Commit graph

14425 commits

Author SHA1 Message Date
Doug Barton
ff29495b22 Remove former maintainer from pkg-desr at their request
Feature safe:	yes
2011-02-05 01:08:40 +00:00
Renato Botelho
dbe7a76658 Update to 20110204
Feature safe:	yes
2011-02-04 16:28:43 +00:00
Martin Wilke
4f42a45ecc - Cleanup previous commit
Feature safe:	yes
2011-02-02 23:51:54 +00:00
Koop Mast
7d33cb0f6d Add vlc - Insufficient input validation in MKV demuxer vulnability.
Feature safe:	yes
2011-02-02 15:45:11 +00:00
Roman Bogorodskiy
018c1efc98 Update to 2.11.5.
PR:		154137 (based on)
Submitted by:	Fumiyuki Shimizu <fumifumi@abacustech.jp>
Feature safe:	yes
2011-01-31 18:55:59 +00:00
Martin Wilke
97de1995af - Cleanup previous Entry
Feature safe:	yes
2011-01-31 14:02:34 +00:00
Bernhard Froehlich
6036842338 - Document maradns -- denial of service when resolving a long DNS hostname
Submitted by:	n j <nino80 at gmail dot com>
Feature safe:	yes
2011-01-31 09:47:54 +00:00
Olli Hauer
83cb0309a2 - update barnyard2 to version 2.1.9
Changes:
 2010-12-27 - Barnyard 2.1.9
   [*] Additions
      * spo_database. Support of encrypted connections to postgresql is now
        available. See README.database for the appropriate options.

      * spo_sguil. Fixed issue with duplication of alerts.

   [*] Improvements

      * spooler. Fixed issue with borking when reading unrecognised records.
        There is now sufficient information to skip and move on.

      * spooler. Fixed early termination of non-readable files, causing the
        dreaded SEGFAULT.

      * classifications. Tweaked output for classification identification if the
        appropriate node can't be found.

PR:		ports/154400
Submitted by:	Paul Schmehl <pauls _at_ utdallas.edu> (maintainer)
Feature safe:	yes
2011-01-31 01:17:36 +00:00
Olli Hauer
0813236ffa - update to version 5.50
- always enable bpf in libdnet-stripped to support build in Jail [1]

Announcement and Changelog are very long and covered by last updates.

Announcement: http://seclists.org/nmap-hackers/2011/0
Changelog: http://nmap.org/changelog.html

PR:		ports/154353 [1]
Submitted by:	Mars G Miro <spry _at_ anarchy.in.the.ph> [1]
Feature safe:	yes
2011-01-30 17:15:07 +00:00
Martin Wilke
ac1cb23d59 bcrypt() is a sophisticated and secure hash algorithm designed by The OpenBSD
project for hashing passwords. bcrypt-ruby provides a simple, humane wrapper
for safely handling passwords.

WWW: http://rubygems.org/gems/bcrypt-ruby

PR:		ports/153965
Submitted by:	Jason Helfman <jhelfman at experts-exchange.com>
Feature safe:	yes
2011-01-30 12:08:25 +00:00
Martin Wilke
344c7ae7b6 - Update to 1.2
PR:		153611
Submitted by:	Yoshisato YANAGISAWA <osho@pcc-software.org> (maintainer)
Feature safe:	yes
2011-01-30 12:08:14 +00:00
Martin Wilke
281a97f4c5 - Update to 0.96
PR:		154079
Submitted by:	Uffe Jakobsen <uffe@uffe.org> (Maintainer)
Feature safe:	yes
2011-01-29 14:28:38 +00:00
Brendan Fabeny
1b897f9223 - Remove an unnecessary addition to CPPFLAGS
that can break non-sandboxed builds when
  some other (poorly-configured) ports are
  installed (For example, lang/libutils or
  textproc/irstlm)
- Remove a problematic mirror, based on
  distilator results

Approved by:	makc, miwi (mentors, implicit)
Feature safe:	yes
2011-01-29 11:27:54 +00:00
Brendan Fabeny
8b824bd56c - Update to 0.2.2.22-alpha
- Remove an unnecessary addition to CPPFLAGS
  that can break non-sandboxed builds when
  some other (poorly-configured) ports are
  installed (For example, lang/libutils or
  textproc/irstlm)
- Remove a problematic mirror, based on
  distilator results

Approved by:	makc, miwi (mentors, implicit)
Feature safe:	yes
2011-01-29 10:55:21 +00:00
Wesley Shields
3377432a65 Adjust range for ISC DHCPv6 server crash.
Feature safe:	yes
2011-01-29 00:23:19 +00:00
Wesley Shields
bf7d233ce8 Document ISC DHCPv6 server crash.
Feature safe:	yes
2011-01-29 00:15:09 +00:00
Xin LI
7e4d1a3af0 crypto++ assumes that the as(1) in PATH is the one used by c++(1),
which is not always true.  When PATH is being configured to a
non-standard sequence, we may found an as(1) newer than the base
one and draw wrong conclusion which leads to failed builds.

Use the result given by c++.  This is also accepted to upstream.

PR:			ports/154325
Submitted by:		swell.k gmail.com
Feature safe:		yes
2011-01-27 20:47:30 +00:00
Alexander Logvinov
0bf09d8ebd - Update to 0.4.8
- Remove BSD license, this library is distributed under LGPL21 license

Feature safe:	yes
2011-01-27 09:36:41 +00:00
Beat Gaetzi
b42fbb8b4f - Add tk-wrapper as run dependency to fix execution of gorilla script
PR:		ports/153706
Reported by:	Aldis Berjoza <aldis AT bsdroot.lv>
Submitted by:	Chris Rees <utisoft AT gmail.com> (maintainer)
Feature safe:	yes
2011-01-26 21:12:02 +00:00
Pav Lucistnik
3cccd3e66c - Update to 0.2.5
PR:		ports/153912
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
Approved by:	maintainer timeout (15 days)
Feature safe:	yes
2011-01-26 12:11:13 +00:00
Pav Lucistnik
826426c946 - Update to 1.2.11
PR:		ports/153911
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
Approved by:	maintainer timeout (15 days)
Feature safe:	yes
2011-01-26 12:04:42 +00:00
Renato Botelho
98c5b4f39f Restrict LLVM to i386 and amd64 since it doesn't build on sparc64, ia64 and
probably on ppc

Submitted by:	Anton Shterenlikht <mexas@bristol.ac.uk>
Feature safe:	yes
2011-01-26 11:04:40 +00:00
Josh Paetzel
0b827a1f4a Update to week 4 snapshot
PR:	ports/154296
Submitted by:	Eric F Crist <ecrist@secure-computing.net>
Feature safe:	yes
Sponsored by:	ClaimLynx, Inc
2011-01-25 23:31:23 +00:00
Gabor Kovesdan
1ab85b998e - Turn IPV6 support on by default
- Bump PORTREVISION

Requested by:	dougb, delphij
Feature safe:	yes
2011-01-25 23:24:03 +00:00
Emanuel Haupt
ce1197e105 Add LICENSE and remove MD5 sums.
Feature safe:	yes
2011-01-25 19:59:40 +00:00
Sergey Skvortsov
1bea12737e Document "bugzilla" - multiple seriuos vulnerabilities.
Feature safe:	yes
2011-01-25 15:07:35 +00:00
Xin LI
30e3f87e71 Add dokuwiki multiple ACL escalation vulnerabilities.
Feature safe:	yes
2011-01-24 23:00:50 +00:00
Emanuel Haupt
0c33b8e58c Update to 1.2
PR:             153486
Approved by:    maintainer timeout (jochen@daten-chaos.de; > 14d)
Feature safe:	yes
2011-01-24 12:35:44 +00:00
Simon L. B. Nielsen
96c4d250d4 Try to unbreak vuxml portaudit build by removing use of HTML entity.
UTF-8 chars should be used.

This is not a fix, just a hack to get it working for now.

Feature safe:	yes (really)
2011-01-23 23:29:29 +00:00
Rene Ladan
45ccbba32c Describe www/chromium vulnerabilities between 8.0.552.215 and 8.0.552.237
Obtained from:	http://googlechromereleases.blogspot.com/
Feature safe:	yes
2011-01-23 13:41:34 +00:00
Xin LI
fdf1d0d2a4 Update to 5.6.1.
Submitted by:	Michael Richards <hackish gmail.com>
Feature safe:	yes
2011-01-22 23:21:52 +00:00
Philippe Audeoud
3b87a2740b - Fix CPAN location
Pointyhat:	swills
Feature safe:	yes
2011-01-22 19:29:29 +00:00
Olli Hauer
6bd9969942 - update nmap to version 5.36TEST4
Changelog: http://nmap.org/changelog.html

Feature safe:	yes
2011-01-22 16:43:18 +00:00
Steve Wills
55d06c6dea - Update to 1.38
Changelog:	http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.38/Changes
Approved by:	wxs@ and pgolluci@ (mentor implicit)
Feature safe:	yes
2011-01-22 02:44:05 +00:00
Wen Heping
97e0b4a04b - Add missing DEPENDS and bump PORTREVISION
PR:		ports/154162
Submitted by:	Alexey Illarionov <littlesavage@rambler.ru>
Feature safe:	yes
2011-01-21 03:04:20 +00:00
Florian Smeets
750f8f449d asterisk-1.8.2.1 is still vulnerable due to a botched merge upstream.
Feature safe:	yes
2011-01-21 01:23:43 +00:00
Wen Heping
846424b94e Twofish is a 128-bit symmetric block cipher with a variable key
length (128, 192, or 256 bits) key, developed by Counterpane Labs.
It is unpatented and free for all uses, as described at
http://www.counterpane.com/twofish.html. It has been one of the
five finalists for AES.

This module is written in pure Perl, it should run everywhere
where Perl runs.

WWW:    http://search.cpan.org/dist/Crypt-Twofish_PP/

PR:		ports/154142
Submitted by:	Konstantin Menshikov <kostjnspb@yandex.ru>
Feature safe:	yes
2011-01-20 06:05:28 +00:00
Brendan Fabeny
c9143a4559 - Update to 0.2.1.29
- Take maintainership

Approved by:	makc, miwi (mentors, implicit)
Security:	CVE-2011-0427
Feature safe:	yes
2011-01-20 05:10:54 +00:00
Wesley Shields
21f5ede427 Update to 1.7.4p6.
"This release fixes a bug in the I/O logging support that could cause visual
artifacts in full-screen programs such as text editors.  This bug was listed as
fixed in sudo 1.7.4p5 but the fix was merged incorrectly."

Feature safe:	yes
2011-01-19 18:32:50 +00:00
Florian Smeets
825e64c847 - fix asterisk16 version string
Approved by:	fjoe (mentor)
Feature safe:	yes
2011-01-19 09:19:48 +00:00
Florian Smeets
ba628db2b2 - Document Exploitable Stack Buffer Overflow in asterisk
Approved by:	fjoe (mentor)
Feature safe:	yes
2011-01-19 08:46:28 +00:00
Wesley Shields
7c78515b88 Document tarsnap cryptographic nonce reuse vulnerability.
Discussed with:	cperciva@
Feature safe:	yes
2011-01-19 02:26:50 +00:00
Cy Schubert
186a989ba9 Remove the OpenSSL port requirement. The base OpenSSL will work too.
Feature safe:	yes
2011-01-18 15:07:56 +00:00
Xin LI
cc0910a0f6 Add entry for moinmoin XSS vulnerabilities.
PR:		ports/153898
Submitted by:	Ruslan Mahmatkhanov <cvs-src yandex ru>
Feature safe:	yes
2011-01-18 09:26:17 +00:00
Baptiste Daroussin
2f71ff1c1c upgrade to 1.7.10
Feature safe:	yes
2011-01-18 07:45:35 +00:00
Brendan Fabeny
0363678d0e Update to 0.2.2.21-alpha
Approved by:	makc, miwi (mentors, implicit)
Security:	CVE-2011-0427
Feature safe:	yes
2011-01-18 02:57:48 +00:00
Xin LI
e94fe47825 Document tor remote code execution and crash vulnerability.
Submitted by:	Janne Snabb <snabb epipe com>
Feature safe:	yes
2011-01-18 02:14:52 +00:00
Gabor Kovesdan
268c3d2c03 - Make IPv6 support optional because it causes a delay on systems that
do not support it

PR:		ports/153431
Submitted by:	Michael Scheidell <michael.scheidell@secnap.com>
Feature safe:	yes
2011-01-17 14:33:14 +00:00
Gerald Pfeifer
f1d32d2c9c Fix the handling of CPPFLAGS in the context of CONFIGURE_ENV / MAKE_ENV.
PR:		153625
Feature safe:	yes
2011-01-15 23:54:43 +00:00
Gerald Pfeifer
0d955bb486 Fix whitespace in Makefile. Add USE_LDCONFIG.
Reported by:	portlint
Feature safe:	yes
2011-01-15 23:31:06 +00:00
Sunpoet Po-Chuan Hsieh
65c8dd0038 - Let graphics/ImageMagick be an optional dependency
- Add OPTIONS: IMAGEMAGICK
- Bump PORTREVISION for dependency change
- Remove obsolete MD5 checksum

PR:		ports/153602
Submitted by:	Grzegorz Blach <magik@roorback.net>
Feature safe:	yes
2011-01-15 15:35:41 +00:00
Wen Heping
c57d59781c - Update to 0.5.1
PR:		ports/154008
Submitted by:	Douglas William Thrift <douglas@douglasthrift.net> (maintainer)
Feature safe:	yes
2011-01-15 13:38:35 +00:00
Alberto Villa
842092dedf - WITH_RAR: unrar is required even when rar is installed.
Feature safe:	yes
2011-01-15 10:38:43 +00:00
Emanuel Haupt
52a2614f1e Fix typo
Feature safe: yes
2011-01-14 20:07:37 +00:00
Doug Barton
57391a8666 Apparently the verhack'ing caused lib/libassuan.a to slip in,
so fix the plist.

Submitted by:   ale

Feature safe:	yes
2011-01-14 18:02:22 +00:00
Emanuel Haupt
134ed538c2 Add ssh-copy-id 5.6p1, small script which copy your ssh public-key to a
remote host; appending it to your remote authorized_keys.

Feature safe: yes
2011-01-14 17:32:37 +00:00
Doug Barton
0064bfe0b9 Fix the shared library version number for libassuan to reflect what
the authors intended by adding:

USE_AUTOTOOLS=	libtool
USE_GNOME=	ltverhack

to security/libassuan/Makefile.

Update the libassuan shared library version number and/or bump
PORTREVISION in the dependent ports.

Requested by:	ale
Feature safe:	yes
2011-01-14 07:42:11 +00:00
Wesley Shields
a18479ea33 Update to 1.7.4p5.
Special thanks to rea@ for commiting the appropriate VuXML for me. :)

PR:		ports/153939
Submitted by:	rea@
Security:	908f4cf2-1e8b-11e0-a587-001b77d09812
Feature safe:	yes
2011-01-13 20:00:11 +00:00
Eygene Ryabinkin
fb9dec4150 security/sudo: document privilege escalation, CVE-2011-0010
PR: 153939
Approved by: delphij (secteam), erwin (mentor)
Feature safe: yes
2011-01-13 14:09:25 +00:00
Eygene Ryabinkin
1fd739edad devel/subversion: document security fixes in 1.6.15
Two DoS conditions:
 - CVE-2010-4539, DoS via walking of SVNParentPath
   collections;
 - CVE-2010-4644, DoS via memory leaks triggered
   by the option "-g" of the blame command.

Approved by: delphij (secteam), erwin (mentor)
Feature safe: yes
2011-01-13 12:53:13 +00:00
Eygene Ryabinkin
3b4eb83811 Split recent PHP entry into multiple ones
Many reasons:
 - some vulnerabilities were present only in the specific
   PHP modules and not in the core PHP;
 - it is better to group vulnerabilities by-topic (DoS, code
   execution, etc);
 - PHAR vulnerability is present only in 5.3.x;
 - extract() vulnerability was fixed both in 5.2 and 5.3:
   http://www.mail-archive.com/php-cvs@lists.php.net/msg47722.html
 - NULL-byte poisoning was fixed only in 5.3, 5.2.x is still
   vulnerable to this design error;
 - DFS-related fixes are not relevant for FreeBSD, since DFS
   is Windows file system that is unsupported by us.

PR: 153433
Approved by: remko (secteam), erwin (mentor)
Feature safe: yes
2011-01-13 05:44:53 +00:00
Gerald Pfeifer
fb63fd0792 Adjust MAKE_ENV and add CFLAGS to be more robust.
PR:		153625
Submitted by:	Sofian Brabez <sbrabez@gmail.com> (maintainer)
Feature safe:	yes
2011-01-12 20:10:50 +00:00
Anton Berezin
764f81a5a0 Update to 1.06.
Changes:	http://search.cpan.org/dist/Crypt-OpenPGP/Changes
2011-01-10 12:03:14 +00:00
Olli Hauer
012f55c745 - update to version 2.6.0
- rewrite the rc script so it works with this version
 - patch the Gemfile, else it will not detect
   rubygem-sqlite3 or ruby-dbd_sqlite3

PR:		153293
Submitted by:	Dax Labrador <semprix at bsdmail.org> (maintainer)
2011-01-09 22:06:07 +00:00
Alex Dupre
32134adc42 Add entry for CVE-2010-4645 (php).
PR:		ports/153766
Submitted by:	Tom Judge <tom@tomjudge.com>
2011-01-09 09:12:09 +00:00
Matthias Andree
25c9695900 Add a note about skipping the self-test. 2011-01-08 10:07:21 +00:00
Matthias Andree
f9b85c98f1 Streamline a bit:
- remove subshell to use basename, and use ## substitution [1]
- remove FreeBSD 5.X compatibility comment [1]
- remove FreeBSD 5.X compatibility code

The parts marked with [1] above were
Submitted by: dougb (Doug Barton)
2011-01-08 10:07:00 +00:00
Eygene Ryabinkin
3c608a1d3f Document CVE-2010-4345: local exim -> root escalation
PR: 152983
Feature safe: yes
Reviewed by: remko (secteam)
Approved by: erwin (mentor), remko (secteam)
2011-01-08 06:54:14 +00:00
Dima Panov
7e6373e612 - The KDE FreeBSD team is proud to announce the release of KDE 4.5.5
for FreeBSD.

It's a bugfix-only release, January 2011 set.
2011-01-07 23:54:08 +00:00
Olli Hauer
3f0360cc96 - update nmap to version 5.36TEST3
- remove dead mirror servers

 Changelog: http://nmap.org/changelog.html

 Mayjor changes are NSE script related, some highlihts:
  o [NSE] Added stuxnet-detect.nse
  o [NSE] Added the ftp-proftpd-backdoor.nse

  and many more interesting NSE scripts.
2011-01-07 20:51:25 +00:00
Martin Wilke
9b3a6da7b3 - Cleanup 2011-01-06 07:06:08 +00:00
Wen Heping
b890949a68 - Document the Clickjacking vulnerabilities of mediawiki 2011-01-06 06:35:37 +00:00
Wen Heping
1f97047ba3 Honggfuzz is a general-purpose fuzzing tool. Given a starting corpus of test
files, Hongfuzz supplies and modifies input to a test program and utilize the
ptrace() API/POSIX signal interface to detect and log crashes.

WWW:    http://code.google.com/p/honggfuzz/
2011-01-05 01:54:24 +00:00
Peter Pentchev
5431ebd5df Implement transparent proxying using the IP_BINDANY option if available in
a way a bit different (and a bit more generic) than the one in the PR.
While I'm here, declare the GPL-2+ license and remove the MD5 checksum.

PR:		153568
Submitted by:	Jason Helfman <jhelfman@experts-exchange.com>
2011-01-04 16:37:24 +00:00
Jeremy Messenger
00f2c843c5 The x11/libcapplet has been broken for over a year (will be two in June 2011)
and no one has any of interest to fix it. It's an ancient software and
is part of GNOME 1. It's time for us to get rid of some of GNOME 1 stuff as
the GNOME 3 is coming sometimes in 2011. Any ports that required libcappet
are removed and ports that have optional aren't remove.

PR:		ports/153355
Discussed with:	My team, FreeBSD GNOME Team
Tested by:	pointyhat-exp (thanks pav!)
2011-01-04 03:32:21 +00:00
Ashish SHUKLA
2c1d3bb271 - Update to 5.50.
Approved by:	pgj (mentor, implicit)
2011-01-03 18:06:56 +00:00
Renato Botelho
21526892f3 Remove expired ports:
2011-01-01 audio/emphasis: abandoned upstream
2011-01-01 converters/ecore-txt: abandoned upstream
2011-01-01 deskutils/estickies: abandoned upstream
2011-01-01 devel/ecore-job: abandoned upstream
2011-01-01 devel/engrave: abandoned upstream
2011-01-01 devel/evfs: abandoned upstream
2011-01-01 devel/ruby-ecore: abandoned upstream
2011-01-01 graphics/exhibit: abandoned upstream
2011-01-01 graphics/epsilon: abandoned upstream
2011-01-01 graphics/esmart: abandoned upstream
2011-01-01 graphics/ruby-edje: abandoned upstream
2011-01-01 graphics/ruby-esmart: abandoned upstream
2011-01-01 graphics/ruby-evas: abandoned upstream
2011-01-01 graphics/ruby-redact: abandoned upstream
2011-01-01 multimedia/eclair: abandoned upstream
2011-01-01 security/phpmyid: Development has ceased.
2011-01-01 sysutils/ecore-config: abandoned upstream
2011-01-01 sysutils/extrackt: abandoned upstream
2011-01-01 textproc/exml: abandoned upstream
2011-01-02 www/mod_accesscookie: upstream is gone
2011-01-02 www/mod_vdbh: upstream is gone
2011-01-02 www/mod_auth_any: upstream is gone
2011-01-02 www/mod_log_data: upstream is gone and will be unsupported by ASF when 2.4.0 is release, migrate to 2.2.x+ now
2011-01-01 x11-fm/entropyfm: abandoned upstream
2011-01-01 x11-themes/e17-splash-fortune: abandoned upstream
2011-01-01 x11-themes/e17-splash-shiny: abandoned upstream
2011-01-01 x11-themes/e17-splash-takara: abandoned upstream
2011-01-01 x11-themes/e17-theme-blue_eyed: abandoned upstream
2011-01-01 x11-themes/e17-theme-dali: abandoned upstream
2011-01-01 x11-themes/e17-theme-gant: abandoned upstream
2011-01-01 x11-themes/e17-theme-japan2007: abandoned upstream
2011-01-01 x11-themes/e17-theme-kor: abandoned upstream
2011-01-01 x11-themes/e17-theme-milky: abandoned upstream
2011-01-01 x11-themes/e17-theme-night_bling: abandoned upstream
2011-01-01 x11-themes/e17-theme-simply_white: abandoned upstream
2011-01-01 x11-themes/e17-splash-azul: abandoned upstream
2011-01-01 x11-themes/e17-splash-blue: abandoned upstream
2011-01-01 x11-themes/e17-splash-clean: abandoned upstream
2011-01-01 x11-themes/e17-splash-logo: abandoned upstream
2011-01-01 x11-toolkits/etk: abandoned upstream
2011-01-01 x11-toolkits/ewl: abandoned upstream
2011-01-01 x11-toolkits/enhance: abandoned upstream
2011-01-01 x11-wm/e17-module-bling: abandoned upstream
2011-01-01 x11-wm/e17-module-mixer: abandoned upstream
2011-01-01 x11-wm/e17-utils: abandoned upstream
2011-01-01 x11/elicit: abandoned upstream
2011-01-01 x11/enity: abandoned upstream
2011-01-01 x11/examine: abandoned upstream
2011-01-01 x11/ecore-desktop: abandoned upstream
2011-01-03 14:38:01 +00:00
Rene Ladan
8cf66a3790 Garbage collect unmaintained expired ports:
2011-01-01 security/lxnb: Development has ceased, mastersite disappeared
2011-01-01 x11-wm/lxsession-lite: Superseded by x11-wm/lxsession
2011-01-02 21:49:02 +00:00
Norikatsu Shigemura
e285bc119c Fix MASTER_SITES.
Pointed out by:	ume
2011-01-02 19:04:08 +00:00
Joe Marcus Clarke
e5a384624b Remove this post-extract target to avoid autotools regeneration. 2011-01-02 17:24:49 +00:00
Thomas Abthorpe
59d48d920f Return kris' ports to the heap.
We hope to see him back again sometime.

Hat:		portmgr-secretary
2011-01-02 06:22:23 +00:00
Norikatsu Shigemura
5babafd4c6 Add tpmmanager 0.8, is an open source TPM (Trusted Platform
Module) management software providing an easy-to-use
graphical user interface.

WWW: http://projects.sirrix.com/trac/tpmmanager
2011-01-02 01:32:43 +00:00
Brendan Fabeny
f9dac246cc Remove some outdated or unreachable mirrors,
based on distilator results

Approved by:	makc, miwi (mentors, implicit)
2011-01-01 20:01:43 +00:00
Brendan Fabeny
e86c15cf8f - update MASTER_SITES on the basis of distilator results and:
http://www.torproject.org/getinvolved/mirrors.html.en
- fix conditional openssl requirements [1] (thanks to Pascal Stumpf
for raising this issue, and that of CVE 2010-1676)

PR:		151181 [1]
Approved by:	makc, miwi (mentors, implicit)
2011-01-01 18:36:01 +00:00
Erwin Lansing
683634eb2b Bump copyright year. 2011-01-01 14:31:38 +00:00
Brendan Fabeny
d47ebb79a8 - update to 0.2.2.20-alpha (includes a security patch for CVE-2010-1676)
- update MASTER_SITES on the basis of:
	 http://www.torproject.org/getinvolved/mirrors.html.en
- update openssl requirements

Approved by:	makc, miwi (mentors, implicit)
2010-12-31 19:26:00 +00:00
Rene Ladan
b7d7206e33 Garbage-collect expired ports:
2010-12-30 databases/p5-sqlrelay: broken and upstream disapeared
2010-12-30 devel/php-dbg2: No upstream support
2010-12-30 dns/fourcdns: upstream has disapeared
2010-12-31 emulators/win4bsd: Development has ceased and distfile is no longer available
2010-12-31 french/mozilla-flp: www/seamonkey port is deprecated. Consider using the www/firefox-i18n.
2010-12-31 french/xtel: Minitel services will be discontinued at the end of 2010.
2010-12-30 ftp/ftpq: upstream has disapeared
2010-12-30 graphics/paintlib: does not compile with new tiff and no more maintained upstream
2010-12-30 graphics/g3dviewer: does not build with gcc 4.2, upstream disapeared
2010-12-30 lang/scriba: Does not compile with gcc 4.2+, looks like abandonware
2010-12-30 math/rascal: Broken on every arch since 2008, looks like an abandonware
2010-12-31 net-mgmt/nrg: Project has vanished. Use cacti instead.
2010-12-31 security/hostsentry: Project is dead.
2010-12-31 sysutils/kcube: Project has vanished
2010-12-31 www/cybercalendar: has been unmaintained since 2001 and is unusable with dates after 2010 (see ports/150974)
2010-12-31 www/flock: Flock 3 moves from Firefox to Chromium
2010-12-31 www/linux-flock: Flock 3 moves from Firefox to Chromium
2010-12-30 x11-clocks/xtu: Looks like abandonware

Leave java/tya in for now, as it has outstanding PRs.
2010-12-31 17:35:17 +00:00
Max Brazhnikov
ffae4b95f6 Update to 0.8.1 2010-12-31 15:20:54 +00:00
Roman Bogorodskiy
1842665597 - Update to 2.9
- Point WWW to libtasn1's own page at gnu.org
2010-12-31 13:07:24 +00:00
Philip M. Gollucci
b2bcd89986 - Fix a vi typo in the previous commit, line should have never changed.
Reported by:    pointyhat via pav
2010-12-30 23:11:59 +00:00
Koop Mast
54fda4dd20 Document webkit-gtk2 multiple vulnerabilities < 1.2.6.
Document some CVE's that didn't make it to release notes from older releases.
2010-12-30 17:13:32 +00:00
Alexander Logvinov
a9019a45d2 - Update to 0.4.7
- The libssh library is distributed under LGPL21 license
2010-12-30 03:13:02 +00:00
Philip M. Gollucci
116ec22ac1 - DISTNAME= ${PORTNAME}-${PORTVERSION} is the default and not needed.
PR:             ports/153292
Submitted by:   myself (pgollucci)
Tested by:      -exp run by pav
Approved by:    portmgr (pav)
2010-12-29 20:04:42 +00:00
Xin LI
ce797dd6db Document django multiple vulnerabilities. 2010-12-29 19:50:56 +00:00
Mark Linimon
1e7fac30a4 Reset krion@FreeBSD.org due to 6 months of inactivity and maintainer-
timeouts.

Hat:		portmgr
2010-12-28 08:11:16 +00:00
Remko Lodder
b2d6212f76 Add Drupal views plugin - Cross Site Scripting (XSS).
While here, improve previously added vuln entry by
following style a bit better.

PR:		153474
Submitted by:	rea
2010-12-28 06:34:32 +00:00
Mark Linimon
d46c2efac2 Reset ijliao@FreeBSD.org due to maintainer-timeouts and long absence.
We hope to see ijliao back again sometime.

Hat:		portmgr
2010-12-28 06:31:49 +00:00
Pav Lucistnik
725ff435f0 - Update to 5.9
- Add options for db backends

PR:		ports/152683
Submitted by:	Ruslan Mahmatkhanov <cvs-src@yandex.ru>
Approved by:	maintainer
2010-12-27 20:32:24 +00:00
Philip M. Gollucci
4fb90771b8 - Update to 1.1
- Remove MD5

PR:             ports/153397
Submitted by:   myself (pgollucci)
Approved by:    osho@pcc-software.org (maintainer)
Sponsored by:   RideCharge Inc. / TaxiMagic
2010-12-27 15:12:15 +00:00
Philip M. Gollucci
0604c5af00 - Update to 1.05
- Remove MD5

PR:             ports/153091
Submitted by:   myself (pgollucci)
Approved by:    maintainer timeout (tobez ; 15 days)
Changes:        http://search.cpan.org/dist/Crypt-OpenPGP/Changes
2010-12-27 14:58:06 +00:00