ensure that client data written to the RewriteLog is
     escaped to prevent terminal escape sequences from entering the
     log file.  [Eric Covener, Jeff Trawick, Joe Orton]

  *) core: Limit ap_pregsub() to 64MB and add ap_pregsub_ex() for longer
     strings.  The default limit for ap_pregsub() can be adjusted at compile
      time by defining AP_PREGSUB_MAXLEN.  [Stefan Fritsch, Jeff Trawick]

  *) core: Support the SINGLE_LISTEN_UNSERIALIZED_ACCEPT optimization
     on Linux kernel versions 3.x and above.  PR 55121.  [Bradley Heilbrun
     <apache heilbrun.org>]

  *) mod_setenvif: Log error on substitution overflow.
     [Stefan Fritsch]

  *) mod_ssl/proxy: enable the SNI extension for backend TLS connections
     [Kaspar Brand]

  *) mod_proxy: Use the the same hostname for SNI as for the HTTP request when
     forwarding to SSL backends. PR 53134.
     [Michael Weiser <michael weiser.dinsnail.net>, Ruediger Pluem]

  *) mod_ssl: Quiet FIPS mode weak keys disabled and FIPS not selected emits
     in the error log to debug level.  [William Rowe]

  *) mod_ssl: Catch missing, mismatched or encrypted client cert/key pairs
     with SSLProxyMachineCertificateFile/Path directives. PR 52212, PR 54698.
     [Keith Burdis <keith burdis.org>, Joe Orton, Kaspar Brand]

  *) mod_proxy_balancer: Added balancer parameter failontimeout to allow server
     admin to configure an IO timeout as an error in the balancer.
     [Daniel Ruggeri]

  *) mod_authnz_ldap: Allow using exec: calls to obtain LDAP bind
     password.  [Daniel Ruggeri]

  *) htdigest: Fix buffer overflow when reading digest password file
     with very long lines. PR 54893. [Rainer Jung]

  *) mod_dav: Ensure URI is correctly uriencoded on return. PR 54611
     [Timothy Wood <tjw omnigroup.com>]

  *) mod_dav: Make sure that when we prepare an If URL for Etag comparison,
     we compare unencoded paths. PR 53910 [Timothy Wood <tjw omnigroup.com>]

  *) mod_dav: Sending an If or If-Match header with an invalid ETag doesn't
     result in a 412 Precondition Failed for a COPY operation. PR54610
     [Timothy Wood <tjw omnigroup.com>]

  *) mod_dav: When a PROPPATCH attempts to remove a non-existent dead
     property on a resource for which there is no dead property in the same
     namespace httpd segfaults. PR 52559 [Diego Santa Cruz
     <diego.santaCruz spinetix.com>]

  *) mod_dav: Do not fail PROPPATCH when prop namespace is not known.
     PR 52559 [Diego Santa Cruz <diego.santaCruz spinetix.com>]

  *) mod_dav: Do not segfault on PROPFIND with a zero length DBM.
     PR 52559 [Diego Santa Cruz <diego.santaCruz spinetix.com>]

PR:		ports/180248
Submitted by:	Jason Helfman jgh@
2013-07-10 19:01:44 +00:00
Rene Ladan
fca5644183 Add new vulnerabilities for www/chromium < 28.0.1500.71
Obtained from:	http://googlechromereleases.blogspot.nl/
2013-07-10 14:35:58 +00:00
Florian Smeets
82057df840 Update to 3.15.1
Submitted by:	Jan Beich <jbeich@tormail.org>
2013-07-10 13:01:52 +00:00
Baptiste Daroussin
ada4f4807c Mark jobs unsafe and convert to USES=gmake 2013-07-10 11:58:46 +00:00
Baptiste Daroussin
33813624cb Mark jobs unsafe 2013-07-10 11:43:18 +00:00
Baptiste Daroussin
cb3bf5c358 Mark jobs unsafe and convert to USES=gmake 2013-07-10 11:20:00 +00:00
Martin Matuska
ad45da9e70 Horde package update:
pear-Horde_ActiveSync 2.5.2 -> 2.5.4
pear-Horde_Core 2.6.0 -> 2.6.1
pear-Horde_Share 2.0.3 -> 2.0.4
2013-07-09 17:18:06 +00:00
Mark Felder
e13651d9bd - Add support for pwck command
PR: ports/180371
Approved by: swills (mentor)
2013-07-09 14:25:56 +00:00
Max Brazhnikov
4206b47dfc - Remove security/pinentry-qt: Qt3 ports are deprecated.
- minor fixes/changes.
2013-07-09 13:37:13 +00:00
Emanuel Haupt
6fe706fd4b - Convert USE_GMAKE to USES=gmake
- Change pkgconfig:build to pkgconfig since it's the same and it's bad practice.
  It accidentally slipped in during the original introduction
- Trim header
2013-07-08 18:42:15 +00:00
Cheng-Lung Sung
4e9a85422a - Update to 2.53
Changes: http://cpansearch.perl.org/src/GAAS/Digest-MD5-2.53/Changes
2013-07-08 02:10:33 +00:00
Jason Helfman
cdebd5ad42 - fix fetch and remove stale mirror
- convert historical header

PR:		180346
Submitted by:	r4721@tormail.org
Approved by:	matthieu@labs.fr (maintainer)
2013-07-07 21:57:17 +00:00
Julien Laffaye
4eebe01c68 - Update to 20130706 snapshot.
- Fix build with go 1.1
2013-07-07 10:02:54 +00:00
Oliver Lehmann
74805540a5 add USES=iconv which it does
Noted by:	mat
2013-07-07 09:03:44 +00:00
Olli Hauer
a344b454d8 - add fix for CVE-2013-1862
- adjust vuxml
2013-07-06 08:46:39 +00:00
Jason Helfman
0458432ec0 - convert USE_GMAKE to USES=gmake 2013-07-06 01:22:56 +00:00
Olli Hauer
89d9998222 - document apache22 CVE-2013-1862 (mod_rewrite)
Update to apache22-2.2.25 is ready to commit.
Until now there is no official announcement from apache.org
so we hold the update back until we have official checksums.
2013-07-05 21:06:15 +00:00
Wesley Shields
5256e84afb Fix missing include.
This was causing the "Undefined symbol '_'" message when hitting ^C or
entering an incorect command.

PR:		ports/180262
Submitted by:	Christophe Juniet <c.juniet@gmail.com>
2013-07-05 18:46:33 +00:00