Commit graph

16779 commits

Author SHA1 Message Date
Wesley Shields
f184505469 Remove the header for ports I created.
For dns/openresolv give proper attribution. This was a copy/paste
mistake the submitter made, which incorrectly gave me attribution
for that file. I did not create it.
2012-12-12 18:48:33 +00:00
Martin Matuska
cd4b5e26f1 Update horde4 packages and applications to horde5 2012-12-12 15:16:56 +00:00
Martin Matuska
2de04ae6e0 Horde Blowfish Encryption Library
Provides blowfish encryption/decryption for PHP string data.

WWW: http://pear.horde.org
2012-12-12 14:47:15 +00:00
Martin Matuska
1e429944f9 Rename old horde applications to horde3- prefix 2012-12-12 12:24:01 +00:00
Rene Ladan
589167d795 Document vulnerabilities in www/chromium < 23.0.1271.97
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
2012-12-12 11:33:16 +00:00
Philippe Audeoud
50dcaee433 - Update to 1.81
- Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.81/Changes
2012-12-12 10:22:06 +00:00
Hajimu UMEMOTO
c45d2ef830 Commit the patch that was forgotten when my
previous commit.

Pointy hat to:	ume
2012-12-11 04:14:37 +00:00
Martin Matuska
b2c4fbb77a Update PCRE to 8.32
Introduces the UTF-32 library pcre32
Bump PORTREVISION in dependent ports
2012-12-10 19:11:11 +00:00
Hajimu UMEMOTO
dda3fab6a5 Update cyrus-sasl2 to 2.1.26.
This bumps shlib version of libsasl2.
2012-12-10 15:10:02 +00:00
Baptiste Daroussin
9c526f7217 Decommissioning java 1.5 (EOLed since October 2009):
suppress any reference to JAVA_VERSION=	1.5+ (part3)
2012-12-10 13:43:43 +00:00
Tilman Keskinoz
9f89d797c8 Update to 1.4.21 2012-12-10 12:10:01 +00:00
Beech Rintoul
f973eabeb0 - Fix build with clang
- Add option for GTK2 support
- Support PLIST_FILES

PR:		ports/174157
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
2012-12-10 08:51:51 +00:00
Alex Kozlov
23fc6f5485 - Convert Makefile headers to new style
- Don't hardcode PORTVERSION in DISTNAME
- Convert to PLIST_FILES
- Fix build with clang

PR:	ports/174205 (based on)
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
2012-12-10 05:32:00 +00:00
Eitan Adler
a52b1a298c Revert Chris Petrik's ports to the pool. Thank you for all your work so far, and should you desire to return just let us know.
PR:		ports/174309
Submitted by:	Chris Petrik
2012-12-10 01:20:16 +00:00
Tom Judge
9aa3fca8d5 Upgrade to 4.43
Changes: http://clamtk.sourceforge.net/CHANGES

Feature safe:	yes
Approved by:	eadler, db (mentors, implicit)
2012-12-09 06:05:36 +00:00
Beech Rintoul
3cb3192a5a - Update MASTER_SITES
- Fix build with clang
- Support CFLAGS properly
- Support PLIST_FILES
Feature safe: yes

PR:		ports/174200
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
2012-12-07 17:03:31 +00:00
Ryan Steinmetz
cf9bd998c7 - Reset MAINTAINER on ports with addresses that have unrecoverable bounces.
Reported by:	portscout
Feature safe:	yes
2012-12-06 16:39:07 +00:00
Kevin Lo
72aa8a0002 Add missing patch.
Feature safe:	yes
2012-12-06 01:59:29 +00:00
Ryan Steinmetz
69ba078f35 - Fix recent vulnerability entry for www/tomcat[67]
Reported by:	Victor Balada Diaz <victor@bsdes.net>
Feature safe:	yes
2012-12-05 23:52:35 +00:00
Bryan Drewery
cf84cfcb04 - Update mirror site for HPN patch
Feature safe:	yes
2012-12-05 22:32:29 +00:00
Ryan Steinmetz
2705e94e03 - Document recent vulnerabilities in www/tomcat6 and www/tomcat7
Requested by:	Victor Balada Diaz <victor@bsdes.net>
Feature safe:	yes
2012-12-05 18:47:24 +00:00
Jason Helfman
511e990ef3 - update to 1.10, trim historical header
- adopt optionsNG and general cleanup

PR:             174137 (based on)
Submitted by:   maintainer, dev2@heesakkers.info
Approved by:    maintainer
Feature safe:	yes
2012-12-05 18:26:50 +00:00
Alex Dupre
54b0cbfde4 Update to 0.13.0 release.
Feature safe:	yes
2012-12-05 10:22:18 +00:00
Erwin Lansing
f7345394fe Update to the latest patch level from ISC:
BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
  vulnerable to a software defect that allows a crafted query to
  crash the server with a REQUIRE assertion failure.  Remote
  exploitation of this defect can be achieved without extensive
  effort, resulting in a denial-of-service (DoS) vector against
  affected servers.

Security:	2892a8e2-3d68-11e2-8e01-0800273fe665
		CVE-2012-5688
Feature safe:	yes
2012-12-05 07:46:03 +00:00
Sunpoet Po-Chuan Hsieh
ab0aad4f10 - Update to 2.33
- Cleanup Makefile header

Changes:	http://search.cpan.org/dist/App-Genpass/Changes
Feature safe:	yes
2012-12-05 00:46:37 +00:00
Ryan Steinmetz
c4786a9368 - Reset MAINTAINER due to unrecoverable bounce
Reported by:	portscout
Feature safe:	yes
2012-12-04 20:39:22 +00:00
Ryan Steinmetz
62259d23d8 - Update to 2.9.4
Feature safe:	yes
2012-12-04 16:35:08 +00:00
Philippe Audeoud
0c2f06b959 - Update to 1.80
- Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.80/Changes

Feature safe:	yes
2012-12-04 09:46:24 +00:00
Ruslan Makhmatkhanov
86897a606e - update to 1.3.4
while here:
- trim Makefile header
- remove indefinite article from COMMENT

PR:		174095
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Feature safe:	yes
2012-12-04 08:38:48 +00:00
Matthias Andree
905a78cc66 Add URL for recent bogofilter heap vuln', CVE-2012-5468, aka. vuln vid=
f524d8e0-3d83-11e2-807a-080027ef73ec

Feature safe: yes
2012-12-03 22:49:42 +00:00
Ruslan Makhmatkhanov
f5731ed473 - revert PORTDOCS change from r308105 - it made this port not DOCS-safe
Reported by:	sunpoet
Feature safe:	yes
2012-12-03 21:07:36 +00:00
Matthias Andree
d8c09eec63 Update bogofilter to new upstream release 1.2.3.
Security update to fix a heap corruption bug with invalid base64 input,
reported and fixed by Julius Plenz, FU Berlin, Germany.

Feature safe:   yes
Security:       CVE-2012-5468
Security:       f524d8e0-3d83-11e2-807a-080027ef73ec
2012-12-03 20:16:21 +00:00
Ruslan Makhmatkhanov
06d9219644 - set explicit value for StartupNotify in DESKTOP_ENTRIES
Suggested by:	danfe
Feature safe:	yes
2012-12-03 06:46:25 +00:00
Kevin Lo
1f12fd1bad Update to 2.1.
Feature safe:	yes

PR:	ports/174016
Submitted by:	Paul Schmehl <pauls at utdallas dot edu>
2012-12-03 05:20:38 +00:00
Sofian Brabez
0ba0f1db67 - Update to 1.4.3
Feature safe:	yes
2012-12-02 17:12:51 +00:00
Ruslan Makhmatkhanov
910d4fde6e - pass maintainership to submitter
- add license (GPLv2)
- add desktop icon and make .desktop file
- update WWW

while here:
- trim Makefile header
- remove Author filed from pkg-descr

PR:		173978
Submitted by:	nemysis <nemysis@gmx.ch>
Feature safe:	yes
2012-12-02 13:11:25 +00:00
Ruslan Makhmatkhanov
1a08b304c1 - update to 1.11
- add new port options

PR:		174024
Submitted by:	Paul Schmehl <pauls@utdallas.edu> (maintainer)
Feature safe:	yes
2012-12-02 12:56:59 +00:00
Ruslan Makhmatkhanov
4bbecee287 - fix wording of "RUN_DEPENDS"
- use INSTALL_DATA to not set execution bit for plugins
- remove trailing whitespace in pkg-descr, while here

PR:		174047
Submitted by:	antoine (maintainer)
Feature safe:	yes
2012-12-02 12:24:40 +00:00
Ruslan Makhmatkhanov
b52aaee534 - correct displaying of pkg-message
while here:
- use one space in Created by:
- some whitespace aligning
- correct python versions in USE_PYTHON
- use PYDISTUTILS_PKGVERSION to set correct package version instead of crafting
  full PYDISTUTILS_EGGINFO
- remove trailin whitespace in pkg-descr and unneded newlines in pkg-message

PR:		174044
Submitted by:	Sayetsky Anton <vsjcfm@gmail.com>
Approved by:	Christoph Theis <theis@gmx.at> (maintainer)
Feature safe:	yes
2012-12-02 10:53:00 +00:00
Armin Pirkovitsch
e8646409cd - Update to version 6.01
- Add MASTER_SITES
- Add LICENSE

PR:           ports/170169
Submitted by: KATO Tsuguru <tkato432 _at_ yahoo.com>
              Chris Petrik <c.petrik.sosa _at_ gmail.com> (maintainer)
Approved by:  beat (mentor)
Feature safe: yes
2012-12-01 00:00:20 +00:00
Armin Pirkovitsch
1dcc6b441b - Update to version 3.3
- Update MASTER_SITES
- Add LICENSE
- Convert to optionsng

PR:           ports/170168
Submitted by: KATO Tsuguru <tkato432 _at_ yahoo.com>
Approved by:  beat (mentor)
Feature safe: yes
2012-11-30 23:50:42 +00:00
Baptiste Daroussin
b4f9e6a392 Fix compilation with clang on head
Feature safe:	yes
2012-11-30 10:47:14 +00:00
Rene Ladan
c68f649d19 Document vulnerabilities in www/chromium < 23.0.1271.95
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-11-30 09:13:32 +00:00
Sofian Brabez
2cfaf1eaf0 The Volatility Framework is a completely open collection of tools, implemented
in Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples.

WWW: http://code.google.com/p/volatility

PR:		ports/172910
Submitted by:	antoine@FreeBSD.org
Feature safe:	yes
2012-11-29 20:51:45 +00:00
Olli Hauer
ef2bdd9595 www/yahoo-ui
- fix CVE-2012-5881

security/vuxml
 - adjust version (we have only 2.8.2 in the tree)

Feature safe: yes

Approved by:	glarkin (maintainer) explicit
2012-11-29 20:33:19 +00:00
Pawel Pekala
790e08b68e Supplemental plugins for Harlan Carvey's RegRipper.
WWW: http://code.google.com/p/regripperplugins/

PR:		ports/172900
Submitted by:	antoine@FreeBSD.org
Feature safe:	yes
2012-11-29 19:31:26 +00:00
Pawel Pekala
151da04dcc RegRipper is an open source tool, written in Perl, for extracting/parsing
information (keys, values, data) from the Registry and presenting it for
analysis.

WWW: http://code.google.com/p/regripper/

PR:		ports/172899
Submitted by:	antoine@FreeBSD.org
Feature safe:	yes
2012-11-29 19:30:25 +00:00
Frederic Culot
9e0da3c3e9 - Update to 0.46
Changes:	http://search.cpan.org/dist/GnuPG-Interface/ChangeLog
Feature safe:	yes
2012-11-29 17:33:35 +00:00
Wesley Shields
ff9560f056 Fix date in yahoo-ui entry.
Noticed by:	dvl@
Feature safe:	yes
2012-11-28 14:37:24 +00:00
Baptiste Daroussin
44ab5cf477 2012-11-28 editors/glimmer: Depends on the expired gtkglarea through py-gtk
2012-11-26 palm/txt2pdbdoc: No more public distfiles
2012-11-26 sysutils/xloadface: No more public distfiles
2012-11-26 shells/gscommander: Abandonware
2012-11-26 security/saferpay: No more public distfiles
2012-11-26 x11-wm/qvwm: No more public distfiles

Feature safe:	yes
2012-11-28 08:00:54 +00:00