Commit graph

20248 commits

Author SHA1 Message Date
Antoine Brodin
2e4f02d791 Adjust to work with new openpyxl 2014-10-19 22:40:28 +00:00
Antoine Brodin
ff4b83fdd2 Update to 2.1.0.8 2014-10-19 22:17:07 +00:00
Max Brazhnikov
0ea52f99b4 KDE/FreeBSD team presents KDE SC 4.14.2 and KDE Workspace 4.11.13!
USE_KDE4=kdehier component has been deprecated, new components added:
 baloo			- Baloo core libraries
 baloo-widgets		- Baloo widgets library
 kfilemetadata		- KDE library for extracting file metadata

New ports:
  graphics/kqtquickcharts	- QtQuick plugin to render interactive charts
  misc/artikulate		- Pronunciation trainer for KDE
				(not usable currently, links to both
				GStreamer 1.x and 0.10.x via dependencies)
  sysutils/baloo[-widgets]	- KDE framework for searching and
				managing user metadata
  sysutils/kfilemetadata	- Library for extracting file metadata

l10n ports:
- Farsi (Persian) and Indonesian translations has been readded
- Vietnamese didn't pass threshold for inclusion into release

astro/kstars:
- switch dependency from math/eigen2 to math/eigen3
- add PYKDE option for updating supernovae data

deskutils/kdepim4:
- update dependencies: add libkgapi and baloo,
  remove now needless clucene, link-grammar, strigi
- add patch to fix build with gcc42
- update COMMENT and description for all KDE PIM ports

devel/ruby-krossruby:
- remove BROKEN, it builds with ruby 2.x now

editors/kate:
- add patch to disable memory-hungry build of the kate tests [1]

graphics/okular:
- add dependency on graphics/libkscreen

math/cantor:
- add optional dependency on lang/luajit for LuaJIT backend
- fix gfortran detection [2]

misc/kdehier4:
- adapt to new pkg world. Now the purpose of kdehier4 only
  to link some stuff between KDE4_PREFIX and LOCALBASE.

science/kalzium:
- switch dependency from math/eigen2 to math/eigen3
- add dependence on science/chemical-mime-data

x11-themes/kdeartwork4
- switch dependency from math/eigen2 to math/eigen3

among other changes:
- drop deprecated USE_KDE4=kdehier
- drop @dirrm from plist
- clean up pkg-descr
- convert to options helpers
- other portlint fixes

The area51 repository features commits by alonso, rakuco and myself.

PR:		187150 [1]
Reported by:	pe.freethread@live.com
Patch by:	Tobias Berner <tcberner@gmail.com>

PR:		180674 [2]
Reported by:	torsten.eichstaedt@web.de

PR:		194316
Exp-run:	antoine
2014-10-19 15:57:27 +00:00
Antoine Brodin
24055ead51 Fix packaging 2014-10-19 15:55:16 +00:00
Thomas Zander
88b3708a52 - Un-break build for non-standard OPTION VCHKPW
PR:		193851
Submitted by:	uffe@uffe.org (maintainer)
MFH:		2014Q4
2014-10-19 10:18:19 +00:00
John Marino
7d17057c0d security/wpa_supplicant: Fix build on FreeBSD 11
On FreeBSD 11, the wpa_supplicant couldn't find the readline headers.
It turns out that Mk/Uses/readline.mk only augments LDFLAGS and CPPFLAGS,
but wpa_supplicant needs -I${LOCALBASE}/include add to CFLAGS.  To fix
FreeBSD build, augment CFLAGS with value of CPPFLAGS in the makefile.

This wasn't an issue on DragonFly.  Apparently wpa_supplicant found the
readline compatibility headers of libedit and used those instead.

reported by:	pkg-fallout
2014-10-19 09:33:04 +00:00
Steve Wills
6d983268f0 security/sslsplit: add port 2014-10-18 18:04:22 +00:00
Cy Schubert
632d308662 Fix LATEST_LINK. 2014-10-18 17:05:55 +00:00
Koop Mast
a502e38ceb Document libxml2 denial of service 2014-10-18 12:52:26 +00:00
John Baldwin
1ebd0e3345 The MAP_NORESERVE flag to mmap() has never been implemented in FreeBSD and
is being removed.  No portrev bump needed since the kernel will continue to
accept this flag for old binaries even after support for it in new binaries
is removed.

PR:		193961
Approved by:	portmgr (antoine)
2014-10-18 12:20:42 +00:00
Antoine Brodin
cf943b289e Unbreak 2014-10-18 10:06:58 +00:00
Thomas Zander
9b26979594 - Update to upstream version 20140826
PR:		193020
Submitted by:	rsimmons0@gmail.com
Approved by:	maintainer timeout
2014-10-18 08:51:46 +00:00
Cy Schubert
3e268db6a3 Add dependency option, defaulting to security/krb5. 2014-10-17 19:31:25 +00:00
Johannes Jost Meixner
94470d7653 security/linux-c6-openssl: kill poodle
- Upgrade openssl to 1.0.1e-30.el6_5.2

Approved by:	swills (mentor)
Security:	03175e62-5494-11e4-9cc1-bc5ff4fb5e7b
2014-10-17 14:34:52 +00:00
Johannes Jost Meixner
8950579048 Add linux-c6-openssl to OpenSSL entry from 2014-10-15.
Approved by:	swills (mentor)
2014-10-17 14:34:14 +00:00
Baptiste Daroussin
791f2bc627 Reset maintainership 2014-10-17 10:23:34 +00:00
Vsevolod Stakhov
a3563e63de - Update to 2.1.1. 2014-10-17 10:13:01 +00:00
Cy Schubert
a28880acce MIT Kerberos released 1.13; 1.12 becomes a maintenance release,
1.11 remains a maintenance release.

- Update security/krb5 1.12.2 --> 1.13
- Copy the old security/krb5 1.12.2 to security/krb5-112
  (now a maintenance release supported by MIT)
- Move the old krb5-maint (1.11.5: old maintenance release) to
  security/krb5-111 (the old maintenance release still supported by MIT)
2014-10-16 19:44:22 +00:00
Florian Smeets
2eac7ee011 Document critical SQL Injection Vulnerability in www/drupal7 2014-10-16 18:19:57 +00:00
John Marino
5ebdc43505 Remove @dirrm from package list of 8 of my ports 2014-10-16 10:56:37 +00:00
Beat Gaetzi
f74c61732f - Mark libxul as vulnerable too
Submitted by:	Jan Beich
2014-10-16 10:34:50 +00:00
Bartek Rutkowski
dc6bd49497 security/kpcli: update 2.5 -> 2.7
PR:		194114
Submitted by:	Alexander Grigoryev <alexander.4mail@gmail.com>
Approved by:	mentors (implicit)
2014-10-16 09:40:52 +00:00
Guido Falsi
04584e5299 - Fix runtime error when used with OpenSSL 1.0.1i [1]
- While here, Fix LICENSE, rename patch files and remove dirrms

PR:		193988
Submitted by:	me
Obtained from:	upstream git repo [1]
Approved by:	maintainer timeout
2014-10-16 09:15:54 +00:00
Alex Kozlov
43a22bb0dd - Fix various distinfo errors
- Remove unused USE_* knobs
- Fix typos in USE_* knobs
- Remove empty lines after .include <bsd.port.mk>

Approved by:	portmgr (bapt)
Differential Revision:	https://reviews.freebsd.org/D911
2014-10-16 08:55:30 +00:00
Wesley Shields
9f1ff7d28f Update to 1.8.11p1
PR:		194259
Submitted by:	cy@ and Yasuhiro KIMURA <yasu@utahime.org>
2014-10-16 02:05:17 +00:00
Ryan Steinmetz
84834f4c2d - Update to 1.9.13
Submitted by:	brooks@
2014-10-16 00:16:37 +00:00
Dmitry Marakasov
4b8ea145f1 - Fix regex to match all sshd auth errors
PR:		194382
Submitted by:	ronald-lists@klop.ws
MFH:		2014Q4
2014-10-15 20:28:48 +00:00
Dmitry Marakasov
3e2b7a507f - Fix rule reset time on arm
PR:		194381
Submitted by:	ronald-lists@klop.ws
MFH:		2014Q4
2014-10-15 20:27:29 +00:00
Bryan Drewery
745d6e04b6 Fix build on systems without stdnoreturn.h
Reported by:	many
2014-10-15 19:22:21 +00:00
Johan van Selst
0390167226 Update gss to 1.0.3 (API+ABI compatible) 2014-10-15 19:17:17 +00:00
Xin LI
70302614ee Update to 1.01j.
With hat:	ports-secteam
Security:	vuxml 03175e62-5494-11e4-9cc1-bc5ff4fb5e7b
Security:	CVE-2014-3513
Security:	CVE-2014-3566
Security:	CVE-2014-3567
Security:	CVE-2014-3568
2014-10-15 18:34:13 +00:00
Johan van Selst
b2202c5236 Update to signing-party 1.1.10 2014-10-15 18:31:19 +00:00
Xin LI
7126d27017 Document OpenSSL multiple vulnerabilities. 2014-10-15 17:59:37 +00:00
Beat Gaetzi
8f7f02ae39 - Update Firefox to 33.0
- Update Firefox ESR to 31.2.0
- Update NSS to 3.17.2
- Update Thunderbird to 31.2.0
- Update libxul to 31.2.0 (and mark as BROKEN)
- Disable SSL 3.0 with pref (Upstream bug 1076983)
- (workaround) replace USE_GCC=yes with USES=compiler:gcc-c++11-lib in
  order to fix runtime for PGO and powerpc/powerpc64 on libc++ systems
- Add OSS audio fallback for HTML5 audio from upstream bug;
  not exposed yet because WebRTC still needs ALSA or PulseAudio
- Kill @dirrm from gecko@ ports per CHANGES from 20140922
- Drop workaround for LLVM PR 19007: base and lang/clang34 have the fix
- Improve workaround comment for LLVM PR 15840, partially rejecting
  r348851 by marino@ until bug 193555

PR:		194356
Submitted by:	Jan Beich
Security:	http://www.vuxml.org/freebsd/9c1495ac-8d8c-4789-a0f3-8ca6b476619c.html
2014-10-15 15:48:16 +00:00
Bryan Drewery
098c7e1322 - Update to 3.2.19 2014-10-15 15:38:46 +00:00
Beat Gaetzi
ae91f822d2 Document mozilla vulnerabilities
PR:		194356
Submitted by:	Jan Beich
2014-10-15 11:46:04 +00:00
Lars Engels
6f5a4bb011 - Update to 1.6.2
- Don't install dev/ directory
- Use .sample suffix for config file
- Reset maintainer after 4 maintainer timeouts
- Take maintainership
2014-10-14 06:30:17 +00:00
Ganael LAPLANCHE
2bbc7813e0 Update to 1.20.2 2014-10-14 06:20:55 +00:00
John Marino
30c09442dd security/wpa_supplicant: Fix mis-information in pkg-message 2014-10-13 19:34:48 +00:00
John Marino
61f267d59a security/wpa_supplicant: Bring in BSD driver fix from DragonFly BSD
DragonFly adopted it's "new" IEEE 802.11 infrastructure from FreeBSD.
This introduced an additional isr_meshid_len field in the
ieee80211req_scan_result structure.  It is necessary to include this
additional offset when calculating the address of the IE data buffer.

Imre Vadasz introduced this fix to DragonFly on 01 Sept 2014, but a
similar fix doesn't appear to be present in FreeBSD's base wpa_supplicant.
2014-10-13 13:49:55 +00:00
Mathieu Arnold
e7b918df60 Only works with php 5.2 -> 5.4.
Sponsored by:	Absolight
2014-10-13 13:08:27 +00:00
John Marino
51b8291f38 wpa/supplicant: Fix driver list with NDIS, take 2
It turns out the driver list was only showing "null" for NDIS when -h
(help) or an unknown switch was passed to wpa_supplicant.  The cause is
that the NDIS driver is the only that that has to be initialized, and
the initialization wasn't occurring in the above case.

The fix is the move the NDIS driver initialization before the command
switches are examined in case wpa_supplicant aborts to usage early.
2014-10-13 12:56:04 +00:00
John Marino
ae5f2c59ae security/wpa_supplicant: Fix NDIS driver, privsep no longer default
The NDIS driver didn't build when privsep option was turned off.  Moveover,
it didn't display the driver name correctly, so I figured out a patch
based on base's ndis driver code.  Thirdly, when privsep option is turned
off, wpa_priv is not built, so let's handle that condition.

Finally, remove privsep from default options because it removes the
standard list of drivers and replaces it with privsep driver.
2014-10-13 09:33:07 +00:00
Vsevolod Stakhov
8444a63926 - Update to 2.1.0
Submitted by:	Johan Schuijt <johan at 300.nl> via private email
2014-10-13 08:33:03 +00:00
Ganael LAPLANCHE
b0e7522bcf Remove @dirrm/@dirrmty from my ports 2014-10-13 07:12:43 +00:00
John Marino
0d6daefa09 Revive security/wpa_supplicant after 6.5 years => version 2.3
This port was retired at version 0.3.8 because wpa_supplicant is
part of FreeBSD base.  However, the last few releases have had a period
of only a few months, so the base is always going to be behind.  DragonFly
is also affected, so I'm bringing the port back at the latest version.

It features the same patches as FreeBSD including the conversion to use
libutil's pidfile routines.  There are some additional patches for
DragonFly support and to fix some bugs from the 9 Oct 2014 release.

The WPA Supplicant build system has been converted to ports options, and
there are dozens of them.  I've set the defaults to match the
configuration in base and verified that it builds with all options
selected at once.
2014-10-12 21:20:25 +00:00
Rodrigo Osorio
5506039337 Update security/pam_ocra to 1.1
PR:	ports/194133
Submitted by:	sg2342@googlemail.com (maintainer)
Approved by:	mentors (implicit)
2014-10-12 17:47:16 +00:00
Antoine Brodin
b64de8f3ae Unbreak on freebsd 8 and 9 2014-10-12 08:35:51 +00:00
Roman Bogorodskiy
24ed10f509 Update to 0.22.1. 2014-10-12 06:12:59 +00:00
Vsevolod Stakhov
5e756f0000 - Update to 1.0.0
Reported by:	urras <urras at tox.im> via private email
2014-10-11 19:36:49 +00:00
Tilman Keskinoz
8700b44c2f Update to 1.4.23 2014-10-11 18:46:36 +00:00
Hajimu UMEMOTO
af5b874dac Use Uses/gssapi.mk.
Submitted by:	hrs
2014-10-11 17:57:11 +00:00
Bartek Rutkowski
69a4bb6af1 security/aespipe: update v2.3e -> v2.4c
PR:		193992
Submitted by:	Ekkehard Gehm <gehm@doom-labs.net>
Approved by:	mentors (implicit)
2014-10-11 16:50:24 +00:00
Roman Bogorodskiy
39805b50a1 Update to 1.16. 2014-10-11 16:13:09 +00:00
Hajimu UMEMOTO
31d3cfd61c Since we don't use its own libtool, build arg is required
to USES=libtool.

Spotted by:	antoine
2014-10-10 17:58:07 +00:00
John Marino
c0ab223c0f security/sguil: Fix shebang in sguild
PR:		194249
Submitted by:	maintainer (Muhammad Rahman)
2014-10-10 09:24:04 +00:00
Hajimu UMEMOTO
6f1768ca2b Include RPATH in the libs, again.
It seems that USES=libtool doesn't rewrite ${LIBTOOL} in
a configure script to use ${LOCALBASE}/bin/libtool like
bsd.autotools.mk did.
So, rewrite it explicitly for workaround.

PR:		194176
Submitted by:	jhujhiti__at__adjectivism.org
2014-10-09 13:18:28 +00:00
Mark Felder
c1641fed7e Convert USE_PYTHON_RUN to new USES syntax;
Appease the angry DEVELOPER=YES god

Approved by:	mat
2014-10-09 13:17:26 +00:00
Mark Felder
cee4eb51b0 Add entry for foreman-proxy
Obtained from:	mmoll
2014-10-09 13:09:52 +00:00
Antoine Brodin
22a3335b80 Fix packaging for linux-c6-libtasn1 and linux-f10-libtasn1
Prevent future issues for mdocml
2014-10-09 05:55:58 +00:00
Emanuel Haupt
e283a7caf5 Remove @dirrm, @dirrmtry 2014-10-08 14:26:25 +00:00
Rene Ladan
92e654eadb Document new vulnerabilities in www/chromium < 38.0.2125.101
Obtained from:	http://googlechromereleases.blogspot.nl/2014/10/stable-channel-update.html
MFH:		2014Q4
2014-10-08 08:32:04 +00:00
William Grzybowski
44c62498d9 security/vinetto: switch from py-imaging to py-pillow
- USES python
- Rename option to reflect reality

With hat:	python
Approved by:	portmgr (bdrewery, implicit)
2014-10-07 11:42:25 +00:00
Bryan Drewery
325e005274 Note my intentions with OVERWRITE_BASE 2014-10-07 00:48:25 +00:00
Sunpoet Po-Chuan Hsieh
9588594094 - Add py-oauth2client 1.3
oauth2client is a Python module for client-side oauth2 authentication. It works
with Google's oauth2 service by default, and is compatible with any oauth2
service.

WWW: https://pypi.python.org/pypi/oauth2client
WWW: http://google.github.io/oauth2client/
2014-10-06 23:08:26 +00:00
Olli Hauer
4f19d92e37 - document bugzilla security issues 2014-10-06 19:09:34 +00:00
Renato Botelho
682b3abc2e Use new @dir for directories out of PREFIX 2014-10-06 10:21:01 +00:00
Bartek Rutkowski
9f9ec87676 security/py-pylibacl: update 0.5.0 -> 0.5.2 and fixes
- Change the MASTER_SITES to CHEESESHOP
- Convert to USES=python
- Change the pkg-descr url
- Pet portlint
- Maintainer's timeout

PR:		193054
Submitted by:	Bartek Rutkowski <robak@FreeBSD.org>
Approved by:	mentors (implicit)
2014-10-06 09:17:39 +00:00
Antoine Brodin
f77c61ef10 New port: security/py-rekall
The Rekall Framework is a completely open collection of tools, implemented in
Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples. The extraction techniques are
performed completely independent of the system being investigated but offer
visibility into the runtime state of the system. The framework is intended to
introduce people to the techniques and complexities associated with extracting
digital artifacts from volatile memory samples and provide a platform for
further work into this exciting area of research.

WWW: http://www.rekall-forensic.com/
2014-10-05 20:12:23 +00:00
Tijl Coosemans
88c67cd38c - Update devel/libtool and devel/libltdl to version 2.4.2.418
- Patch libtool so it uses the same library version specification as on
  Darwin, Linux and other systems.  Given the version current:revision:age
  a library will be given the extension .so.major.age.revision with major
  equal to current-age.  Before libtool would use .so.current on FreeBSD.
- Patch libtoolize to remove two cases of umask 0 that caused libltdl
  files to be copied world writable (--ltdl option)
- Let USES=libtool patch this new version correctly
- Adjust all ports with USES=libtool:build and bump PORTREVISION on their
  dependent ports if a library version changed

PR:		194068
Exp-run by:	antoine
Approved by:	portmgr (antoine)
2014-10-05 18:01:19 +00:00
Antoine Brodin
ddb907c803 Update to 20140928 2014-10-04 22:21:59 +00:00
Antoine Brodin
c166489a46 Switch from py-imaging to py-pillow 2014-10-03 20:49:50 +00:00
Bryan Drewery
9b637227c4 - Mark OVERWRITE_BASE and security/openssh-portable-base as DEPRECATED.
These will be removed on January 1 2015.

  Really ports should not be touching the base system at all.

  This option is a big foot-shoot problem:

  1. Recent versions of FreeBSD such as 9.3, 10.0, 10.1+, now remove all ssh
     files from /usr if you 'make delete-old' with WITHOUT_SSH. This results in
     removing the overwrite base files.
  2. Uninstalling the package leaves the system with no ssh.
  3. Running installworld without WITHOUT_SSH results in overwriting the
     package, or giving false-positive 'pkg check -s' errors.
  4. The port fails to pass QA checks because it removes system files.
2014-10-03 19:31:07 +00:00
Bryan Drewery
7f9db6bed2 Support multiple ListenAddress ports
Reported by:	rustamabd@gmail.com
2014-10-03 19:23:03 +00:00
Bryan Drewery
a1d0d79986 Fix rsyslog entry for pkgname matching 2014-10-02 21:14:31 +00:00
Matthew Seaman
c042b3ff7e www/rt42 < 4.2.8 is vulnerable to shellshock related exploits through
its SMIME integration.

Security:	81e2b308-4a6c-11e4-b711-6805ca0b3d42
2014-10-02 19:59:02 +00:00
Brad Davis
fb3f37589e - Update the rsyslog entry to reflect the new versions
Reviewed by:	bdrewery
2014-10-02 19:30:56 +00:00
Bryan Drewery
b455206d28 Update to 3.2.18 2014-10-02 18:40:11 +00:00
Mathieu Arnold
cd7e7c160c Cleanup @dirrm* from my ports.
Sponsored by:	Absolight
2014-10-02 16:37:02 +00:00
Mark Felder
eef685b8bb The default pardon and prescribe settings in the rc script were swapped
and did not match the documentation. Users should tune to their needs
instead of relying on the defaults, but if they are this will be an
improvement.

Submitted by:	John Vinopal
2014-10-02 12:28:02 +00:00
Bryan Drewery
ddc9d6d9b4 Update Jenkins entry 549a2771-49cc-11e4-ae2c-c80aa9043978 to be readable. 2014-10-02 01:06:43 +00:00
Bryan Drewery
25485f86c6 Update grammar of DoS in Jenkins entry 2014-10-02 00:54:29 +00:00
Bryan Drewery
c2c59333ab Fix Jenkins entry to note that XSS is an issue, not as compiler 2014-10-02 00:53:43 +00:00
Bryan Drewery
59834325c3 Document Jenkins vulnerabilities
Security:		CVE-2014-3661
Security:		CVE-2014-3662
Security:		CVE-2014-3663
Security:		CVE-2014-3664
Security:		CVE-2014-3680
Security:		CVE-2014-3681
Security:		CVE-2014-3666
Security:		CVE-2014-3667
Security:		CVE-2013-2186
Security:		CVE-2014-1869
Security:		CVE-2014-3678
Security:		CVE-2014-3679
2014-10-02 00:46:54 +00:00
Bryan Drewery
33e5a12d5b Fix bash entries to also mark bash-static vulnerable 2014-10-01 22:57:16 +00:00
Bryan Drewery
15015e6b02 Document CVE-2014-6277 and CVE-2014-6278 for bash. 2014-10-01 22:30:59 +00:00
Bryan Drewery
ca11fc5279 - Document CVE-2014-7187 fixed in bash-4.3.27_1 2014-10-01 22:12:11 +00:00
Matthew Seaman
a763414630 Document the latest phpMyAdmin vulnerability.
- while here fix the '>' breakage in the rsyslogd entry.

Security:	3e8b7f8a-49b0-11e4-b711-6805ca0b3d42
2014-10-01 21:25:46 +00:00
Tijl Coosemans
0bda2cf7ad - Convert to USES=autoreconf
- Remove USES=libtool:build because this port does not use libtool
2014-10-01 10:11:33 +00:00
Bryan Drewery
a703832b9e Document CVE-2014-7186 for bash 2014-10-01 03:40:03 +00:00
Baptiste Daroussin
1446608ec7 Convert to USES=horde
Fix pear-Horde_core options
Use options helpers where possible
2014-09-30 22:14:59 +00:00
Brad Davis
b210b76fd9 - Document sysutils/rsyslog vulnerabilities CVE-2014-3634
Reviewed by:	bdrewery@
2014-09-30 20:09:32 +00:00
John Marino
2ab3cf8b2c security/libbeid: Add <stdlib.h> header for malloc
The existing patch removed "<malloc.h>" but didn't provide "<stdlib.h>".
Adjust to compound patch to fix that oversight.

FWIW, the extra work to partially fix a patch is one reason I don't like
one-patch-many-files.  It's not the only reason.
2014-09-30 18:34:58 +00:00
Sunpoet Po-Chuan Hsieh
ffae57f93e - Pet portlint: move USES=pear downward 2014-09-30 15:23:23 +00:00
Marcus von Appen
5b550ab827 service_identity aspires to give you all the tools you need
for verifying whether a certificate is valid for the intended
purposes.

In the simplest case, this means host name verification.
However, service_identity implements RFC 6125 fully and
plans to add other relevant RFCs too.

WWW: https://github.com/pyca/service_identity

PR:		193930
Submitted by:	Axel Rau <axel.rau@chaos1.de>
2014-09-30 14:04:34 +00:00
Rene Ladan
67eb00ba41 Remove expired ports:
2014-08-31 net/libnet10: Superseded by net/libnet
2014-09-30 net/despoof: Depends on expired net/libnet10
2014-09-30 sysutils/gpkgdep: Requires old pkg_info
2014-09-30 security/vida: Depends on expired net/libnet10
2014-09-30 net/nemesis: Depends on expired net/libnet10
2014-09-30 net-mgmt/sing: Depends on expired net/libnet10
2014-09-30 net-mgmt/gps: Depends on expired net/libnet10
2014-09-30 net/ttlscan: Depends on expired net/libnet10
2014-09-30 security/zombiezapper: Depends on expired net/libnet10
2014-09-30 dns/dnshijacker: Depends on expired net/libnet10
2014-09-30 net/xboxproxy: Depends on expired net/libnet10
2014-09-30 net-mgmt/scdp: Depends on expired net/libnet10
2014-09-30 net-mgmt/angst: Depends on expired net/libnet10
2014-09-30 security/py-otr: Abandoned upstream
2014-09-30 net-p2p/cdonkey: depends on deprecated db41 version
2014-09-30 12:28:26 +00:00
Vanilla I. Shu
d7be309e30 Add pam_ocra 1.0, RFC6287 (OCRA) PAM module.
PR:		ports/194024
Submitted by:	Stefan Grundmann
2014-09-30 04:15:22 +00:00
Bryan Drewery
e7ca3763f8 Document shells/fish vulnerabilities 2014-09-29 23:34:30 +00:00
Olli Hauer
a4d0af628e - adopt new pkg-plist style 2014-09-28 19:01:08 +00:00
Olli Hauer
963a62e890 - remove useless PORT_OPTIONS:MDOCS check
- /PLIST_DIRSTRY/PLIST_DIRS/
2014-09-28 18:53:40 +00:00