Commit graph

15090 commits

Author SHA1 Message Date
Cy Schubert
8031aefbc9 Now builds under 9.0-CURRENT. 2011-09-11 23:21:29 +00:00
Ashish SHUKLA
ca77928f00 Re-revise emacs vulnerability to limit with >= 22 and < 22.2_1 instead of
>21.* and <22.2_1 which didn't work as expected
2011-09-10 07:41:21 +00:00
Cy Schubert
7e46f6989f Update 1.6.5 --> 1.9.8
Assume maintainership of this port.
2011-09-09 19:41:42 +00:00
Brendan Fabeny
a508d90c31 - update to 0.2.3.3-alpha
- allow WITH_BUFFEREVENTS again, after upstream changes
- use gcc hardening on versions of the OS that support PIE
- fix linking in the WITH_TCMALLOC case without
changing the default search path for all libraries,
to try to prevent any additional problems
2011-09-09 19:26:41 +00:00
Brendan Fabeny
1ad1b85b62 fix linking in the WITH_TCMALLOC case without
changing the default search path for all libraries,
to try to prevent any additional problems
2011-09-09 19:26:00 +00:00
Jimmy Olgeni
9d2ae83f00 Fix a typo. 2011-09-09 12:02:45 +00:00
Ashish SHUKLA
96677f674d - Limit emacs vulnerability to > 21.* and <= 22.2 instead of just <= 22.2 2011-09-08 22:30:42 +00:00
Chris Rees
3c4a0c7d56 - Add missing dependency
- Chase distfile change
- Correct SPF option, add option for DKIM plugin

PR:		ports/160379
Submitted by:	Janky Jay III <ek@purplehat.org> (maintainer)
2011-09-08 19:32:16 +00:00
Sofian Brabez
fe5705b619 - Update to 0.13
Approved by:	jadawin@ (mentor)
2011-09-08 13:57:10 +00:00
Sofian Brabez
f045d303f8 - Update to 1.3.0
Approved by:	jadawin@ (mentor)
2011-09-08 13:51:46 +00:00
Peter Pentchev
7acef01da1 Update to stunnel-4.43 which is not vulnerable to the security
problem described in the PR.

PR:		160218
Reported by:	Cory McIntire <loon@lolunix.org>
2011-09-08 09:53:47 +00:00
Andrej Zverev
a015f2e5d0 - Replace ../../authors in MASTER_SITE_SUBDIR with CPAN:CPANID macro.
See http://wiki.freebsd.org/Perl for details.
- Change maintainership from ports@ to perl@ for ports in this changeset.

With perl@ hat
2011-09-08 08:36:43 +00:00
Ryan Steinmetz
d05ca82e04 Update to 2.9.1
Add LICENSE

PR:		ports/160044
Submitted by:	zi@
Approved by:	wxs (mentor), maintainer timeout
2011-09-08 01:36:49 +00:00
Ashish SHUKLA
dfda2a32ec Chase editors/emacs update 2011-09-07 20:21:30 +00:00
Eitan Adler
9968bd25b3 - emulators/wahcade: eliminate py-elementtree dependency [0]
- security/zenmap: eliminate py-pysqlite2x dependency [1]
- deskutils/griffith: eliminate py-pysqlite2x dependency [2]

PR:		ports/160049 [0], ports/160071 [1], ports/160161 [2]
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru> [0,1,2]
Approved by:	bapt (mentor)
2011-09-07 19:50:46 +00:00
Xin LI
1ab653e101 Document two OpenSSL vulnerabilities.
(There is no OpenSSL 0.9.8s in the ports so mark <1.0.0 as vulnerable).
2011-09-07 18:30:41 +00:00
Dirk Meyer
6c8034f069 - Security update to 1.0.0e
Security: http://openssl.org/news/secadv_20110906.txt

- drop option TLS_EXTRACTOR, now in distribution

- add RFC-5705 patch
Obtained from:	OpenBSD
2011-09-07 18:10:58 +00:00
Sofian Brabez
36b48d77cf - Update to 11.0.0
- Update MASTER_SITES
- Add LICENSE

Reviewed by:	lwhsu@
Approved by:	jadawin@ (mentor)
2011-09-07 09:27:54 +00:00
Roman Bogorodskiy
58472ecd1f Update to 0.5.
PR:		160334 (based on)
Submitted by:	Kurt Jaeger <fbsd-ports@opsec.eu>
2011-09-07 04:07:06 +00:00
Wesley Shields
37bb0715c9 - Switch to using bsd.port.options.mk. 2011-09-07 01:30:26 +00:00
Pawel Pekala
b60a11438e - Chase devel/google-perftools shlib bump
- security/tor*: add -L${LOCALBASE}/lib to LDFLAGS (fixes linking)

Approved by:    miwi, wen (mentors implicit)
2011-09-06 23:40:32 +00:00
Pav Lucistnik
f6b8d196e9 - Correct massh.conf handling
Reported by:	pointyhat
2011-09-06 23:18:21 +00:00
Florian Smeets
ca91894b39 fix last thunderbird entry 2011-09-06 21:12:04 +00:00
Florian Smeets
8625fcf9a1 add firefox, thunderbird and seamonkey to the DigiNotar.nl entry
Security:	http://www.vuxml.org/freebsd/aa5bc971-d635-11e0-b3cf-080027ef73ec.html
2011-09-06 20:12:44 +00:00
Xin LI
549f67f58a Fix clang build.
PR:		ports/160509
Submitted by:	h h <aakuusta gmail.com>
2011-09-06 20:01:05 +00:00
Wesley Shields
272665e1dc - Update to 1.8.2
- Now depend on gettext
- While here, use DISTVERSION.
2011-09-06 18:07:33 +00:00
Cy Schubert
6fc815c911 Apply patch from MIT KRB5 GIT tree commit: 043533c2f13d2bc69316.
libgssrpc was ignorant of the remote address of the kadmin socket,
even when it's IPv4.  This made old-style GSSAPI authentication fail
because it uses the wrong channel bindings.  Fix this problem by making
clnttcp_create() get the remote address from the socket using getpeername()
if the caller doesn't provide it and it's an IPv4 address.

PR:		160500
Submitted by:	Ben Kaduk <kaduk@mit.edu>
2011-09-06 15:55:36 +00:00
Ashish SHUKLA
defd7eee8a - Update to 0.17
PR:		ports/160451
Submitted by:	sunpoet
2011-09-06 03:02:11 +00:00
Pav Lucistnik
70d7643e6f - Revert part of previous commit, perl is still needed to build
Reported by:	pointyhat
2011-09-05 22:07:21 +00:00
Martin Matuska
69b1f15e47 Update to 1.2.0 2011-09-05 20:05:49 +00:00
Baptiste Daroussin
d9b5d6e084 Fix vuln.xml, while here fix indentation 2011-09-05 16:24:22 +00:00
Eitan Adler
d853d81edd - Update to 1.2.7
PR:		ports/160368
Submitted by:	gjb
Approved by:	dvl (maintainer), bapt (mentor)
Security:	CVE-2011-2938
2011-09-05 15:55:38 +00:00
Eitan Adler
86ce0d9beb - Fix errors in port
Approved by:	bapt (mentor)
2011-09-05 03:50:30 +00:00
Chris Rees
81583d75a7 - Document cfs buffer overflow vulnerability.
- While here, unbreak packaudit -- it doesn't like newlines in the
  middle of tags.  Perhaps a comment should say something?
2011-09-04 20:15:52 +00:00
Eitan Adler
a817fff05a Massh makes it possible to perform the following on hundreds, or even
thousands of hosts in a parallelized fashion:

    * Run Remote Commands
    * Push and Execute Pre-Written Scripts
    * Push Files
    * Pull Files

WWW: http://m.a.tt/er/massh/
PR:		ports/159770
Submitted by:	Sascha Klauder <sklauder@trimind.de>
Approved by:	bapt (mentor)
2011-09-04 19:31:56 +00:00
Chris Rees
144386e89d - After more research, mark FORBIDDEN -- vulnerable to buffer overflows.
- As per policy on security issues, shorten removal date to one month.

Security:	CVE-2002-0351
Security:	DSA-116-1
2011-09-04 19:11:16 +00:00
Chris Rees
346adf89e0 Mark deprecated; broken for two years with no fix.
Expires on 4/Nov

PR:		ports/137378 ports/155788
2011-09-04 16:57:30 +00:00
Johan van Selst
b5e8cad7af Update Nettle to 2.4 (bugfix release) 2011-09-04 15:43:18 +00:00
Matthias Andree
b9fbdfa4d8 Change extract program:
- Also work with HEAD (1.79) version of Mozilla's certdata.txt,
  reported by Daniel Stenberg.
- Add BSD 2-clause license.
- Die when certificates without trust block appear.
2011-09-04 15:11:48 +00:00
Matthias Andree
ac6a550744 Mark MAKE_JOBS_UNSAFE.
Reported by: eadler@.
2011-09-04 13:29:30 +00:00
Matthias Andree
a784172628 See to proper version tags in the bundle .pem file. 2011-09-04 13:21:09 +00:00
Matthias Andree
2ead02b85f Revise nss/ca_root_nss working around Mozilla,
limit ca_root_nss vuln to < 3.12.11 from <= 3.12.11.

Add a new entry for the ca_root_nss bug that caused extraction of untrusted
certificates to the trust bundle.

PR: ports/160455
2011-09-04 13:14:21 +00:00
Matthias Andree
0aaf4d7fb0 Security update: use newer Mozilla Builtin-Trust store
to revoke DigiNotar.nl trust.

Security fix: the modssl ca-bundle.pl script did not process
"untrusted" marks on certificates. Drop it and write a new
script in its place that does that.

Synch up with security/nss port to 3.12.11.

Not asking for maintainer approval because of multiple
timeouts in response to related PRs vs. security/[ca_root_]nss.
2011-09-04 13:08:49 +00:00
TAKATSU Tomonari
ed9b6828f5 - Add a new port: security/R-cran-ROAuth
This package provides an interface to the OAuth 1.0 specification,
  allowing users to authenticate via OAuth to the server of their
  choice.

  WWW:	http://cran.r-project.org/web/packages/ROAuth/
2011-09-04 13:05:23 +00:00
TAKATSU Tomonari
5925e7f3da - Add a new port: security/R-cran-digest
The digest package provides a function 'digest' for the creation
  of hash digests of arbitrary R objects (using the md5, sha-1, sha-256
  and crc32 algorithms) permitting easy comparison of R language
  objects, as well as a function hmac() to create hash-based message
  authentication code. The md5 algorithm by Ron Rivest is specified
  in RFC 1321, the SHA-1 and SHA-256 algorithms are specified in
  FIPS-180-1 and FIPS-180-2, and the crc32 algorithm is described in
  ftp://ftp.rocksoft.com/cliens/rocksoft/papers/crc_v3.txt. For md5,
  sha-1 and sha-256, this packages uses small standalone implementations
  that were provided by Christophe Devine. For crc32, code from the
  zlib library is used. Please note that this package is not meant
  to be deployed for cryptographic purposes for which more comprehensive
  (and widely tested) libraries such as OpenSSL should be used.

  WWW:	http://cran.r-project.org/web/packages/digest/
2011-09-04 13:01:29 +00:00
Sunpoet Po-Chuan Hsieh
9bcf2c5e8c - Correct affected plone versions 2011-09-04 11:46:47 +00:00
Sunpoet Po-Chuan Hsieh
93e80fe6da - Update to 1.71
Changes:	http://search.cpan.org/dist/GD-SecurityImage/Changes
2011-09-04 08:37:16 +00:00
Dirk Meyer
ba4e488555 - bump modifiled for CVE-2007-5137 2011-09-04 04:09:42 +00:00
Sunpoet Po-Chuan Hsieh
4637358a45 - Add p5-Crypt-OpenSSL-CA 0.21
Crypt-OpenSSL-CA - Model of an X509v3 Certification Authority

This package performs the cryptographic operations necessary to issue
X509 certificates and certificate revocation lists (CRLs).  It is
implemented as a Perl wrapper around the popular OpenSSL library.  All
certificate and CRL extensions supported by OpenSSL are available, and
then some.

WWW: http://search.cpan.org/dist/Crypt-OpenSSL-CA/

PR:		ports/160167
Submitted by:	Rodrigo Mosconi <freebsd@mosconi.mat.br>
2011-09-03 20:21:15 +00:00
Dirk Meyer
29bfb40520 - update CVE-2007-5137 2011-09-03 16:28:49 +00:00