Commit graph

17811 commits

Author SHA1 Message Date
Rene Ladan
b9ef730527 Remove expired ports:
2013-07-11 databases/embedded_innodb: The Embedded InnoDB project was terminated a few years ago
2013-07-11 print/lyx16: Unmaintained upstream, upgrading to the 2.x series is advised
2013-07-11 security/py-crack: Superseded by security/py-cracklib
2013-07-11 09:33:29 +00:00
Carlo Strub
51d58f52f3 Add vulnerability on otrs
Security:	e3e788aa-e9fd-11e2-a96e-60a44c524f57
2013-07-11 07:50:26 +00:00
Baptiste Daroussin
f3dc0c6f27 Reset maintainer (email is bouncing)
While here:
- Trim headers
- Convert to USES where applicable
- Bump klamav portrevision (pkgconfig is not a run dep anymore)
2013-07-11 05:53:09 +00:00
Matthias Andree
c893c9e130 Remove expired security/openvpn20 port.
It is recommended to migrate to security/openvpn.
2013-07-10 22:28:30 +00:00
Olli Hauer
5183b40651 - update to apache-2.2.25
- update vuxml with additional CVE-2013-1896 entry

Changes with Apache 2.2.25
  http://www.apache.org/dist/httpd/CHANGES_2.2.25

  *) SECURITY: CVE-2013-1896 (cve.mitre.org)
     mod_dav: Sending a MERGE request against a URI handled by mod_dav_svn with
     the source href (sent as part of the request body as XML) pointing to a
     URI that is not configured for DAV will trigger a segfault. [Ben Reser
     <ben reser.org>]

  *) SECURITY: CVE-2013-1862 (cve.mitre.org)
     mod_rewrite: Ensure that client data written to the RewriteLog is
     escaped to prevent terminal escape sequences from entering the
     log file.  [Eric Covener, Jeff Trawick, Joe Orton]

  *) core: Limit ap_pregsub() to 64MB and add ap_pregsub_ex() for longer
     strings.  The default limit for ap_pregsub() can be adjusted at compile
      time by defining AP_PREGSUB_MAXLEN.  [Stefan Fritsch, Jeff Trawick]

  *) core: Support the SINGLE_LISTEN_UNSERIALIZED_ACCEPT optimization
     on Linux kernel versions 3.x and above.  PR 55121.  [Bradley Heilbrun
     <apache heilbrun.org>]

  *) mod_setenvif: Log error on substitution overflow.
     [Stefan Fritsch]

  *) mod_ssl/proxy: enable the SNI extension for backend TLS connections
     [Kaspar Brand]

  *) mod_proxy: Use the the same hostname for SNI as for the HTTP request when
     forwarding to SSL backends. PR 53134.
     [Michael Weiser <michael weiser.dinsnail.net>, Ruediger Pluem]

  *) mod_ssl: Quiet FIPS mode weak keys disabled and FIPS not selected emits
     in the error log to debug level.  [William Rowe]

  *) mod_ssl: Catch missing, mismatched or encrypted client cert/key pairs
     with SSLProxyMachineCertificateFile/Path directives. PR 52212, PR 54698.
     [Keith Burdis <keith burdis.org>, Joe Orton, Kaspar Brand]

  *) mod_proxy_balancer: Added balancer parameter failontimeout to allow server
     admin to configure an IO timeout as an error in the balancer.
     [Daniel Ruggeri]

  *) mod_authnz_ldap: Allow using exec: calls to obtain LDAP bind
     password.  [Daniel Ruggeri]

  *) htdigest: Fix buffer overflow when reading digest password file
     with very long lines. PR 54893. [Rainer Jung]

  *) mod_dav: Ensure URI is correctly uriencoded on return. PR 54611
     [Timothy Wood <tjw omnigroup.com>]

  *) mod_dav: Make sure that when we prepare an If URL for Etag comparison,
     we compare unencoded paths. PR 53910 [Timothy Wood <tjw omnigroup.com>]

  *) mod_dav: Sending an If or If-Match header with an invalid ETag doesn't
     result in a 412 Precondition Failed for a COPY operation. PR54610
     [Timothy Wood <tjw omnigroup.com>]

  *) mod_dav: When a PROPPATCH attempts to remove a non-existent dead
     property on a resource for which there is no dead property in the same
     namespace httpd segfaults. PR 52559 [Diego Santa Cruz
     <diego.santaCruz spinetix.com>]

  *) mod_dav: Do not fail PROPPATCH when prop namespace is not known.
     PR 52559 [Diego Santa Cruz <diego.santaCruz spinetix.com>]

  *) mod_dav: Do not segfault on PROPFIND with a zero length DBM.
     PR 52559 [Diego Santa Cruz <diego.santaCruz spinetix.com>]

PR:		ports/180248
Submitted by:	Jason Helfman jgh@
2013-07-10 19:01:44 +00:00
Rene Ladan
fca5644183 Add new vulnerabilities for www/chromium < 28.0.1500.71
Obtained from:	http://googlechromereleases.blogspot.nl/
2013-07-10 14:35:58 +00:00
Florian Smeets
82057df840 Update to 3.15.1
Submitted by:	Jan Beich <jbeich@tormail.org>
2013-07-10 13:01:52 +00:00
Baptiste Daroussin
ada4f4807c Mark jobs unsafe and convert to USES=gmake 2013-07-10 11:58:46 +00:00
Baptiste Daroussin
33813624cb Mark jobs unsafe 2013-07-10 11:43:18 +00:00
Baptiste Daroussin
cb3bf5c358 Mark jobs unsafe and convert to USES=gmake 2013-07-10 11:20:00 +00:00
Martin Matuska
ad45da9e70 Horde package update:
pear-Horde_ActiveSync 2.5.2 -> 2.5.4
pear-Horde_Core 2.6.0 -> 2.6.1
pear-Horde_Share 2.0.3 -> 2.0.4
2013-07-09 17:18:06 +00:00
Mark Felder
e13651d9bd - Add support for pwck command
PR: ports/180371
Approved by: swills (mentor)
2013-07-09 14:25:56 +00:00
Max Brazhnikov
4206b47dfc - Remove security/pinentry-qt: Qt3 ports are deprecated.
- minor fixes/changes.
2013-07-09 13:37:13 +00:00
Emanuel Haupt
6fe706fd4b - Convert USE_GMAKE to USES=gmake
- Change pkgconfig:build to pkgconfig since it's the same and it's bad practice.
  It accidentally slipped in during the original introduction
- Trim header
2013-07-08 18:42:15 +00:00
Cheng-Lung Sung
4e9a85422a - Update to 2.53
Changes: http://cpansearch.perl.org/src/GAAS/Digest-MD5-2.53/Changes
2013-07-08 02:10:33 +00:00
Jason Helfman
cdebd5ad42 - fix fetch and remove stale mirror
- convert historical header

PR:		180346
Submitted by:	r4721@tormail.org
Approved by:	matthieu@labs.fr (maintainer)
2013-07-07 21:57:17 +00:00
Julien Laffaye
4eebe01c68 - Update to 20130706 snapshot.
- Fix build with go 1.1
2013-07-07 10:02:54 +00:00
Oliver Lehmann
74805540a5 add USES=iconv which it does
Noted by:	mat
2013-07-07 09:03:44 +00:00
Olli Hauer
a344b454d8 - add fix for CVE-2013-1862
- adjust vuxml
2013-07-06 08:46:39 +00:00
Jason Helfman
0458432ec0 - convert USE_GMAKE to USES=gmake 2013-07-06 01:22:56 +00:00
Olli Hauer
89d9998222 - document apache22 CVE-2013-1862 (mod_rewrite)
Update to apache22-2.2.25 is ready to commit.
Until now there is no official announcement from apache.org
so we hold the update back until we have official checksums.
2013-07-05 21:06:15 +00:00
Wesley Shields
5256e84afb Fix missing include.
This was causing the "Undefined symbol '_'" message when hitting ^C or
entering an incorect command.

PR:		ports/180262
Submitted by:	Christophe Juniet <c.juniet@gmail.com>
2013-07-05 18:46:33 +00:00
Bryan Drewery
cc016c4708 Add an openssh-portable-base slave port to install with OVERWRITE_BASE 2013-07-05 18:27:50 +00:00
Baptiste Daroussin
6151b40b59 Convert to USES=gmake 2013-07-05 13:44:31 +00:00
Alex Dupre
5c9e41ea31 Don't crash when backend cannot be signalled.
Update master sites.

PR:		ports/180291
Submitted by:	Marcin Cieslak <saper@saper.info>
2013-07-05 13:21:07 +00:00
Bryan Drewery
dcd945cc38 Add LICENSE 2013-07-05 12:46:45 +00:00
Alex Dupre
c78100319a Update to v13.04.29 release. 2013-07-05 12:07:16 +00:00
Raphael Kubo da Costa
554e0c79c9 Update the KDE Software Compilation to 4.10.5.
Proudly brought to you by the KDE on FreeBSD team. We're sorry to ship two
KDE updates in just a few days, but the work on 4.10.5 was very light
compared to 4.10.4 so it was ready much faster.

The release announcement can be found in [1].
[1] http://www.kde.org/announcements/announce-4.10.5.php

The biggest news for us on FreeBSD is that the Ruby bindings should work
with Ruby 1.9 now.

I will probably add a note to UPDATING later about this, but as avilla@
pointed out, the clang support we mentioned that was improved in 4.10.4
requires a rebuild of the ports that depend on kdelibs4. Most of them are
covered by this update, but those which are not part of the Software
Compilation need to be rebuilt manually to make sure the previous issues
(proper symbol visibility being the most annoying of them) are solved.
2013-07-04 23:34:32 +00:00
William Grzybowski
d3b7c1a84c security/tpmmanager: update to 0.8.1
- Update to 0.8.1 [1]
- Trim Makefile header [1]
- Use PORTDOCS
- Pass maintainership to submitter

PR:		ports/180244
Submitted by:	Danilo Egêa Gondolfo <danilogondolfo gmail.com>
2013-07-04 17:59:48 +00:00
Matthias Andree
0452c21b0e Add PORTSCOUT limit. 2013-07-04 06:18:58 +00:00
Pawel Pekala
3de5e4dc76 Update to version 2.3
PR:		ports/180234
Submitted by:	Alexander <alexander.4mail@gmail.com> (maintainer)
2013-07-03 18:43:29 +00:00
Ryan Steinmetz
e4d57b3efd - Fix broken pkg-plist (revert previous commit)
- Bump PORTREVISION
2013-07-02 21:22:25 +00:00
Raphael Kubo da Costa
18ff93d1a7 Update to KDE SC 4.10.4, proudly presented by the KDE on FreeBSD team.
With commits from avilla@, makc@, rakuco@ and Schaich Alonso.

The upstream announcement can be found in [1].
[1] http://www.kde.org/announcements/announce-4.10.4.php

clang support should be more stable now, with clang being recognized by
kdelibs4 and being passed the correct flags to build other ports.
Additionally, all ports being committed have been verified to build with
-CURRENT's clang 3.3 on an amd64 tinderbox (special thanks go to swills@ for
providing it).

Work on the newly-released 4.10.5 will begin shortly.
2013-07-02 19:04:18 +00:00
Xin LI
a4c3e0313f Fix CVE-2013-2174 for ftp/curl with a patch from vendor for
now so that users can build the port, per popular demands
on mailing list.

The upgrade patch found in ports/172325 is currently under
exp-run.  The changes in this commit against ftp/curl can be
safely reverted before applying that patch, as it's shipped
with new curl release.

Approved by:	portmgr (miwi)
2013-07-02 07:43:02 +00:00
Lars Engels
fbfb14c18e Update to version 201326
PR:		ports/180167
Submitted by:	maintainer
2013-07-01 18:10:27 +00:00
William Grzybowski
ec93240f13 security/libsparkcrypto: Cryptographic library implemented in SPARK
libsparkcrypto is a formally verified implementation of several widely used
symmetric cryptographic algorithms using the SPARK programming language and
toolset. For the complete library proofs of the absence of run-time errors
like type range violations, division by zero and numerical overflows are
available. Some of its subprograms include proofs of partial correctness.

The distribution contains test cases for all implemented algorithms and a
benchmark to compare its performance with the OpenSSL library. The achieved
speed has been found to be very close to the optimized C and Assembler
implementations of OpenSSL.

WWW: http://senier.net/libsparkcrypto/

PR:		ports/180015
Submitted by:	John Marino <draco@marino.st>
2013-07-01 16:36:08 +00:00
Matthew Seaman
63cb6cc692 Security update to 4.0.4.1
ChangeLog: http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/4.0.4.1/phpMyAdmin-4.0.4.1-notes.html/view

Advisory: http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php

Security:	1b93f6fe-e1c1-11e2-948d-6805ca0b3d42
2013-06-30 20:49:32 +00:00
Roman Bogorodskiy
32831a1c26 Update to 1.12. 2013-06-30 16:59:08 +00:00
TAKATSU Tomonari
1c58caee7b - Update to 0.4.93
- Transfer maintainership to ruby@

PR:		ports/179883
Submitted by:	swills
2013-06-30 13:37:53 +00:00
Antoine Brodin
2321685405 - Do not modify charset.alias
- Add a directory created by the port to pkg-plist
2013-06-29 21:35:45 +00:00
Antoine Brodin
bf7f33b9fa Add empty directory created by the port to pkg-plist 2013-06-29 21:31:50 +00:00
Baptiste Daroussin
b5a3db0cb2 Convert to USES=imake
Trim headers
2013-06-28 22:26:56 +00:00
Felippe de Meirelles Motta
22bc3c69b9 The axTLS project is an SSL client/server library using the TLSv1
protocol.  It is designed to be small and fast, and is suited to
embedded projects.  A web server is included.

WWW: http://http://axtls.sourceforge.net/

PR:		ports/177790
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp>
2013-06-28 20:55:58 +00:00
Martin Matuska
59da570ac1 Horde package update:
pear-Horde_ActiveSync 2.5.0 -> 2.5.2
pear-Horde_Crypt 2.2.0 -> 2.2.1
pear-Horde_Form 2.0.4 -> 2.0.5
pear-Horde_Util 2.2.2 -> 2.3.0
2013-06-28 12:13:35 +00:00
Palle Girgensohn
0ae6f0998d Security update for apache-xml-security-c
URL:	http://santuario.apache.org/secadv.data/CVE-2013-2210.txt
Security:	81da673e-dfe1-11e2-9389-08002798f6ff
Security:	CVE-2013-2210
2013-06-28 11:07:48 +00:00
Cheng-Lung Sung
cd741b4ff1 - Update to 5.85 2013-06-28 02:32:59 +00:00
Wesley Shields
0c40c664ed Update to 1.8.7. 2013-06-28 00:58:49 +00:00
Cy Schubert
04d5039845 Add File::KeePass::Agent An application agent for working with
File::KeePass objects.
2013-06-28 00:02:47 +00:00
Frederic Culot
745fd37e12 - Update to 0.28
- Trim Makefile's header

Changes:	https://github.com/kazu-yamamoto/pgpdump/blob/master/CHANGES
PR:		ports/180002
Submitted by:	TAKAHASHI Kaoru <kaoru@kaisei.org> (maintainer)
2013-06-26 14:36:22 +00:00
Ryan Steinmetz
2b82cfd6a8 - Update to 5.01 2013-06-26 11:34:08 +00:00
Florian Smeets
d24ed7a7b6 - update firefox to 22.0
- update firefox-esr, thunderbird and libxul to 17.0.7
- update nspr to 4.10
- OSS support was removed upstream, only ALSA and PulseAudio are supported
  from now on.

Security:	b3fcb387-de4b-11e2-b1c6-0025905a4771
In collaboration with:	Jan Beich <jbeich@tormail.org>
2013-06-26 11:01:34 +00:00
David Thiel
48a43ca434 Update to 3.0.13. Fixes a regression in the GrowingLogFiles policy. 2013-06-25 19:04:41 +00:00
Alex Dupre
7fe96c1093 Welcome PHP 5.5!
Future steps:
- rename current php5 ports to php54
- make php55 the default one after an exp-run
2013-06-24 14:32:11 +00:00
Ryan Steinmetz
a1d7b35ed4 - Update to 1.9.2
- Convert to new 'created by' header
- Workaround build issue under 10.x

PR:		ports/179781
Submitted by:	brooks@
2013-06-24 11:55:42 +00:00
Eygene Ryabinkin
fee422ed2e VuXML: document CVE-2013-2174, heap corruption in cURL library 2013-06-23 20:14:01 +00:00
Antoine Brodin
7d57692fe6 Deprecate: broken on FreeBSD 8 and newer
Approved by:	maintainer
2013-06-23 19:55:13 +00:00
Steve Wills
2d07552681 - Update to 0.3.5 2013-06-23 14:24:07 +00:00
Steve Wills
65fa3a020e - Make dep on libcrack less specific to fix build
PR:		ports/179789
Submitted by:	John Marino <draco@marino.st>
2013-06-23 02:15:09 +00:00
Raphael Kubo da Costa
eccc66583e Make the port work with FreeBSD 9.x and later.
Due to changes in pf, expiretable wouldn't work on FreeBSD 9.x.

PR:		ports/175527
Submitted by:	Cristiano Deana <cris@gufi.org> (maintainer)
2013-06-22 21:11:40 +00:00
Bryan Drewery
37db06f38b - In rc script, be consistent in reload and check for and generate keys
if needed, as well as checking for port collision with base sshd.

Reported by:	delphij
2013-06-22 15:11:30 +00:00
Steve Wills
94d8197109 - Update puppet to 3.2.2 which fixes CVE-2013-3567 [1]
- Update puppet27 to 2.7.22 which fixes CVE-2013-3567
- Document security issue

PR:		ports/179816 [1]
Submitted by:	mat [1]
Security:	b162b218-c547-4ba2-ae31-6fdcb61bc763
2013-06-22 12:49:28 +00:00
Rene Ladan
3e00d89321 - Remove conditional code for net/samba34, it was removed on 2013-06-04
- Convert Makefile header
- Fix typo in pkg-message

PR:		ports/179279
Submitted by:	myself
Approved by:	maintainer timeout (girald@etcom.ufrgs.br, 19 days)
2013-06-22 09:36:41 +00:00
Brendan Fabeny
7044e0fe42 Correct the CVE-2013-0131 entry, so that the most recent revision of
x11/nvidia-driver-304 is not mistakenly flagged as vulnerable
2013-06-22 09:36:10 +00:00
Steve Wills
dc6047f41e A pure Ruby implementation of the RC4 algorithm
WWW: http://rubygems.org/gems/ruby-rc4
2013-06-22 02:37:58 +00:00
Renato Botelho
45ca106752 Use new macros 2013-06-21 18:45:23 +00:00
Renato Botelho
b619cfa852 . Update to 20130621
. Use new macros where it's possible
2013-06-21 18:41:08 +00:00
William Grzybowski
a9db62d9e9 security/openvas-plugins: fix build
- Fix build, add pkgconfig to USES [1]
- Trim Makefile header

PR:		ports/179811 [1]
Submitted by:	John Marino <draco@marino.st>
2013-06-21 17:48:03 +00:00
William Grzybowski
24e305725e security/openvas-server: fix build
- Fix build, add pkgconfig to USES
- Trim Makefile header
- Remove leading article form COMMENT

PR:		ports/179810 [1]
Submitted by:	John Marino <draco@marino.st>
2013-06-21 17:47:19 +00:00
Antoine Brodin
45ab3998d9 Add an empty directory created by the port to pkg-plist
Approved by:	portmgr (miwi)
2013-06-21 16:40:56 +00:00
Mikhail Teterin
fb0ad26065 Only depend on net/netcat, when /usr/bin/netcat is not uvailable (either
because the present FreeBSD is too old, or because we are building on,
say, DragonFlyBSD).

Fix up most compiler warnings, while I'm here.

Bump PORTREVISION.

PR:		ports/179752
Submitted by:	John Marino
2013-06-21 03:10:20 +00:00
Brendan Fabeny
49fd91c13d Update to 0.2.4.14-alpha
Security:	Tor bugs 9002, 9063
2013-06-20 04:37:30 +00:00
Steve Wills
5b4cc0be18 A fork of Twitter OAuth REST API client library for Ruby
WWW: http://rubygems.org/gems/jugyo-twitter_oauth

PR:		ports/179533
Submitted by:	Koichiro IWAO <meta+ports@vmeta.jp>
2013-06-20 04:15:59 +00:00
Jason Helfman
ff04bb0634 - fix formating of 8b97d289-d8cf-11e2-a1f5-60a44c524f57
With Hat:	ports-secteam
2013-06-19 21:56:56 +00:00
Eitan Adler
1943b2a636 Add extra-validation to the validation target.
While here, test with python2 and permit the script to run with either 2 or 3.

Requested by:	delphij
With Hat:	ports-secteam
2013-06-19 21:20:50 +00:00
Eitan Adler
dc4cfebc03 - Fix entry dates for some 'insane' dates. In some cases a best effort was made to guess what was meant due to either destroyed svn logs (formatting 'fixes') or lost to time reports.
With Hat:	ports-secteam
2013-06-19 21:14:50 +00:00
Antoine Brodin
64fc300e8c Add a missing directory to pkg-plist 2013-06-19 21:03:41 +00:00
Eitan Adler
6eb7da5901 Add an additional validation script to the vuxml port.
At this point it is not tied to the validate: target because validation fails.

Reviewed by:	simon, delphij
With Hat:	ports-secteam
2013-06-19 20:46:23 +00:00
Johan van Selst
af42ee9581 - Update CyaSSL to 2.7.0
- Enable SNI support
2013-06-19 20:09:26 +00:00
Martin Wilke
9d406ff3be - Don't remove directories not created by this port
Reported by:	pkg (DEVELOPER_MODE)
2013-06-19 15:21:03 +00:00
Martin Wilke
7f4666b112 - Don't remove directories not created by this port
Reported by:	pkg (DEVELOPER_MODE)
2013-06-19 14:48:53 +00:00
Max Brazhnikov
030e7b83cf Disable Qt3 frontend: Qt3 ports are deprecated.
PR:		ports/179207
Reported by:	Scot Hetzel <swhetzel at gmail.com>
2013-06-19 14:14:13 +00:00
Carlo Strub
3c16878418 Fix typo soccat -> socat 2013-06-19 11:08:02 +00:00
Carlo Strub
3c635bcb65 Add vulnerability on OTRS 2013-06-19 11:07:35 +00:00
Hiroki Sato
956f2f5524 Fix pkg-plist.
Reported by:	QAT
2013-06-18 23:41:57 +00:00
Hiroki Sato
7b9fde159a Add security/fbopenssl, a library containing extensions to OpenSSL,
including support for GSS-API (RFC 2743) and SPNEGO (RFC 2478).
2013-06-18 18:40:13 +00:00
Antoine Brodin
884efdd294 Fix after PORT_OPTIONS conversion 2013-06-18 16:07:39 +00:00
Xin LI
1c18fc94e4 Fix date for flashpluginwrapper. 2013-06-18 15:50:05 +00:00
Xin LI
d5b6f823e9 Add entry for SA-13:06.mmap. 2013-06-18 15:45:02 +00:00
Palle Girgensohn
179f046f0c Security update for apache-xml-security-c.
Dependant ports, especially shibboleth2-sp, opensaml2, xmltooling
and log4shib should all be updated.

Security: CVE-2013-2156
2013-06-18 15:15:48 +00:00
Dirk Meyer
705a136b7c - fix build when libc.so is not a symlink
Submitted by:	Bryan Drewery
2013-06-18 04:33:06 +00:00
Martin Wilke
945bb192d1 - Add RUN_DEPENDS for security/py-cracklib
- Support desktop-file-utils/shebangfix/shared-mime-info

PR:		179594
Submitted by:	Ports Fury
2013-06-17 15:32:04 +00:00
Brendan Fabeny
278a353a2f Document Tor bug 9072 2013-06-17 03:23:53 +00:00
Brendan Fabeny
7505e5bcb8 Disable the faulty fix for Tor bug 9063, which could compromise anonymity
Security:	Tor bug 9072
2013-06-16 22:42:53 +00:00
Brendan Fabeny
0d75f0b940 Remove a problematic mirror, and note that the commit message for r321043
should have read:

Update to 0.2.4.13-alpha

Security:	Tor bug 8833 and other potential remote crash vulnerabilities
2013-06-16 12:47:50 +00:00
Brendan Fabeny
93ebfae6ac update to 0.2.4.7-alpha; remove some stale mirrors 2013-06-16 12:21:44 +00:00
William Grzybowski
e2ee40fb24 security/slurpie: fix build with clang
- Fix build with clang, main int arg
- NOPORTDOCS -> PORT_OPTIONS:MDOCS
- Trim Makefile header

Approved by:	culot / jpaetzel (mentors, implicit)
2013-06-16 11:27:34 +00:00
Hiroki Sato
59c7516a1b Make parallel build possible for SUBDIR. 2013-06-15 18:20:02 +00:00
Antoine Brodin
bbfff2fcf1 - Update metasploit to 4.6.2
- Update the list of scripts
- SVN is discontinued
- new DB option for database support

PR:		ports/179159
Approved by:	maintainer timeout (15 days)
2013-06-14 20:40:09 +00:00
Kubilay Kocak
6fc13122f8 security/py-oauthlib: Fix pkg-plist
- Fix pkg-plist. missing @dirrm entries

Reported by:	sbz (thanks!)
2013-06-14 14:04:38 +00:00
William Grzybowski
e17c1fddb1 security/ike: update to 2.2.1
- Update to 2.2.1 [1]
- Remove NATT warning about FreeBSD < 8.0 patch

Changes: https://www.shrew.net/download/changelog/ike/2.2.1-release

PR:		ports/179503 [1]
Submitted by:	Matthew Grooms <mgrooms@shrew.net> (maintainer)
Approved by:	culot / jpaetzel (mentors, implicit)
2013-06-14 13:48:02 +00:00
Hiroki Sato
11bc9c3ef4 Fix pkg-plist.
Reported by:	QAT
2013-06-14 06:25:39 +00:00
Alex Kozlov
57cf43f89f - Fix typo in dbus entry
Reported by:	Christoph Mallon <christoph.mallon@gmx.de>
2013-06-14 06:21:13 +00:00
Martin Wilke
d954be0b06 - Do not remove directories not created by this port
Reported by:	pkg (DEVELOPER_MODE)
2013-06-14 03:21:07 +00:00
Martin Wilke
dc46933ab2 - Don't remove directories not created by this port
Reported by:	pkg (DEVELOPER_MODE)
2013-06-13 23:48:20 +00:00
Antoine Brodin
00bab28c85 Add an empty directory installed by the port to pkg-plist 2013-06-13 20:54:20 +00:00
Hiroki Sato
1511e3942c Update to 1.3.4. 2013-06-13 20:41:01 +00:00
Antoine Brodin
7fc1718493 - Fix a typo in PORT_OPTIONS conversion
- Create configuration directory we try to remove on uninstall
2013-06-13 20:39:52 +00:00
Koop Mast
93fc4d80bf Update to 1.6.12.
I'm not completly sure this affects us, but beter safe then sorry.
While here wordsmith Options description to try to make it clearer.

Security:	CVE-2013-2168
2013-06-13 19:54:25 +00:00
Johan van Selst
d82b0db767 Update Nettle to 2.7.1 (bugfix release) 2013-06-13 19:51:53 +00:00
Andrej Zverev
83421b9c80 - try to fix after recent perl upgrade 2013-06-13 10:24:56 +00:00
Johan van Selst
647cb16ec0 Add patch to fix build on FreeBSD 10.x (no functional changes) 2013-06-13 09:52:06 +00:00
Philippe Audeoud
c376cdad73 - Update to 1.94
- Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.94/Changes
2013-06-13 09:28:22 +00:00
Andrej Zverev
b8138b3c53 - Fix build with new site_perl
Submitted by:	ohauer@
2013-06-12 19:20:40 +00:00
Antoine Brodin
9f1b0c98ec Add empty directories created by this port to pkg-plist. 2013-06-12 18:04:12 +00:00
Andrej Zverev
124b00a56f - Fix build with new site_perl
Submitted by:	olli hauer <ohauer@gmx.de>
2013-06-12 17:45:02 +00:00
Sofian Brabez
da62e949ed - Replace Whom by Created by 2013-06-12 13:29:37 +00:00
Sofian Brabez
ec4cffae18 - Bump PORTREVISION after cracklib update
- Don't specify ABI number in LIB_DEPENDS
- Make portlint happy
2013-06-12 13:25:26 +00:00
Sofian Brabez
fa2c30b2c1 - Bump PORTREVISION after cracklib update
- Don't specify ABI version number in LIB_DEPENDS
2013-06-12 13:05:07 +00:00
Martin Wilke
b868b38d00 - Unbreak build on HEAD 2013-06-12 06:16:42 +00:00
Martin Wilke
ab9ecc0e1a - Fix build on HEAD 2013-06-12 06:07:33 +00:00
Eitan Adler
933455bf44 Update to 11.2r202.291
PR:		ports/179502
Submitted by:	Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp>
2013-06-11 22:44:39 +00:00
Frederic Culot
c14a0f2716 - Document vulnerabilities in www/owncloud
Security:	d7a43ee6-d2d5-11e2-9894-002590082ac6
Obtained from:	http://owncloud.org/about/security/advisories/
2013-06-11 21:03:38 +00:00
Ruslan Makhmatkhanov
350839d292 ECDSA cryptographic signature library (pure python).
WWW: http://github.com/warner/python-ecdsa

PR:		179448
Submitted by:	Neil Booth Neil Booth <kyuupichan@gmail.com>
2013-06-11 18:25:17 +00:00
Ruslan Makhmatkhanov
d776ccc36b Implementation of AES in pure Python.
As such it will be slow (hence the project name) but still useful when
faster ones are not available (for example, for JavaScript clients in
browsers, and Python servers on Google App Engine).

WWW: https://code.google.com/p/slowaes/

PR:		179447
Submitted by:	Neil Booth <kyuupichan@gmail.com>
2013-06-11 18:24:08 +00:00
Frederic Culot
6f41b547e8 - Update to 0.8.9 [1]
- Make additional documentation installation conditional
  (note: run-rootless.txt not installed as not relevant for FreeBSD)

Changes:        https://raw.github.com/fail2ban/fail2ban/master/ChangeLog
PR:             ports/179426 [1]
Submitted by:   Christoph Theis <theis@gmx.at> (maintainer)
2013-06-11 14:21:48 +00:00
Sofian Brabez
ccafe0f4af - Add dependency on pkgconfig
Reported by:	mat
2013-06-11 08:50:20 +00:00
Tilman Keskinoz
3279c626da Add patch to fix compilation with clang 2013-06-11 08:42:15 +00:00
Sofian Brabez
693f63157c - Mark DEPRECATED by security/py-cracklib after r320515 commit 2013-06-11 01:24:17 +00:00
Sofian Brabez
1d44350a1f - Update to 2.9.0
- Update pkg-descr
- Update WWW
- Remove PYTHON OPTION in security/cracklib and made security/py-cracklib a python slave port

Reviewed by:	crees
Approved by:	sbz (myself)
2013-06-11 00:52:47 +00:00
Anton Berezin
aa20cabeb7 Update to 1.55.
Changes:	http://search.cpan.org/dist/Net-SSLeay/Changes
2013-06-10 11:01:08 +00:00
Kubilay Kocak
850f8cf258 security/py-oauthlib: Update to 0.4.2
- Update to 0.4.2
- Update pkg-plist

Changes:

- 0.4.2: OAuth 2 draft to RFC. Removed OAuth 2 framework decorators.
- 0.4.1: Documentation corrections and various small code fixes.
2013-06-10 01:08:24 +00:00
Martin Wilke
949f1dc6a8 - Remove php4 reference 2013-06-09 17:50:46 +00:00
William Grzybowski
db20e94521 - Update to 3.10.0 [1]
- Remove unnecessary depend [2]
- Add LICENSE (BSD AL2 MIT)
- Fix install of perl library

Changes: http://ftimes.sourceforge.net/Files/ChangeLog/ChangeLog

PR:		ports/177738 [1], ports/178924 [2]
Submitted by:	klm <klm@uidzero.org> (maintainer) [1], az [2]
Approved by:	culot / jpaetzel (mentors, implicit), maintainer
2013-06-09 16:59:46 +00:00
Martin Wilke
17711897e9 - Update to 1.3
PR:		179028
Submitted by:	Douglas William Thrift <douglas@douglasthrift.net>
2013-06-09 16:48:39 +00:00
Palle Girgensohn
443d55c61e Add build dependency on boost for shibboleth and opensaml.
PR:	ports/179431
2013-06-09 14:41:24 +00:00
Martin Wilke
986a57d0a4 - Unbreak build on HEAD 2013-06-09 13:01:20 +00:00
Martin Wilke
daef95be25 - Fix build 2013-06-09 11:16:38 +00:00
Alexey Dokuchaev
7bad2ebf91 Remove no longer needed patch (fixed upstream). 2013-06-09 02:04:27 +00:00
Sunpoet Po-Chuan Hsieh
0ffff03b15 - Update to 0.10
Changes:	http://search.cpan.org/dist/IO-Async-SSL/Changes
2013-06-08 21:10:12 +00:00
Alexey Dokuchaev
bd43382377 Update to version 3.6.0; rephrase option descriptions while here. 2013-06-08 13:32:23 +00:00
Florian Smeets
f011d407e4 Update to 5.3.26
Security:	59e7163c-cf84-11e2-907b-0025905a4770
2013-06-07 15:19:27 +00:00
Andrej Zverev
02eb7ff1b6 - Remove unnecessary depend on PERL_LEVEL < 5.12
PR:		ports/178928
Submitted by:	az
Approved by:	maintainer (timeout)
2013-06-07 07:47:25 +00:00
Andrej Zverev
b7a896b7c0 - Trim Makefile header
- Remove unnecessary depend on PERL_LEVEL < 5.12

PR:		ports/178927
Submitted by:	az
Approved by:	maintainer (timeout)
2013-06-07 07:45:41 +00:00
Erwin Lansing
90decc5694 Match only the most recent Bind9* version in the latest vulnerability,
older versions are not affected.
2013-06-07 06:30:39 +00:00
Brendan Fabeny
780303a9b4 update lang/sbcl to 1.1.8, and adjust dependent ports 2013-06-06 13:13:34 +00:00
Erwin Lansing
20d85a9876 Fix typo in previous revision. 2013-06-06 10:59:35 +00:00
Anton Berezin
0102655a0f Update to 0.73.
Changes:	http://search.cpan.org/dist/Module-Signature/Changes
2013-06-06 09:43:39 +00:00
Erwin Lansing
38f95d861c Add entry for the latest Bind vulnerabilities in CVE-2013-3919. 2013-06-06 08:36:34 +00:00
Matthew Seaman
e9dd2fa24f Security upgrade to 4.0.3
Advisory: http://www.phpmyadmin.net/home_page/security/PMASA-2013-6.php

ChangeLog: http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/4.0.3/phpMyAdmin-4.0.3-notes.html/view

Security:	6b97436c-ce1e-11e2-9cb2-6805ca0b3d42
2013-06-05 22:02:13 +00:00
Baptiste Daroussin
badd7f819b Convert to new options framework 2013-06-05 10:21:04 +00:00
Koop Mast
218db049e2 Update to 0.16.6.
Obtained from:	GNOME dev repo
Security:	CVE-2013-1431
2013-06-05 09:02:46 +00:00
Palle Girgensohn
f0aa98db05 Don't remove /var/*/shibboleth with rm -rf, so we don't "pull out the carpet from underneath" a running shibd. Hence allow updating while the old shibd is still running. 2013-06-05 09:02:10 +00:00
Rene Ladan
9ea8c3f037 Document vulnerabilities in www/chromium < 27.0.1453.110
Obtained from:	http://googlechromereleases.blogspot.nl/
2013-06-04 22:30:28 +00:00
Baptiste Daroussin
1d90adc1c4 Removed security/pam_authsrv which depend on expired and broken security/fwtk
This fixes index

Pointyhat to:	bapt
2013-06-04 22:06:46 +00:00
Eitan Adler
c07672e4ab - Fix build
- Ensure validation
2013-06-04 21:52:40 +00:00
Baptiste Daroussin
1f1efd3220 Removed fwtk, no more public distfiles, expired for long 2013-06-04 21:43:08 +00:00
Niclas Zeising
d516c8b663 Fix security issues in xorg client libraries.
Most libraries were updated to newer versions, in some cases patches
were backported instead.

Most notably, x11/libX11 was updated to 1.6.0

Security:	CVE-2013-1981
		CVE-2013-1982
		CVE-2013-1983
		CVE-2013-1984
		CVE-2013-1985
		CVE-2013-1986
		CVE-2013-1987
		CVE-2013-1988
		CVE-2013-1989
		CVE-2013-1990
		CVE-2013-1991
		CVE-2013-1992
		CVE-2013-1993
		CVE-2013-1994
		CVE-2013-1995
		CVE-2013-1996
		CVE-2013-1997
		CVE-2013-1998
		CVE-2013-1999
		CVE-2013-2000
		CVE-2013-2001
		CVE-2013-2002
		CVE-2013-2003
		CVE-2013-2004
		CVE-2013-2005
		CVE-2013-2062
		CVE-2013-2063
		CVE-2013-2064
		CVE-2013-2066
2013-06-04 19:31:29 +00:00
Gabor Pali
109269205e - Update The Glorious Glasgow Haskell Compiler to version 7.6.3
- Update Haskell Platform to version 2013.2.0.0

Please note that port revisions for all the Haskell ports without version
changes are bumped.

Some highlights of the update:

- Fix PDF generation for pandoc [1]
- From now on, PREFIX/{lib,share,share/doc}/cabal/ghc-GHC_VERSION are used for
  hs- ports (Cabal packages) as prefixes to avoid problems when upgrading with
  portmaster(8) [2]
- Experimental support for LLVM-based code generation (disabled by default)
- Many simplifications, refactoring in bsd.cabal.mk

New ports (11):

devel/hs-asn1-types                         0.1.3
devel/hs-data-default-class                 0.0.1
devel/hs-data-default-instances-base        0.0.1
devel/hs-data-default-instances-containers  0.0.1
devel/hs-data-default-instances-dlist       0.0.1
devel/hs-data-default-instances-old-locale  0.0.1
devel/hs-extensible-exceptions              0.1.1.4
devel/hs-mmorph                             1.0.0
devel/hs-quickcheck-io                      0.1.0
x11-toolkits/hs-GLURaw                      1.3.0.0
x11-toolkits/hs-OpenGLRaw                   1.3.0.0

Updated ports (104):

archivers/hs-zlib                        0.5.4.0_1        --> 0.5.4.1
databases/hs-persistent                  1.1.5.1          --> 1.2.0.1
databases/hs-persistent-sqlite           1.1.5            --> 1.2.0
databases/hs-persistent-template         1.1.2.4          --> 1.2.0
devel/hs-HUnit                           1.2.5.1_1        --> 1.2.5.2
devel/hs-IORefCAS                        0.2_3            --> 0.2.0.1
devel/hs-MonadRandom                     0.1.8            --> 0.1.9
devel/hs-QuickCheck                      2.5.1.1_1        --> 2.6
devel/hs-abstract-deque                  0.1.6_1          --> 0.2
devel/hs-alex                            3.0.2_1          --> 3.0.5
devel/hs-async                           2.0.1.3_1        --> 2.0.1.4
devel/hs-basic-prelude                   0.3.4.0          --> 0.3.5.0
devel/hs-blaze-builder                   0.3.1.0_4        --> 0.3.1.1
devel/hs-byteorder                       1.0.3_4          --> 1.0.4
devel/hs-cabal-install                   0.14.0_4         --> 1.16.0.2
devel/hs-classy-prelude                  0.5.3            --> 0.5.7
devel/hs-cmdargs                         0.10.2           --> 0.10.3
devel/hs-conduit                         1.0.2            --> 1.0.5
devel/hs-data-default                    0.5.0_1          --> 0.5.3
devel/hs-fsnotify                        0.0.6            --> 0.0.11
devel/hs-generic-deriving                1.4.0            --> 1.5.0
devel/hs-git-annex                       4.20130323_1     --> 4.20130601
devel/hs-haddock                         2.11.0_1         --> 2.13.2
devel/hs-hashable                        1.2.0.5          --> 1.1.2.5,1
devel/hs-hlint                           1.8.43           --> 1.8.45
devel/hs-hspec                           1.4.4            --> 1.5.4
devel/hs-hspec-expectations              0.3.0.3_1        --> 0.3.2
devel/hs-largeword                       1.0.4            --> 1.0.5
devel/hs-lens                            3.8.7.3          --> 3.9.0.2
devel/hs-lifted-base                     0.2.0.2          --> 0.2.0.5
devel/hs-monad-control                   0.3.1.4_1        --> 0.3.2.1
devel/hs-monad-logger                    0.3.0.1          --> 0.3.1.1
devel/hs-monad-par                       0.3.4.1          --> 0.3.4.2
devel/hs-pool-conduit                    0.1.1_1          --> 0.1.2
devel/hs-profunctors                     3.3              --> 3.3.0.1
devel/hs-reflection                      1.1.7            --> 1.3.2
devel/hs-resourcet                       0.4.5            --> 0.4.7.1
devel/hs-show                            0.5              --> 0.6
devel/hs-split                           0.2.1.1_1        --> 0.2.2
devel/hs-stm                             2.4_1            --> 2.4.2
devel/hs-syb                             0.3.7_1          --> 0.4.0
devel/hs-tagged                          0.4.4_1          --> 0.6
devel/hs-text                            0.11.2.3_1       --> 0.11.3.1
devel/hs-unix-compat                     0.4.1.0          --> 0.4.1.1
devel/hs-unix-time                       0.1.5            --> 0.1.8
devel/hs-unordered-containers            0.2.3.0          --> 0.2.3.1
devel/hs-utility-ht                      0.0.8_3          --> 0.0.9
devel/hs-uuagc                           0.9.42.2_3       --> 0.9.42.3
devel/hs-uuid                            1.2.9            --> 1.2.13
devel/hs-void                            0.5.11           --> 0.6
math/hs-NumInstances                     1.2              --> 1.3
math/hs-comonad-transformers             3.0.1_1          --> 3.0.2
math/hs-semigroups                       0.9              --> 0.9.1
math/hs-statistics                       0.10.2.0_2       --> 0.10.3.1
net/hs-network                           2.3.1.0_1        --> 2.4.1.2
net/hs-publicsuffixlist                  0.0.3            --> 0.1
net/hs-socks                             0.5.0            --> 0.5.1
security/hs-certificate                  1.3.5_1          --> 1.3.7
security/hs-cipher-aes                   0.1.7            --> 0.1.8
security/hs-clientsession                0.8.1_1          --> 0.9
security/hs-crypto-api                   0.11             --> 0.12.1
security/hs-crypto-conduit               0.5.0            --> 0.5.2
security/hs-crypto-pubkey                0.1.2_1          --> 0.1.3
security/hs-crypto-pubkey-types          0.2.0_1          --> 0.3.2
security/hs-cryptocipher                 0.4.0_1          --> 0.5.0
security/hs-cryptohash                   0.8.3_1          --> 0.9.0
security/hs-skein                        0.1.0.12         --> 1.0.3
textproc/hs-HaXml                        1.23.3_2         --> 1.24
textproc/hs-attoparsec-conduit           1.0.0            --> 1.0.1
textproc/hs-blaze-html                   0.6.0.0          --> 0.6.1.1
textproc/hs-blaze-markup                 0.5.1.4          --> 0.5.1.5
textproc/hs-case-insensitive             1.0              --> 1.0.0.2
textproc/hs-highlighting-kate            0.5.3.8          --> 0.5.3.9
textproc/hs-hs-bibutils                  4.17             --> 5.0
textproc/hs-polyparse                    1.8_3            --> 1.9
textproc/hs-texmath                      0.6.1.3          --> 0.6.1.5
textproc/hs-xml                          1.3.12_4         --> 1.3.13
textproc/hs-yaml                         0.8.2.3          --> 0.8.2.4
www/hs-HTTP                              4000.2.5_1       --> 4000.2.8
www/hs-cgi                               3001.1.7.4_6,1   --> 3001.1.7.5,1
www/hs-hamlet                            1.1.6.3          --> 1.1.7.1
www/hs-happstack-server                  7.1.7            --> 7.1.7.1
www/hs-heist                             0.11.1           --> 0.12.0
www/hs-http-conduit                      1.9.0            --> 1.9.3
www/hs-http-reverse-proxy                0.1.1.3          --> 0.1.1.6
www/hs-shakespeare                       1.0.3.1          --> 1.0.5
www/hs-shakespeare-css                   1.0.3            --> 1.0.5.1
www/hs-shakespeare-js                    1.1.2.1          --> 1.1.4
www/hs-snap                              0.11.2           --> 0.12.0
www/hs-wai-extra                         1.3.2.4          --> 1.3.4
www/hs-wai-test                          1.3.0.4          --> 1.3.1
www/hs-warp                              1.3.7.4          --> 1.3.8.1
www/hs-yesod                             1.1.9.2          --> 1.2.0.1
www/hs-yesod-auth                        1.1.5.3          --> 1.2.0
www/hs-yesod-core                        1.1.8.2          --> 1.2.0.4
www/hs-yesod-form                        1.2.1.3          --> 1.3.0
www/hs-yesod-persistent                  1.1.0.1_1        --> 1.2.0
www/hs-yesod-platform                    1.1.8            --> 1.2.0.1
www/hs-yesod-routes                      1.1.2            --> 1.2.0
www/hs-yesod-static                      1.1.2.2          --> 1.2.0
www/hs-yesod-test                        0.3.5            --> 1.2.0
x11-toolkits/hs-GLUT                     2.1.2.1_7,1      --> 2.4.0.0,1
x11-toolkits/hs-OpenGL                   2.2.3.1_4,1      --> 2.8.0.0,1
x11/hs-xmobar                            0.16_2           --> 0.17

Removed ports (2):

www/hs-yesod-default                     1.1.3.2
www/hs-yesod-json                        1.1.2.1

PR:		ports/179146 [1]
Requested by:	Omar Thameen <omar@biglist.com> [1]
Reported by:	sperber, bapt [2]
Tested by:	sperber [2]
Obtained from:	FreeBSD Haskell
2013-06-04 18:53:40 +00:00
Palle Girgensohn
732610c736 Update Shibboleth-sp and its tool chain to 2.5.1.
Note that from 2.5, shibd is run as the user shibd.  The port tries to fix the
key file ownership but if you have changed the file name of the key from the
default sp-key.pem, make sure you chown your key file(s) to user shibd.

Also, take maintainership of the entire tool chain (approved by all previous
maintainers).

Incorporates the ideas suggested by Craig Leres [177668], making sure that the
ssl key is not added to the package.

PR:	177668, 178694
2013-06-04 17:29:21 +00:00
Cy Schubert
fd0bfa7a6d Update krb5 1.11.2 --> 1.11.3.
This is a bugfix release.

* Fix a UDP ping-pong vulnerability in the kpasswd (password changing)
  service.  [CVE-2002-2443]

* Improve interoperability with some Windows native PKINIT clients.

Security:	CVE-2002-2443
2013-06-04 04:45:22 +00:00
Matthias Andree
fe2b2351bd Add LICENSE=GPLv2. 2013-06-03 20:14:07 +00:00
Antoine Brodin
fca8a90240 New port: rubygem-origami
Origami is a Ruby framework designed to parse, analyze, and forge PDF
documents.
WWW: http://code.google.com/p/origami-pdf/
2013-06-03 19:22:34 +00:00
Chris Rees
c27d53f4c2 Update to 1.6.2
* Fix buffer overflows in fileserver and ptserver.
* Fix rare file corruption during background sync (Gerrit 8796).
* Fix corrupting clients' metadata cache during certain errors (Gerrit 6957).
* Fix cache corruption when reading from a file another client is simultaneously writing to (Gerrit 7994).
* Fix fileservers to properly report >2 TiB partitions.

and some other less serious changes.

PR:		ports/179259
Submitted by:	Adam Nowacki <nowak@tepeserwery.pl>
Submitted by:	bjk (maintainer)
Security:	CVE-2013-1794
2013-06-03 18:29:50 +00:00
Marcelo Araujo
4aed171d28 - Update to 2.7.4.
More info:
https://github.com/SpiderLabs/ModSecurity/blob/master/CHANGES

PR:		ports/179167
Submitted by:	ohauer@
Security:	9dfb63b8-8f36-11e2-b34d-000c2957946c
2013-06-03 06:51:43 +00:00
Baptiste Daroussin
b109b97dd2 Chase libtasn1 switching from USE_GNOME=pkgconfig to USES=pkgconfig
That has made pkgconf being a Build deps instead of Build+Run deps thus ports depending on pkgconf need an explicit dependency
2013-06-02 19:15:39 +00:00
Baptiste Daroussin
2b136bb9ec Add an explicit dependency to pkgconf
Submitted by:	antoine (irc)
2013-06-02 19:06:44 +00:00
Steve Wills
53b7835915 - Update to 1.1.1 2013-06-02 01:26:51 +00:00
Raphael Kubo da Costa
02cc67a03f Remove duplicate optipng vulnerability.
It was separately committed in r315254, so remove the version I added
in r318453.

Reported by:	Alexander Milanov <a@amilanov.com>
2013-06-01 19:22:38 +00:00
Matthias Andree
1e43de2e91 Add two more URLs to openvpn's vulnerability from March 2013 (CVE-2013-2061)
Security: 92f30415-9935-11e2-ad4c-080027ef73ec
2013-06-01 16:49:13 +00:00
Roman Bogorodskiy
310f9d6a44 Convert to USES for pkgconfig and pkgconfig.
PR:		178313
Submitted by:	Kimmo Paasiala <kpaasial@gmail.com>
2013-06-01 16:47:48 +00:00
Matthias Andree
2165191209 - Backport fix for CVE-2013-2061 to openvpn22 and openvpn20;
while it is unclear whether it affects OpenSSL-builds at all.
  Let's play it safe.
- Reference CVE-2013-2061 name in OpenVPN's VuXML entry
- Mark 2.0.9_4 <= openvpn < 2.1.0 and 2.2.2_2 < openvpn < 2.3.0 not vulnerable
- Mark openvpn22 deprecated and to expire 2013-09-01.
  (openvpn20 is already marked to expire 2013-07-11.)

Security:	CVE-2013-2061
Security:	92f30415-9935-11e2-ad4c-080027ef73ec
2013-06-01 16:47:41 +00:00
Sergey A. Osokin
51baf2cb66 Document passenger vulnerability. 2013-06-01 08:08:56 +00:00
Matthias Andree
c8d0576046 Update to new upstream release
2013.05.31 -- Version 2.3.2
Arne Schwabe (3):
      Only print script warnings when a script is used. Remove stray mention of script-security system.
      Move settings of user script into set_user_script function
      Move checking of script file access into set_user_script

Davide Brini (1):
      Provide more accurate warning message

Gert Doering (2):
      Fix NULL-pointer crash in route_list_add_vpn_gateway().
      Fix problem with UDP tunneling due to mishandled pktinfo structures.

James Yonan (1):
      Always push basic set of peer info values to server.

Jan Just Keijser (1):
      make 'explicit-exit-notify' pullable again

Josh Cepek (2):
      Fix proto tcp6 for server & non-P2MP modes
      Fix Windows script execution when called from script hooks

Steffan Karger (2):
      Fixed tls-cipher translation bug in openssl-build
      Fixed usage of stale define USE_SSL to ENABLE_SSL

svimik (1):
      Fix segfault when enabling pf plug-ins
2013-05-31 23:06:39 +00:00
Lev A. Serebryakov
976ab3f623 Update subversion ports to 1.7.10 and 1.6.23.
It fixes 3 security issues:

    CVE-2013-1968: fsfs repository corruption caused by newline characters in filenames
    CVE-2013-2088: contrib hook-scripts can allow arbitrary code execution
    CVE-2013-2112: svnserve remotely triggerable DoS.

Security:	CVE-2013-1968
Security:	CVE-2013-2088
Security:	CVE-2013-2112
2013-05-31 21:41:55 +00:00
Renato Botelho
bc85228263 Update to 20130531 2013-05-31 15:54:30 +00:00
Martin Wilke
f812dffb52 - Do not try to remove dirs. not created by the port
Reported by:	pkg (DEVELOPER_MODE)
2013-05-31 14:45:46 +00:00
Martin Wilke
58dded840a - Do not try to remove dirs. not created by the port
- Trim header

Reported by:	pkg (DEVELOPER_MODE)
2013-05-31 14:43:45 +00:00
Chris Rees
9aa023d98b Actually remove bitchx-devel and add a VuXML entry.
Security:	CVE-2007-4584
Security:	CVE-2007-5839
Security:	CVE-2007-5922
2013-05-31 11:33:41 +00:00
Andrej Zverev
7a98b659fc - Trim Makefile header
- Remove unnecessary depend on PERL_LEVEL < 5.12

PR:		ports/178921
Submitted by:	az
Approved by:	maintainer
2013-05-30 17:53:04 +00:00
Chris Rees
2ebcb999ae This CPython extension provides Python bindings for cracklib.
It contains a pythonic interface to cracklib's functions and
some Python convenience functions.

WWW: https://pypi.python.org/pypi/cracklib
2013-05-30 16:07:21 +00:00
Rene Ladan
1759b37af1 - Finish removal of support for Linux 2.4 in bsd.linux-apps.mk and
bsd.linux-rpm.mk.  The default linux version is now Fedora 10.
- Remove now obsolete checks for Linux 2.4 in emulators/linux_base-c6,
  emulators/linux_base-f10, and emulators/linux_dist-gentoo-stage3.
  While there, remove superfluous -p argument from ${MKDIR}.
- Remove now obsolete check for Linux 2.4 or FreeBSD 6 and lower from
  astro/google-earth.
- Remove expired Fedora Core 4 ports which were only used on FreeBSD 7
  and below.
- Update LEGAL and MOVED

PR:		ports/176877
Submitted by:	myself
Approved by:	portmgr (bapt)
Exp-run by:	bapt
2013-05-30 09:11:52 +00:00
David Thiel
462a773f89 Update silktools to 2.5.0. 2013-05-29 19:43:10 +00:00
Martin Wilke
eabfefee87 Keyczar is an open source cryptographic toolkit designed to make it easier and
safer for developers to use cryptography in their applications. Keyczar supports
authentication and encryption with both symmetric and asymmetric keys. Some
features of Keyczar include:

* A simple API
* Key rotation and versioning
* Safe default algorithms, modes, and key lengths
* Automated generation of initialization vectors and ciphertext signatures
* Java, Python, and C++ implementations
* International support in Java (Python coming soon)

Keyczar was originally developed by members of the Google Security Team and is
released under an Apache 2.0 license.

WWW: http://www.keyczar.org/

PR:		ports/179025
Submitted by:	Douglas Thrift <douglas@douglasthrift.net>
2013-05-29 00:36:46 +00:00
Martin Wilke
ed807b4a4b SecretService provides a way to securely storing passwords and other secrets in
Python.

It uses DBus Secret Service API that is supported by GNOME Keyring (>= 2.30) and
KWallet (>= 4.8).

It allows to create new passwords, delete and search for passwords matching
given attributes. It also supports graphical prompts when unlocking is needed.

WWW: http://pypi.python.org/pypi/SecretStorage

PR:		ports/179026
Submitted by:	Douglas Thrift <douglas@douglasthrift.net>
2013-05-29 00:35:48 +00:00
Brendan Fabeny
e80e131996 Update math/R to 3.0.1-patched, and adjust dependent ports;
synchronize math/rpy with upstream repository

Reviewed by:	wen
Approved by:	wen, tota
2013-05-28 15:15:05 +00:00
Jase Thew
2b8774d2ca - Document znc null pointer dereference vulnerability. 2013-05-28 14:23:29 +00:00
Baptiste Daroussin
38c9861c42 Fix build with clang
While here convert NOPORTDOCS -> PORT_OPTIONS:MDOCS
Trim headers
2013-05-27 13:20:35 +00:00
Baptiste Daroussin
d94900c472 Mark as broken: does not build
nasl_crypto.c:25:10: fatal error: 'openssl/md2.h' file not found
2013-05-27 10:15:47 +00:00
Ganael LAPLANCHE
254bd71ee3 Update to 1.19 2013-05-27 09:28:45 +00:00
Baptiste Daroussin
6e82bab500 Fix plist 2013-05-27 09:28:00 +00:00
Chris Rees
88ec2acd44 Remove duplicate LICENSE line. 2013-05-27 08:16:01 +00:00
Emanuel Haupt
eb7bd354ae Adjust range for socat entry. 2013-05-27 00:41:56 +00:00
Emanuel Haupt
4a3aabf8d2 Document socat FD leak vulnerability.
Security:	CVE-2013-3571
2013-05-26 22:01:38 +00:00
Steve Wills
0cb9be9c5b - Add entry for ruby 1.9.3p429 2013-05-26 20:34:16 +00:00
Cy Schubert
25d82f9122 Fix build when usng clang. 2013-05-26 17:10:31 +00:00
Xin LI
182f4c58cd Document couchdb XSS vulnerability.
PR:		ports/178985
Submitted by:	wollman
2013-05-26 08:38:26 +00:00
Bryan Drewery
ef47aef18c - Update and re-add KERB_GSSAPI gsskex patch.
I did very minor porting of the upstream patch to make
  it apply.
  Note that this currently does not build with base heimdal, but
  does build with port MIT or port HEIMDAL.
- Bump PORTREVISION in case someone built the update, expecting
  this option to work and now have a broken ssh.

PR:		ports/178885
Reported by:	Garrett Wollman <wollman@csail.mit.edu>
2013-05-25 16:44:00 +00:00
Sunpoet Po-Chuan Hsieh
1817b62215 - Remove outdated PERL_LEVEL check
- Cleanup Makefile header
- While I'm here, add LICENSE

PR:		ports/178923
Submitted by:	az
2013-05-25 08:14:36 +00:00
Andrej Zverev
159ed5ba82 - Trim Makefile header
- Remove unnecessary depend on PERL_LEVEL < 5.12
- Drop maintainership per maintainer request

PR:		ports/178926
Submitted by:	az
Approved by:	Victor Popov <v.a.popov@gmail.com> (maintainer)
2013-05-25 05:40:00 +00:00
Baptiste Daroussin
0cb6d71751 Fix typo 2013-05-24 14:02:52 +00:00
Niclas Zeising
e6040fecaf Mark as broken on FreeBSD >= 900007, does not build with utmpx.
Submitted by:	xorg exp-run
Approved by:	portmgr (bapt)
2013-05-24 13:47:55 +00:00
Niclas Zeising
2cea1286b0 Chase the c-ares shlib bump. [1]
Fix plist by adding localized man pages.
Bump portrevision.
Trim makefile headers

Submitted by:	xorg exp-run [1]
Approved by:	portmgr (bapt)
2013-05-24 13:16:49 +00:00
Andrej Zverev
dfd33acdf2 - Trim Makefile header
- Remove unnecessary depend on PERL_LEVEL < 5.12
2013-05-24 09:11:48 +00:00
Florian Smeets
b645bdcbbf Update to 2.17.1 as the 2.18 release was postponed / cancelled 2013-05-23 15:30:07 +00:00
Carlo Strub
30ee8e1d18 Fix entry date, wrongly entered in revision 318453 2013-05-23 08:20:48 +00:00
Carlo Strub
261b3bc55f fix typo in recent otrs vulnerability 2013-05-23 08:02:56 +00:00
Carlo Strub
20adf54dfa Add vulnerabilities
Security:	CVE-2013-2637
		CVE-2013-3551
2013-05-23 07:58:57 +00:00
Matthew Seaman
6306a2c58c Security Updates
- www/rt40 to 4.0.13
   - www/rt38 to 3.8.17 [1]

This is a security fix addressing a number of CVEs:

    CVE-2012-4733
    CVE-2013-3368
    CVE-2013-3369
    CVE-2013-3370
    CVE-2013-3371
    CVE-2013-3372
    CVE-2013-3373
    CVE-2013-3374

Users will need to update their database schemas as described in
pkg-message

Approved by:	flo [1]
Security:	3a429192-c36a-11e2-97a9-6805ca0b3d42
2013-05-23 07:24:40 +00:00
Jason Helfman
2a8fb99db4 - adoption of optionsNG
Approved by:	portmgr (miwi)
2013-05-23 02:19:02 +00:00
Dmitry Marakasov
110a55d43b - Trim Makefile header
- OptionsNG
2013-05-23 02:04:46 +00:00
Bryan Drewery
97ceaf35a1 - Fix sshd crash when not using HPN
This was due to not including the canohost.h header for our
  base customization to respect class login restrictions. I had
  missed this as I was only tested with the default (HPN enabled)
  which already was including this header.

Reported by:	runelind in ##freenode
Tested by:	runelind, myself
Reported by:	Krzysztof Stryjek
2013-05-23 00:30:30 +00:00
Xin LI
38fdae7228 Update to 5.6.2. 2013-05-22 22:51:57 +00:00
Xin LI
4fa5971018 This changeset fixes two issues with crypto++ library:
* patch-misc.h

   This fixes a warning triggered by testing an unsigned parameter against
   0.  The patch solves this by creating a different template for signed
   case.

 * patch-nbtheory.cpp

   This is a workaround for a bug with the current version of libc++ shipped
   with FreeBSD 9.x, which causes an infinite loop when generating RSA key,
   possibly also other operations.

PR:		ports/178827
Submitted by:	Michael Gmelin <freebsd grem de>
2013-05-22 22:41:42 +00:00
Guido Falsi
6dfcd07f9a Copy botan port to new port for botan 1.10 which can coexist with
the old port.

PR:		ports/178812
Submitted by:	Lapo Luchini <lapo@lapo.it> (maintainer of security/botan)
2013-05-22 18:07:53 +00:00
Anton Berezin
5e0f2a6e25 Update to 2.17.
Changes:	http://search.cpan.org/dist/Crypt-Twofish/Changes
2013-05-22 09:25:12 +00:00
Rene Ladan
a729270e30 Fix vuxml by using the correct format for CVE names.
Prodded by:	bz on IRC
2013-05-22 09:14:17 +00:00
Philippe Audeoud
85ceb6de10 - Update to 1.17 2013-05-22 08:48:30 +00:00
Rene Ladan
3b313dc9e6 List vulnerabilities fixed in www/chromium 27.0.1453.93 (which is the
current version in the Ports Collection).
2013-05-22 08:45:10 +00:00
Josh Paetzel
ff5fe33a5e Update to latest snapshot
PR:	ports/178814
Submitted by:	Eric F Crist <ecrist@secure-computing.net>
Sponsored by:	Claimlynx
2013-05-21 23:32:54 +00:00
Bryan Drewery
342bde1646 Mark BROKEN as I have received 2 separate reports
of crashing.
2013-05-21 22:29:07 +00:00
David Thiel
4cc48dd134 Update to 3.0.12. Changes:
- A bug has been fixed that could cause a slow and steady increase of memory
  usage

- Negated conditionals in the config file are handled correctly now
2013-05-21 18:36:01 +00:00
Mikhail Teterin
a4d51a600a Refactor the replay code to fix the reported vulnerability -- simply use mmap()
instead of a buffer.

Bump PORTREVISION.

While here, fix warnings -- well enough for gcc48 to be happy with ``-Wall -W''.

Approved by:	maintainer timeout (since February).
2013-05-21 16:29:19 +00:00
Jun Kuriyama
092bfd2a41 - Upgrade to 0.34. 2013-05-21 14:57:43 +00:00
William Grzybowski
9517c37109 - Do not install COPYING, LICENSE is already defined [1]
- While I'm here rephrase COMMENT [2]

Submitted by:	danfe [1], culot [2] (via email)
Approved by:	culot (mentor)
2013-05-21 11:55:16 +00:00
William Grzybowski
4b910b1351 - Do not mute install command
- Use LICENSE knob and do not install COPYRIGHT

Submitted by:	danfe (via email)
Approved by:	culot (mentor)
2013-05-21 11:51:55 +00:00
William Grzybowski
6d6f5a815c - Update to 0.4.1
Changes: https://github.com/jedisct1/libsodium/blob/8cb86026/NEWS

PR:		ports/178259
Submitted by:	csosstudy <csosstudy@gmail.com> (maintainer)
Approved by:	culot (mentor)
2013-05-20 10:30:45 +00:00
William Grzybowski
b8470425cc - Update to 0.7.3.1
- Pass maintainership to submitter
- Remove leading article from COMMENT

Changes:
http://sourceforge.net/p/pam-pgsql/code/ci/46a971d5/tree/CHANGELOG

PR:		ports/178334
Submitted by:	Berend de Boer <berend@pobox.com>
Approved by:	culot (mentor)
2013-05-20 10:29:45 +00:00
Raphael Kubo da Costa
00093d96e5 Patch multiple vulnerabilities in x11-toolkits/plib.
PR:		ports/178710
Submitted by:	Denny Lin <dennylin93@hs.ntnu.edu.tw>
2013-05-19 14:06:36 +00:00
Raphael Kubo da Costa
b1b1116c67 - Update to 0.7.4
- Add VuXML entry
- Trim Makefile header
- Add LICENSE

PR:		ports/177206
Submitted by:	Alexander Milanov <a@amilanov.com>
Approved by:	Thomas Hurst <tom@hur.st> (maintainer)
Security:	a8818f7f-9182-11e2-9bdf-d48564727302
2013-05-18 20:35:07 +00:00
Max Brazhnikov
250a3e24d3 KDE/FreeBSD team presents KDE SC 4.10.3 ports!
- Remove patches and checks for unsupported FreeBSD versions.

The area51 repository features commits by avilla, rakuco and myself.
2013-05-18 20:34:41 +00:00
Ryan Steinmetz
4660f9544f - Update to 4.99 2013-05-18 18:25:58 +00:00
Bryan Drewery
ac9ad08ef2 - Update to 6.2p2
- The LPK patch has been updated but is obsolete, deprecated and
  untested. It has been replaced by AuthorizedKeysCommand
- The upstream HPN's last update was for 6.1 and is mostly
  abandoned. The patch has had bugs since 5.9. I have reworked
  it and split into into HPN and AES_THREADED options. The
  debugging/logging part of the patch is incomplete. I may
  change the patch to more closely match our base version
  eventually.
- The KERB_GSSAPI option has been removed as the patch has not
  been updated by upstream since 5.7
- sshd VersionAddendum is currently not working as intended;
  it will be fixed later to allow removing the port/pkg version.
- Update our patchset to match latest base version
- Bring in ssh-agent -x support from base
- I incrementally updated the port from 5.8 up to 6.2p2 along
  with patches. You can find all of the versions at
  https://github.com/bdrewery/openssh

Changes:
    http://www.openssh.com/txt/release-5.9
    http://www.openssh.org/txt/release-6.0
    http://www.openssh.org/txt/release-6.1
    http://www.openssh.org/txt/release-6.2
    http://www.openssh.org/txt/release-6.2p2
2013-05-17 19:47:35 +00:00
Bryan Drewery
c56d4773a5 - Bring in r199804 and r206397 from base to avoid killing sshd in
high-pressure swapping environments
2013-05-17 14:36:34 +00:00
Bryan Drewery
86f302336e - Remove copyright as it was a base customization that was removed in
base r213250
2013-05-17 14:16:10 +00:00
Bryan Drewery
b3a7b6b7c2 - Remove CHROOT option and patch. ChrootDirectory was added in 5.0
to achieve the same thing.
2013-05-17 13:56:29 +00:00
Xin LI
0a7fd89016 Update the recent nginx entry to cover the exact version range and include
information for CVE-2013-2070.
2013-05-16 22:46:38 +00:00
Chris Rees
2c783ac500 Use explicit IP for localhost rather than DNS name; this causes ipv6 attempts
PR:		ports/155788
Submitted by:	System Administrator <root@naboo.vindaloo.com>

Pass flag to mount to disable lockd

PR:		ports/137378
Submitted by:	kib
2013-05-16 18:22:08 +00:00
Martin Wilke
29aaee5b66 - Fix plist
- Trim header

Reported by:	poudriere exp-run
2013-05-16 09:43:52 +00:00
Martin Wilke
fb5f2ba83a - Fix plist
- Trim header

Reported by:	poudriere exp-run
2013-05-16 08:39:00 +00:00
David E. O'Brien
c476b2ec7c Add license info. 2013-05-16 05:29:15 +00:00
Eitan Adler
51f436b626 Update to the latest version of Adobe Flash 2013-05-16 04:14:30 +00:00
Alexey Dokuchaev
d25e552bfe Update to version 3.5.0. 2013-05-16 03:56:29 +00:00
Florian Smeets
ba05efc063 - update firefox to 21.0
- update firefox-esr and thunderbird to 17.0.6
- WEBRTC now supports PULSEAUDIO
- make linux-firefox work with plugins again (e.g. quakelive)

Security:		4a1ca8a4-bd82-11e2-b7a0-d43d7e0c7c02
In collaboration with:	Jan Beich <jbeich@tormail.org>
2013-05-16 02:00:38 +00:00
Ryan Steinmetz
156910ed5b - Bump PORTREVISION after dns/c-ares update 2013-05-15 19:58:55 +00:00
Chris Rees
ef6baa3596 security/cfs: Resurrect and maintain CFS.
The referenced security issues have been fixed in this version (1.5.0 beta), and
some small bugs have been found too, with many fixes from Debian's Gerrit Pape.

Obtained from:	Debian (parts)
Security:	CVE-2002-0351
Security:	CVE-2006-3123
2013-05-15 17:29:33 +00:00
Sergey A. Osokin
8651adfa36 Update ranges according latest available information.
Source:	http://mailman.nginx.org/pipermail/nginx-announce/2013/000114.html
2013-05-14 07:15:24 +00:00
Martin Wilke
84c3f93d99 - Convert to PEAR_AUTOINSTALL
- Trim header
- Take maintainership
2013-05-13 14:32:20 +00:00
Martin Wilke
d989e04f27 - Convert to PEAR_AUTOINSTALL
- Trim header
2013-05-13 09:56:24 +00:00
Martin Wilke
65f30985a7 - Convert to PEAR_AUTOINSTALL
- Trim header
2013-05-13 09:50:05 +00:00
Martin Wilke
7c21248ca7 - Convert to PEAR_AUTOINSTALL
- Trim header
2013-05-13 09:41:13 +00:00