2013-08-28 lang/gdc: Broken for more than 6 month
2013-08-31 net-im/cli-msn: MSN Messenger service terminated 30 APR 2013
2013-09-01 x11-toolkits/wxd: Depends on deprecated lang/gdc
2013-09-01 security/openvpn22: Please migrate to a newer OpenVPN version
2013-09-01 devel/dsss: Depends on expired lang/gdc
2013-09-01 graphics/qcamview: Broken on FreeBSD 8 and newer
2013-09-01 www/cacheboy15-devel: Broken on FreeBSD 8 and newer
2013-09-01 graphics/spcaview: Broken on FreeBSD 8 and newer
2013-09-01 comms/uticom: Broken on FreeBSD 8 and newer
2013-09-01 net/ipex: Broken on FreeBSD 8 and newer
2013-09-01 graphics/phpsview: Broken on FreeBSD 8 and newer
2013-09-01 misc/usbrh: Broken on FreeBSD 8 and newer
2013-09-01 net/atmsupport: Broken on FreeBSD 8 and newer
2013-09-01 comms/ib-kmod: Broken on FreeBSD 8 and newer
2013-09-01 net/libproxy-mozjs: Does not work with newer libxul
2013-09-01 www/helixplugin: Does not work with newer libxul
2013-09-01 deskutils/chmsee: Does not work with newer libxul
2013-09-01 www/moonshine: Does not work with newer libxul
2013-09-01 x11/ggiterm: Unmaintained and broken
2013-09-01 graphics/libggigcp: Unmaintained
2013-09-01 graphics/libggimisc: Unmaintained
2013-09-01 graphics/libggiwmh: Unmaintained
2013-09-01 devel/libgiigic: Unmaintained
2013-09-01 games/koth: Unmaintained
be IGNOREd regardless of PACKAGE_BUILDING. Soem have no MASTER_SITES
and require manual fetching, others are already marked RESTRICTED.
- Trim headers
- Convert some pre-fetch errors into IGNORE
- Remove needless quoting in java/jdk7-doc IGNORE
With hat: portmgr
- Only look at CKA_TRUST_SERVER_AUTH, _EMAIL_PROTECTION, and
_CODE_SIGNING attributes.
- Omit certificates that do not have any explicit trust value in these
three attributes; at least one of the purposes must mark the
certificate a trusted delegator.
- Validate that the trust is one of three known trust values, to become
aware of syntax changes in certdata.txt. If it is an unknown token,
abort with an error stating that the script must be updated.
- Check that we have at least 25 certificates in the output or abort.
This removes these two certificates that have "unknown"
(CKT_NSS_MUST_VERIFY_TRUST) in all three tokens, making them unfit as
trust anchors:
1 C=DE, O=TC TrustCenter GmbH, OU=TC TrustCenter Universal CA,
CN=TC TrustCenter Universal CA III
2 C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network,
OU=http://www.usertrust.com,
CN=UTN-USERFirst-Network Applications
164 trusted certificates remain.
- Do not use easyinstall
- Do not installed zipped egg [1]
- Bump PORTREVISION for package change
- Cleanup Makefile header
Requested by: olgeni [1]
Tested by: olgeni
Right now this is a noop in the former case and a noop in the latter
case unless lang/gcc44 has been installed explicitly.
This puts a bit more emphasis on standardizing on a canonical version
"current" GCC and makes it easier to update that canonical version
by changing the default in Mk/bsd.gcc.mk and updating the lang/gcc port.
That is, USE_GCC=yes means "use a decent/modern version of GCC" without
having to worry about details.
Approved by: portmgr (bdrewery)
incorrect, and the topic description does not need too many details
since that is explained in the description itself.
Also correct the url's since c comes before u ;-)
Prodded by: stas
"make fetch" failure on non-POSIX-compliant SHELL:
1. Replace ${SHELL} by ${SH} so the fetchwrapper.sh gets executed with a
POSIX-compliant shell (such as /bin/sh)
2. Just because it's meant that way, add an svn:executable=* property
on files/fetchwrapper.sh.
PR: ports/181252
Reported by: Mike Harding (private email)
unfortunately, doing it correctly requires GNU make (for order-only
prerequisites)
- Standardize Makefile header, define LICENSE (MIT)
- Install somewhat more complete set of portdocs
- Install manpages relative to MANPREFIX
- While here, convert to OptionsNG, utilize PORTDOCS, remove pkg-plist,
and generally cleanup port's Makefile
- update firefox-esr, thunderbird and libxul to 17.0.8
- update seamonkey to 2.20
- fix plist for *-i18n
Security: 0998e79d-0055-11e3-905b-0025905a4771
In collaboration with: Jan Beich <jbeich@tormail.org>
Quoting the upstream's change log:
- Security fix: prevent a nefarious SSH server or network attacker from
crashing PuTTY at startup in three different ways by presenting a maliciously
constructed public key and signature.
- Security fix: PuTTY no longer retains the private half of users' keys in
memory by mistake after authenticating with them.
- Revamped the internal configuration storage system to remove all fixed
arbitrary limits on string lengths. In particular, there should now no longer
be an unreasonably small limit on the number of port forwardings PuTTY can
store.
- Port-forwarded TCP connections which close one direction before the other
should now be reliably supported, with EOF propagated independently in the
two directions. This also fixes some instances of port-forwarding data
corruption (if the corruption consisted of losing data from the very end of
the connection) and some instances of PuTTY failing to close when the session
is over (because it wrongly thought a forwarding channel was still active
when it was not).
- The terminal emulation now supports xterm's bracketed paste mode (allowing
aware applications to tell the difference between typed and pasted text, so
that e.g. editors need not apply inappropriate auto-indent).
- You can now choose to display bold text by both brightening the foreground
colour and changing the font, not just one or the other. - PuTTYgen will now
never generate a 2047-bit key when asked for 2048 (or more generally n−1 bits
when asked for n).
- Some updates to default settings: PuTTYgen now generates 2048-bit keys by
default (rather than 1024), and PuTTY defaults to UTF-8 encoding and 2000
lines of scrollback (rather than ISO 8859-1 and 200).
- Unix: PSCP and PSFTP now preserve the Unix file permissions, on copies in
both directions.
- Unix: dead keys and compose-character sequences are now supported.
- Unix: PuTTY and pterm now permit font fallback (where glyphs not present in
your selected font are automatically filled in from other fonts on the
system) even if you are using a server-side X11 font rather than a Pango
client-side one.
- Bug fixes too numerous to list, mostly resulting from running the code
through Coverity Scan which spotted an assortment of memory and resource
leaks, logic errors, and crashes in various circumstances.
Security: 4b448a96-ff73-11e2-b28d-080027ef73ec
Security: CVE-2013-4206
Security: CVE-2013-4207
Security: CVE-2013-4208
Security: CVE-2013-4852
per port extra changes:
devel/p5-Perl-Version remove outage PERL_LEVEL check
devel/p5-Devel-LeakTrace-Fast remove perl version requiment 5.12.0- (no need in current version)
Approved by: lth@ (maintainer)
was done for security/tor-devel in r322977; remove some problematic mirrors;
update Makefile idioms (gmake, LIB_DEPENDS, etc.); attempt to remove leftovers
in /var during deinstallation [1]
Reported by: miwi [1]
- some small Makefile cleanups
- add vuxml entry
Vulnerability Types: Cross-Site Scripting, Remote Code Execution
Overall Severity: Critical
Vulnerable subcomponent: Third Party Libraries used for audio and video playback
Affected Versions: All versions from 4.5.0 up to the development branch of 6.2
Vulnerability Type: Cross-Site Scripting
Severity: Medium
Vulnerable subcomponent: Backend File Upload / File Abstraction Layer
Vulnerability Type: Remote Code Execution by arbitrary file creation
Affected Versions: All versions from 6.0.0 up to the development branch of 6.2
Severity: Critical
PR: ports/180951
ports/180952
ports/180953
Submitted by: Helmut Ritter <freebsd-ports@charlieroot.de> (maintainer)
Security: http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-002/
CVE-2011-3642
CVE-2013-1464
ChangeLog: http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/4.0.5/phpMyAdmin-4.0.5-notes.html/download
SecurityAdvisory: http://www.phpmyadmin.net/home_page/security/PMASA-2013-10.php
- Deprecate databases/phpmyadmin35
This version is vulnerable to the 'clickjacking protection bypass'
problem fixed in 4.0.5, but the development team will not be
publishing a fix. "We have no solution for 3.5.x, due to the proposed
solution requiring JavaScript. We don't want to introduce a dependency
to JavaScript in the 3.5.x family."
Therefore deprecate this port and set expiry for one month. Please
upgrade to 4.0.5 instead.
Security: 17326fd5-fcfb-11e2-9bb9-6805ca0b3d42