Commit graph

16503 commits

Author SHA1 Message Date
Philippe Audeoud
4e30987879 - Update to 2.16
- Changelog: http://cpansearch.perl.org/src/GBARR/Authen-SASL-2.16/Changes
2012-09-13 13:13:34 +00:00
Jason E. Hale
7afa609aeb - Update MAINTAINER to my new FreeBSD.org address
Approved by:	makc (mentor)
2012-09-13 04:45:58 +00:00
Brendan Fabeny
1a3d3d9924 update security/tor to 0.2.2.39 and security/tor-devel to 0.2.3.22-rc
Security:	Tor bugs 6690, 6811
2012-09-13 04:13:47 +00:00
Steve Wills
78877f2e04 - Update to 0.10.22.6 which fixes two security issues
- Document security issues in vuxml [1]

Reviewed by:	bdrewery [1]
Security:	178ba4ea-fd40-11e1-b2ae-001fd0af1a4c
2012-09-13 03:35:09 +00:00
Brendan Fabeny
b7c7102421 update lang/sbcl to 1.0.58 and switch to the new options format;
adjust dependent ports
2012-09-13 02:03:41 +00:00
Kevin Lo
9c0b49d590 Update to 2.0; with some help from rm@
PR:	ports/169690
Submitted by:	Paul Dokas <paul at dokas dot name>
2012-09-12 08:09:18 +00:00
Alexey Dokuchaev
208dfd5a20 Update NVIDIA arbitrary memory access vulnerability with CVE-2012-4225. 2012-09-12 07:31:22 +00:00
Ruslan Makhmatkhanov
c5db3d9375 Update Plone to 4.2.1.
This update includes:
 - www/py-plone.outputfilters 1.2 -> 1.6
 - www/py-Products.CMFPlone 4.1.5 -> 4.2.1.1
 - www/py-plone.app.vocabularies 2.1.6 -> 2.1.7
 - www/py-plone.subrequest 1.6.2 -> 1.6.6
 - www/py-plone.app.discussion 2.1.5 -> 2.1.7
 - www/py-plonetheme.classic 1.1.2 -> 1.2.3
 - www/plone 4.1.5 -> 4.2.1
 - www/py-plone.i18n 2.0 -> 2.0.1
 - www/py-plone.fieldsets 2.0.1 -> 2.0.2
 - www/py-plone.app.search 1.0.2 -> 1.0.4
 - www/py-plone.app.content 2.0.9 -> 2.0.11
 - www/py-plone.app.testing 4.0.2 -> 4.2
 - www/py-plone.app.contentrules 2.1.4 -> 2.1.8
 - www/py-plone.uuid 1.0.2 -> 1.0.3
 - www/py-plone.app.upgrade 1.1.6 -> 1.2.1
 - www/py-plone.app.caching 1.0.3 -> 1.1
 - www/py-plone.app.linkintegrity 1.4.5 -> 1.4.6
 - www/py-plone.app.iterate 2.1.5 -> 2.1.7
 - www/py-plone.testing 4.0.3 -> 4.0.4
 - www/py-plone.app.contentmenu 2.0.5 -> 2.0.6
 - www/py-plone.app.controlpanel 2.2.3 -> 2.2.8
 - www/py-plone.portlet.collection 2.0.4 -> 2.1.1
 - www/py-plone.resource 1.0b6 -> 1.0.1
 - www/py-plone.app.registry 1.0.1 -> 1.1
 - www/py-plone.app.workflow 2.0.6 -> 2.0.7
 - www/py-plone.app.portlets 2.2.3 -> 2.2.6
 - www/py-plone.app.blob 1.5.1 -> 1.5.2
 - www/py-Products.TinyMCE 1.2.12 -> 1.2.13
 - www/py-plone.app.locales 4.0.11 -> 4.0.15
 - www/py-plonetheme.sunburst 1.2.4 -> 1.2.7
 - www/py-plone.app.theming 1.0b9 -> 1.0.3
 - www/py-plone.app.collection 1.0.1 -> 1.0.5
 - www/py-plone.folder 1.0.1 -> 1.0.2
 - www/py-plone.app.querystring 1.0.1 -> 1.0.5
 - www/py-plone.app.jquerytools 1.3.1 -> 1.3.2
 - www/py-plone.app.contentlisting 1.0 -> 1.0.1
 - www/py-plone.stringinterp 1.0.5 -> 1.0.7
 - www/py-plone.app.layout 2.2.4 -> 2.2.7
 - www/py-plone.app.z3cform 0.5.7 -> 0.6.0
 - www/py-plone.portlets 2.0.2 -> 2.1
 - www/py-plone.app.kss 1.7.0 -> 1.7.1
 - www/py-plone.app.redirector 1.1.2 -> 1.1.3
 - devel/py-kss-core 1.6.3 -> 1.6.4
 - devel/py-Products.ATContentTypes 2.1.7 -> 2.1.8
 - devel/py-Products.ResourceRegistries 2.0.6 -> 2.2.1
 - devel/py-five.customerize 1.0.2 -> 1.0.3
 - devel/py-diazo 1.0rc4 -> 1.0.1
 - devel/py-Products.CMFEditions 2.2.2 -> 2.2.5
 - devel/py-Products.ExtendedPathIndex 2.9 -> 3.0.1
 - devel/py-z3c.formwidget.query 0.7 -> 0.8
 - devel/py-Products.Archetypes 1.7.13 -> 1.8.3
 - devel/py-Products.CMFPlacefulWorkflow 1.5.6 -> 1.5.7
 - devel/py-archetypes.querywidget 1.0.1 -> 1.0.4
 - devel/py-Products.PloneLanguageTool 3.2.4 -> 3.2.5
 - devel/py-Products.GenericSetup 1.6.6 -> 1.7.2
 - devel/py-Products.CMFTestCase 0.9.11 -> 0.9.12
 - devel/py-Products.PasswordResetTool 2.0.7 -> 2.0.8
 - devel/py-archetypes.kss 1.7.1 -> 1.7.2
 - devel/py-collective.z3cform.datetimewidget 1.1.1 -> 1.2.0
 - devel/py-Products.PloneTestCase 0.9.13 -> 0.9.15
 - devel/py-zope.schema 4.0.1 -> 4.2.0
 - devel/py-archetypes.referencebrowserwidget 2.4.11 -> 2.4.12
 - security/py-Products.PlonePAS 4.0.12 -> 4.0.13
 - security/py-Products.PluggableAuthService 1.7.7 -> 1.8.0

common changes:
 - strip Makefile header
 - choose proper value for USE_PYTHON in a cases when I sure that the port
   is required -2.7 only or may be built/run both 2.x and 3.x
 - comment off USE_ZOPE
 - tab -> space in pkg-descr:WWW

nuances:
 - new port www/py-plone.app.jquery added per this plone update requirements
 - devel/py-zope.schema updated to 4.2.0 because I hadn't got any response from
   maintainer and because this exact version is required for this plone update

feature highlights/release notes:
 - http://plone.org/products/plone/releases/4.2
 - http://plone.org/products/plone/releases/4.2.1
2012-09-11 17:34:09 +00:00
Ryan Steinmetz
b846243bc3 - Update entry for net/freeradius2 to reflect local patch to address cve-2012-3547 2012-09-11 11:38:53 +00:00
Eygene Ryabinkin
4e88ce38dd VuXML: document remote code execution in freeRADIUS 2012-09-11 08:46:31 +00:00
Eygene Ryabinkin
91e9022623 www/moinmoin: fix CVE-2012-4404, wrong processing of group ACLs
Using upstream patch from
  http://hg.moinmo.in/moin/1.9/raw-rev/7b9f39289e16

PR:		171346
QA page:	http://codelabs.ru/fbsd/ports/qa/www/moinmoin/1.9.4_1
Approved by:	khsing.cn@gmail.com (maintainer)
Security:	http://www.vuxml.org/freebsd/4f99e2ef-f725-11e1-8bd8-0022156e8794.html
2012-09-11 07:51:07 +00:00
Beat Gaetzi
734349b51e - Move libxul 1.9.2 to www/libxul19
- Update www/libxul to 10.0.7
- Update all dependent ports to use www/libxul19 (no functional changes)
- Bump PORTREVISION on ports where libxul is a run dependency as the
  resulting package will change.

Submitted by:	Jan Beich <jbeich@tormail.org>
With hat:	gecko
2012-09-10 19:19:32 +00:00
Roman Bogorodskiy
5edb885f84 Update to 0.14. 2012-09-10 17:21:55 +00:00
Beat Gaetzi
b91fcc8feb - Add Emacs 24 to IGNORE liste
Reported by:	pointyhat
Submitted by:	ashish
Approved by:	maintainer timeout
2012-09-10 08:05:25 +00:00
Emanuel Haupt
e39f22fbeb - Use OPTIONSng
- Remove deprecated header information
2012-09-09 21:12:47 +00:00
Brendan Fabeny
651e02289f update to 0.2.3.21-rc
Security:	Tor bugs 6252, 6690, 6710
2012-09-09 11:05:21 +00:00
Eitan Adler
f439946309 Welcome back Chris Petrik <c.petrik.sosa@gmail.com>
PR:	ports/171481
2012-09-09 02:30:44 +00:00
Steve Wills
66fbf90699 - Update to 0.13
PR:		ports/171057
Approved by:	maintainer timeout (sethk@meowfishies.com, >2 weeks)
2012-09-09 01:54:51 +00:00
Steve Wills
8ae16b69aa - Remove dependency on p5-Devel-Mallinfo 2012-09-09 01:38:13 +00:00
Steve Wills
fe17e87029 - Update to 1.09
PR:		ports/170970
Approved by:	maintainer timeout (kappa@rambler-co.ru, >2 weeks)
2012-09-08 14:48:14 +00:00
Doug Barton
59e2817c8e Update libotr and pidgin-otr to 4.0.0
The main new features in 4.0.0:

* Support v3 of the OTR protocol

* The plugin now supports multiple OTR conversations with the same buddy
  who is logged in at multiple locations. In this case, a new OTR menu
  will appear, which allows you to select which session an outgoing
  message is indended for. Note that concurrent SMP authentications with
  the same buddy who is logged in multiple times is not yet supported
  (starting a second authentication will end the first).

* During a private conversation with a buddy, an incoming unencrypted
  message will now trigger the regular incoming message notifications.
  In Pidgin this includes showing the message in the top-right
  notification area, if it is normally configured to do so.

* When a private conversation begins, the plugin will indicate whether
  Pidgin is configured to log the conversation.

* By default, OTR conversations will not be logged by Pidgin.

* New translations.

* libotr API changes:

  - instance tags, to support multiple simultaneous logins

  - support for asynchronous private key generation

  - the ability to provide an "extra" symmetric key to applications
    (with forward secrecy)

  - applications can supply a formation conversion callback if they do
    not natively use XHTML-style UTF8 markup

  - error messages formerly provided by libotr are now handled using
    callbacks to the application, for better i18n support

  - otrl_message_sending now handles message fragmentation internally
2012-09-08 07:03:21 +00:00
Doug Barton
433f1ce663 Hook security/libotr3 up, and move ports that depend on the old version
to this new dependency.
2012-09-08 06:58:01 +00:00
Mark Linimon
f12a5af997 Mark as broken on sparc64.
Hat:		portmgr
2012-09-08 06:53:18 +00:00
Doug Barton
4d3a4412c3 Copy libotr to libotr3 so that ports that still rely on the old,
incompatible version can continue uninterrupted until they upgrade.
2012-09-08 06:50:14 +00:00
Eitan Adler
74ddbe2d42 Add vim specific modeline to help users write correct vuxml
Submitted by:	bdrewery
2012-09-08 02:37:32 +00:00
Raphael Kubo da Costa
7b558f1217 Document the vulnerability that led to emacs 24.2 2012-09-07 23:07:14 +00:00
Florian Smeets
9e2d4844cf - Update firefox to 15.0.1
- Sync changes from gecko repository@r995
 general
 - don't specify prefix for libevent when using pkg-config
 - ia64 and sparc64 use 8k pagesize by default
 - add visibility hack for clang 3.2 with libc++
 - fix build using clang 3.2 (on FreeBSD 10-CURRENT)
 - rename a few more patches to ease tracking of bugzilla bugs
 www/seamonkey
 - unbreak unsetting LDAP and MAILNEWS options after bug 707305
 - use compile time debugging WITH_DEBUG
 security/nss
 - unbreak install WITH_DEBUG
 - unbreak powerpc64
 devel/nspr
 - use absolute paths when specifiying srcdir to make gdb(1) happy

In collaboration with:	andreast, zeising, Jan Beich <jbeich@tormail.org>
2012-09-07 22:10:01 +00:00
Eitan Adler
26ceb56d8b Add a sanity check to ensure vuxml is actually installed prior to performing
the tidy step in validate. This step actually requires just the dependancies
but the full validate requires that vuxml be installed.

Reviewed by:	simon
Approved by:	secteam (implicit)
2012-09-07 21:34:03 +00:00
Steve Wills
0b61befb1c - Update to 3.4.2 [1] [2] [3]
- Document security issue [4]

PR:		ports/171397 [1]
PR:		ports/171404 [2]
PR:		ports/171405 [3]
Submitted by:	Yuan-Chung Hsiao <ychsiao@ychsiao.org> (maintainer) [1]
Submitted by:	Joe Horn <joehorn@gmail.com> (maintainer) [2] [3]
Reviewed by:	eadler [4]
Security:	30149157-f926-11e1-95cd-001fd0af1a4c
2012-09-07 20:25:41 +00:00
Mark Linimon
612ed51a61 Mark as broken on powerpc only on -current. This will unblock gnome,
kde, and other builds on 8 and 9.

Hat:		portmgr
2012-09-07 19:42:02 +00:00
Renato Botelho
a3ce7b21e5 Update to 20120906 2012-09-06 17:33:48 +00:00
Eygene Ryabinkin
2fdbfc0e43 VuXML: add <modified> tag for Wireshark's entry for CVE-2012-3548 2012-09-06 06:10:41 +00:00
Ryan Steinmetz
a395d8322f - Update to 4.07 2012-09-06 02:30:30 +00:00
Ryan Steinmetz
6c0b252894 - Update to 1.3.1 2012-09-06 02:17:32 +00:00
Ryan Steinmetz
03712c6e95 - Add in workaround for compatibility with libhtp >= 0.3
- Bump PORTREVISION
2012-09-06 02:07:34 +00:00
Joe Marcus Clarke
a075d031b2 Change the wireshark version for the DRDA fix. 2012-09-05 16:02:11 +00:00
Dag-Erling Smørgrav
dbc36c9345 Remove useless metadata from ports I created. 2012-09-05 15:43:33 +00:00
Cy Schubert
60236bdbd9 Update 0.13.1 --> 0.15.1 2012-09-05 14:26:25 +00:00
Frederic Culot
48d9d6c9ba - Update to 0.23
Changes:	http://search.cpan.org/dist/Authen-TacacsPlus/Changes
2012-09-05 10:56:26 +00:00
Eygene Ryabinkin
1213e0634b VuXML: document XSS in MoinMoin before 1.9.4 via RST parser 2012-09-05 10:42:38 +00:00
Eygene Ryabinkin
bf6426a1fb VuXML: document wrong group ACL processing in MoinMoin 2012-09-05 09:47:35 +00:00
Eygene Ryabinkin
1b3ec36058 PHP 5.x: document header splitting vulnerability
There is a related CVE number (CVE-2012-4388), but there is no current
consensus about it:
  http://article.gmane.org/gmane.comp.security.oss.general/8303
2012-09-05 06:29:38 +00:00
Matthias Andree
84f7423f73 Modify fetchmail vuln' URLs to established site.
While at it, adjust the two oldest topics to current format, for uniformity,
on, for instance, http://www.vuxml.org/freebsd/pkg-fetchmail.html.
2012-09-04 21:05:15 +00:00
Ashish SHUKLA
4b9fb5608c Chase Emacs updates 2012-09-04 17:05:43 +00:00
Eygene Ryabinkin
e4591b9585 security/squidclamav: fix DoS and XSS vulnerabilities
Apply upstream patches for CVE-2012-3501 and CVE-2012-4667.

Security:	http://www.vuxml.org/freebsd/ce680f0a-eea6-11e1-8bd8-0022156e8794.html
Security:	http://www.vuxml.org/freebsd/8defa0f9-ee8a-11e1-8bd8-0022156e8794.html
PR:		171022
QA page:	http://codelabs.ru/fbsd/ports/qa/security/squidclamav/5.7_1
Approved by:	maintainer timeout (1 week)
2012-09-04 13:45:28 +00:00
Mark Linimon
8e65c59121 Mark as broken on powerpc and sparc64 (and, presumably, ia64).
Hat:		portmgr
2012-09-04 06:57:36 +00:00
Johan van Selst
fb5118b613 - Add patch to fix getsubopt() parsing
Fixes setting of "realm-kdc" and "server-realm"
  http://lists.gnu.org/archive/html/help-shishi/2012-08/msg00073.html
- Bump PORTREVISION
- Reduce Makefile header

Submitted by:	Mats Erik Andersson <openbsd@gisladisker.se>
2012-09-02 09:04:01 +00:00
Eitan Adler
fc7b0bc22c Inform the community about a recent bitcoin DoS vuln.
Reviewed by:	swills
2012-09-02 02:57:37 +00:00
Olli Hauer
3c8085b82e - update bugzilla bugzilla3 and bugzilla42
- use new bugzilla@ address (members skv@, tota@, ohauer@)
- patch russian/japanese/german bugzilla and bugzilla templates
  so the reflect the security updates in the original templates
- patch german/bugzilla42 templates
- adopt new Makefile header

	vuxml: 6ad18fe5-f469-11e1-920d-20cf30e32f6d
	CVE: CVE-2012-3981
	https://bugzilla.mozilla.org/show_bug.cgi?id=785470
	https://bugzilla.mozilla.org/show_bug.cgi?id=785522
	https://bugzilla.mozilla.org/show_bug.cgi?id=785511
2012-09-01 20:16:06 +00:00
Eygene Ryabinkin
98d2a83482 VuXML: document CVE-2012-3534, DoS via large number of connections 2012-09-01 18:50:14 +00:00