Commit graph

16892 commits

Author SHA1 Message Date
Ruslan Makhmatkhanov
4bbecee287 - fix wording of "RUN_DEPENDS"
- use INSTALL_DATA to not set execution bit for plugins
- remove trailing whitespace in pkg-descr, while here

PR:		174047
Submitted by:	antoine (maintainer)
Feature safe:	yes
2012-12-02 12:24:40 +00:00
Ruslan Makhmatkhanov
b52aaee534 - correct displaying of pkg-message
while here:
- use one space in Created by:
- some whitespace aligning
- correct python versions in USE_PYTHON
- use PYDISTUTILS_PKGVERSION to set correct package version instead of crafting
  full PYDISTUTILS_EGGINFO
- remove trailin whitespace in pkg-descr and unneded newlines in pkg-message

PR:		174044
Submitted by:	Sayetsky Anton <vsjcfm@gmail.com>
Approved by:	Christoph Theis <theis@gmx.at> (maintainer)
Feature safe:	yes
2012-12-02 10:53:00 +00:00
Armin Pirkovitsch
e8646409cd - Update to version 6.01
- Add MASTER_SITES
- Add LICENSE

PR:           ports/170169
Submitted by: KATO Tsuguru <tkato432 _at_ yahoo.com>
              Chris Petrik <c.petrik.sosa _at_ gmail.com> (maintainer)
Approved by:  beat (mentor)
Feature safe: yes
2012-12-01 00:00:20 +00:00
Armin Pirkovitsch
1dcc6b441b - Update to version 3.3
- Update MASTER_SITES
- Add LICENSE
- Convert to optionsng

PR:           ports/170168
Submitted by: KATO Tsuguru <tkato432 _at_ yahoo.com>
Approved by:  beat (mentor)
Feature safe: yes
2012-11-30 23:50:42 +00:00
Baptiste Daroussin
b4f9e6a392 Fix compilation with clang on head
Feature safe:	yes
2012-11-30 10:47:14 +00:00
Rene Ladan
c68f649d19 Document vulnerabilities in www/chromium < 23.0.1271.95
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-11-30 09:13:32 +00:00
Sofian Brabez
2cfaf1eaf0 The Volatility Framework is a completely open collection of tools, implemented
in Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples.

WWW: http://code.google.com/p/volatility

PR:		ports/172910
Submitted by:	antoine@FreeBSD.org
Feature safe:	yes
2012-11-29 20:51:45 +00:00
Olli Hauer
ef2bdd9595 www/yahoo-ui
- fix CVE-2012-5881

security/vuxml
 - adjust version (we have only 2.8.2 in the tree)

Feature safe: yes

Approved by:	glarkin (maintainer) explicit
2012-11-29 20:33:19 +00:00
Pawel Pekala
790e08b68e Supplemental plugins for Harlan Carvey's RegRipper.
WWW: http://code.google.com/p/regripperplugins/

PR:		ports/172900
Submitted by:	antoine@FreeBSD.org
Feature safe:	yes
2012-11-29 19:31:26 +00:00
Pawel Pekala
151da04dcc RegRipper is an open source tool, written in Perl, for extracting/parsing
information (keys, values, data) from the Registry and presenting it for
analysis.

WWW: http://code.google.com/p/regripper/

PR:		ports/172899
Submitted by:	antoine@FreeBSD.org
Feature safe:	yes
2012-11-29 19:30:25 +00:00
Frederic Culot
9e0da3c3e9 - Update to 0.46
Changes:	http://search.cpan.org/dist/GnuPG-Interface/ChangeLog
Feature safe:	yes
2012-11-29 17:33:35 +00:00
Wesley Shields
ff9560f056 Fix date in yahoo-ui entry.
Noticed by:	dvl@
Feature safe:	yes
2012-11-28 14:37:24 +00:00
Baptiste Daroussin
44ab5cf477 2012-11-28 editors/glimmer: Depends on the expired gtkglarea through py-gtk
2012-11-26 palm/txt2pdbdoc: No more public distfiles
2012-11-26 sysutils/xloadface: No more public distfiles
2012-11-26 shells/gscommander: Abandonware
2012-11-26 security/saferpay: No more public distfiles
2012-11-26 x11-wm/qvwm: No more public distfiles

Feature safe:	yes
2012-11-28 08:00:54 +00:00
Raphael Kubo da Costa
26801e4cf7 Update to 2.0.3.
This new version includes a migration from Perl to C and support for
ipfw and pf.

While here, trim the Makefile headers.

PR:		ports/171951
Submitted by:	Sean Greven <sean.greven@gmail.com> (maintainer)
Feature safe:	yes
2012-11-27 21:41:29 +00:00
Olli Hauer
3bcd3fdd25 - document www/yahoo-ui security issue and mark port forbidden [1]
pet portlint (maintainer is already notified)

- adjust CVE entries for bugzilla (CVE-2012-5475 was rejected) [2]

Feature safe: yes

Security:	CVE-2012-5881 [1][2]
		CVE-2012-5882 [1][2]
		CVE-2012-5883 [2]

Approved by:	glarkin (implicit) [1]
2012-11-27 20:09:34 +00:00
Rene Ladan
11e9990c10 Describe new vulnerabilities in www/chromium < 23.0.1271.91
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-11-27 10:02:25 +00:00
TAKATSU Tomonari
91f95126fd - Update to 0.6.0
- Convert to new Makefile header
- Trim WWW: line in pkg-descr

Feature safe:	yes
2012-11-26 22:57:07 +00:00
Jase Thew
70dc19873f - Update to 1.2.3
- Assume maintainership

Changes:	https://raw.github.com/polarssl/polarssl/fb1ba781b398d39f4444515381babcc9e5a8dcd2/ChangeLog

Feature safe:	yes
2012-11-26 19:49:22 +00:00
Anton Berezin
1623ed7497 Update to 5.74.
Changes: http://cpansearch.perl.org/src/MSHELOR/Digest-SHA-5.74/Changes

Feature safe:	yes
2012-11-26 12:31:17 +00:00
Alex Dupre
0b6035194b Update to 1.5.3 release.
Feature safe:	yes
2012-11-26 10:59:28 +00:00
Florian Smeets
abbf32d4b2 - Update backports patch to 20121114
- Bump PORTREVISION

Changes:
- CVE-2006-7243
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow
context-dependent attackers to bypass intended access restrictions by placing a
safe file extension after this character, as demonstrated by .php\0.jpg at the
end of the argument to the file_exists function

Secuity 3761df02-0f9c-11e0-becc-0022156e8794 fixed by check in fopen functions
for strlen(filename) != filename_len

- CVE-2012-4388
The sapi_header_op function in main/SAPI.c does not properly determine a pointer
during checks for %0D sequences (aka carriage return characters), which allows
remote attackers to bypass an HTTP response-splitting protection mechanism via a
crafted URL, this vulnerability exists because of an incorrect fix for
CVE-2011-1398.

- Timezone database updated to version 2012.9 (2012i)

PR:		ports/173685
Submitted by:	Svyatoslav Lempert <svyatoslav.lempert@gmail.com>
Approved by:	maintainer
Feature safe:	yes
2012-11-25 15:42:22 +00:00
Wesley Shields
5fb60dc50f Add entries for the following advisories:
FreeBSD-SA-12:08.linux
FreeBSD-SA-12:07.hostapd
FreeBSD-SA-12:06.bind

Feature safe:	yes
2012-11-25 04:02:28 +00:00
Steve Wills
ebdf97f80b - Update to 0.8.7.1
- Fix installation so it doesn't overwrite your config files every time you
  upgrade the port
- Fix some space/tab issues to make portlint happy
- Use dirrmtry in a few places because some people have their own custom
  filters, actions, etc.

PR:		ports/171708
Submitted by:	Mark Felder <feld@feld.me>
Approved by:	Christoph Theis <theis@gmx.at> (maintainer)
Feature safe:	yes
2012-11-24 03:08:36 +00:00
Jase Thew
8c849a82df - Remove hardcoded dependency on security/gpg. Instead, add OPTIONS to allow
choice of GnuPG version.

PR:		ports/172323
Approved by:	jadawin (perl@)

Feature safe:	yes
2012-11-23 15:55:30 +00:00
Dirk Meyer
96e5bf3440 - opera -- execution of arbitrary code
Feature safe: yes
2012-11-22 20:27:45 +00:00
Brendan Fabeny
a6d283edd6 update to 0.2.4.6-alpha
Feature safe:	yes
2012-11-22 11:30:22 +00:00
David Thiel
0a7059d585 Update to 3.0.8, unbreak with utmpx.
Feature safe: Yes
2012-11-21 20:36:28 +00:00
Martin Matuska
1d8470b15e Document new vulnerability in www/lighttpd 1.4.31
Feature safe:	yes
2012-11-21 14:35:31 +00:00
Florian Smeets
9aafe503d0 - Update firefox and thunderbird to 17.0
- Update seamonkey to 2.14
- Update ESR ports and libxul to 10.0.11
- support more h264 codecs when using GSTREAMER with YouTube
- Unbreak firefox-esr, thunderbird-esr and libxul on head >= 1000024 [1]
- Buildsystem is not python 3 aware, use python up to 2.7 [2]

PR:		ports/173679 [1]
Submitted by:	swills [1], demon [2]
In collaboration with:	Jan Beich <jbeich@tormail.org>
Security:	d23119df-335d-11e2-b64c-c8600054b392
Approved by:	portmgr (beat)
Feature safe:	yes
2012-11-20 23:01:15 +00:00
Brendan Fabeny
12311574e9 update to 0.2.3.25
Feature safe:	yes
2012-11-20 15:08:34 +00:00
Renato Botelho
70953c6d15 Update to 20121120
Feature safe:	yes
2012-11-20 14:17:04 +00:00
Frederic Culot
f51195062a - Update to 0.14
- Add LICENSE (Artistic 1 & GPL 1)

Changes:	http://search.cpan.org/dist/Crypt-OpenSSL-DSA/Changes
Feature safe:	yes
2012-11-19 10:34:45 +00:00
Frederic Culot
e40b0f02b3 - Update to 2.31
Changes:	http://search.cpan.org/dist/Crypt-CBC/Changes
Feature safe:	yes
2012-11-19 09:57:33 +00:00
Frederic Culot
f9d48ff0a9 - Update to 0.22
Changes:	http://search.cpan.org/dist/RadiusPerl/Changes
Feature safe:	yes
2012-11-19 09:47:49 +00:00
Martin Matuska
41df8feeb2 horde4 update:
archivers/pear-Horde_Compress 1.0.7 -> 1.0.8
databases/pear-Horde_Db 1.2.1 -> 1.2.2
deskutils/horde4-groupware 4.0.8 -> 4.0.9
deskutils/horde4-kronolith 3.0.17 -> 3.0.18
deskutils/horde4-mnemo 3.0.6 -> 3.0.7
deskutils/horde4-nag 3.0.8 -> 3.0.9
devel/pear-Horde_Alarm 1.0.7 -> 1.0.8
devel/pear-Horde_Cache 1.0.5 -> 1.0.6
devel/pear-Horde_Core 1.9.2 -> 1.9.3
devel/pear-Horde_Date 1.0.11 -> 1.0.12
devel/pear-Horde_Nls 1.1.6 -> 1.1.7
mail/horde4-imp 5.0.23 -> 5.0.24
mail/horde4-ingo 2.0.9 -> 2.0.10
mail/horde4-turba 3.0.15 -> 3.0.16
mail/horde4-webmail 4.0.8 -> 4.0.9
mail/pear-Horde_Imap_Client 1.5.5 -> 1.5.11
mail/pear-Horde_Mime 1.6.1 -> 1.6.2
mail/pear-Horde_Mime_Viewer 1.0.8 -> 1.0.9
security/pear-Horde_Auth 1.4.9 -> 1.4.10
security/pear-Horde_Secret 1.0.2 -> 1.0.4
textproc/pear-Horde_Text_Filter 1.1.5 -> 1.1.6
www/horde4-ansel 2.0.1 -> 2.0.2
www/horde4-base 4.0.15 -> 4.0.16
www/horde4-wicked 1.0.1 -> 1.0.2
www/pear-Horde_Browser 1.0.8 -> 1.0.9
www/pear-Horde_Service_Weather 1.1.2 -> 1.1.3
www/pear-Horde_SessionHandler 1.0.5 -> 1.0.6

Feature safe:	yes
2012-11-19 08:02:01 +00:00
Jase Thew
04822a6d48 - Fix copy and paste error in latest weechat entry
(81826d12-317a-11e2-9186-406186f3d89d)

Feature safe:	yes
2012-11-18 12:51:26 +00:00
Jase Thew
7d1870cfd5 - Document new vulnerability in irc/weechat and irc/weechat-devel
Feature safe:	yes
2012-11-18 12:46:39 +00:00
Ryan Steinmetz
9e979e7feb - Update to 1.3.4
Feature safe:	yes
2012-11-18 05:52:07 +00:00
Philippe Audeoud
bbabd4e43e - Update to 1.77
- Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.77/Changes

Feature safe:	yes
2012-11-16 10:20:21 +00:00
Tom Judge
1f97bf62dc * Fix build against libcli 0.9.6
* Make dependance on ActiveMQ off by default.

Feature safe:	yes
Approved by:	eadler (mentor)
2012-11-16 03:44:09 +00:00
Matthias Andree
43c5928d90 Add CONFLICTS.
Suggested by:	ketas's ports conflicts checker
Feature safe:	yes
2012-11-15 23:33:59 +00:00
Sofian Brabez
c2e8e5f1d6 - Update to 1.9.0
Feature safe:	yes
2012-11-15 20:57:00 +00:00
Olli Hauer
bb7daf8882 - bugzilla security updates to version(s)
3.6.11, 4.0.8, 4.2.4

Summary
=======

The following security issues have been discovered in Bugzilla:

* Confidential product and component names can be disclosed to
  unauthorized users if they are used to control the visibility of
  a custom field.

* When calling the 'User.get' WebService method with a 'groups'
  argument, it is possible to check if the given group names exist
  or not.

* Due to incorrectly filtered field values in tabular reports, it is
  possible to inject code which can lead to XSS.

* When trying to mark an attachment in a bug you cannot see as
  obsolete, the description of the attachment is disclosed in the
  error message.

* A vulnerability in swfstore.swf from YUI2 can lead to XSS.

Feature safe: yes

Security:	CVE-2012-4199
		https://bugzilla.mozilla.org/show_bug.cgi?id=731178

		CVE-2012-4198
		https://bugzilla.mozilla.org/show_bug.cgi?id=781850

		CVE-2012-4189
		https://bugzilla.mozilla.org/show_bug.cgi?id=790296

		CVE-2012-4197
		https://bugzilla.mozilla.org/show_bug.cgi?id=802204

		CVE-2012-5475
		https://bugzilla.mozilla.org/show_bug.cgi?id=808845
		http://yuilibrary.com/support/20121030-vulnerability/
2012-11-14 19:29:42 +00:00
Pawel Pekala
8c5957c966 - Update to version 2.1.5
- Add LICENSE
- Convert to optionsNG
- Don't overwrite user modified config

PR:		ports/172058
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
Feature safe:	yes
2012-11-13 18:54:15 +00:00
Jase Thew
fe3e63dcfc - Update recent weechat entry (e02c572f-2af0-11e2-bb44-003067b2972c)
- Document assigned CVE Identifier
- Document workaround for vulnerable versions

Feature safe:	yes
2012-11-13 18:17:13 +00:00
Rene Ladan
616eda309b Document vulnerabilities in two typo3 components.
Obtained from:	http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005/
Feature safe:	yes
2012-11-12 21:47:27 +00:00
Pawel Pekala
2b97404cf4 Update pkg-descr to current project state
PR:		ports/173445
Submitted by:	Jr Aquino <tanawts@gmail.com>  (maintainer)
Feature safe:	yes
2012-11-12 21:06:19 +00:00
Emanuel Haupt
bd73cda3a7 Mark IGNORE on ${OSVERSION} >= 1000024 where the script got added to the base
system.

Feature safe:	yes
2012-11-12 14:44:24 +00:00
Guido Falsi
edee9b21b3 Fix typo.
Feature safe:	yes
2012-11-12 13:07:30 +00:00
Guido Falsi
864702607f - Update to 2.7.1
- Convert to new options framework
- Document US-CERT VU#268267
- Trim Makefile headers

PR:		ports/173226
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp> (maintainer)
Feature safe:	yes
2012-11-12 13:04:37 +00:00
Pawel Pekala
b7bec7d93b - Update MASTER_SITES and WWW: line
- Support CFLAGS properly
- Add MAKE_JOBS_SAFE
- Don't install license file twice

PR:		ports/172064
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
Feature safe:	yes
2012-11-10 18:16:38 +00:00
Pawel Pekala
d01f1f8167 - Add LICENSE
- Add MAKE_JOBS_SAFE
- Support PORTEXAMPLES
- Replace patch with REINPLACE_CMD

PR:             ports/172063
Submitted by:   KATO Tsuguru <tkato432@yahoo.com>
Feature safe:   yes
2012-11-10 17:38:33 +00:00
Pawel Pekala
a6d974d908 - Add LICENSE
- Switch to PLIST_FILES, PORTDOCS
- Remove bunch of patches, replaced by REINPLACE_CMD

PR:		ports/172062
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
Feature safe:	yes
2012-11-10 17:07:42 +00:00
Pawel Pekala
ada2e37f3b - Add LICENSE
- Switch to PLIST_FILES

PR:		ports/172061
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
Feature safe:	yes
2012-11-10 16:52:43 +00:00
Steve Wills
80df39460a - Improve latest ruby entry slightly
Feature safe:	yes
2012-11-10 15:17:31 +00:00
Jase Thew
b5f3820240 - Modify recent e02c572f-2af0-11e2-bb44-003067b2972c entry
- Add constraints to vulnerable versions
- Add additional references
- Improve topic
- Correct description

Feature safe:	yes
2012-11-10 14:45:55 +00:00
Eitan Adler
236f5555af Apply an upstream patch that fixes a security hole
when receiving a special colored message.

The maintainer was contacted but due to the nature of
the issue apply the patch ASAP.

Approved by:	secteam-ports (swills)
Security:	e02c572f-2af0-11e2-bb44-003067b2972c
Feature safe:	yes
2012-11-10 04:55:47 +00:00
Steve Wills
dd14410e21 - Update lang/ruby19 to 1.9.3p327
- Document security issue in earlier versions

Security:	5e647ca3-2aea-11e2-b745-001fd0af1a4c
Feature safe:	yes
2012-11-10 04:00:41 +00:00
Jason Helfman
90461f79f5 - clarification that ASF reported issue for:
- 152e4c7e-2a2e-11e2-99c7-00a0d181e71d
 - 4ca26574-2a2c-11e2-99c7-00a0d181e71d

Feature safe:	yes
2012-11-09 23:02:15 +00:00
Jason Helfman
c5d5f48eb2 - document tomcat vulnerabilities
Feature safe:	yes
2012-11-09 19:09:32 +00:00
Bryan Drewery
8e52ee3253 - Update to 0.4.3
- Trim header

Feature safe:	yes
2012-11-09 16:18:33 +00:00
Eitan Adler
528c35064c Update latest version and document security issues
PR:	ports/173487
Submitted by:	 Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp>
Security:	4b8b748e-2a24-11e2-bb44-003067b2972c
Feature safe:	yes
2012-11-09 04:31:13 +00:00
Pietro Cerutti
8d1275d48a - fix MASTER_SITES
Reported by:	PH (via beat@)
Approved by:	portmgr@ (implicit)
Feature safe:	yes
2012-11-08 11:16:48 +00:00
Jason E. Hale
4f7ec695a7 - Update to 1.2.0
While here:
- Trim Makefile header
- Fix capitalization and spacing in COMMENT and pkg-descr

PR:		ports/173466
Submitted by:	John Chen <johnpupu@gmail.com>
Approved by:	makc, avilla (mentors, implicit)
Feature safe:	yes
2012-11-08 10:50:29 +00:00
Pietro Cerutti
37a282d06d - fix mtree by avoiding to install a .in CMake configure file
Reported by:	PH (via beat@)
Approved by:	portmgr@ (implicit)
Feature safe:	yes
2012-11-08 09:49:04 +00:00
Rene Ladan
98f8f6fd1f Document new vulnerabilities in www/chromium < 23.0.1271.64
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-11-07 10:15:19 +00:00
Tom Judge
8ba5b30b50 Update to 4.42.
Changes:

http://clamtk.sourceforge.net/CHANGES

Feature safe:	yes
Approved by:	eadler (mentor)
2012-11-07 02:48:57 +00:00
Chris Rees
a17bd43f2f Document opera vulnerabilities
Feature safe:	yes
2012-11-06 20:45:14 +00:00
Felippe de Meirelles Motta
02595801c1 pev is a multiplatform PE analysis toolkit that
includes tools to retrieve and parsing information
about Windows PE files.

PR:		ports/173390
Submitted by:	Danilo Egea Gondolfo <danilogondolfo@gmail.com>
Feature safe:	yes
2012-11-06 19:40:03 +00:00
Raphael Kubo da Costa
ba5714cb8e Pass maintainership to Jr Aquino <tanawts@gmail.com>.
The previous maintainer has timed out on many of the recent updates,
and Jr Aquino has expressed interest in maintaining the port in PR
171800.

I sent an email to both maintainers on Oct 21 and got no response from
Yonatan so far; considering the usual timeout period for PRs of 14
days, I guess it is safe to also use it to pass maintainership to
someone who is more interested in the port.

Feature safe:	yes
2012-11-06 09:20:41 +00:00
Adam Weinberger
09740eacf9 Unbreak package build by registering PORTDOCS if we're installing docs.
Feature safe:	yes
2012-11-06 03:51:42 +00:00
Adam Weinberger
705ad75ebd Force NLS support with a very broken autotools configure. This fixes
package building. PORTREVISION bump for plist change if NLS enabled.

Feature safe:	yes
2012-11-05 22:30:28 +00:00
Sofian Brabez
9ce02d3c65 - Update to 0.3
PR:		ports/172850
Submitted by:	Kubilay Kocak <koobs.freebsd at gmail.com> (maintainer)
Feature safe:	yes
2012-11-05 22:15:43 +00:00
Eitan Adler
ec57b7c60d Fix minor typo
Feature safe:	yes
2012-11-05 17:55:45 +00:00
Eitan Adler
d4f766c819 Update latest version and document security issues
PR:	ports/172619
Submitted by:	tijl
Security:	36533a59-2770-11e2-bb44-003067b2972c
Feature safe:	yes
2012-11-05 17:53:51 +00:00
Bryan Drewery
03230925f6 - Update to 0.5 [1]
- Trim header

PR:		ports/173307 [1]
Submitted by:	pirzyk [1]
Feature safe:	yes
2012-11-05 16:18:31 +00:00
Sofian Brabez
5c42d2f556 - Update WWW
Feature safe:	yes
2012-11-05 13:11:10 +00:00
Sofian Brabez
9e0807c3c0 - Update to 1.5
- Update pkg-descr
- Update ${FILESDIR}/license.sh

Feature safe: yes
2012-11-05 12:51:58 +00:00
Alex Dupre
86c11aa377 Update to 2.0.1 release.
Feature safe:	yes
2012-11-05 10:34:25 +00:00
Grzegorz Blach
ed1ad7e1b9 - Change my email address to gblach@FreeBSD.org
- Change Makefile headers to shorter form

Feature safe:	yes
2012-11-04 13:05:04 +00:00
TAKATSU Tomonari
dd97995921 - Update to 0.9.2
- Convert to new Makefile header
- Trim WWW: line in pkg-descr

Feature safe:	yes
2012-11-04 05:58:42 +00:00
Cy Schubert
823cac2328 Fix plist.
Feature safe:	yes
2012-11-04 02:10:49 +00:00
Cy Schubert
72581e9b75 Update krb5-appl 1.0.2 --> 1.0.3
Feature safe:	yes
2012-11-03 19:28:33 +00:00
Cy Schubert
132c8dd868 Update krb5 1.9.2 --> 1.10.3
Feature safe:	yes
2012-11-03 18:59:37 +00:00
Emanuel Haupt
00df1d9662 Restore 'Created by' header information. This has been removed during the
first announcement of the new trimming rule and the finalized overworked
version.

Feature safe:   yes
2012-11-03 18:01:22 +00:00
Emanuel Haupt
703cf52788 - Update to 1.72
- Trim header

Feature safe:	yes
2012-11-03 17:04:16 +00:00
Emanuel Haupt
c46269266b - Update to 0.69
- Trim header

Feature safe:	yes
2012-11-03 16:54:44 +00:00
Olli Hauer
78d9f12bd3 - update to svn revision 243
Changes: http://code.google.com/p/pulledpork/source/detail?r=243
- Bug #121 - Update to allow for new etpro.com url and cert!
- Bug #119 - Fixed regex [^\\]...
- Unlisted Bug - Allow for escaped ; "\;" in references

Feature safe: yes
2012-11-03 13:14:06 +00:00
Chris Rees
614a28ba15 Correct plural of "vulnerability"
Feature safe:	yes
2012-11-03 11:59:52 +00:00
Emanuel Haupt
7c8c62db8a - Update to 1.49
- Trim header

Feature safe:	yes
2012-11-03 11:33:22 +00:00
Ryan Steinmetz
685f7c16cd - Update to 1.3.3
Feature safe:	yes
2012-11-02 19:10:30 +00:00
Olli Hauer
6ce2ba945d - update apache22 to version 2.22.23
- trim vuxml/Makefile header

with hat apache@

Feature safe: yes

Security:       CVE-2012-2687
2012-11-02 18:45:31 +00:00
Jimmy Olgeni
3ec23a27f5 Add entry for webmin < 1.600_1 (potential XSS attack).
Feature safe:	yes
2012-11-02 18:08:19 +00:00
Chris Rees
1446804ad6 Add cfv to category Makefile
Reported by:	beat
Feature safe:	yes
2012-11-02 17:17:11 +00:00
Pawel Pekala
373301c87d - Update MASTER_SITES and WWW: line
- Add LICENSE
- Switch to PLIST_FILES

PR:		ports/172250
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
Feature safe:	yes
2012-11-02 16:01:37 +00:00
Chris Rees
e6cecb1d38 Resurrect security/cfv and remove optional dependency on
security/py-fchksum; the port works just fine without it.
Feature safe:	yes
2012-11-02 13:23:08 +00:00
Alex Kozlov
e5b501cb86 Remove because it depends on security/py-fchksum which is not in the ports tree anymore.
Feature safe:	yes
2012-11-02 13:11:56 +00:00
Alex Kozlov
468e27bfb3 Remove expired port:
2012-10-20 security/py-fchksum: No more public distfiles

Feature safe:	yes
2012-11-02 11:41:26 +00:00
Bryan Drewery
02b8160c5a - Document ruby vulnerabilities:
* CVE-2012-4464 + CVE-2012-4466
   $SAFE escaping vulnerability about Exception#to_s / NameError#to_s
 * CVE-2012-4522
   Unintentional file creation caused by inserting an illegal NUL character

Reviewed by:	eadler
Feature safe:	yes
2012-11-02 03:17:18 +00:00
Florian Smeets
1345402cf6 Update to 3.8.15
Security:	4b738d54-2427-11e2-9817-c8600054b392
Feature safe:	yes
2012-11-01 14:10:55 +00:00
Li-Wen Hsu
0af6aab139 - Update to 1.2.4
Feature safe:	yes
2012-11-01 05:27:34 +00:00
Li-Wen Hsu
fe6999cbb3 - Update to 1.8.0
Feature safe:	yes
2012-11-01 05:25:54 +00:00
Cy Schubert
fa0057ab71 Update pam_krb5 from 4.4 to 4.6.
Feature safe:	yes
2012-10-31 16:51:29 +00:00
Anton Berezin
d226a3e5b6 - update to 0.06
- remove dependency on Storable (which is bundled with all supported perl versions)
- convert header to the new layout

Changes in 0.06: http://cpansearch.perl.org/src/TJENNESS/Crypt-PassGen-0.06/ChangeLog

Feature safe:	yes
2012-10-31 10:43:23 +00:00
Brendan Fabeny
5c8cee9237 remove a problematic mirror; attempt to fix build on ia64 [1]
Reported by:	A. Shterenlikht [1]
Feature safe:	yes
2012-10-31 09:23:06 +00:00
Ruslan Makhmatkhanov
25b9c14558 - update to 7.16 [1]
while here:
- trim Makefile header
- remove indefinite article in COMMENT
- remove IGNORE_WITH_PHP and IGNORE_WITH_PGSQL since
  we have not this versions in the tree anymore
- fix pkg-plist
- add vuxml entry

PR:		173211
Submitted by:	Rick van der Zwet <info at rickvanderzwet dot nl> [1]
Approved by:	Nick Hilliard <nick at foobar dot org> (maintainer)
Security:	2adc3e78-22d1-11e2-b9f0-d0df9acfd7e5
Feature safe:   yes
2012-10-30 21:01:16 +00:00
Brendan Fabeny
924cc1fc3c update to 0.2.3.24-rc [1]; remove a problematic mirror;
attempt to fix build on ia64 [2]

Reported by:	A. Shterenlikht [2]
Security:	CVE-2012-2249; CVE-2012-2250;
		Tor bugs 7139, 7191 [1]
Feature safe:	yes
2012-10-30 03:27:15 +00:00
Bryan Drewery
9c27afcde5 - Take maintainership
Feature safe:	yes
2012-10-29 15:08:30 +00:00
Gabor Pali
f0ec39444f - Convert options to the new format
PR:		ports/172558
Submitted by:	pgj
Approved by:	maintainer
Feature safe:	yes
2012-10-28 20:07:39 +00:00
Florian Smeets
912a7b12e4 - Update www/firefox{,-i18n} to 16.0.2
- Update seamonkey to 2.13.2
- Update ESR ports and libxul to 10.0.10
- Update nspr to 4.9.3
- Update nss to 3.14
- with GNOMEVFS2 option build its extension, too [1]
- make heap-committed and heap-dirty reporters work in about:memory
- properly mark QT4 as experimental (needs love upstream)
- *miscellaneous cleanups and fixups*

mail/thunderbird will be updated once the tarballs are available.

PR:		ports/173052 [1]
Security:	6b3b1b97-207c-11e2-a03f-c8600054b392
Feature safe:	yes
In collaboration with:	Jan Beich <jbeich@tormail.org>
2012-10-28 17:03:28 +00:00
Chris Rees
09a8c4aa8c RC fixes;
- Use REQUIRE in lieu of BEFORE where possible
- Include KEYWORD: shutdown for persistent services
- load_rc_config should precede any default settings
- Style fixes, indenting functions, remove single-line functions

Approved by:	gabor (maintainer)
Feature safe:	yes
2012-10-28 13:57:12 +00:00
Baptiste Daroussin
4d39da4cc3 - Update MASTER_SITES and WWW: line
- Add LICENSE
- Add MAKE_JOBS_SAFE
- Support PLIST_FILES

Remove file:
files/patch-ad
pkg-plist

Comment for now USE_READLINE as it is buggy

PR:		ports/172053
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
Feature safe:	yes
2012-10-26 23:54:32 +00:00
Baptiste Daroussin
79d70d5453 - Update MASTER_SITES and WWW: line
- Add LICENSE
- Support USE_PYTHON_RUN

PR:		ports/172060
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
Feature safe:	yes
2012-10-26 23:32:25 +00:00
Frederic Culot
7d36eb8fdf - Update to 1.6 [1]
- Add LICENSE (Artistic 1 & GPL 1)

Changes:	http://search.cpan.org/dist/AuthCAS/Changes
PR:		ports/172939 [1]
Submitted by:	Geoffroy Desvernay <dgeo@centrale-marseille.fr>
Approved by:	Frank Wall <fw@moov.de> (maintainer)
Feature safe:	yes
2012-10-26 16:08:41 +00:00
Baptiste Daroussin
c3226aeda4 Deprecate a bunch of ports that are either abandonware and/or for which no more
public distfiles are available

Feature safe:	yes
2012-10-26 10:23:01 +00:00
Jason E. Hale
54a3a5b828 - Update MASTER_SITES
- Remove DEPRECATED/EXPIRATION_DATE as port fetches now
- Use PORTDOCS macro and PLIST_FILES instead of 4 line pkg-plist
- Convert to new options framework
- Trim Makefile header
- Remove dead WWW from pkg-descr
- Rename patch-aa to patch-zz.c

PR:		ports/172065
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
Approved by:	makc, avilla (mentors, implicit)
Feature safe:	yes
2012-10-26 09:29:39 +00:00
Eygene Ryabinkin
98cf8cbd46 mail/exim: upgrade to 4.80.1
This is bugfix-only release, it eliminates remote code execution
in the DKIM code.

Security: http://www.vuxml.org/freebsd/b0f3ab1f-1f3b-11e2-8fe9-0022156e8794.html
QA page: http://codelabs.ru/fbsd/ports/qa/mail/exim/4.80.1
Feature safe: yes
2012-10-26 08:46:40 +00:00
Beat Gaetzi
5b4fdb835a Mark as BROKEN: incomplete plist
Reported by:	pointyhat
Feature safe:	yes
2012-10-26 06:59:32 +00:00
Ruslan Makhmatkhanov
339aa6e578 - add CVE reference (still in reserved state) for recent django vulnerabilty
Feature safe:	yes
2012-10-25 19:31:50 +00:00
Baptiste Daroussin
f155dc3ddc 2012-10-20 security/sscep: No more public distfiles
2012-10-20 security/py-rijndael: No more public distfiles
2012-10-20 security/pam_af: No more public distfiles
2012-10-20 security/its4: No more public distfiles
2012-10-20 russian/xcyrBGR: No more public distfiles
2012-10-20 russian/wmcyrx: No more public distfiles
2012-10-20 print/advi: No more public distfiles
2012-10-20 palm/plucker: No more public distfiles
2012-10-20 net-p2p/py-bittornado-core: Depends on the deprecated wx 2.4
2012-10-20 net-p2p/py-bittornado: Depends on the deprecated wx 2.4
2012-10-20 net-mgmt/nagios-radauth-plugin: No more public distfiles
2012-10-20 net-mgmt/nagios-check_nick: No more public distfiles

Feature safe:	yes
2012-10-25 18:02:31 +00:00
MANTANI Nobutaka
c37e9acb47 Update to 4.3.
Feature safe:	yes
2012-10-25 12:32:21 +00:00
Ruslan Makhmatkhanov
600314693a - update django ports to 1.3.4 and 1.4.2, that fixing couple of security issues.
All users are encouraged to upgrade immediately.
- add vuxml entry

changes common for both ports:
- trim Makefile header
- strict python version to 2.x only
- utilize options framework multiple choice feature to let user to choose
  database backends needed. Make SQLITE option default
- shorten description of HTMLDOCS_DESC to make it fit into dialog screen
- SITELIBDIR -> PKGNAMEPREFIX change in dependencies
- convert NOPORTDOCS condition to optionsng
- tab -> space change in pkg-descr

PR:		173017
Submitted by:	rm (myself)
Approved by:	lwhsu (maintainer, by mail)
Security:	5f326d75-1db9-11e2-bc8f-d0df9acfd7e5
Feature safe:   yes
2012-10-25 10:12:42 +00:00
Boris Samorodov
3029da845a . remove directories installed by other porst from pkg-plist; [1]
. use two line style header;  [1]
. change "${.CURDIR}/.." to "${PORTSDIR}/security" for DESCR.

PR:		ports/172966  [1]
Submitted by:	Barbara <barbara.xxx1975@libero.it>  [1]
Feature safe:	yes
2012-10-23 19:04:19 +00:00
Timur I. Bakeyev
121f37e2a1 Adjust for usage of new MASTER_SITE_SAMBA
Feature safe:	yes
2012-10-22 09:28:54 +00:00
Wesley Shields
1f75ec0a67 Document multiple wireshark vulnerabilities.
Feature safe:	yes
2012-10-22 02:37:07 +00:00
Raphael Kubo da Costa
ac89caedb6 Update to 4.4.0.
PR:		ports/171800
Submitted by:	Jr Aquino <tanawts@gmail.com>
Feature safe:	yes
Approved by:	maintainer timeout (31 days)
2012-10-21 14:00:09 +00:00
Munechika SUMIKAWA
dece71c9bc Make works with perl5.16
Feature safe: yes
Submitted by:	Cy Schubert <Cy.Schubert@komquats.com>
2012-10-21 12:12:54 +00:00
Jason E. Hale
b707e5a735 - Add upstream patch to fix CPU consumption and termination bug
http://code.google.com/p/munge/issues/detail?id=18
- Bump PORTREVISION since runtime behavior will change

While here:
- Trim Makefile header
- Remove indefinite article from COMMENT

PR:		ports/172856
Submitted by:	Loic Pefferkorn <loic-freebsd@loicp.eu>
Approved by:	maintainer
		makc, avilla (mentors, implicit)
Feature safe:	yes
2012-10-20 07:53:53 +00:00
Jason E. Hale
cb58c72603 - Update MASTER_SITES
- Remove DEPRECATED/EXPIRATION_DATE since port fetches now
- Convert to new options framework
- Trim Makefile header

PR:		ports/172055
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
Approved by:	makc, avilla (mentors, implicit)
Feature safe:	yes
2012-10-20 05:10:27 +00:00
Dirk Meyer
708f8cce25 - drop maintainership
Feature safe: yes
2012-10-18 19:19:34 +00:00
Dirk Meyer
e8dc0cb4f4 - drop maintainership
Feature safe: yes
2012-10-18 19:18:59 +00:00
Jason Helfman
bbcfa83bf7 - clarify end-user impact for 57652765-18aa-11e2-8382-00a0d181e71d
Suggested by:	simon@
Feature safe:	yes
2012-10-18 04:13:27 +00:00
Jason Helfman
3e1fd09f4a - document xlockmore issue, 57652765-18aa-11e2-8382-00a0d181e71d, CVE-2012-4524
Feature safe:	yes
2012-10-17 23:47:27 +00:00
Greg Larkin
ac0a60caca - Converted a remaining conditional to OptionsNG
Feature safe:	yes
2012-10-17 19:18:56 +00:00
Greg Larkin
b86ecbfe40 - Updated to 1.3.15
PR:		ports/172520
Submitted by:	Takefu <takefu@airport.fm>
Feature safe:	yes
2012-10-17 19:14:19 +00:00
Sergey Matveychuk
0cc44da55a - Update to 2.3.15
Security: e11955ca-187c-11e2-be36-00215af774f0
Feature safe:	yes
2012-10-17 17:25:43 +00:00
Sergey Matveychuk
2ae50166b4 - xinetd vulnerability
Feature safe:	yes
2012-10-17 17:22:51 +00:00
Ruslan Makhmatkhanov
8d11ec6917 sha3 wrapper (keccak) for Python. The package is a wrapper around the
optimized reference implementation from http://keccak.noekeon.org/ . Only
the optimizations for 32 and 64bit platforms are used. The optimized SSE and
ARM assembly variants are ignored for now.

The module is a standalone version of the SHA-3 implemention of Python 3.4
(currently under development).

WWW: http://bitbucket.org/tiran/pykeccak

PR:		172606
Submitted by:	Kubilay Kocak <koobs.freebsd at gmail dot com>
Feature safe:   yes
2012-10-17 08:03:42 +00:00
Greg Larkin
1aba59f53d - Updated ZF advisory to include similar XEE vulnerability
Feature safe:	yes
2012-10-16 14:37:50 +00:00
Greg Larkin
fc2b1f04c7 - Document Zend Framework XXE injection vulnerability
Feature safe:	yes
2012-10-16 14:26:07 +00:00
Kevin Lo
76d3c9736b - Add missing dependency on perl
- Adopt new Makefile header

Feature safe:	yes
2012-10-16 06:41:41 +00:00
Eitan Adler
478a532c8f Update the distinfo as upstream has changed.
I verfied this to be same content as the old version modulo the copyright.

Approved by:	secteam (implicit)
Feature safe:	yes
2012-10-15 22:31:39 +00:00
Beat Gaetzi
592cf5e025 - Make as BROKEN: missing prerequisites
CMake Error at aux/binpac/CMakeLists.txt:17 (message):
   Could not find prerequisite package 'Perl'

Reported by:	pointyhat
Feature safe:	yes
2012-10-15 19:10:49 +00:00
Eitan Adler
8baf6a3603 Add the CVE for the gitolite vuln.
Feature safe:	yes
2012-10-15 16:31:39 +00:00
Steve Wills
e106672073 - Actually commit the VuXML entry
PR:		ports/172565
Feature safe:	yes
Pointyhat to:	swills
2012-10-15 16:02:12 +00:00
Oliver Lehmann
c36cb48b31 disable SQLite support for the time being (no child port exists)
Feature safe: yes
2012-10-15 12:33:25 +00:00
Matthew Seaman
36d4653ed4 Document the latest security vulnerabilities for phpMyAdmin.
Fix was already committed to the port 6 days ago.

Feature safe:	yes
2012-10-14 21:05:33 +00:00
Ryan Steinmetz
8547d1b97b - Add in additional package names for recent bind vulnerability
Feature safe:	yes
2012-10-14 15:30:47 +00:00
Oliver Lehmann
182cf1e19d update to 0.65.0
Feature safe:	yes
2012-10-14 12:55:49 +00:00
TAKATSU Tomonari
840c486644 - Update to 0.4.4
- Convert to new Makefile header

Feature safe:	yes
2012-10-13 20:37:03 +00:00
Gabor Kovesdan
423a07c748 - Fix mistakenly expanded variable substitution
Noticed by:	zeising
Feature safe:	yes
2012-10-13 18:35:19 +00:00
Gabor Kovesdan
72c887c31c - Let amavisd_ram respect tmpfs [1]
- Fix amavis-p0fanalyzer startup script [2]
- Bump PORTREVISION

PR:		ports/169660 [1],
		ports/172182 [2]
Submitted by:	Helmut Schneider <jumper99@gmx.de> [1],
		Rouslan Iskhakov <rouslan@rshell.net> [2]
Feature safe:	yes
2012-10-13 18:04:57 +00:00
Eitan Adler
b66d828585 Convert to OptionsNG
Trim Headers

PR:	ports/172429
Submitted by:	Michael Gmelin <freebsd@grem.de>
Feature safe:	yes
2012-10-13 17:13:33 +00:00
Dirk Meyer
851945b1eb - cleanup comments
Feature safe: yes
2012-10-13 13:39:56 +00:00
Tilman Keskinoz
61ec221a5e Update to 1.4.20
Feature safe: yes
2012-10-13 12:53:27 +00:00
Ryan Steinmetz
33f6437307 - As pulledpork/barnyard are required for most installations, depend on these by default
Feature safe:	yes
2012-10-13 02:05:14 +00:00
Jason E. Hale
54d220d791 - Update to 1.10
- Convert to new options framework
- Allow for any available version of TCL to be used
- Add LICENSE
- Remove indefinite article from COMMENT, update
- Mark MAKE_JOBS_SAFE
- Trim Makefile header

PR:		ports/172456
Submitted by:	Paul Schmehl <pauls@utdallas.edu> (maintainer)
Approved by:	makc (mentor)
Feature safe:	yes
2012-10-12 11:10:30 +00:00
Bryan Drewery
a57e323196 - Update to 20120831 snapshot [1]
- Trim header

PR:		ports/171201 [1]
Submitted by:	dumbbell [1]
Approved by:	Jui-Nan Lin <jnlin@csie.nctu.edu.tw> (maintainer) [1]
Feature safe:	yes
2012-10-12 02:08:58 +00:00
Bryan Drewery
d229ac58bf - Update to latest snapshot [1]
- Properly install symlinks for auth-pam and down-root plugins [1]
- Fix pkg-message description of locations of these plugins [1]
- Fix plist for nonexistent DOCSDIR/openvpn and DOCSDIRS/sample

PR:		ports/172587 [1]
Submitted by:	Eric F Crist <ecrist@secure-computing.net> (maintainer) [1]
Feature safe:	yes
2012-10-11 20:13:18 +00:00
Bryan Drewery
29193d8a23 - Properly install symlinks for auth-pam and down-root plugins [1]
- Fix pkg-message description of locations of these plugins [1]
- Fix plist for nonexistent DOCSDIR/openvpn

PR:		ports/172598 [1]
Submitted by:	Eric F Crist <ecrist@secure-computing.net> (maintainer) [1]
Feature safe:	yes
2012-10-11 20:11:26 +00:00
Florian Smeets
809698066e - update to 16.0.1
- update vuln.xml entry

Feature safe:   yes
2012-10-11 19:15:12 +00:00
Alex Dupre
0152f87d81 Update to 2.0.0 release:
- add PSKC support

Feature safe:	yes
2012-10-11 14:09:26 +00:00
Wesley Shields
8a5f60ba4f If OPIE option is on we can not pass --with-pam in CONFIGURE_ARGS. Make it
so that OPIE will pass --with-opie and if it is off we pass --with-pam. [1]

No functional changes with this, just a build fix.

While here use tabs where appropriate and cleanup pkg-descr. [2]

Feature safe:	yes
2012-10-11 13:36:47 +00:00
Rene Ladan
f789f9d2e3 Document a new vulnerability in www/chromium < 22.0.1229.94
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-10-10 22:06:59 +00:00
Florian Smeets
98ff1f74fb - Update firefox-esr, thunderbird-esr, linux-firefox and linux-thunderbird to 10.0.8
- Update firefox and thunderbird to 16.0
- Update seamonkey to 2.13
- Update all -i18n ports respectively
- switch firefox 16.0 and seamonkey 2.13 to ALSA by default for better
  latency during pause and seeking with HTML5 video
- remove fedisableexcept() hacks, obsolete since FreeBSD 4.0
- support system hunspell dictionaries [1]
- unbreak -esr ports with clang3.2 [2]
- unbreak nss build when CC contains full path [3]
- remove GNOME option grouping [4]
- integrate enigmail into thunderbird/seamonkey as an option [5]
- remove mail/enigmail* [6]
- enable ENIGMAIL, LIGHTNING and GIO options by default
- add more reporters in about:memory: page-faults-hard, page-faults-soft,
  resident, vsize
- use bundled jemalloc 3.0.0 on FreeBSD < 10.0 for gecko 16.0,
  only heap-allocated reporter works in about:memory (see bug 762445)
- use lrintf() instead of slow C cast in bundled libopus
- use libjpeg-turbo's faster color conversion if available during build
- record startup time for telemetry
- use -z origin instead of hardcoding path to gecko runtime
- fail early if incompatible libxul version is installed (in USE_GECKO)
- *miscellaneous cleanups and fixups*

PR:		ports/171534 [1]
PR:		ports/171566 [2]
PR:		ports/172164 [3]
PR:		ports/172201 [4]
Discussed with:	ale, beat, Jan Beich [5]
Approved by:	ale [6]
In collaboration with:	Jan Beich <jbeich@tormail.org>
Security:	6e5a9afd-12d3-11e2-b47d-c8600054b392
Feature safe:	yes
Approved by:	portmgr (beat)
2012-10-10 21:13:06 +00:00
Andrej Zverev
8b040d94f2 - Remove SITE_PERL from *_DEPENDS (final part)
Approved by: portmgr@ (bapt@)
2012-10-10 16:56:07 +00:00
Jason E. Hale
d978af402e - Update to 2.0.3
- Remove devel/pth dependency; libassuan-pth was dropped in 2.0.0
- Remove additional CFLAGS for amd64; builds fine on tinderbox without them

Approved by:	makc, avilla (mentors, implicit)
2012-10-10 15:21:55 +00:00
Jason E. Hale
39593d116b - Take maintainership
Approved by:	makc, avilla (mentors, implicit)
2012-10-10 12:20:25 +00:00
Erwin Lansing
b6095ca45c Upgrade to the latest BIND patch level:
A deliberately constructed combination of records could cause named
to hang while populating the additional section of a response.

Security:	  http://www.vuxml.org/freebsd/57a700f9-12c0-11e2-9f86-001d923933b6.html
2012-10-10 11:54:44 +00:00
Ryan Steinmetz
7d73f0d5a1 - Update to 1.3.2 2012-10-10 11:42:04 +00:00
Ryan Steinmetz
f0a01a1e2d - Add additional MASTER_SITES for pkcs header files. 2012-10-10 11:25:06 +00:00
Ryan Steinmetz
76c4e3b429 - Update to 4.54 2012-10-09 22:19:55 +00:00
Mark Linimon
a8693b8dee Force numerous ports that fail to build with clang over to instead always
rely on gcc.  The patch uses the new USE_GCC=any code in Mk/bsd.gcc.mk to
accomplish this.

The ports chosen were ports that blocked 2 or more ports from building with
clang.  (There are several hundred other ports that still fail to build with
clang, even with this patch.  This is merely one step along the way.)

Those interested in fixing these ports with clang, and have clang as their
default compiler, can simply set FORCE_BASE_CC_FOR_TESTING=yes.

For those who have gcc as their default compiler, this change is believed
to cause no change.

Hat:		portmgr
Tested with:	multiple runs on amd64-8-exp-bcm and 9-exp-clang, with various
		combinations of patch/no-patch and flag settings.
2012-10-09 22:12:13 +00:00
Sofian Brabez
a1a2f49cac - Fix Makefile header 2012-10-09 11:14:31 +00:00
Sofian Brabez
bf7e39e982 - Update MASTER_SITES
- Remove options description already in Mk/bsd.options.desc.mk
2012-10-08 22:51:50 +00:00
Xin LI
f5f555fb36 Add a few casts to initializer of int array when the constant is greater
than 0x7fffffff, as they have exceeded the range of standard int.  This
makes the code to compile when -std=c++11.

The resulting binary was not changed by this commit.  PORTREVISION
not bumped intentionally as this is a build fix.

While I'm there, also convert the header to new style.

PR:		ports/171525
Submitted by:	Michael Gmelin <freebsd grem de>
2012-10-08 21:55:37 +00:00
Rene Ladan
f7c717bc10 Document new vulnerabilities in www/chromium < 22.0.1229.92
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
2012-10-08 20:45:52 +00:00
Doug Barton
deda664425 Throw my ports back in the pool, and make my intentions clear for the
various ports that I've created.

I bid fond fare well
A chapter closes for me
What opens for you?
2012-10-08 10:38:47 +00:00
Sofian Brabez
db15666cad - Fix logic problem 2012-10-08 09:38:22 +00:00
Sofian Brabez
b2adb9e2d1 - Convert to new option framework
- Add LICENSE
- Update MASTER_SITES
- Update pkg-descr
2012-10-08 08:13:05 +00:00
Jason E. Hale
f077975c81 - Fix typo
Noticed by:	bsam
Approved by:	makc (mentor implicit)
2012-10-07 21:03:15 +00:00
Jason E. Hale
8316b5f018 - Update to 0.4.5 [1]
- Drop specific ABI version numbers from LIB_DEPENDS [2]
- Trim Makefile header [2]
- Convert to new options framework [2]
- Fix build on 7.x [2]

PR:		ports/172395
Submitted by:	Kurt Jaeger <fbsd-ports@opsec.eu> (maintainer) [1]
Approved by:	makc (mentor), maintainer [2]
2012-10-07 20:43:21 +00:00
Doug Barton
d5a5903a44 Restore option descriptions to what the maintainer actually put in the PR
Pointy hat to:	eadler

PR:		ports/172426
Submitted by:	Michael Gmelin <freebsd@grem.de> (maintainer)
2012-10-07 19:31:17 +00:00
Doug Barton
09b4d34dc4 silence reinplace command from last commit 2012-10-07 18:53:25 +00:00
Sofian Brabez
eb29091417 - Convert to new options framework
- Add LICENSE
- Add math/py-numpy build depends
- Bump PORTREVISION
2012-10-07 08:44:21 +00:00
Doug Barton
a424a10aae Work around a problem on stable/[89] with libotr generating an
"undefined reference to `__stack_chk_fail_local'" error. None
of the usual remedies work (such as making sure that gcc is used
instead of ld for the linker) so on those releases we simply
disable that option.

pointyhat logs confirm that pidgin-otr (the only consumer of libotr
atm) is failing on 8 and 9 with the same configure error that I am
seeing on 8, so this patch should at least allow it to build on those
releases.

Bump PORTREVISION for libotr to err on the side of caution.

While I'm here, remove a now-spurious mod to the pidgin-otr configure.
2012-10-07 07:54:18 +00:00
Baptiste Daroussin
f5ca116cda use libtommath as default math library as it used to be before conversion to
optionsng

Repored by:	linimon
2012-10-07 07:12:54 +00:00
Eitan Adler
a65ebd957d Convert to OptionsNG
PR:	ports/172426
Submitted by:	Michael Gmelin <freebsd@grem.de>
2012-10-07 04:44:48 +00:00
Eitan Adler
d95db58136 Trim the headers in the ports I maintain. 2012-10-06 14:35:45 +00:00
Renato Botelho
566e1b7f4e Change headers of all ports maintained by me to new format 2012-10-05 12:41:45 +00:00
Greg Larkin
bcb47fb57b - Updated to 1.3.0
- Removed explicit library version number from gpg-error in LIB_DEPENDS

PR:		ports/172202
Submitted by:	Doug Barton <dougb@freebsd.org>
2012-10-04 20:16:55 +00:00
Jason Helfman
3aec6823ff - Make GMP OPTION'al
- Add upstream patch for test failure when built without GMP

PR:		172299
Submitted by:	koobs.freebsd@gmail.com
2012-10-04 16:45:41 +00:00
Baptiste Daroussin
0c06111c46 Convert to new options framework 2012-10-04 10:48:50 +00:00
Ruslan Makhmatkhanov
e791395a82 - fix runtime when devel/subversion and/or devel/pysvn is installed [1]
- bump PORTREVISION

As side effect, I completely disabled --update feature. It was done for number
of reasons:
- subversion relationship starts not only if --update feature is requested by
  user, but when pysvn or svn is available
- we do not installing repository metadata from the source tarball (exactly this
  breaks the --update option, but it is broken anyway, see below)
- aforementioned repository metadata is not compatible with svn 1.7, that is in
  ports now
- development repository moved to github from subversion hosting anyway

This is accomplished with replacing the call of getRevisionNumber() with static
const, that represents the svn last revision from tarball.

while here:
- trim Makefile header
- remove indefinite article from COMMENT
- convert to optionsng

Reported by:	Fausto Marzi <fausto.marzi at gmail dot com> (by mail) [1]
2012-10-03 20:01:09 +00:00
Ruslan Makhmatkhanov
4841bb2ab4 - correct the range in last entry (le/lt typo) 2012-10-03 12:51:11 +00:00
Ruslan Makhmatkhanov
db8657349b - update to 2.8.10
- add vuxml entry

This release fixes SQL injection vulnerability.

PR:		172114
Submitted by:	rm (myself)
Approved by:	ports-secteam (eadler)
Security:	dee44ba9-08ab-11e2-a044-d0df9acfd7e5
2012-10-03 12:33:38 +00:00
Sofian Brabez
8be1420b3f - Update to 1.8.0 2012-10-03 11:07:31 +00:00
Julien Laffaye
3d2151acf5 - Update to 20121001 snapshot 2012-10-03 07:46:54 +00:00
Jason Helfman
fe5909d1aa - set maintainer to ruby@ 2012-10-03 00:47:00 +00:00
Andrej Zverev
43b2f3f94d - Fix typos (LICENSE is correct form inside bsd.licenses.mk).
- Removed LICENSE_FILE where is no need in this.

Spotted by:	zont@
Approved by:	portmgr (bapt@)
2012-10-02 16:40:40 +00:00