Commit graph

434679 commits

Author SHA1 Message Date
Bryan Drewery
9d5a011dc7 MFH: r464267
FLAVORS: Fix several 'make *recursive' targets not passing along FLAVOR properly.

PR:		225659 comment #15
Approved by:	portmgr (implicit)
2018-03-12 18:29:58 +00:00
Thomas Zander
730962021e MFH: r464190
Update to upstream version 2.3.4

Details:
- Fix issue where LDAP login with empty passwort
  was possible, see
  https://github.com/pdav/netmagis/issues/173
- Fix LICENSE*
- Pet portlint

PR:		226437
Submitted by:	dgeo@centrale-marseille.fr
Approved by:	pdagog@gmail.com (maintainer)

Approved by:	ports-secteam (riggs)
2018-03-11 18:00:43 +00:00
Yuri Victorovich
0ad3afd2d4 MFH: r463768
security/strongswan: Fix crash in public key authentication with 5.6.2

While here, added LICENSE_FILE.

PR:		226404
Submitted by:	strongswan@Nanoteq.com (maintainer)
Approved by:	tcberner (mentor, implicit)
Approved by:	ports-secteam (lists@eitanadler.com)
2018-03-11 08:49:06 +00:00
Jan Beich
6d0eca8a9f MFH: r464082
games/openra: update GeoLite2 to March snapshot

fetch: https://geolite.maxmind.com/download/geoip/database/GeoLite2-Country.mmdb.gz: size mismatch: expected 1687146, actual 1702260

Approved by:	ports-secteam blanket
2018-03-10 17:45:49 +00:00
Jan Beich
d405852749 MFH: r463847
games/openra: update to 20180307

Changes:	https://github.com/OpenRA/OpenRA/wiki/Changelog#release-20180218
Approved by:	ports-secteam (riggs)
2018-03-10 17:42:41 +00:00
Thomas Zander
4a4d79d044 MFH: r464076
Un-break with SSL OPTION (default)

PR:		225885
Submitted by:	brnrd

Approved by:	ports-secteam (riggs)
2018-03-10 14:57:08 +00:00
Mark Felder
dca462b24a MFH: r458993 r463489
security/tor: Update to 0.3.2.9

This release contains many new features and many bugfixes.
Plesee see the complete list here:
https://blog.torproject.org/tor-0329-released-we-have-new-stable-series

Additionally, this update adds "#include <osreldate.h>" to qualm the
compiler warning that was caused by the previous fix.

Now security/tor and security/tor-devel are identical.

security/tor: Update to 0.3.2.10

Backport of countermeasures to mitigate denial-of-service
attacks against the Tor network.

Changelog is in:
https://gitweb.torproject.org/tor.git/tree/ChangeLog

None of these fixes appear to be essential for clients, but relays
should upgrade.

Port changes:
* Changed the implementation of 'tor_setuid': now it is done through
  the command line argument, instead of the torrc file.
2018-03-10 13:48:14 +00:00
Antoine Brodin
6a492da7c8 MFH: r460800
BUILD_DEPENDS against `devel/llvm' was not sufficient, since ISPC binary is
actually linked to libLLVM.so.  Make it LIB_DEPENDS and thus try to unbreak
`graphics/embree'.

Reported by:	pkg-fallout
2018-03-10 07:03:21 +00:00
Bryan Drewery
8b96587552 MFH: r463857
Update to 1.6.6.

Changes: https://wiki.znc.in/ChangeLog/1.6.6

Approved by:	dbaio (maintainer)
Differential Revision:	https://reviews.freebsd.org/D14615

Approved by:	portmgr (implicit)
2018-03-09 22:20:49 +00:00
Jan Beich
201128bc96 MFH: r464001
emulators/citra: update to s20180309

Changes:	3cda637c...33a0e87a
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-03-09 20:16:42 +00:00
Jan Beich
fe04d1d1e3 MFH: r464000
emulators/rpcs3: update to 0.0.5.40

Changes:	7233640cf...7bbadfd08
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-03-09 20:15:43 +00:00
Jan Beich
fafbccecb8 MFH: r463874
www/firefox-esr: update to 52.7.0

Changes:	https://www.mozilla.org/firefox/52.7.0/releasenotes/
Security:	c71cdc95-3c18-45b7-866a-af28b59aabb5
Approved by:	ports-secteam (riggs)
2018-03-09 19:32:59 +00:00
Carlos J. Puga Medina
724c296562 MFH: r463831
- Switch from x11-fonts/noto to x11-fonts/noto-lite
- Bump PORTREVISION

PR:		226255
Reported by:	tobik

Approved by:	ports-secteam (riggs)
2018-03-09 17:05:29 +00:00
Jimmy Olgeni
7fdb2b74c1 MFH: r463787
net/rabbitmq: recursively fix ownership of RABBITMQ_LOG_BASE on startup.

Submitted by:	Jeff Walter
Approved by:	portmgr
2018-03-09 16:41:05 +00:00
Jan Beich
e3a9fba079 MFH: r463675 r463875 r463877 r463894 r463962
www/firefox: update to 59.0

Changes:	https://www.mozilla.org/firefox/59.0/releasenotes/
Security:	c71cdc95-3c18-45b7-866a-af28b59aabb5
Approved by:	ports-secteam (riggs)
2018-03-09 14:42:48 +00:00
Jan Beich
55c87ad6d6 MFH: r460539
www/firefox: unbreak with Rust 1.25

error: unnecessary parentheses around function argument
    --> servo/ports/geckolib/glue.rs:4391:36
     |
4391 |     let name = unsafe { Atom::from((&*name)) };
     |                                    ^^^^^^^^ help: remove these parentheses
     |
note: lint level defined here
    --> servo/ports/geckolib/lib.rs:5:9
     |
5    | #![deny(warnings)]
     |         ^^^^^^^^
     = note: #[deny(unused_parens)] implied by #[deny(warnings)]

Obtained from:	upstream (Firefox 59)
Approved by:	ports-secteam blanket
2018-03-09 14:39:00 +00:00
Carlos J. Puga Medina
cda7b72428 MFH: r463839
www/chromium: update to 64.0.3282.186

Changelog: https://chromium.googlesource.com/chromium/src/+log/63.0.3239.132..64.0.3282.186?pretty=fuller&n=10000

Security:	https://vuxml.freebsd.org/freebsd/8e986b2b-1baa-11e8-a944-54ee754af08e.html
Security:	https://vuxml.freebsd.org/freebsd/abfc932e-1ba8-11e8-a944-54ee754af08e.html

Approved by:	ports-secteam (riggs)
2018-03-09 12:54:40 +00:00
Kubilay Kocak
08b9d95fa4 MFH: r463710
sysutils/froxlor: Fix packaging when APACHE option is unset

The pkg-plist for some entries relied on the AP_NAME variable, which is
only defined when the APACHE option is set (the default), via
bsd.apache.mk. The variables value is the ports name, so replace it with
PORTNAME accordingly.

While I'm here, fix misspelled PORTREVIION.

Reported by:	z3dm4n (via IRC)
Approved by:	portmgr (blanket)
2018-03-09 11:41:41 +00:00
Jan Beich
dfcc26ba93 MFH: r463696
security/nss: update to 3.36

Changes:	https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.36_release_notes
Changes:	https://hg.mozilla.org/projects/nss/shortlog/NSS_3_36_RTM
ABI:		https://abi-laboratory.pro/tracker/timeline/nss/
Approved by:	ports-secteam (riggs)
2018-03-09 07:59:17 +00:00
Jan Beich
77d8a2edf2 MFH: r463695
devel/nspr: update to 4.19 (nop)

From upstream ChangeLog:
- Update NSPR to build with Android NDK r16
- Add missing include for SIZE_MAX
- Use atexit() to register _PR_Fini on OSX

Changes:	https://hg.mozilla.org/projects/nspr/shortlog/NSPR_4_19_RTM
ABI:		https://abi-laboratory.pro/tracker/timeline/nspr/
Approved by:	ports-secteam (riggs)
2018-03-09 07:57:38 +00:00
Tobias Kortkamp
ca515024a8 MFH: r463605
www/gitea: Update to 1.3.3

PR:		226342
Approved by:	stb@lassitu.de (maintainer)
Changes:	https://blog.gitea.io/2017/12/release-of-1.3.2/
Changes:	https://blog.gitea.io/2018/02/release-of-1.3.3/

Approved by:	ports-secteam blanket
2018-03-09 06:49:27 +00:00
Ben Woods
045ee42f09 MFH: r463791
sysutils/py-salt: Update to 2017.7.4

This is a bugfix release for the 2017.7.x branch.

Changes this release:
  https://docs.saltstack.com/en/latest/topics/releases/2017.7.4.html

PR:		226319
Approved by:	Christer Edwards (maintainer)

Approved by:	ports-secteam (riggs)
2018-03-08 22:35:51 +00:00
Jan Beich
37b4ca273c multimedia/libvpx: backport vpx_image fix (direct commit)
Reported by:	Debian
Obtained from:	upstream (libvpx 1.7.0)
Approved by:	ports-secteam blanket
2018-03-08 18:34:26 +00:00
Jan Beich
27a9c500e0 MFH: r463646 r463677 r463844
emulators/citra: update to s20180307

Changes:	7c1a2235...3cda637c
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-03-08 00:24:35 +00:00
Jan Beich
17e1f13c63 MFH: r463843
emulators/rpcs3: update to 0.0.5.38

Changes:	91d051115...7233640cf
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-03-08 00:22:21 +00:00
Jan Beich
5da5d5ef1e multimedia/libvpx: backport VP9 fix (direct commit)
Obtained from:	upstream (libvpx 1.7.0, via Firefox 59)
Approved by:	ports-secteam blanket
2018-03-08 00:20:21 +00:00
Tobias Kortkamp
14ba0b7874 MFH: r463720
sysutils/testdisk: Fix build with PROGREISERFS=on

Fix LIB_DEPENDS: libreiserfs-0.3.so does not exist

PR:		195339
Submitted by:	crest@sahiro.org
Approved by:	flz (maintainer)

Approved by:	ports-secteam blanket
2018-03-06 12:33:51 +00:00
Jan Beich
08f1e41014 MFH: r463679
emulators/rpcs3: update to 0.0.5.36

Changes:	ec0cd9f00...91d051115
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-03-06 01:02:52 +00:00
Jan Beich
dbf01cdec3 MFH: r463465 r463677
emulators/citra: update to s20180302

Changes:	ac626eda...7c1a2235
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-03-06 01:02:04 +00:00
Jan Beich
5cf854db5f MFH: r463613 r463676
www/waterfox: update to 56.0.4.36

- Apply some FF59 fixes

Changes:	e03e284b08...79492ecca4
Approved by:	ports-secteam blanket
2018-03-06 01:01:05 +00:00
Renato Botelho
2479db01ab MFH: r463323
- Update security/strongswan to 5.6.2 [1]
- Enable CURL option by default [2]

PR:		226043 [1], 220488 [2]
Submitted by:	strongswan@Nanoteq.com (maintainer) [1]
		karl@denninger.net [2]
Approved by:	maintainer [2]
Security:	CVE-2018-6459
Sponsored by:	Rubicon Communications, LLC (Netgate)
Approved by:	ports-secteam (riggs)
2018-03-05 11:39:16 +00:00
Jan Beich
64f490cc89 MFH: r463637
www/waterfox: drop bindgen workaround

Approved by:	ports-secteam blanket
2018-03-05 10:32:32 +00:00
Torsten Zuehlsdorff
8f118e0159 MFH: r463395
lang/php72: Update from 7.2.2 to 7.2.3

Changelog: http://www.php.net/ChangeLog-7.php#7.2.3

Approved by: ports-secteam (riggs)
2018-03-04 12:50:51 +00:00
Jason E. Hale
1e5f4f5c22 MFH: r463547
- Fix build with aarch64, armv6, armv7
- Fix QT4 option on all platforms (needs USES=gmake, and fix for moc location)
- Remove some substitutions that didn't do anything
- Don't try to create directories already in mtree

Approved by:	ports-secteam (blanket)
2018-03-04 03:21:12 +00:00
Jason E. Hale
fae07e6fdb MFH: r463363
Add several security fixes addressing:
- CVE-2017-6892
- CVE-2017-8361
- CVE-2017-8362
- CVE-2017-8363
- CVE-2017-8365
- CVE-2017-12562
- CVE-2017-14634

Note:
- Fix for CVE-2017-8365 is included in files/patch-CVE-2017-8361

While here:
- Fix LICENSE and add LICENSE_FILE

PR:		226271
Submitted by:	jhale
Reviewed by:	koobs, eadler, jbeich
Approved by:	ports-secteam (eadler)
Obtained from:	upstream (https://github.com/erikd/libsndfile)
Security:	004debf9-1d16-11e8-b6aa-4ccc6adda413
Security:	2b386075-1d9c-11e8-b6aa-4ccc6adda413
Differential Revision:	https://reviews.freebsd.org/D14552

Approved by:	ports-secteam (riggs)
2018-03-04 02:34:49 +00:00
Bryan Drewery
a2b0ee437b MFH: r463542
Add missing requirement on LOGIN for rc script.

PR:		225857
Submitted by:	will@worrbase.com
Differential Revision:	https://reviews.freebsd.org/D14575

Approved by:	portmgr (implicit)
2018-03-03 23:34:04 +00:00
Jan Beich
30d30caa10 MFH: r463540
security/clamfs: unbreak with boost 1.65

PR:		220725
Submitted by:	Walter Schwarzenfeld <w.schwarzenfeld@utanet.at>
Approved by:	maintainer timeout (7 months)
Approved by:	ports-secteam blanket
2018-03-03 23:13:26 +00:00
Jan Beich
eda02ba62f MFH: r463537
games/spring: unbreak with boost 1.65

PR:		220762
Submitted by:	Walter Schwarzenfeld <w.schwarzenfeld@utanet.at>
Approved by:	maintainer timeout (3 months)
Approved by:	ports-secteam blanket
2018-03-03 22:42:24 +00:00
Cy Schubert
e9cff82c39 MFH: r463211
Flag FORBIDDEN instead of IGNORE due to possbile security issues.

Reported by:	mat
Approved by:	portmgr (riggs)
2018-03-03 20:06:50 +00:00
Cy Schubert
a55f251efb MFH: r463183
It appears as if the development branch of ntp is dead as no new
development tarballs have been relesed for ~ 17 months now. This is a
security concern.

Approved by:	portmgr (riggs)
2018-03-03 20:05:52 +00:00
Jan Beich
8d38ac1f25 MFH: r462941
gecko: convert to CONFIGURE_OUTSOURCE

client.mk is on its way out upstream, switching to it was a mistake.

$ MACH=1 gmake -f client.mk build
client.mk:40: /.mozconfig-client-mk: No such file or directory
gmake: *** No rule to make target '/.mozconfig-client-mk'.  Stop.

Approved by:	ports-secteam (riggs)
2018-03-03 20:04:09 +00:00
Thomas Zander
cc589ff95c MFH: r463487
Fix build on 11 and later with c++ compilers by default in c++11 mode

PR:		226213
Submitted by:	portmaster@bsdforge.com (maintainer)

Approved by:	ports-secteam (build fix blanket)
2018-03-03 15:39:06 +00:00
Jan Beich
077fdfe44a MFH: r463456
emulators/rpcs3: update to 0.0.5.34

Changes:	8d7620d95...ec0cd9f00
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-03-03 00:55:57 +00:00
Jan Beich
782fdc820b MFH: r463455
www/waterfox: apply some FF59 fixes

Approved by:	ports-secteam blanket
2018-03-03 00:55:06 +00:00
Larry Rosenman
492246435e MFH: r463407
security/clamav: upgrade to 0.99.4
Release notes: http://blog.clamav.net/2018/03/clamav-0994-has-been-released.html

Submitted by:	mmokhi
Security:	CVE-2012-6706
Security:	CVE-2017-6419
Security:	CVE-2017-11423
Security:	CVE-2018-1000085
Security:	CVE-2018-0202
Differential Revision:	https://reviews.freebsd.org/D14562

Approved by:	ports-secteam (zi)
2018-03-02 23:31:38 +00:00
Craig Leres
8c0351ee72 MFH: r461322
Update to 1.28 which fixes a buffer overflow (that will be)
documented in CVE-2017-17663.

Reviewed by:	matthew	(mentor)
Approved by:	matthew	(mentor)
Security:	f5524753-67b1-4c88-8114-29c2d258b383
Differential Revision:	https://reviews.freebsd.org/D14218

Approved by:	ports-secteam (feld)
2018-03-02 21:39:40 +00:00
Palle Girgensohn
401b2f1466 MFH: r458860 r463146
Update to version 1.6.3

Shibboleth SP software vulnerable to forged user attribute data
====================================================================
The Service Provider software relies on a generic XML parser to process
SAML responses and there are limitations in older versions of the parser
that make it impossible to fully disable Document Type Definition (DTD)
processing.

Through addition/manipulation of a DTD, it's possible to make changes
to an XML document that do not break a digital signature but are
mishandled by the SP and its libraries. These manipulations can alter
the user data passed through to applications behind the SP and result
in impersonation attacks and exposure of protected information.

While the use of XML Encryption can serve as a mitigation for this bug,
it may still be possible to construct attacks in such cases, and the SP
does not provide a means to enforce its use.

An updated version of XMLTooling-C (V1.6.3) is available that works
around this specific bug.

While newer versions of the parser are configured by the SP into
disallowing the use of a DTD via an environment variable, this feature
is not present in the parser used on some supported platforms (notably
Red Hat and CentOS 7), so an additional fix is being provided now that
an actual DTD exploit has been identified.

Security:	CVE-2018-0486

Shibboleth SP software vulnerable to additional data forgery flaws

The XML processing performed by the Service Provider software has been
found to be vulnerable to new flaws similar in nature to the one
addressed in an advisory last month.

Security:	22438240-1bd0-11e8-a2ec-6cc21735f730
URL:		https://shibboleth.net/community/advisories/secadv_20180227.txt

Approved by:	ports-secteam
2018-03-02 14:34:52 +00:00
Craig Leres
78e4ece060 MFH: r461924 r462351 r462460
Use USE_GITHUB instead of hand crafting urls.

Sponsored by:	Absolight

Add a NETMAP option to build and install the bro netmap plugin.

PR: 224918
Reported by: Shane Peters
Reviewed by: matthew (mentor)
Approved by: matthew (mentor)
Differential Revision: https://reviews.freebsd.org/D14378

Update to 2.5.3 which fixes an integer overflow:

    http://blog.bro.org/2018/02/bro-253-released-security-update.html

Note that a CVE has not been assigned yet.

Reviewed by:	matthew (mentor)
Approved by:	matthew (mentor)
Differential Revision:	https://reviews.freebsd.org/D14444

Approved by:	ports-secteam (swills)
2018-03-02 00:38:45 +00:00
Palle Girgensohn
3b76b8eb62 MFH: r463327
2018-03-01 Security Update Release

The PostgreSQL Global Development Group has released an update to all supported
versions of the PostgreSQL database system, including 10.3, 9.6.8, 9.5.12,
9.4.17, and 9.3.22.

The purpose of this release is to address CVE-2018-1058, which describes how a
user can create like-named objects in different schemas that can change the
behavior of other users' queries and cause unexpected or malicious behavior,
also known as a "trojan-horse" attack. Most of this release centers around added
documentation that describes the issue and how to take steps to mitigate the
impact on PostgreSQL databases.

We strongly encourage all of our users to please visit
https://wiki.postgresql.org/wiki/A_Guide_to_CVE-2018-1058:_Protect_Your_Search_Path
for a detailed explanation of CVE-2018-1058 and how to protect your PostgreSQL
installations.

After evaluating the documentation for CVE-2018-1058, a database administrator
may need to take follow up steps on their PostgreSQL installations to ensure
they are protected from exploitation.

Security:	CVE-2018-1058

Approved by:	portmgr
2018-03-01 16:01:45 +00:00
Larry Rosenman
d0e523d688 MFH: r463271
Update dovecot to 2.2.34, and bump pigeonhole.

 * CVE-2017-15130: TLS SNI config lookups may lead to excessive
   memory usage, causing imap-login/pop3-login VSZ limit to be reached
   and the process restarted. This happens only if Dovecot config has
   local_name { } or local { } configuration blocks and attacker uses
   randomly generated SNI servernames.
 * CVE-2017-14461: Parsing invalid email addresses may cause a crash or
   leak memory contents to attacker. For example, these memory contents
   might contain parts of an email from another user if the same imap
   process is reused for multiple users. First discovered by Aleksandar
   Nikolic of Cisco Talos. Independently also discovered by "flxflndy"
   via HackerOne.
 * CVE-2017-15132: Aborted SASL authentication leaks memory in login
   process.
 * Linux: Core dumping is no longer enabled by default via
   PR_SET_DUMPABLE, because this may allow attackers to bypass
   chroot/group restrictions. Found by cPanel Security Team. Nowadays
   core dumps can be safely enabled by using "sysctl -w
   fs.suid_dumpable=2". If the old behaviour is wanted, it can still be
   enabled by setting:
   import_environment=$import_environment PR_SET_DUMPABLE=1
 * doveconf output now includes the hostname.

 + mail_attachment_detection_options setting controls when
   $HasAttachment and $HasNoAttachment keywords are set for mails.
 + imap: Support fetching body snippets using FETCH (SNIPPET) or
   (SNIPPET (LAZY=FUZZY))
 + fs-compress: Automatically detect whether input is compressed or not.
   Prefix the compression algorithm with "maybe-" to enable the
   detection, for example: "compress:maybe-gz:6:..."
 + Added settings to change dovecot.index* files' optimization behavior.
   See https://wiki2.dovecot.org/IndexFiles#Settings
 + Auth cache can now utilize auth workers to do password hash
   verification by setting auth_cache_verify_password_with_worker=yes.
 + Added charset_alias plugin. See
   https://wiki2.dovecot.org/Plugins/CharsetAlias
 + imap_logout_format and pop3_logout_format settings now support all of
   the generic variables (e.g. %{rip}, %{session}, etc.)
 + Added auth_policy_check_before_auth, auth_policy_check_after_auth
   and auth_policy_report_after_auth settings.
 - v2.2.33: doveadm-server: Various fixes related to log handling.
 - v2.2.33: doveadm failed when trying to access UNIX socket that didn't
   require authentication.
 - v2.2.33: doveadm log reopen stopped working
 - v2.2.30+: IMAP stopped advertising SPECIAL-USE capability
 - v2.2.30+: IMAP stopped sending untagged OK/NO storage notifications
 - replication: dsync sends unnecessary replication notification for
   changes it does internally. NOTE: Folder creates, renames, deletes
   and subscribes still trigger unnecessary replication notifications,
   but these should be rather rare.
 - mail_always/never_cache_fields setting changes weren't applied for
   existing dovecot.index.cache files.
 - Fix compiling and other problems with OpenSSL v1.1
 - auth policy: With master user logins, lookup using login username.
 - FTS reindexed all mails unnecessarily after loss of
   dovecot.index.cache file
 - mdbox rebuild repeatedly fails with "missing map extension"
 - SSL connections may have been hanging with imapc or doveadm client.
 - cassandra: Using protocol v3 (Cassandra v2.1) caused memory leaks and
   also timestamps weren't set to queries.
 - fs-crypt silently ignored public/private keys specified in
   configuration (mail_crypt_global_public/private_key) and just
   emitted plaintext output.
 - lock_method=dotlock caused crashes
 - imapc: Reconnection may cause crashes and other errors

Security:	CVE-2017-14461
Security:	CVE-2017-15130
Security:	CVE-2017-15132

Approved by:	ports-secteam (delphij), adamw
2018-03-01 14:24:34 +00:00