Commit graph

17862 commits

Author SHA1 Message Date
Rene Ladan
27abcfb125 Remove expired ports:
2013-08-28 lang/gdc: Broken for more than 6 month
2013-08-31 net-im/cli-msn: MSN Messenger service terminated 30 APR 2013
2013-09-01 x11-toolkits/wxd: Depends on deprecated lang/gdc
2013-09-01 security/openvpn22: Please migrate to a newer OpenVPN version
2013-09-01 devel/dsss: Depends on expired lang/gdc
2013-09-01 graphics/qcamview: Broken on FreeBSD 8 and newer
2013-09-01 www/cacheboy15-devel: Broken on FreeBSD 8 and newer
2013-09-01 graphics/spcaview: Broken on FreeBSD 8 and newer
2013-09-01 comms/uticom: Broken on FreeBSD 8 and newer
2013-09-01 net/ipex: Broken on FreeBSD 8 and newer
2013-09-01 graphics/phpsview: Broken on FreeBSD 8 and newer
2013-09-01 misc/usbrh: Broken on FreeBSD 8 and newer
2013-09-01 net/atmsupport: Broken on FreeBSD 8 and newer
2013-09-01 comms/ib-kmod: Broken on FreeBSD 8 and newer
2013-09-01 net/libproxy-mozjs: Does not work with newer libxul
2013-09-01 www/helixplugin: Does not work with newer libxul
2013-09-01 deskutils/chmsee: Does not work with newer libxul
2013-09-01 www/moonshine: Does not work with newer libxul
2013-09-01 x11/ggiterm: Unmaintained and broken
2013-09-01 graphics/libggigcp: Unmaintained
2013-09-01 graphics/libggimisc: Unmaintained
2013-09-01 graphics/libggiwmh: Unmaintained
2013-09-01 devel/libgiigic: Unmaintained
2013-09-01 games/koth: Unmaintained
2013-09-01 15:06:45 +00:00
Bryan Drewery
de6f5e55eb - IGNORE when PACKAGE_BUILDING as these require manual fetch
With hat:	portmgr
2013-08-31 01:51:02 +00:00
Baptiste Daroussin
b2c2296adc Eradicate USE_GNOME=pkgconfig from security
While here:
- Trim headers
- Convert USE_GMAKE to USES=gmake
- Convert USE_GNOME=gnomehack to USES=pathfix
- Convert USE_PERL5 to USES=perl5
2013-08-31 00:11:06 +00:00
Hajimu UMEMOTO
a0cb745994 Mark security/cyrus-sasl2 MAKE_JOBS_UNSAFE.
PR:		ports/181626
Submitted by:	amdmi3
2013-08-30 15:47:17 +00:00
Frederic Culot
a4ad9e25e6 - Update to 0.8.10
Changes:        https://raw.github.com/fail2ban/fail2ban/master/ChangeLog
PR:             ports/179528
Submitted by:   Christoph Theis <theis@gmx.at> (maintainer)
2013-08-30 14:23:33 +00:00
Sunpoet Po-Chuan Hsieh
fdd462485d - Remove Author line 2013-08-29 18:06:47 +00:00
Sunpoet Po-Chuan Hsieh
1b0d3f744b - Add WWW
- Use single space after WWW:
- Remove Author line
2013-08-29 17:16:52 +00:00
Bryan Drewery
bd78be73dd - Remove bogus conditional IGNORE for PACKAGE_BUILDING; these should
be IGNOREd regardless of PACKAGE_BUILDING. Soem have no MASTER_SITES
  and require manual fetching, others are already marked RESTRICTED.
- Trim headers
- Convert some pre-fetch errors into IGNORE
- Remove needless quoting in java/jdk7-doc IGNORE

With hat:	portmgr
2013-08-29 14:16:03 +00:00
Sergey Matveychuk
671a651bc8 - Document the last cacti vulnerabilities
PR:		ports/181606 (based on)
Submitted by:	Rodrigo (ros) OSORIO <rodrigo@bebik.net>
2013-08-29 10:56:24 +00:00
Matthias Andree
a4027193e3 Update extraction script to:
- Only look at CKA_TRUST_SERVER_AUTH, _EMAIL_PROTECTION, and
  _CODE_SIGNING attributes.

- Omit certificates that do not have any explicit trust value in these
  three attributes; at least one of the purposes must mark the
  certificate a trusted delegator.

- Validate that the trust is one of three known trust values, to become
  aware of syntax changes in certdata.txt. If it is an unknown token,
  abort with an error stating that the script must be updated.

- Check that we have at least 25 certificates in the output or abort.

This removes these two certificates that have "unknown"
(CKT_NSS_MUST_VERIFY_TRUST) in all three tokens, making them unfit as
trust anchors:

1 C=DE, O=TC TrustCenter GmbH, OU=TC TrustCenter Universal CA,
    CN=TC TrustCenter Universal CA III

2 C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network,
    OU=http://www.usertrust.com,
    CN=UTN-USERFirst-Network Applications

164 trusted certificates remain.
2013-08-29 08:10:09 +00:00
Remko Lodder
9f93346788 Add CVE entries to latest entry for Asterisk.
Add "The" in who reports the issue.
Bump modified date
2013-08-29 06:15:52 +00:00
Sunpoet Po-Chuan Hsieh
8e958a4c52 - Use single space after WWW: 2013-08-29 04:21:28 +00:00
Sunpoet Po-Chuan Hsieh
9e12ae1e0f - Use single space after WWW: 2013-08-29 04:10:37 +00:00
Sunpoet Po-Chuan Hsieh
7a0285baaf - Use single space after WWW: 2013-08-29 04:08:53 +00:00
Florian Smeets
a66fd06e16 Update net/asterisk to 1.8.23.1
Update net/asterisk10 to 10.12.3
Update net/asterisk11 to 11.5.1

Security:	fd2bf3b5-1001-11e3-ba94-0025905a4771
2013-08-28 20:51:32 +00:00
Martin Matuska
8f8de2c289 Horde package update:
Horde_Browser 2.0.3 -> 2.0.4
Horde_Core 2.6.6 -> 2.7.0
Horde_Crypt 2.2.1 -> 2.2.2
Horde_Exception 2.0.3 -> 2.0.4
Horde_History 2.1.6 -> 2.2.0
Horde_Http 2.0.3 -> 2.0.4
Horde_Perms 2.1.0 -> 2.1.1
Horde_SessionHandler 2.2.2 -> 2.2.3
Horde_Url 2.2.0 -> 2.2.1
horde-base 5.1.2 -> 5.1.3
horde-imp 6.1.3 -> 6.1.4
horde-nag 4.1.1 -> 4.1.2
horde-passwd 5.0.0 -> 5.0.1
horde-turba 4.1.1 -> 4.1.2
2013-08-27 18:10:33 +00:00
Renato Botelho
d546ff7530 - Add a patch to fix CVE-2013-4073
- Bump php53-openssl PORTREVISION

PR:		ports/181546
Submitted by:	garga@
Approved by:	flo@ (maintainer)
Obtained from:	http://git.php.net/?p=php-src.git;a=blobdiff;f=ext/openssl/openssl.c;h=c32748cb6443a4d8e4bb14fe96ad72e32ec8acff;hp=d7ac117e51c8f5d8ab0632c276af48d610b4b19e;hb=2874696a5a8d46639d261571f915c493cd875897;hpb=f4dc2240a048050a87a6e3e31573f13a2256cf2e
Security:	CVE-2013-4073
2013-08-27 10:33:45 +00:00
Ryan Steinmetz
a017c61eeb - Update to 2.9.5.3
- Don't build example dynamic preprocessor
2013-08-26 21:01:43 +00:00
Baptiste Daroussin
6c26406029 Remove --export-all-symbols which is not supported and makes 'make install' fail. 2013-08-26 17:24:09 +00:00
Baptiste Daroussin
6cdbe4cf2e Remove -Werror to allow building with clang 2013-08-26 12:56:54 +00:00
Jimmy Olgeni
5e00e02af6 Update iPython package name. 2013-08-25 16:14:03 +00:00
Max Brazhnikov
e2a5233b95 - Update to 0.8.3
- Remove stale patch
- Drop deprecated PTHREAD_* stuff
2013-08-23 16:12:31 +00:00
Rene Ladan
2738c7104a Remove expired port:
2013-08-23 security/sfs: Broken on FreeBSD 8 and newer
2013-08-23 09:52:03 +00:00
Bryan Drewery
220facfb8e - Fix build
- Update to 1.6.0

PR:		ports/177758
Submitted by:	Petr Rehor <prehor@gmail.com> (maintainer)
2013-08-22 02:37:47 +00:00
Sunpoet Po-Chuan Hsieh
ee0456d513 - Cleanup Makefile header 2013-08-21 17:42:57 +00:00
Vanilla I. Shu
85fca52ebb Fix pkg-plist. 2013-08-21 17:07:20 +00:00
Vanilla I. Shu
cc84602885 Add p5-CryptX, crypto toolkit. 2013-08-21 14:43:47 +00:00
Sunpoet Po-Chuan Hsieh
c9cf6c6113 - Convert to new perl framework 2013-08-21 14:08:06 +00:00
Rene Ladan
c49d4ce4ac Document new vulnerabilities in www/chromium < 29.0.1547.57
Obtained from:	http://googlechromereleases.blogspot.nl/
2013-08-21 09:29:44 +00:00
Olli Hauer
56b7b51e42 - fix pkg-plist (ja) 2013-08-21 07:42:01 +00:00
Olli Hauer
c18edf2f37 - update to 6.4.0
- remove patches for EOL FreeBSD releases
- convert to OPTIONS

Changelog:
http://nmap.org/changelog.html
2013-08-21 04:57:14 +00:00
Koop Mast
dc7ab3f9b0 Fix multiple security issues in the bundled libav version by replacing it
with a newer version.

Reported by:	Jan Beich <jbeich@tormail.org>
2013-08-20 15:36:43 +00:00
Andrej Zverev
e22cb3e0ce - Convert to new perl5 framework
Approved by:	bdrewery@ (maintainer)
2013-08-20 11:43:44 +00:00
Rui Paulo
f7ad576cca Use GCC 4.2+ on armv6.
Reviewed by:	umq
Approved by:	umq
2013-08-20 05:31:34 +00:00
Anton Berezin
17597283fc Update to 0.23.
Changes:	http://search.cpan.org/dist/RadiusPerl/Changes
2013-08-19 20:45:58 +00:00
Mathieu Arnold
5f20fb8f86 Update to 0.9.6 2013-08-19 13:48:21 +00:00
Anton Berezin
27e59af026 Update to 1.10.
Changes:	http://search.cpan.org/dist/Crypt-IDEA/changes
2013-08-19 13:33:09 +00:00
Jun Kuriyama
ce99cacd0f - Upgrade to 2.0.21 (minor improvements). 2013-08-19 13:29:42 +00:00
Mathieu Arnold
0341a9f0e4 Update to 2.33 2013-08-19 12:40:53 +00:00
Mathieu Arnold
c5fc0329cf Update to 2.14 2013-08-19 12:40:28 +00:00
Mathieu Arnold
29f1295197 Update to 0.06 2013-08-19 12:40:02 +00:00
Mathieu Arnold
cb90a1659a Update to 0.131750 2013-08-19 12:39:27 +00:00
Mathieu Arnold
7e4431cc54 Update to 0.9.1.1.1. 2013-08-19 12:35:44 +00:00
Mathieu Arnold
65af5efda8 Update to 0.9.60. 2013-08-19 12:35:00 +00:00
Mathieu Arnold
4acfb17f72 Update to 0.33. 2013-08-19 12:33:15 +00:00
Mathieu Arnold
ee2ab8a9ab Update to 2.07. 2013-08-19 09:01:00 +00:00
Stanislav Sedov
59aae10fcc - Correct lcms2 VuXML entry: only versions before 2.5 are vulnerable.
PR:		ports/181384
Reported by:	Derek Schrock <dereks@lifeofadishwasher.com>
2013-08-19 08:07:02 +00:00
Ashish SHUKLA
379da32f9e - Update modified date of VuXML entry which was missed in r317985
Reported by:	remko
2013-08-18 10:41:10 +00:00
Sunpoet Po-Chuan Hsieh
eff1514804 - Update USE_PYTHON
- Do not use easyinstall
- Do not installed zipped egg [1]
- Bump PORTREVISION for package change
- Cleanup Makefile header

Requested by:	olgeni [1]
Tested by:	olgeni
2013-08-18 03:15:35 +00:00
Gerald Pfeifer
41e60477bd Replace USE_GCC=4.6+ and USE_GCC=4.4+ by USE_GCC=yes.
Right now this is a noop in the former case and a noop in the latter
case unless lang/gcc44 has been installed explicitly.

This puts a bit more emphasis on standardizing on a canonical version
"current" GCC and makes it easier to update that canonical version
by changing the default in Mk/bsd.gcc.mk and updating the lang/gcc port.

That is, USE_GCC=yes means "use a decent/modern version of GCC" without
having to worry about details.

Approved by:	portmgr (bdrewery)
2013-08-17 16:27:24 +00:00
Antoine Brodin
325ea40973 Update python-registry to 0.2.7 2013-08-17 08:49:49 +00:00
Remko Lodder
5b750bca79 Correct latest entry, properly indent the paragraphs
and sort the url list alphabetically.
2013-08-17 08:36:30 +00:00
Brendan Fabeny
73059db992 Amend 689c2bf7-0701-11e3-9a25-002590860428 so that it doesn't overlap with
80771b89-f57b-11e2-bf21-b499baab0cbe, but keep both entries rather than
augmenting the old one, because I've cited the new one in a commit message.
2013-08-17 08:24:35 +00:00
Brendan Fabeny
4ce32e9298 Update security/libgcrypt to 1.5.3 [1], and document the latest gnupg
and libgcrypt vulnerability

PR:		181231
Submitted by:	Hirohisa Yamaguchi (maintainer) [1]
Security:	http://www.vuxml.org/freebsd/689c2bf7-0701-11e3-9a25-002590860428.html
2013-08-17 07:56:12 +00:00
Brad Davis
beeccba037 - Update puppet to 3.2.4 which fixes CVE-2013-4761 and CVE-2013-4956
Approved by:	swills@
Security:	2b2f6092-0694-11e3-9e8e-000c29f6ae42
2013-08-16 17:54:41 +00:00
Remko Lodder
e82c192b18 Correct polarssl entry, the lines were way to long, indentation was
incorrect, and the topic description does not need too many details
since that is explained in the description itself.

Also correct the url's since c comes before u ;-)

Prodded by:	stas
2013-08-16 05:35:00 +00:00
Stanislav Sedov
1f8bb4dc02 - Fix ordering of references.
Reported by:	remko
2013-08-15 19:54:22 +00:00
Stanislav Sedov
9c2bca2d9f - Add lcms2 DoS vulnerability entry.
Hat: secteam
2013-08-15 19:02:34 +00:00
Alex Kozlov
d4041784dc - Remove MAKE_JOBS_SAFE variable
Approved by:	portmgr (bdrewery)
2013-08-14 22:35:50 +00:00
Dirk Meyer
702abdca4e - update to 1.0.22 2013-08-14 21:12:06 +00:00
Matthias Andree
d8d9871e4e Fix regression from my earlier commit r324675 which caused a
"make fetch" failure on non-POSIX-compliant SHELL:

1. Replace ${SHELL} by ${SH} so the fetchwrapper.sh gets executed with a
   POSIX-compliant shell (such as /bin/sh)

2. Just because it's meant that way, add an svn:executable=* property
   on files/fetchwrapper.sh.

PR:		ports/181252
Reported by:	Mike Harding (private email)
2013-08-14 17:28:32 +00:00
Emanuel Haupt
192975256b Update to 1.3.2 2013-08-14 12:44:56 +00:00
Johan van Selst
d13974de60 Note that parallel builds do not work
While here, update Perl dependency style and WWW

PR:		ports/181275
Submitted by:	mat
2013-08-14 08:32:53 +00:00
Alexey Dokuchaev
430c83ad89 Use correct installation commands for header file and library. 2013-08-14 03:58:16 +00:00
Alexey Dokuchaev
5fa3334496 - Unbreak parallel (-jX) builds by fixing yacc'ed targets dependencies;
unfortunately, doing it correctly requires GNU make (for order-only
  prerequisites)
- Standardize Makefile header, define LICENSE (MIT)
- Install somewhat more complete set of portdocs
- Install manpages relative to MANPREFIX
- While here, convert to OptionsNG, utilize PORTDOCS, remove pkg-plist,
  and generally cleanup port's Makefile
2013-08-14 03:54:53 +00:00
Matthias Andree
ed87d0ff92 Update to new version 1.2.8, fixing security issues (denial of service).
Fix fetching, by bypassing splash screen (adds files/fetchwrapper.sh).

Approved by:	jase (maintainer)
Security:	72bf9e21-03df-11e3-bd8d-080027ef73ec
Security:	CVE-2013-4623
2013-08-13 17:17:15 +00:00
Frederic Culot
341a499bf6 - Update to 1.6.1
Changes:	http://pypi.python.org/pypi/keyring/1.6.1#changes
PR:		ports/181247
Submitted by: 	Douglas William Thrift <douglas@douglasthrift.net> (maintainer)
2013-08-13 15:00:47 +00:00
Matthias Andree
c51af7a6be Add CVE Id, which was not in the advisory,
but on <https://polarssl.org/security>.
2013-08-13 06:20:27 +00:00
Matthias Andree
6421943e6a Record PolarSSL < 1.2.8 infinite loop denial of service.
Note: the port has not yet been upgraded, and the fix then needs to be merged
to the 9.2 ports branch before release.
2013-08-13 06:17:32 +00:00
Brendan Fabeny
a582c52d89 Update to 0.2.4.16-rc 2013-08-13 03:39:37 +00:00
Antoine Brodin
5e46505535 Update python-registry to 0.2.6 2013-08-10 11:51:31 +00:00
Matthias Andree
9145f8cde9 Prevent packaging stuff to be pulled from the tree a day after release. 2013-08-10 09:20:09 +00:00
Xin LI
12cdec36f5 Add a link to the advisory.
Submitted by:	remko
2013-08-09 20:52:29 +00:00
Sunpoet Po-Chuan Hsieh
6aa36a6744 - Update to 1.3.3
- Remove leading indefinite article from COMMENT
- Pet portlint: remove ABI version number from LIB_DEPENDS
- Cleanup Makefile header

Changes:	http://pecl.php.net/package-changelog.php?package=gnupg
2013-08-09 17:22:27 +00:00
Xin LI
7027b5a896 Document Samba DoS vulnerability. 2013-08-09 17:22:16 +00:00
Antoine Brodin
aba57212b5 - Remove article from COMMENT
- Do not use PYTHON_SITELIBDIR in DEPENDS
- Add missing OPTIONS_DEFINE
- Remove LICENSE from PORTDOCS
- Remove unneeded line from plist
2013-08-09 15:51:28 +00:00
Olivier Duchateau
a0a7af1b5e - Update to 0.23 2013-08-09 12:16:33 +00:00
Alexey Dokuchaev
b8851b154c - Unbreak parallel builds by fixing targets' dependencies
- Cleanup port's Makefile slightly while I am here
2013-08-09 02:11:20 +00:00
Ryan Steinmetz
f82694aa19 - Fix build under 10-CURRENT when using OpenSSL, chasing r254107 (OpenSSL bugfix for RT #2984)
- Add security/ca_root_nss as a dependency to fix GnuTLS build
- Do not bump PORTREVISION

Reported by:	gnn@
2013-08-08 23:58:12 +00:00
Ryan Steinmetz
81b171d3bf - Install manpages, regardless of what PORTDOCS is set to [1]
- Update MASTER_SITES [1]
- Update WWW [1]
- Honor PORTEXAMPLES
- Pacify portlint(1)
- Do not bump PORTREVISION

PR:		ports/180373 [1]
Submitted by: 	"r4721@tormail.org" <r4721@tormail.org> [1]
2013-08-08 23:24:39 +00:00
Florian Smeets
48f9528b90 - update firefox to 23.0
- update firefox-esr, thunderbird and libxul to 17.0.8
- update seamonkey to 2.20
- fix plist for *-i18n

Security:		0998e79d-0055-11e3-905b-0025905a4771
In collaboration with:	Jan Beich <jbeich@tormail.org>
2013-08-08 18:42:03 +00:00
Matthias Andree
65de6df531 Add one more reference for PuTTY 0.59-0.61 vuln CVE-2011-4607. 2013-08-07 16:26:12 +00:00
Matthias Andree
2dca42dc97 More references for PuTTY < 0.63 vulnerabilities. 2013-08-07 16:22:29 +00:00
Matthias Andree
a6428e5e5a Upgrade PuTTY to new 0.63 beta upstream release, adding vulnerability info.
Quoting the upstream's change log:

- Security fix: prevent a nefarious SSH server or network attacker from
  crashing PuTTY at startup in three different ways by presenting a maliciously
  constructed public key and signature.
- Security fix: PuTTY no longer retains the private half of users' keys in
  memory by mistake after authenticating with them.
- Revamped the internal configuration storage system to remove all fixed
  arbitrary limits on string lengths. In particular, there should now no longer
  be an unreasonably small limit on the number of port forwardings PuTTY can
  store.
- Port-forwarded TCP connections which close one direction before the other
  should now be reliably supported, with EOF propagated independently in the
  two directions. This also fixes some instances of port-forwarding data
  corruption (if the corruption consisted of losing data from the very end of
  the connection) and some instances of PuTTY failing to close when the session
  is over (because it wrongly thought a forwarding channel was still active
  when it was not).
- The terminal emulation now supports xterm's bracketed paste mode (allowing
  aware applications to tell the difference between typed and pasted text, so
  that e.g. editors need not apply inappropriate auto-indent).
- You can now choose to display bold text by both brightening the foreground
  colour and changing the font, not just one or the other.  - PuTTYgen will now
  never generate a 2047-bit key when asked for 2048 (or more generally n−1 bits
  when asked for n).
- Some updates to default settings: PuTTYgen now generates 2048-bit keys by
  default (rather than 1024), and PuTTY defaults to UTF-8 encoding and 2000
  lines of scrollback (rather than ISO 8859-1 and 200).
- Unix: PSCP and PSFTP now preserve the Unix file permissions, on copies in
  both directions.
- Unix: dead keys and compose-character sequences are now supported.
- Unix: PuTTY and pterm now permit font fallback (where glyphs not present in
  your selected font are automatically filled in from other fonts on the
  system) even if you are using a server-side X11 font rather than a Pango
  client-side one.
- Bug fixes too numerous to list, mostly resulting from running the code
  through Coverity Scan which spotted an assortment of memory and resource
  leaks, logic errors, and crashes in various circumstances.

Security:	4b448a96-ff73-11e2-b28d-080027ef73ec
Security:	CVE-2013-4206
Security:	CVE-2013-4207
Security:	CVE-2013-4208
Security:	CVE-2013-4852
2013-08-07 16:11:17 +00:00
Andrej Zverev
ca70e439c2 - Convert to new perl framework
per port extra changes:
devel/p5-Perl-Version remove outage PERL_LEVEL check
devel/p5-Devel-LeakTrace-Fast remove perl version requiment 5.12.0- (no need in current version)

Approved by:	lth@ (maintainer)
2013-08-07 13:20:32 +00:00
Brendan Fabeny
bd0fca35b5 Make the torrc log domain(s) and level(s) user-configurable in security/tor, as
was done for security/tor-devel in r322977; remove some problematic mirrors;
update Makefile idioms (gmake, LIB_DEPENDS, etc.); attempt to remove leftovers
in /var during deinstallation [1]

Reported by:	miwi [1]
2013-08-07 12:54:37 +00:00
Alexey Dokuchaev
aa8db30ef9 Adjust NVidia driver version ranges after r304966 to remedy false positives. 2013-08-07 08:41:51 +00:00
Andrej Zverev
2c25cf429d - Convert to new perl framework
- Trim Makefile header

Approved by:	wen@ (maintainer)
2013-08-06 08:50:49 +00:00
Olli Hauer
ac22a002c2 - secuity update for typo3 ports
- some small Makefile cleanups
- add vuxml entry

Vulnerability Types: Cross-Site Scripting, Remote Code Execution
 Overall Severity: Critical

Vulnerable subcomponent: Third Party Libraries used for audio and video playback
 Affected Versions: All versions from 4.5.0 up to the development branch of 6.2
 Vulnerability Type: Cross-Site Scripting
 Severity: Medium

Vulnerable subcomponent: Backend File Upload / File Abstraction Layer
 Vulnerability Type: Remote Code Execution by arbitrary file creation
 Affected Versions: All versions from 6.0.0 up to the development branch of 6.2
 Severity: Critical

PR:		ports/180951
		ports/180952
		ports/180953
Submitted by:	Helmut Ritter <freebsd-ports@charlieroot.de> (maintainer)
Security:	http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-002/
		CVE-2011-3642
		CVE-2013-1464
2013-08-05 21:56:56 +00:00
Andrej Zverev
43f0c9f153 - Convert to new perl framework
- Trim Makefile header

Approved by:	tobez@ (maintainer)
2013-08-05 15:05:29 +00:00
Michael Landin
0c2e25d1f0 - change AUTHOR email 2013-08-04 13:04:54 +00:00
Matthew Seaman
9aacd678d3 - Security update of databases/phpmyadmin to 4.0.5
ChangeLog: http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/4.0.5/phpMyAdmin-4.0.5-notes.html/download
SecurityAdvisory: http://www.phpmyadmin.net/home_page/security/PMASA-2013-10.php

- Deprecate databases/phpmyadmin35

This version is vulnerable to the 'clickjacking protection bypass'
problem fixed in 4.0.5, but the development team will not be
publishing a fix. "We have no solution for 3.5.x, due to the proposed
solution requiring JavaScript. We don't want to introduce a dependency
to JavaScript in the 3.5.x family."

Therefore deprecate this port and set expiry for one month.  Please
upgrade to 4.0.5 instead.

Security:	17326fd5-fcfb-11e2-9bb9-6805ca0b3d42
2013-08-04 12:13:50 +00:00
Rene Ladan
dcd32429b1 Add new vulnerabilities for www/chromium < 28.0.1500.95
Obtained from:	http://googlechromereleases.blogspot.nl/
2013-08-03 14:56:41 +00:00
Mathieu Arnold
62a41b423b - Convert to new perl framework
- Remove MAKE_JOBS_SAFE=yes, it's the default.
2013-08-03 13:44:00 +00:00
Antoine Brodin
61ebf63b31 Convert regripper to USES=perl5 2013-08-03 09:23:18 +00:00
Andrej Zverev
99ad912735 - Convert to new perl framework
- Trim Makefile header
2013-08-03 08:45:51 +00:00
Mathieu Arnold
4063eccdf2 - Convert to new perl framework
- Trim Makefile header
2013-08-02 21:38:09 +00:00
Mathieu Arnold
4819ca343b - Convert to new perl framework
- Trim Makefile header
- Remove MAKE_JOBS_SAFE=yes, it's the default.
2013-08-02 18:52:07 +00:00
Andrej Zverev
0aad97bb5c - Convert to new perl framework 2013-08-02 18:21:05 +00:00
Mathieu Arnold
13bdf03c6e Convert my ports to the new perl order. 2013-08-02 17:16:28 +00:00