Commit graph

16892 commits

Author SHA1 Message Date
Matthias Andree
51939c51c1 OpenVPN changes, upgrades and fixes:
- Upgrade security/openvpn to v2.3.0 (changes installed layout a bit),
  splitting and re-diffing patches.
- Retain v2.2.2 as security/openvpn22
- Mark security/openvpn20 as deprecated and to expire 6 months from now
- Fix TCP_NODELAY option (openvpn 2.3, 2.2), see
  <http://community.openvpn.net/openvpn/ticket/158>
- Fix PassTOS option (openvpn 2.2, 2.0), see
  http://community.openvpn.net/openvpn/ticket/135
2013-01-11 23:09:37 +00:00
Ruslan Makhmatkhanov
41baa561f4 - drop PKGNAMEPREFIX (it's an app, not library)
- replace su-to-zenmap.sh (su detection script) with more clean solution
  from PC-BSD, that does not require modification to work properlt with kde4
- bump PORTREVISION

PR:		175120
Submitted by:	nemysis <nemysis@gmx.ch> (maintainer)
2013-01-11 20:22:28 +00:00
Ryan Steinmetz
780c794649 - Fix discovery date on nagios vulnerability (CVE-2012-6096) 2013-01-11 14:11:27 +00:00
Eygene Ryabinkin
dfb4aa68fa www/squid3x: upgrade to 3.1.23 and 3.2.6
Squid 3.1.23 is effectively Squid 3.1.22_2 with the final fix for
CVE-2012-5643 applied.

Squid 3.2.6 also received that abovementioned fix, but in comparison
with 3.2.5 from ports it has another change that fixes handling the
"tcp_outgoing_tos" directive for BSD-like systems, including FreeBSD,
  http://bugs.squid-cache.org/show_bug.cgi?id=3731

VuXML entry for SQUID:2012-1 (aka CVE-2012-5643) was also updated to
reflect the proper version specifications from the updated advisory,
  http://www.squid-cache.org/Advisories/SQUID-2012_1.txt

Approved by:	Thomas-Martin Seck <tmseck@web.de>
Security:	http://portaudit.freebsd.org/c37de843-488e-11e2-a5c9-0019996bc1f7.html
QA page:	http://codelabs.ru/fbsd/ports/qa/www/squid31/3.1.23
QA page:	http://codelabs.ru/fbsd/ports/qa/www/squid32/3.2.6
2013-01-11 09:53:41 +00:00
Ryan Steinmetz
61dff6701a - Document vulnerability in net-mgmt/nagios (CVE-2012-6096) 2013-01-11 01:16:14 +00:00
Rene Ladan
714b96e33c Document vulnerabilities in www/chromium < 24.0.1312.52
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
2013-01-11 00:32:48 +00:00
Martin Matuska
3fbd06d67b Update Horde Groupware to 5.0.3:
security/pear-Horde_Share 2.0.2
textproc/pear-Horde_SpellChecker 2.1.0
comms/pear-Horde_SyncMl 2.0.2
textproc/pear-Horde_Text_Filter 2.0.4
devel/pear-Horde_Token 2.0.2
sysutils/pear-Horde_Vfs 2.0.4
ftp/horde-gollem 3.0.0RC2
www/horde-base 5.0.3
mail/horde-imp 6.0.3
mail/horde-ingo 3.0.2
deskutils/horde-groupware 5.0.3
deskutils/horde-kronolith 4.0.3
deskutils/horde-mnemo 4.0.2
deskutils/horde-nag 4.0.2
devel/horde-timeobjects 2.0.2
www/horde-trean 1.0.0RC1
mail/horde-turba 4.0.2
mail/horde-webmail 5.0.3
2013-01-10 17:39:16 +00:00
Martin Matuska
279369dc0b Horde maintenance update to following new versions:
devel/pear-Horde_Alarm 2.0.3
devel/pear-Horde_Argv 2.0.3
security/pear-Horde_Auth 2.0.2
www/pear-Horde_Browser 2.0.3
devel/pear-Horde_Cli 2.0.2
archivers/pear-Horde_Compress 2.0.2
devel/pear-Horde_Core 2.1.5
security/pear-Horde_Crypt 2.1.1
security/pear-Horde_Crypt_Blowfish 1.0.2
devel/pear-Horde_Data 2.0.2
devel/pear-Horde_Date 2.0.2
devel/pear-Horde_Exception 2.0.2
www/pear-Horde_Form 2.0.2
devel/pear-Horde_Icalendar 2.0.2
graphics/pear-Horde_Image 2.0.2
devel/pear-Horde_Itip 2.0.2
textproc/pear-Horde_Kolab_Format 2.0.2
devel/pear-Horde_LoginTasks 2.0.2
mail/pear-Horde_Mime_Viewer 2.0.2
devel/pear-Horde_Nls 2.0.2
textproc/pear-Horde_Pdf 2.0.2
security/pear-Horde_Perms 2.0.2
devel/pear-Horde_Prefs 2.1.0
www/pear-Horde_Routes 2.0.2
devel/pear-Horde_Util 2.0.3
2013-01-10 10:34:08 +00:00
Anton Berezin
52ea9e33df Update to 1.52.
Changes:	http://search.cpan.org/dist/Net-SSLeay/Changes
2013-01-10 09:24:24 +00:00
Kevin Lo
5950919d7a Assign maintainership to Craig Leres.
PR:	ports/175152
2013-01-10 02:29:44 +00:00
Florian Smeets
fc9eea7212 - update firefox, thunderbird, linux-firefox and linux-thunderbird to 17.0.2
- update firefox-esr, thunderbird-esr and libxul to 10.0.12
- update linux-seamonkey to 2.15

Security:	http://www.vuxml.org/freebsd/a4ed6632-5aa9-11e2-8fcb-c8600054b392.html
2013-01-09 23:28:19 +00:00
Thomas Abthorpe
b2d4b657d1 - Change MAINTAINER address
- Trim headers while I am here
- Clean up some trailing whitespace
2013-01-09 19:50:06 +00:00
Sergey Matveychuk
abf896d430 Fix <topic> style: common dash style, remove softvare versions 2013-01-09 15:03:01 +00:00
Sofian Brabez
f78beb00ec - Convert to new option framework 2013-01-09 13:17:27 +00:00
Baptiste Daroussin
7c736f500c Convert vanhu@ ports to new options framework
Removed optionnal dependency on the deprecated py-visual for net/scapy

Approved by:	maintainer (vanhu)
2013-01-09 11:06:32 +00:00
Steve Wills
039ae3caa9 - Update rubygem-rails to 3.2.11
- Update ports require by rubygem-rails
- Add vuxml entry for rails security issues

Security:	ca5d3272-59e3-11e2-853b-00262d5ed8ee
Security:	b4051b52-58fa-11e2-853b-00262d5ed8ee
2013-01-09 03:53:15 +00:00
Renato Botelho
6591313e33 Update to 20130108 2013-01-08 23:58:30 +00:00
Ryan Steinmetz
6d7ff3db8d - Properly copy namespace attributes/resolve make validate issues
Reviewed by:	simon@, eadler@
Approved by:	zi (with ports-secteam hat)
2013-01-08 23:46:02 +00:00
Hajimu UMEMOTO
e17b4f7b57 Don't search lib32 on FreeBSD/i386. 2013-01-08 15:15:57 +00:00
Li-Wen Hsu
9e8220759f Document Jenkins 2013-01-04 Security Advisory 2013-01-08 05:18:14 +00:00
Jason Helfman
f4c5c26085 - update security/rubygem-net-ssh to 2.2.2,2 [1]
- update devel/rubygem-mixlib-authentication to 1.3.0 [2]
- update devel/rubygem-highline to 1.6.15 [3]
- update sysutils/rubygem-chef to 10.16.4 [4]

PR:		171010 [1]
PR:		173646 [2]
PR:		173647 [3]
PR:		171005 [4]
Submitted by: nickdewing@gmail.com [1,4]
Submitted by: maintainer, renchap@cocoa-x.com [2,4], renchap@cocoa-x.com [3]
2013-01-08 00:35:19 +00:00
David Thiel
d542383805 Update to 3.0.9. 2013-01-07 21:14:03 +00:00
TAKATSU Tomonari
e62bbe9b89 - Update to 5.0.1
- Change maintainer address
- Trim Makefile header
- Convert to new options framework
- Cleanup

PR:		ports/173860 (based on)
Submitted by:	Riaan Kruger (maintainer)
2013-01-07 12:11:14 +00:00
Ryan Steinmetz
0ab76792fc - Update to 1.3
- Update header for new 'created by' style
- Add LICENSE
2013-01-06 21:24:03 +00:00
Eygene Ryabinkin
10329684c5 VuXML: extend entry for MoinMoin vulnerabilities fixed in 1.9.6
Use more verbose descriptions from CVE entries and trim citation
from CHANGES to the relevant parts.
2013-01-06 20:37:24 +00:00
Olli Hauer
dfddabb5cd - update nmap to version 6.25
- fix build with clang and stdlib=libc++ [1]

Nmap 6.25 [2012-11-29]
o [NSE]	Added CPE to smb-os-discovery output.

o [Ncat] Fixed the printing of warning messages	for large arguments to
  the -i and -w	options. [Michal Hlavinka]

o [Ncat] Shut down the write part of connected sockets in listen mode
  when stdin hits EOF, just as was already done	in connect mode.
  [Michal Hlavinka]

o [NSE]	Added new fingerprints for http-enum: Sitecore,	Moodle,	typo3,
  SquirrelMail,	RoundCube. [Jesper Kückelhahn]

o Added	some new checks	for failed library calls. [Bill	Parker]

PR:		172358
		174817

Submitted by:	arrowdodger <6yearold@gmail.com> [1]
		Anders N. <wicked@baot.se> (general update request)
2013-01-06 18:42:38 +00:00
Li-Wen Hsu
ea30109921 Document Django 2012-12-10 vulnerabilty 2013-01-06 18:14:23 +00:00
Hajimu UMEMOTO
4cbb088d05 If security/krb5 is installed and OPENLDAP option is enabled, it
failed to build unless KRB5_HOME is set properly.  Now, only when
KRB5_HOME is set properly, it build with security/krb5.

Spotted by:	David Gessel <gessel__at__blackrosetech.com>
2013-01-06 16:56:55 +00:00
Hajimu UMEMOTO
b63862b5e7 Use proper krb5-config when using HEIMDAL in ports. 2013-01-06 16:37:52 +00:00
Eygene Ryabinkin
f23d543f2c VuXML: fix r309982
Use proper tags for CVE identifiers.  I should run 'make validate'
_every_ time before committing.
Pointyhat to:	rea
2013-01-06 13:24:39 +00:00
Eygene Ryabinkin
5160c1cd21 VuXML for MoinMoin issues: add CVE references 2013-01-06 13:10:10 +00:00
Matthias Andree
568dc8e828 Bump PORTREVISION, to get the ports rebuilt with ${CC}. 2013-01-06 13:04:46 +00:00
Matthias Andree
2df322a6f4 - Convert to Options NG. Renames GTK option to GTK2 for consistency.
- Strip Makefile header.
- Make sure that the port build heeds ${CC}, passing it through MAKE_ARGS.
- Replace CC-is-clang specific -Wno-empty-body by unconditional -Wno-error.
- Remove LIB_DEPENDS ABI versions.
2013-01-06 12:52:30 +00:00
Matthias Andree
df0862b076 - Convert to OptionsNG
- Strip Makefile header
- Drop LIB_DEPENDS ABI versions
2013-01-06 11:29:44 +00:00
Florian Smeets
0dc6f44549 Update to 3.14.1.with.ckbi.1.93
This was released to revoke certificates that were used for MITM. For
details see:

https://blog.mozilla.org/security/2013/01/03/revoking-trust-in-two-turktrust-certficates/
2013-01-05 21:34:25 +00:00
Hajimu UMEMOTO
7e9e4ddc3a When building with security/krb5 (specifying KRB5_HOME), make
sure to link mit-krb5 libs.
2013-01-05 18:01:02 +00:00
Johan van Selst
11b6704ad8 Update SKS to 1.1.4 2013-01-05 15:41:39 +00:00
Brendan Fabeny
2a56971eac update lang/sbcl to 1.1.3 and adjust dependent ports 2013-01-05 14:13:46 +00:00
Chris Rees
6e35983b99 Freetype 2.4.8 vulnerabilities were already documented.
While here, correct pkgname

Noticed by:	kwm
2013-01-05 12:54:28 +00:00
Chris Rees
d3b77c45e6 Mark moinmoin vulnerable
Security:	http://www.debian.org/security/2012/dsa-2593

document freetype vulnerabilities

Security:	CVE-2012-(1126-1144)
2013-01-05 11:29:00 +00:00
Ruslan Makhmatkhanov
a872d8cf5c - update to 6.25
while here:
- limit python version to 2.x only (pygtk2)
- correct dependency

PR:		174607
Submitted by:	nemysis <nemysis@gmx.ch> (maintainer)
2013-01-04 20:01:47 +00:00
Brendan Fabeny
3f2ca9c1d8 update the R base ports to 2.15.2 and adjust dependent ports
Reviewed by:	thierry, tota, wen
2013-01-04 17:51:39 +00:00
Erwin Lansing
cf6de2da7f Bump copyright to 2013. 2013-01-04 07:30:09 +00:00
Florian Smeets
a3056ea587 Add correct version numbers to the recent asterisk entry
Pointy hat to:	flo
2013-01-03 19:46:51 +00:00
Florian Smeets
9a4203f7ce - update net/asterisk to 1.8.19.1
- update net/asterisk10 to 10.11.1
- update net/asterisk11 to 10.1.2
- add vuln.xml entry

Security:	f7c87a8a-55d5-11e2-a255-c8600054b392
2013-01-03 19:41:30 +00:00
Chris Rees
b9dc70b62d Note charybdis and ircd-ratbox vulnerabilities
PR:		ports/174878
Security:	http://www.ratbox.org/ASA-2012-12-31.txt
2013-01-02 12:28:47 +00:00
Wesley Shields
f7fd2d2466 Disable PIE on ia64. This was causing a run-time failure.
Submitted by:	Anton Shterenlikht, Todd Miller
2013-01-01 20:33:52 +00:00
Baptiste Daroussin
132750cf0c Convert to optionsng
Trim headers
2012-12-31 12:47:32 +00:00
Baptiste Daroussin
17817288a1 Remove useless LICENSE_FILE 2012-12-31 12:46:02 +00:00
Ruslan Makhmatkhanov
b089e4ac3f - enclose email in header into proper brackets 2012-12-31 08:21:05 +00:00