Commit graph

21931 commits

Author SHA1 Message Date
Jan Beich
952acc52bc security/{,ca_root_}nss: update to 3.20
No CA root changes, just chasing NSS version.

Changes:	https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20_release_notes
2015-08-20 13:13:51 +00:00
Peter Wemm
b19a6d27d1 Look up a reference to a commit in 2005 that had been previously lost. 2015-08-20 00:54:34 +00:00
Peter Wemm
3a85ee852f Update some legacy items that don't work or are using runtime remapping:
- cvsweb -> svnweb
- stray cgi query-pr -> xml pr references
- remove redundant formatting that references obsolete cgi scripts.

Should be cosmetic and reduce some http redirects.
2015-08-20 00:41:56 +00:00
Jason Unovitch
cb4b8c53ef Extend recent QEMU related xen-tools CVEs to include the qemu-* ports
PR:		202402
Security:	CVE-2015-5154
Security:	CVE-2015-5165
Security:	CVE-2015-5166
Security:	da451130-365d-11e5-a4a5-002590263bf5
Security:	f06f20dc-4347-11e5-93ad-002590263bf5
Security:	ee99899d-4347-11e5-93ad-002590263bf5
Approved by:	feld (mentor)
2015-08-19 22:06:17 +00:00
Koop Mast
d385993841 Document CVE-2015-4491 in gdk-pixbuf2. 2015-08-19 10:39:52 +00:00
Erwin Lansing
7bc3824272 Reset maintainer
<yanagisawa@csg.is.titech.ac.jp>: host mail.csg.ci.i.u-tokyo.ac.jp[133.11.54.4]
    said: 550 5.1.1 <yanagisawa@csg.is.titech.ac.jp>: Recipient address
    rejected: User unknown in local recipient table (in reply to RCPT TO
    command)

Sponsored by:	DK Hostmaster A/S
2015-08-19 08:10:40 +00:00
Erwin Lansing
ee22b32be1 Reset maintainer
<iwazaki8@yahoo.co.jp>: host mx1.mail.yahoo.co.jp[182.22.12.119] said: 554
    delivery error: dd Sorry your message to iwazaki8@yahoo.co.jp cannot be
    delivered. This account has been disabled or discontinued [#102]. -
    mta006.mail.bbt.yahoo.co.jp (in reply to end of DATA command)

Sponsored by:	DK Hostmaster A/S
2015-08-19 07:34:46 +00:00
Erwin Lansing
073fcca809 Reset maintainer
<fbsd_user@a1poweruser.com>: host mail.a1poweruser.com[199.188.206.6] said: 550
    No Such User Here" (in reply to RCPT TO command)

Sponsored by:	DK Hostmaster A/S
2015-08-19 07:22:32 +00:00
Erwin Lansing
8a80f84f39 Reset maintainer
<db@TruNet.dk>: Host or domain name not found. Name service error for
    name=TruNet.dk type=AAAA: Host not found

Sponsored by:	DK Hostmaster A/S
2015-08-19 07:12:35 +00:00
Erwin Lansing
242b11c519 Reset maintainer.
<alaunay@hlfl.org>: host hlfl.org[112.78.117.153] said: 554 5.7.1
    <alaunay@hlfl.org>: Relay access denied (in reply to RCPT TO command)

Sponsored by:	DK Hostmaster A/S
2015-08-19 07:01:24 +00:00
Mark Felder
395ea0c23f irc/unreal fix <name> to be capitalized
Security:	0ecc1f55-45d0-11e5-adde-14dae9d210b8
2015-08-18 18:44:12 +00:00
Dmitry Marakasov
e261d6abc0 - Fix shebangs
Approved by:	portmgr blanket
MFH:		2015Q3 (blanket)
2015-08-18 18:21:55 +00:00
Mark Felder
5cdd85208f Document django vulnerabilities
Security:	CVE-2015-5963
Security:	CVE-2015-5964
2015-08-18 18:12:15 +00:00
Mark Felder
fb41e90eca Document irc/unreal denial of service
No CVE assigned yet
2015-08-18 17:45:45 +00:00
Mark Felder
34feb83747 Document graphics/jasper vulnerability
Security:	CVE-2015-5203
2015-08-18 17:37:02 +00:00
Mark Felder
f8b5e62157 Document freexl multiple vulnerabilities. One is still awaiting CVE assignment.
Security:	CVE-2015-2776
2015-08-18 17:27:44 +00:00
Mark Felder
07a6a96061 rt was assigned a CVE
Security:	83b38a2c-413e-11e5-bfcf-6805ca0b3d42
Security:	CVE-2015-6506
2015-08-18 17:12:14 +00:00
Mark Felder
aff74189b2 ansible was assigned a CVE
Security:	72fccfdf-2061-11e5-a4a5-002590263bf5
Security:	CVE-2015-6240
2015-08-18 17:10:24 +00:00
Mark Felder
56f2f50e35 gnutls was assigned a CVE
Security:	ec6a2a1e-429d-11e5-9daa-14dae9d210b8
Security:	CVE-2015-6251
2015-08-18 17:08:14 +00:00
Bryan Drewery
b2806a22e4 - Update to OpenSSH 7.0p1
- Update X509 patch to 8.5

Changes: http://www.openssh.com/txt/release-7.0
2015-08-18 15:42:52 +00:00
Bryan Drewery
6b73e467c2 Update to snapshot 20150817 2015-08-18 03:21:24 +00:00
Jason Unovitch
f737137e6e security/keepass: update 2.29 -> 2.30
PR:		202244
Submitted by:	Ben Woods <woodsb02@gmail.com> (maintainer)
Approved by:	delphij (mentor)
2015-08-18 00:31:29 +00:00
Mark Felder
9393684fe7 Document mod_jk vulnerability
Security:	CVE-2014-8111
2015-08-17 16:25:27 +00:00
Mathieu Arnold
21a283f3be Remove UNIQUENAME and LATEST_LINK.
UNIQUENAME was never unique, it was only used by USE_LDCONFIG and now,
we won't have conflicts there.

Use PKGBASE instead of LATEST_LINK in PKGLATESTFILE, the *only* consumer
is pkg-devel, and it works just fine without LATEST_LINK as pkg-devel
has the correct PKGNAME anyway.

Now that UNIQUENAME is gone, OPTIONSFILE is too. (it's been called
OPTIONS_FILE now.)

Reviewed by:	antoine, bapt
Exp-run by:	antoine
Sponsored by:	Absolight
Differential Revision:	https://reviews.freebsd.org/D3336
2015-08-17 14:20:40 +00:00
Jason Unovitch
906f4181a0 Document two QEMU related xen-tools security advisories
PR:		201931
Security:	CVE-2015-5166
Security:	ee99899d-4347-11e5-93ad-002590263bf5
Security:	CVE-2015-5165
Security:	f06f20dc-4347-11e5-93ad-002590263bf5
Approved by:	feld (mentor)
2015-08-17 13:51:23 +00:00
Jason Unovitch
3ddecc8987 Document PHP security issues impacting the lang/php5* ports (Core/SPL)
and 3 extensions (OpenSSL, Phar, SOAP)

PR:		202386
Security:	787ef75e-44da-11e5-93ad-002590263bf5
Approved by:	feld (mentor)
2015-08-17 13:44:55 +00:00
Dmitry Marakasov
8cb8e22925 - Fix shebangs
- Add NO_ARCH

Approved by:	portmgr blanket
MFH:		2015Q3 (blanket)
2015-08-17 10:09:14 +00:00
MANTANI Nobutaka
4671145f8d Update to 2.13. 2015-08-17 06:38:04 +00:00
Jun Kuriyama
80f5314898 Add more signature (locally verified).
PR:		ports/202312
Submitted by:	igorz@yandex.ru
2015-08-17 01:47:46 +00:00
Grzegorz Blach
4461ed4d6e - Upgrade to 2.3
- Readopt port
2015-08-16 21:52:20 +00:00
Dmitry Marakasov
daac632db3 - Update to 1.9.0
- Change mirror from SF to CHEESESHOP

PR:		202330
Submitted by:	mp39590@gmail.com (maintainer)
2015-08-16 11:56:02 +00:00
Sunpoet Po-Chuan Hsieh
4b44a7fbb9 - Add NO_ARCH
- Update WWW
2015-08-16 00:41:44 +00:00
Sunpoet Po-Chuan Hsieh
b0920eb268 - Add NO_ARCH
- Update WWW
2015-08-16 00:41:39 +00:00
Sunpoet Po-Chuan Hsieh
102d26c01f - Add NO_ARCH
- Update WWW
2015-08-16 00:41:34 +00:00
Veniamin Gvozdikov
04d1c41cb7 - Remove qt4-linguist dependency; add qt4-network instead.
- qt4-testlib is not used outside tests directory; remove it
from run-time dependencies.
- Sort USES.
- Fix a typo in COMMENT.
- Bump PORTREVISION.

PR:		ports/202046
Submitted by:	Andriy Voskoboinyk <s3erios@gmail.com>
2015-08-15 16:43:35 +00:00
Xin LI
64db83a616 Update to 1.86b. 2015-08-15 01:14:00 +00:00
Philip M. Gollucci
969d63aa67 security/afl: cannonicalize MAINTAINER 2015-08-14 22:04:36 +00:00
Mark Felder
f26ac585a3 Update MASTER_SITES to fix fetching problem due to abnormal version number
PR:		202332
2015-08-14 20:38:38 +00:00
Jason Unovitch
84b6d07e0b Document MediaWiki multiple security vulnerabilities
PR:		202328
Security:	6241b5df-42a1-11e5-93ad-002590263bf5
Approved by:	feld (mentor)
2015-08-14 17:09:29 +00:00
Mark Felder
ce0db51f73 - Update to 3.3.17.1
MFH:		2015Q3
Relnotes:	http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/8268
Security:	ec6a2a1e-429d-11e5-9daa-14dae9d210b8
2015-08-14 16:39:58 +00:00
Jan Beich
6243f755e0 Sync libvpx check for CVE-2015-448[56] with r394231 2015-08-14 16:38:33 +00:00
Mark Felder
fa6690aaac Document freeradius3 vulnerability 2015-08-14 16:34:30 +00:00
Mark Felder
3fe36cb69b Document gnutls vulnerabilities
No CVEs assigned yet
2015-08-14 16:08:58 +00:00
Jan Beich
65fee93fa5 security/nss: update legacy ckbi suffix to the one used in 3.19.1
This is only for convenience, see
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201831

MFH:		2015Q3
X-MFH-With:	r394204
2015-08-14 12:43:26 +00:00
Jan Beich
8e29d28afc security/{,ca_root_}nss: update to 3.19.3
Changes:	https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.3_release_notes
MFH:		2015Q3
2015-08-14 12:35:26 +00:00
Renato Botelho
3b658b53e0 Update to 2.8.1
PR:		202073
Submitted by:	David Harrigan
2015-08-14 10:38:08 +00:00
Tilman Keskinoz
198fc2e7be Update to 1.4.24 2015-08-13 18:23:33 +00:00
Sunpoet Po-Chuan Hsieh
8c9a5f334f - Remove RG link 2015-08-13 17:39:31 +00:00
Sunpoet Po-Chuan Hsieh
3e91a0a7a3 - Update to 1.4.1
Changes:	https://github.com/PracticallyGreen/omniauth-saml/releases
2015-08-13 17:37:51 +00:00
Sunpoet Po-Chuan Hsieh
4de2046894 - Update to 1.0.0
Changes:	https://github.com/onelogin/ruby-saml/blob/master/changelog.md
2015-08-13 17:37:47 +00:00
Sunpoet Po-Chuan Hsieh
7fb934f295 - Add PORTSCOUT 2015-08-13 17:37:42 +00:00
Sunpoet Po-Chuan Hsieh
c9ea33e518 - Update to 1.1.0
- Add NO_ARCH

Changes:	https://github.com/tinfoil/devise-two-factor/commits/master
2015-08-13 17:36:08 +00:00
Sunpoet Po-Chuan Hsieh
95502b7141 - Remove MASTER_SITE_SUBDIR 2015-08-13 17:32:52 +00:00
Dmitry Marakasov
444fbfecdc - Switch to USES=autoreconf 2015-08-13 13:18:27 +00:00
Jason Unovitch
abe03f7039 Document Froxlor database password information disclosure vulnerability
PR:		202262
Security:	CVE-2015-5959
Security:	9ee72858-4159-11e5-93ad-002590263bf5
Approved by:	feld (mentor)
2015-08-13 02:07:33 +00:00
Matthew Seaman
1fea324cb0 Document two XSS vulnerabilities in rt40, rt42. 2015-08-12 22:16:52 +00:00
Mark Felder
6b20fc9e4b Document py-foolscap vulnerability 2015-08-12 19:32:26 +00:00
Jan Beich
4e22ba8b0b Make libvpx-1.3.0 vulnerable by moving MFSA 2014-77 into separate entry 2015-08-12 09:55:10 +00:00
Koop Mast
b38a24c915 Document newest flash vulnabilities.
Also list the c6_64 flash port.
2015-08-12 07:31:35 +00:00
Jun Kuriyama
15a431ac2d - Upgrade to 2.1.7 (minor fixes). 2015-08-11 22:50:17 +00:00
Pawel Pekala
59bb1a4781 Update to version 1.17.1
PR:		201772
Submitted by:	Christoph Moench-Tegeder
Approved by:	maintainer timeout
2015-08-11 20:19:40 +00:00
Jan Beich
23a5407e4f Oops, mark bundled libvpx v1.4.0 in firefox as vulnerable again
libvpx v1.3.0-4418-g587ff64 in firefox-esr 38.x shouldn't be affected
given Mozilla hasn't backported the update there. MFSA 2015-89 says
otherwise though.

https://bugzilla.mozilla.org/show_bug.cgi?id=1178215
2015-08-11 19:48:29 +00:00
Jan Beich
22ff99085e Move libvpx vulnerability into its own entry 2015-08-11 19:03:36 +00:00
Jan Beich
83f85a1d4f Document recent mozilla vulnerabilities 2015-08-11 18:51:57 +00:00
Dmitry Marakasov
90df300381 - Switch to USES=autoreconf 2015-08-11 17:55:29 +00:00
Dmitry Marakasov
1a3a7d7f59 - Switch to USES=autoreconf 2015-08-11 17:55:22 +00:00
Dmitry Marakasov
45ef318428 - Add NO_ARCH
Approved by:	portmgr blanket
2015-08-11 17:51:42 +00:00
Dmitry Marakasov
9a17c2f835 - Switch to USES=autoreconf 2015-08-11 17:42:43 +00:00
Dmitry Marakasov
3806eb9c28 - Switch to USES=autoreconf 2015-08-11 15:45:37 +00:00
Dmitry Marakasov
16dd640023 - Switch to USES=autoreconf 2015-08-11 15:19:40 +00:00
Dmitry Marakasov
9616d002b5 - Switch to USES=autoreconf 2015-08-11 14:49:18 +00:00
Dmitry Marakasov
3097c504ad - Switch to USES=autoreconf 2015-08-11 14:49:10 +00:00
Dmitry Marakasov
580147a469 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-08-11 12:18:18 +00:00
Dmitry Marakasov
da2d4d2c6b - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-08-10 22:45:23 +00:00
Dmitry Marakasov
2897051dcd - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-08-10 22:44:57 +00:00
Dmitry Marakasov
036051a73c - Switch to USES=autoreconf 2015-08-10 19:53:50 +00:00
Dmitry Marakasov
628cbff934 - Switch to USES=autoreconf 2015-08-10 19:53:45 +00:00
Dmitry Marakasov
7a38eadf4f - Switch to USES=autoreconf 2015-08-10 19:20:33 +00:00
Dmitry Marakasov
6916d02a69 - Switch to USES=autoreconf 2015-08-10 19:20:27 +00:00
Dmitry Marakasov
122627a101 - Switch to USES=autoreconf 2015-08-10 18:16:51 +00:00
Guido Falsi
846e224899 Document an already fixxed vulnerability in lighttpd 1.4.35 or older.
PR:		202134
Submitted by:	pkubaj at riseup.net
vuxml entry submitted by:	Jason Unovitch <jason.unovitch at gmail.com>
2015-08-10 13:25:32 +00:00
Jason Unovitch
39531e5b46 Document PCRE heap overflow vulnerability in '(?|' situations
PR:		202209
Security:	ff0acfb4-3efa-11e5-93ad-002590263bf5
Approved by:	feld (mentor)
2015-08-10 10:34:54 +00:00
Andrew Turner
605de447c0 Adds -fPIC to CFLAGS_aarch64 to a number of ports that already have it
in the amd64 CFLAGS and are failing to build.

Approved by:	bapt
Differential Revision:	https://reviews.freebsd.org/D3321
2015-08-09 22:24:04 +00:00
Steve Wills
f345a9f453 security/rubygem-omniauth-saml: create port
A generic SAML strategy for OmniAuth

WWW: https://github.com/PracticallyGreen/omniauth-saml

PR:		201809
Submitted by:	Torsten Zühlsdorff <ports@toco-domains.de>
2015-08-09 20:49:37 +00:00
Steve Wills
cd31cadb54 security/rubygem-ruby-saml: create port
SAML toolkit for Ruby on Rails

WWW: https://github.com/onelogin/ruby-saml

PR:		201810
Submitted by:	Torsten Zühlsdorff <ports@toco-domains.de>
2015-08-09 20:39:07 +00:00
Steve Wills
d99e5bea25 security/rubygem-devise-two-factor: create port
Barebones two-factor authentication with Devise

WWW: https://github.com/tinfoil/devise-two-factor

PR:		201807
Submitted by:	Torsten Zühlsdorff <ports@toco-domains.de>
2015-08-09 20:26:35 +00:00
Steve Wills
ba2d3fcf20 secrutiy/rubygem-attr_encrypted: create port
Ruby library which generates attr_accessors that encrypt
and decrypt attributes transparently

WWW: https://github.com/attr-encrypted/attr_encrypted

PR:		201806
Submitted by:	Torsten Zühlsdorff <ports@toco-domains.de>
2015-08-09 20:21:02 +00:00
Steve Wills
637c7e0c2c security/rubygem-encryptor: create port
A simple wrapper for the standard ruby OpenSSL library to encrypt
and decrypt strings

WWW: https://github.com/attr-encrypted/encryptor

PR:		201808
Submitted by:	Torsten Zühlsdorff <ports@toco-domains.de>
2015-08-09 20:17:48 +00:00
Alexander Leidinger
435ea2a95a Re-commit of
64 bit linuxulator support (not activated by default):
 - most of the work was done by Alan Jude
 - all errors are mine
 - 64bit (may) have rough edges
 - I validated
    * that the 32bit part doesn't has deinstall regressions (incl. EXP runs by
      antoine)
    * 29 of 72 64bit ports ports don't have deinstall leftovers (more validation
      later, when I dare to activate the 64bit linuxulator in the kernel)
 - the infrastructure part looks mature enough to let more test-bunnies get
   some experience with the new 64 bit parts
 - to use it you shall have no linux ports installed and have to specify
   (on your own risk) the following in make.conf before installing the ports:
   OVERRIDE_LINUX_BASE_PORT=c6_64
   OVERRIDE_LINUX_NONBASE_PORTS=c6_64

This is on top of the exiting c6 linux ports. Given that CentOS 7 is 64bits
only, we decided to have it as an "overlay" instead of new ports.
The 64bit part only installs 64bit executables, the 32bit ports can not be
installed at the same time (if needed we can think of letting the 64bit
overlay install the 32bit parts too, but given the CentOS 7 comment
above...).

Differential Revision:	https://reviews.freebsd.org/D174
Submitted by:		alanjude
Sponsored by:		Essen FreeBSD Hackathon 2015
Reviewed by:		xmj, eadler (earlier versions)
Approved by:		portmgr (antoine after some EXP-runs)
2015-08-09 19:14:13 +00:00
Florian Smeets
90bc8dd3a1 Mention all CVEs that are fixed in 4.2.4. The release notes only mentioned
one.

Reported by:	junovitch
2015-08-09 18:38:51 +00:00
Johan van Selst
a05bb7c3ec Update to signing-party 2.1 (bugfix release)
http://metadata.ftp-master.debian.org/changelogs/main/s/signing-party/signing-party_2.1-1_changelog
2015-08-09 09:03:23 +00:00
Jose Alonso Cardenas Marquez
230cf6828f - editors/lazarus update to 1.4.2
- Add USE_FPC_RUN to bsd.fpc.mk. It add fpc units like run dependencies. Otherwise
  fpc units only are added like build dependencies (less dependencies registered
  when they are installed with pkg).
- Remove GTK1 obsolete dependencies
- Bump all ports with dependencies of fpc-* units
- Bump all ports with dependencies of lazarus ports
- Clean up
2015-08-09 08:06:43 +00:00
Jan Beich
d16e69df1f Document recent mozilla vulnerabilities 2015-08-07 06:51:05 +00:00
Florian Smeets
0045db9f56 Document wordpress vulnerabilities
Security:	CVE-2015-2213
2015-08-06 19:55:04 +00:00
Bernard Spil
48337355e0 Revert pkg-plist OPENSSL_SHLIBVER addition
Reported by:	antoine
2015-08-06 19:36:46 +00:00
Bernard Spil
52c1732223 security/libressl: Update to 2.2.2
* Bump SHLIB versions of libssl/crypto/tls
  * Bump OPENSSL_SHLIBVER in bsd.openssl.mk
  * Add UPDATING entry for SHLIB version bump
  * Narrow scope of CONFLICTS (portlint)

Changes:

  ftp://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt

Differential_revision:	D3278
Reviewed by:        koobs (mentor), vsevolod (maintainer, mentor)
Approved by:        koobs (mentor)
2015-08-06 19:13:18 +00:00
Lev A. Serebryakov
576a556027 Add two security issues for subversion. 2015-08-06 15:45:40 +00:00
Bartek Rutkowski
0de1b53912 security/kpcli: update 2.8 -> 3.0
- Add PWSAFE3 option

PR:		202103
Submitted by:	Alexander <alexander.4mail@gmail.com> (maintainer)
2015-08-06 09:52:08 +00:00
Bartek Rutkowski
c9298c9ce1 security/p5-Crypt-PWSafe3: new port
Crypt::PWSafe3 provides read/write access to Password Safe V3 database files.

WWW: http://search.cpan.org/dist/Crypt-PWSafe3/

PR:		202101
Submitted by:	Alexander <alexander.4mail@gmail.com>
2015-08-06 09:43:10 +00:00
Jason Unovitch
1af58f4e7c Document Elasticsearch directory traversal attack and remote code execution
PR:		201834
Security:	CVE-2015-5377
Security:	fb3668df-32d7-11e5-a4a5-002590263bf5
Security:	CVE-2015-5531
Security:	ae8c09cb-32da-11e5-a4a5-002590263bf5
Approved by:	feld (mentor)
2015-08-05 22:11:05 +00:00
Koop Mast
d129587b5d The FreeBSD GNOME team proudly presents GNOME 3.16 for FreeBSD.
The offical GNOME 3.16 release notes can be found at https://help.gnome.org/misc/release-notes/3.16/

Upgrade instructions for port users:

Delete the old tracker package with:
# pkg delete -f tracker
And user port upgrade tool of choice to upgrade.

Thanks to Antoine Brodin for running the exp-runs.

This release was made possible by the following people:
  Gustau Perez
  Ting-Wei_Lan

PR:		201980
2015-08-05 19:13:24 +00:00
Matthias Andree
c13de12f75 Bugfix upgrade to new upstream release 2.3.8.
ChangeLog:
https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn23#OpenVPN2.3.8
2015-08-05 19:10:15 +00:00
Koop Mast
d138701abc Part 2 of adding USE_GNOME=intltool to ports that require it.
The reason for this is that in the GNOME 3.16 update, USE_GNOME gtk20 and
gtk30 don't pull intltool in anymore.

PR:		201980
Exp-run by:	antoine@
2015-08-05 07:39:47 +00:00
Dmitry Marakasov
7dd565cb10 - Strip library 2015-08-04 19:20:15 +00:00
Dmitry Marakasov
4b4c440495 - Don't use / in sed regexps to allow paths, unbreaking cross-builds
Approved by:	portmgr blanket
2015-08-04 16:37:42 +00:00
Bartek Rutkowski
0fb23d8542 security/py-fail2ban: update 0.9.2 -> 0.9.3
- Add LICENSE_FILE

PR:		202026
Submitted by:	Christoph Theis <theis@gmx.at> (maintainer)
2015-08-04 12:09:09 +00:00
Jason Unovitch
60d42be396 Document xen-tools QEMU heap overflow flaw with certain ATAPI commands
PR:		201931
Security:	CVE-2015-5154
Security:	da451130-365d-11e5-a4a5-002590263bf5
Approved by:	delphij (mentor)
2015-08-04 10:56:23 +00:00
Dmitry Marakasov
97f565a4d8 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-08-03 23:00:43 +00:00
Dmitry Marakasov
6546255212 - Add LICENSE
- Strip library
2015-08-03 18:54:54 +00:00
Jason Unovitch
4b94fc1c8c Correct version range for libidn entry
PR:		201780
Security:	CVE-2015-2059
Security:	4caf01e2-30e6-11e5-a4a5-002590263bf5
Approved by:	feld (mentor)
2015-08-03 10:20:58 +00:00
Martin Matuska
a69ba14652 Horde package update:
comms/pear-Horde_ActiveSync 2.28.5 -> 2.28.6
devel/pear-Horde_Alarm 2.2.4 -> 2.2.5
security/pear-Horde_Auth 2.1.8 -> 2.1.10
www/pear-Horde_Browser 2.0.9 -> 2.0.10
archivers/pear-Horde_Compress 2.1.2 -> 2.1.3
devel/pear-Horde_Core 2.20.5 -> 2.20.8
security/pear-Horde_Crypt 2.5.3 -> 2.6.0
www/pear-Horde_Css_Parser 1.0.6 -> 1.0.7
devel/pear-Horde_Data 2.1.2 -> 2.1.3
devel/pear-Horde_Date 2.1.0 -> 2.1.1
devel/pear-Horde_Exception 2.0.5 -> 2.0.6
www/pear-Horde_Form 2.0.9 -> 2.0.11
devel/pear-Horde_History 2.3.4 -> 2.3.5
devel/pear-Horde_Icalendar 2.1.0 -> 2.1.1
graphics/pear-Horde_Image 2.3.1 -> 2.3.2
mail/pear-Horde_Imap_Client 2.29.0 -> 2.29.1
devel/pear-Horde_LoginTasks 2.0.4 -> 2.0.5
mail/pear-Horde_Mail 2.6.0 -> 2.6.2
mail/pear-Horde_Mime_Viewer 2.1.0 -> 2.1.1
security/pear-Horde_Perms 2.1.4 -> 2.1.5
devel/pear-Horde_Prefs 2.7.3 -> 2.7.4
net/pear-Horde_Rpc 2.1.4 -> 2.1.5
devel/pear-Horde_Serialize 2.0.3 -> 2.0.4
devel/pear-Horde_Support 2.1.3 -> 2.1.4
textproc/pear-Horde_Text_Filter 2.3.1 -> 2.3.2
devel/pear-Horde_Util 2.5.5 -> 2.5.6
sysutils/pear-Horde_Vfs 2.2.2 -> 2.3.0
www/horde-ansel 3.0.2 -> 3.0.3
ftp/horde-gollem 3.0.3 -> 3.0.4
www/horde-base 5.2.6 -> 5.2.7
mail/horde-imp 6.2.9 -> 6.2.10
mail/horde-ingo 3.2.5 -> 3.2.6
deskutils/horde-kronolith 4.2.8 -> 4.2.9
deskutils/horde-mnemo 4.2.6 -> 4.2.7
www/horde-passwd 5.0.2 -> 5.0.3
www/horde-trean 1.1.1 -> 1.1.2
mail/horde-turba 4.2.7 -> 4.2.8
mail/horde-webmail 5.2.7 -> 5.2.9
deskutils/horde-groupware 5.2.7 -> 5.2.9
www/horde-wicked 2.0.3 -> 2.0.4
2015-08-03 07:06:14 +00:00
Koop Mast
2f0486b647 Part 1 of adding USE_GNOME=intltool to ports that require it.
The reason for this is that in the GNOME 3.16 update, USE_GNOME gtk20 and
gtk30 don't pull intltool in anymore.

PR:		201980
Exp-run by:	antoine@
2015-08-02 20:23:55 +00:00
Tijl Coosemans
a374acb969 By default libtool replaces -export-symbols <file> with -retain-symbols-file
<file> on ELF systems, but this doesn't really do what -export-symbols is
meant to do.  On GNU ELF systems it converts <file> to a simple version
script first and then uses -version-script instead of -retain-symbols-file.
Let USES=libtool patch libtool scripts to do this on all systems with GNU
ld(1).

Bump PORTREVISION on all ports where the build log contains -export-symbols.

audio/calf: This port builds a module that now exports only one function,
but it also builds a number of executables that link to this module and
expect to see other functions.  Because it's already a bit dodgy to link to
a module (libtool warns about this) let the module continue to export only
one function and instead build an ordinary library from the same source that
the executables can link to.  Fix a number of other issues in the same
Makefile.am and clean up the port Makefile.

japanese/scim-honoka: Tries to hide all symbols that start with an
underscore, but because this library is written in C++ all symbols start
with _Z so it ends up hiding everything.  Just don't hide anything at all
like the textproc/scim configure script does.

multimedia/schroedinger: Apply an upstream patch.

textproc/scim-input-pad: Same as japanese/scim-honoka.

PR:		201922
Approved by:	portmgr (antoine)
Exp-run by:	antoine
2015-08-02 15:03:19 +00:00
Mark Felder
78b618ce2d security/sshguard: update to 1.6.1 2015-08-01 23:24:56 +00:00
Dmitry Marakasov
4338780649 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-31 21:21:54 +00:00
Dmitry Marakasov
43ebb75313 - Add NO_ARCH
- Drop @dirrm* from plist

Approved by:	portmgr blanket
2015-07-31 21:21:47 +00:00
Dmitry Marakasov
37df7b9810 - Add NO_ARCH
- Drop @dirrm* from plist

Approved by:	portmgr blanket
2015-07-31 21:20:51 +00:00
Dmitry Marakasov
556d14b71c - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-31 21:20:37 +00:00
Mark Felder
d0d41e120e Document older net-snmp DoS vulnerability
Security:	CVE-2014-3565
2015-07-31 16:36:08 +00:00
Sunpoet Po-Chuan Hsieh
923282745e - Update to 1.2.1
Changes:	https://github.com/nov/rack-oauth2/commits/master
2015-07-31 16:27:11 +00:00
Sunpoet Po-Chuan Hsieh
0860d91a51 - Update to 3.0.0
Changes:	https://github.com/doorkeeper-gem/doorkeeper/blob/master/NEWS.md
2015-07-31 16:27:06 +00:00
Mark Felder
87f3524b10 Document net-snmp vulnerability
Security:	CVE-2015-5621
2015-07-31 15:57:38 +00:00
Steve Wills
d580e88d46 security/vault: fix typo in Makefile
PR:		202004
Submitted by:	Maciej Pasternacki <maciej@pasternacki.net>
Pointyhat to:	swills
2015-07-31 13:57:21 +00:00
Antoine Brodin
7c1312c6fb Fix dependency 2015-07-31 07:23:55 +00:00
Jason Unovitch
2f584ead0c Reflect Chicken 4.10.0 RC2 as the minimum version with the CVE-2015-4556 fix
PR:		200980
Security:	CVE-2015-4556
Security:	0da404ad-1891-11e5-a1cf-002590263bf5
Approved by:	delphij (mentor)
2015-07-31 00:26:34 +00:00
Dmitry Marakasov
75655b91af - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-30 22:23:20 +00:00
Dmitry Marakasov
12d91c11c1 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-30 22:23:13 +00:00
Dmitry Marakasov
c5dd2c5e68 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-30 22:23:07 +00:00
Dmitry Marakasov
0ac0cd73f1 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-30 21:13:47 +00:00
Dmitry Marakasov
456009d0f4 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-30 21:13:37 +00:00
Dmitry Marakasov
937065dfb5 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-30 21:13:32 +00:00
Jung-uk Kim
fda492aae5 Set path to krb5-config properly. 2015-07-30 19:54:53 +00:00
Jung-uk Kim
ad92a3c5c7 Convert to USES=gssapi. 2015-07-30 19:10:44 +00:00
Dmitry Marakasov
87d3dcef02 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-30 00:37:19 +00:00
Matthias Andree
993cd79edd Update to new upstream bug-fix release 0.65
Release notes: http://lists.tartarus.org/pipermail/putty-announce/2015/000021.html
2015-07-29 22:57:36 +00:00
Dmitry Marakasov
1125ec829a - Drop @dirrm* from plist
- Remove useless pre/post.mk split

Approved by:	portmgr blanket
2015-07-29 22:53:56 +00:00
Dmitry Marakasov
bf7c4a29b9 - Fix installation from non-root
Approved by:	portmgr blanket
2015-07-29 22:49:22 +00:00
Antoine Brodin
6e381a9d53 Switch default python_CMD used by shebangfix to ${PYTHON_CMD} for ports
using python

PR:		201077
Reviewed by:	mat
With hat:	portmgr
Differential Revision:	https://reviews.freebsd.org/D2955
2015-07-29 22:09:53 +00:00
Dmitry Marakasov
18f6bb82fc - Add LICENSE
- Drop @dirrm* from plist

Approved by:	portmgr blanket
2015-07-28 23:28:03 +00:00
Dmitry Marakasov
866b133b4d - Add LICENSE
- Drop @dirrm* from plist

Approved by:	portmgr blanket
2015-07-28 23:27:56 +00:00
Dmitry Marakasov
4a5a689aef - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-28 23:27:49 +00:00
Dmitry Marakasov
d466784722 - Add NO_ARCH
- Drop @dirrm* from plist

Approved by:	portmgr blanket
2015-07-28 23:27:16 +00:00
Dmitry Marakasov
e5af9f7f53 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-28 23:26:59 +00:00
Dmitry Marakasov
b87bbcf3d4 - Drop @dirrm* from plist
- Add NO_ARCH

Approved by:	portmgr blanket
2015-07-28 23:26:53 +00:00
Dmitry Marakasov
8c9c1610da - Fix shebangs
Approved by:	portmgr blanket
MFH:		2015Q3 (blanket)
2015-07-28 21:10:35 +00:00
Dmitry Marakasov
b75af0f869 - Fix shebangs
Approved by:	portmgr blanket
MFH:		2015Q3 (blanket)
2015-07-28 21:05:37 +00:00
Mark Felder
11ea679b7f Document bind CVE
Security:	CVE-2015-5477
2015-07-28 20:23:36 +00:00
Mark Felder
9cc9f3e740 Update to 1.2.14
Includes backported security fixes

Changes:	https://tls.mbed.org/tech-updates/releases/polarssl-1.2.14-released

PR:		201603
Security:	d3216606-2b47-11e5-a668-080027ef73ec
2015-07-28 18:08:30 +00:00
Jimmy Olgeni
4de8ee56a4 Upgrade to version 1.1.0. 2015-07-28 10:43:20 +00:00
Dmitry Marakasov
ca6ca6ac76 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-28 02:55:30 +00:00
Bryan Drewery
240ae04027 - Update to 3.3.16
Changes: http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/8235
2015-07-27 18:59:29 +00:00
Bryan Drewery
dfe1f78791 Add upstream fix to address CVE-2015-5600 for MaxAuthTries bypass.
Security:	5b74a5bc-348f-11e5-ba05-c80aa9043978
2015-07-27 18:47:55 +00:00
Bryan Drewery
ff50ff98cc Document OpenSSH CVE-2015-5600 for MaxAuthTries bypass 2015-07-27 18:46:47 +00:00
Bryan Drewery
9232111ac8 Fix accidental revert of PermitRootLogin default to NO.
This was due to the patch not being needed in the snapshot version
which I based the 6.9 update off of. The default is changed in
the upcoming 7.0 release
2015-07-27 18:41:02 +00:00
Bryan Drewery
d52433c212 Update to snapshot 20150727 2015-07-27 18:36:15 +00:00
Bryan Drewery
2520291173 - Update to 6.9p1
- Update X509 patch to 8.4

Changes:	http://www.openssh.com/txt/release-6.9
2015-07-27 18:30:24 +00:00
Bryan Drewery
fc37a38e71 Bring over ETCDIR and libedit updates from main port 2015-07-27 17:09:31 +00:00
Dmitry Marakasov
05f2d17765 - Fix fetch, again 2015-07-27 14:57:17 +00:00
Mark Felder
f086d5f251 Document logstash SSL/TLS security vulnerability (FREAK attack)
PR:		201893
Security:	CVE-2015-5378
Security:	c470bcc7-33fe-11e5-a4a5-002590263bf5
2015-07-27 13:06:48 +00:00
Erwin Lansing
f2f9b9bebb Version 2.0.0 of SoftHSM has been released. More updates and bug fixes can be found in the alpha and beta release notes.
SoftHSM 2.0.0 - 2015-07-17

- SOFTHSM-121: Test cases for C_DecryptUpdate/C_DecryptFinal.
- Support C_DecryptUpdate/C_DecryptFinal for symmetric algorithms.
  (Patch from Thomas Calderon)\

Bugfixes:

- SOFTHSM-120: Segfault after renaming variables.

PR:		201900
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Sponsored by:	DK Hostmaster A/S
2015-07-27 10:12:45 +00:00
Kurt Jaeger
dd06283c71 security/py-paramiko: 1.14.0 -> 1.15.2
- Website updated
- For other changes see
  http://www.paramiko.org/changelog.html

PR:		199896
Submitted by:	Claudius Herder <claudius.herder@ambtec.de>
Approved by:	sbz (maintainer timeout)
2015-07-26 20:05:57 +00:00
Mark Felder
5448a53f91 security/sshguard-null
portable do-nothing backend for applying detection but not prevention

PR:		201323
2015-07-26 15:04:34 +00:00
Antoine Brodin
011dfa81be Unbreak INDEX, reverting r392921
With hat:	portmgr
2015-07-26 13:35:29 +00:00
Alexander Leidinger
3aeeb3f1bd 64 bit linuxulator support (not activated by default):
- most of the work was done by Alan Jude
 - all errors are mine
 - 64bit (may) have rough edges
 - I validated
    * that the 32bit part doesn't has deinstall regressions
    * 29 of 72 64bit ports ports don't have deinstall leftovers (more validation
      later, when I dare to activate the 64bit linuxulator in the kernel)
 - the infrastructure part looks mature enough to let more test-bunnies get
   some experience with it
 - to use it you shall have no linux ports installed and have to specify
   (on your own risk) the following in make.conf before installing the ports:
   OVERRIDE_LINUX_BASE_PORT=c6_64
   OVERRIDE_LINUX_NONBASE_PORTS=c6_64

This is on top of the exiting c6 linux ports. Given that CentOS 7 is 64bits
only, we decided to have it as an "overlay" instead of new ports.
The 64bit part only installs 64bit executables, the 32bit ports can not be
installed at the same time (if needed we can think of letting the 64bit
overlay install the 32bit parts too, but given the CentOS 7 comment
above...).

Differential Revision:	https://reviews.freebsd.org/D174
Submitted by:		alanjude
Sponsored by:		Essen FreeBSD Hackathon 2015
Reviewed by:		xmj, eadler (earlier versions)
Approved by:		portmgr (implicit, I remember blanked approval for
			linux parts loooong ago, punish me if you don't
			agree anymore)
2015-07-26 13:06:24 +00:00
Antoine Brodin
836aa8d7d1 Update to 1.3.0
Announce: http://blog.kiddaland.net/2015/07/bringing-end-to-sorrow-new-plaso-release.html
2015-07-25 17:09:01 +00:00
Antoine Brodin
584922bc73 Update to 20150708 2015-07-25 17:05:35 +00:00
Antoine Brodin
b3a75009e5 New port: security/py-artifacts
A free, community-sourced, machine-readable knowledge base of forensic artifacts
that the world can use both as an information source and within other tools.

WWW: https://github.com/ForensicArtifacts/artifacts
2015-07-25 17:04:23 +00:00
Rene Ladan
4d8ca6a514 Document new vulnerabilities in www/chromium < 44.0.2403.89
Obtained from:	http://googlechromereleases.blogspot.nl/
2015-07-25 12:38:01 +00:00
Bryan Drewery
c3a9da2b6d Use new USES=libedit 2015-07-24 17:01:58 +00:00
Mark Felder
dba923bdb3 Document shibboleth DoS
Security:	CVE-2015-2684
2015-07-24 16:58:16 +00:00
Mark Felder
5859d7655b Adjust wordpress range -- www/wordpress has PORTEPOCH
Security:	c80b27a2-3165-11e5-8a1d-14dae9d210b8
2015-07-24 13:57:47 +00:00
Mark Felder
813a18f16d Update Wordpress entry to add CVEs
Security:	c80b27a2-3165-11e5-8a1d-14dae9d210b8
Security:	CVE-2015-5622
Security:	CVE-2015-5623
2015-07-24 13:41:35 +00:00
Palle Girgensohn
df902098c4 The new shibboleth will refuse to accept -u when it was
already su:ed to that user. Trust shibboleth to change user.
2015-07-24 10:54:41 +00:00
Ryan Steinmetz
bd4f277406 - Update to 2.9.7.5 2015-07-23 18:30:41 +00:00
Mark Felder
f4d53cf11b Document wordpress XSS
Changes:	https://codex.wordpress.org/Version_4.2.3
2015-07-23 18:24:12 +00:00
Mark Felder
ddbda929af Document libidn out-of-bounds read issue with invalid UTF-8 input
PR:		201780
Security:	CVE-2015-2059
Security:	4caf01e2-30e6-11e5-a4a5-002590263bf5
2015-07-23 15:44:55 +00:00
Mark Felder
2389e5446d Document buffer overflow vulnerabilities in SoX
PR:		201778
CVE:		CVE-2014-8145
Security:	9dd761ff-30cb-11e5-a4a5-002590263bf5
Security:	92cda470-30cb-11e5-a4a5-002590263bf5
2015-07-23 15:39:31 +00:00
Palle Girgensohn
43e9362f36 Shibboleth SP software crashes on well-formed but invalid XML.
The Service Provider software contains a code path with an uncaught
exception that can be triggered by an unauthenticated attacker by
supplying well-formed but schema-invalid XML in the form of SAML
metadata or SAML protocol messages. The result is a crash and so
causes a denial of service.

You must rebuild opensaml and shibboleth with xmltooling-1.5.5 or later.
The easiest way to do so is to update the whole chain including
shibboleth-2.5.5 an opensaml2.5.5.

URL:    	http://shibboleth.net/community/advisories/secadv_20150721.txt
Security:	CVE-2015-2684
2015-07-23 13:21:05 +00:00
Jimmy Olgeni
a346ea5b04 Document CVE assignment in iPython 3.2.1 entry.
PR:		201515
Security:	CVE-2015-5607
Security:	81326883-2905-11e5-a4a5-002590263bf5
2015-07-22 22:51:33 +00:00
Ganael LAPLANCHE
c9e90b0961 Fix build with new libcaca when CACASAVER is on
MFH:		2015Q3
2015-07-22 19:39:22 +00:00
Renato Botelho
70d00a6e91 Update to 1.8.14p3 2015-07-22 13:34:15 +00:00
Koop Mast
7ba3aedb1d Add gdk-pixbuf2 vulnability.
Notified by:	feld@
2015-07-22 12:01:46 +00:00
Steve Wills
688ec36bf9 security/vault: update to 0.2.0 2015-07-22 04:40:46 +00:00
Jun Kuriyama
8e3343ad54 - Fix ksh shebang
- Add missing dependency on ksh
- Cosmetic whitespace fixes

PR:		ports/201536
Submitted by:	amdmi3
2015-07-22 04:15:03 +00:00
Renato Botelho
8c90f7f8fa Update to 1.8.14p2 2015-07-21 12:28:17 +00:00
Rene Ladan
8df36f9d35 Remove expired ports:
2015-07-20 devel/rubygem-builder31: not used by other ports anymore
2015-07-20 devel/rubygem-timers1: not used by other ports anymore
2015-07-20 net/rubygem-rubyntlm01: not used by other ports anymore
2015-07-20 security/rubygem-net-scp11: not used by other ports anymore
2015-07-20 security/rubygem-net-ssh27: not used by other ports anymore
2015-07-20 19:35:30 +00:00
Mark Felder
9828f3208f Adjust range for apache22
We intended to commit 2.2.31 to ports but there are some issues. We will
instead backport the CVE fix to 2.2.29_6 for now.

Security:	CVE-2015-3183
2015-07-20 16:35:13 +00:00
Mark Felder
a18c28d59d Document PCRE buffer overflow
PR:		201188
Security:	CVE-2015-5073
2015-07-20 15:00:23 +00:00
Mark Felder
66eff4eebe Fix moodle reference URL
PR:		201675
Security:	43891162-2d5e-11e5-a4a5-002590263bf5
2015-07-20 14:52:06 +00:00
Mark Felder
acd94bf6a8 Document Cacti Multiple XSS and SQL injection vulnerabilities
PR:		201702
Security:	CVE-2015-4634
Security:	0bfda05f-2e6f-11e5-a4a5-002590263bf5
2015-07-20 14:35:39 +00:00
Renato Botelho
bfb16b32ec - Fix installation with DOCS broken by my last commit
- Bump PORTREVISION

Pointyhat to:	garga
2015-07-20 13:13:01 +00:00
Mathieu Arnold
848dfdbbaa Fix build WITHOUT=NLS.
Sponsored by:	Absolight
2015-07-20 13:01:33 +00:00
Renato Botelho
48fdd79071 - Replace DISTVERSION by PORTVERSION otherwise it ends up as 1.8.14.p1,
what is < 1.8.14. [1]
- While I'm here silence portlint warnings re-generating patches with
  make makepatch and removing unnecessary DOCS check

Reported by:	Robert Burmeister [1]
2015-07-20 12:30:54 +00:00
Renato Botelho
6499621583 Update to 1.8.14p1 2015-07-19 13:02:38 +00:00
Mark Felder
82117237b4 Document php-phar vulnerabilities
Add missing modified date to zenphoto entry

Security:	CVE-2015-5589
Security:	CVE-2015-5590
2015-07-18 23:43:41 +00:00
Mark Felder
55c06219e4 zenphoto was assigned CVEs
Security:	5c399624-2bef-11e5-86ff-14dae9d210b8
2015-07-18 23:26:23 +00:00
Mark Felder
eaeeb99d09 Document recent Moodle security advisories
Security:	CVE-2015-3272
Security:	CVE-2015-3273
Security:	CVE-2015-3274
Security:	CVE-2015-3275
Security:	43891162-2d5e-11e5-a4a5-002590263bf5

PR:		201675
2015-07-18 23:16:04 +00:00
Mark Felder
82652125ce package name is mariadb100, not mariadb10
Security:	36bd352d-299b-11e5-86ff-14dae9d210b8
2015-07-18 22:09:10 +00:00
Mark Felder
6ae8532dfb MySQL SSL Downgrade affects the client not the server
Remove mention of MySQL & friends that are not getting patched:
We will update their packages with a pkg-message to notify users

Security:	36bd352d-299b-11e5-86ff-14dae9d210b8
2015-07-18 20:21:07 +00:00
Mark Felder
9fa7db8dbb Add missing <cvename> to apache entry
Security:	29083f8e-2ca8-11e5-86ff-14dae9d210b8
2015-07-17 20:41:30 +00:00
Mark Felder
914bb920a5 Add missing apache22 packages for other "workers"
Security:	29083f8e-2ca8-11e5-86ff-14dae9d210b8
2015-07-17 17:30:34 +00:00
Mark Felder
27468dc29d Apache 2.2.31 is now public, fixing CVE-2015-3183
Security:	CVE-2015-3183
2015-07-17 17:26:53 +00:00
Mark Felder
84069dba92 CVE now assigned to squid
Security:	150d1538-23fa-11e5-a4a5-002590263bf5
Security:	CVE-2015-5400
2015-07-17 16:49:43 +00:00
Max Brazhnikov
7d1d2b9b42 security/pinentry:
- Add GNOME 3 pinentry dialog
2015-07-17 15:49:09 +00:00
Renato Botelho
c0ee37f355 Update to 1.8.14 2015-07-17 13:15:17 +00:00
Koop Mast
c226ecb73e Update flash entry.
Fixed version was released for CVE-2015-5122, CVE-2015-5123.
2015-07-17 07:52:17 +00:00
Mark Felder
301953df6f Correct range for libav
I was led to believe that 11.5 and 12.0 releases existed and included
the fix. They have not yet been issued by upstream. We will backport the
fix and bump PORTREVISION.

Security:	a928960a-2bdc-11e5-86ff-14dae9d210b8
2015-07-16 19:40:31 +00:00
Mark Felder
7e42716ea4 Document zenphoto vulnerabilities
No CVE assigned yet
2015-07-16 19:22:19 +00:00
Mark Felder
37f5cfceef Document groovy vulnerability
Security:	CVE-2015-3253
2015-07-16 19:01:11 +00:00
Mark Felder
a4928ec178 Document libav vulnerability
Security:	CVE-2015-5479
2015-07-16 17:13:27 +00:00
Tijl Coosemans
9dda8dd58f Add a new port for mbed TLS 2.0.0 (formerly polarssl) 2015-07-16 08:42:37 +00:00
Jan Beich
2142c8ff74 Document recent multiple mozilla vulnerabilities 2015-07-16 06:08:45 +00:00
Jan Beich
ef0a0c91f1 - Update NSS and ca_root_nss to 3.19.2
- Update Firefox and gmp-api to 39.0
- Update Firefox ESR and libxul to 38.1.0

Changes:	https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.19.2_release_notes
Changes:	https://www.mozilla.org/firefox/39.0/releasenotes/
Changes:	https://www.mozilla.org/firefox/38.1.0/releasenotes/
MFH:		2015Q3
Security:	https://vuxml.freebsd.org/freebsd/44d9daee-940c-4179-86bb-6e3ffd617869.html
2015-07-16 06:05:59 +00:00
Dmitry Marakasov
98e0658f70 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-16 03:12:01 +00:00
Dmitry Marakasov
ea0276fde1 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-16 02:44:58 +00:00
Dmitry Marakasov
6f5b1af7b4 - Drop @dirrm* from plist
Approved by:	portmgr blanket
2015-07-16 02:39:25 +00:00
Matthias Andree
b3fb0fb085 Add PolarSSL < 1.2.14 issues.
See PR #201603 for a remedy.
2015-07-15 23:24:37 +00:00
Tijl Coosemans
3b24aa8886 Latest libxml2 vulnerability also affects linux-*-libxml2 2015-07-15 21:10:52 +00:00
Tijl Coosemans
0b8062d39e Document linux-*-libxml2 vulnerabilities 2015-07-15 20:10:38 +00:00
Tijl Coosemans
eb7966011b Document linux-c6-flac vulnerabilities 2015-07-15 19:40:04 +00:00
Dmitry Marakasov
130db4abf8 - Add LICENSE_FILE
- Fix shebangs
- Add NO_ARCH

Approved by:	portmgr blanket
MFH:		2015Q3 (blanket)
2015-07-15 18:37:06 +00:00
Bartek Rutkowski
768e5d4a76 security/tclgpg: new port
Tcl interface to GNU Privacy Guard with interface similar to TclGPGME

WWW: https://chiselapp.com/user/sgolovan/repository/tclgpg/

PR:		201337
Submitted by:	Mikhail <mp39590@gmail.com>
2015-07-15 17:43:37 +00:00
Dmitry Marakasov
9b17636b06 - Note that the previous commit has added missing USES=perl5
- This commit fixes it as it should only be a run-dependency

Approved by:	portmgr blanket
2015-07-15 17:39:46 +00:00
Tijl Coosemans
066f65ca47 Update to nss-3.19.1-3.el6_6 2015-07-15 16:26:34 +00:00
Tijl Coosemans
3ec3901646 Update to libssh2-1.4.2-1.el6_6.1 2015-07-15 16:03:18 +00:00
Tijl Coosemans
44ca809b55 Update to cyrus-sasl-lib-2.1.23-15.el6_6.2 2015-07-15 15:57:31 +00:00
Mark Felder
efe33c1ada - Document multiple security issues for libwmf
PR:		201513
Security:	CVE-2004-0941
Security:	CVE-2007-0455
Security:	CVE-2007-2756
Security:	CVE-2007-3472
Security:	CVE-2007-3473
Security:	CVE-2007-3477
Security:	CVE-2009-3546
Security:	CVE-2015-4695
Security:	CVE-2015-4696
Security:	CVE-2015-0848
Security:	CVE-2015-4588
Security:	ca139c7f-2a8c-11e5-a4a5-002590263bf5
2015-07-15 15:49:59 +00:00
Mark Felder
dd15fe6134 Reference another URL for tidy's CVE
PR:		200631
Security:	bd1ab7a5-0e01-11e5-9976-a0f3c100ae18
2015-07-15 15:19:53 +00:00
Mark Felder
e6f6190e96 CVEs have been assigned for tidy
Security:	bd1ab7a5-0e01-11e5-9976-a0f3c100ae18
Security:	CVE-2015-5522
Security:	CVE-2015-5523
2015-07-15 14:03:16 +00:00
Mark Felder
60cd13f0e9 Document multiple apache24 vulnerabilities
Security:	CVE-2015-3183
Security:	CVE-2015-3185
Security:	CVE-2015-0253
Security:	CVE-2015-0228
2015-07-15 13:40:32 +00:00
Koop Mast
0d1093ae75 Fix typo in flash security bulletin. 2015-07-15 13:19:57 +00:00
Tijl Coosemans
66873d0f39 - Update url of latest Flash plugin advisory
- Document libXfont vulnerabilities in linux-*-xorg-libs
2015-07-15 12:46:08 +00:00
Matthias Andree
cf38806ec3 Add an openvpn-polarssl that selects PolarSSL for its default TLS provider. 2015-07-15 00:10:59 +00:00
Baptiste Daroussin
bdf7699e8b Development ceased, broken with modern ssh (lots of options just do not work) 2015-07-14 20:39:36 +00:00
Dmitry Marakasov
917579f01d - Fix shebangs
Approved by:	portmgr blanket
MFH:		2015Q3 (blanket)
2015-07-14 20:32:39 +00:00
Dmitry Marakasov
bc3f38623b - Fix shebangs
Approved by:	portmgr blanket
MFH:		2015Q3 (blanket)
2015-07-14 20:31:45 +00:00
Dmitry Marakasov
4eb3b986ad - Fix shebangs
Approved by:	portmgr blanket
MFH:		2015Q3 (blanket)
2015-07-14 20:30:51 +00:00
Dmitry Marakasov
4d5e2f4edb - Fix shebangs
Approved by:	portmgr blanket
MFH:		2015Q3 (blanket)
2015-07-14 19:59:09 +00:00
Jimmy Olgeni
7923381cc6 Add security/elixir-comeonin, a password hashing library for Elixir. 2015-07-14 14:31:42 +00:00
Tijl Coosemans
f16f896af3 Use the correct package name for linux-*-flashplugin
Reported by:	pluknet
2015-07-14 12:14:01 +00:00
Max Brazhnikov
3dafeaacf5 security/pinentry:
- Fix build: libassuan is now mandatory dependence
- Explicitly disable GNOME 3 and Emacs versions

MFH:		2015Q3
2015-07-14 09:14:41 +00:00
Koop Mast
ab8a200529 Use correct <tag> to mark all versions vulnerable. 2015-07-14 08:48:55 +00:00
Koop Mast
3c4341b2cf Add newest flash vulnerabilities CVE-2015-5122 and CVE-2015-5123.
No fixed version of flash available yet.
2015-07-14 08:39:50 +00:00
Mark Felder
d0b5c0de83 Document php sqlite3 use-after-free vulnerability
Change previous entry title to be hyphenated
2015-07-13 21:05:39 +00:00
Mark Felder
ec3ca64d19 Document php spl use-after-free vulnerability
No CVE assigned yet
2015-07-13 21:00:47 +00:00
Mark Felder
81036778fa Document PHP arbitrary code execution. No CVE assigned yet.
Fix missing blockquote URL in previous entry
2015-07-13 20:55:38 +00:00
Mark Felder
70252280ce php 5.4 package name is php5, not php54
Security:	36bd352d-299b-11e5-86ff-14dae9d210b8
2015-07-13 20:53:37 +00:00
Mark Felder
9bab088577 Document CVE-2015-3152 "BACKRONYM" vulnerability
PHP resolved in recent releases
MySQL has fixed in 5.7 branch and did not backport to older branches
MariaDB resolved in 5.5.44 and 10.0.20
Percona has not included a fix in any release (5.1, 5.5, or 5.6)

Security:	CVE-2015-3152
2015-07-13 20:46:04 +00:00
Jung-uk Kim
c65a352eb1 - Update to 0.9.5.
- Disable LIBSECRET option for GTK2 by default.  It does not work and broke
Thunderbird/Enigmail for me.

Approved by:	makc (maintainer)
MFH:		2015Q3
2015-07-13 16:45:52 +00:00
Mark Felder
a98f3e6b76 hadoop2 and oozie ports fetch a version of tomcat that is vulnerable
Security:	25e0593d-13c0-11e5-9afb-3c970e169bc2
Security:	CVE-2014-0230
Security:	CVE-2014-7810
2015-07-13 13:25:36 +00:00