Commit graph

15543 commits

Author SHA1 Message Date
Wesley Shields
7ee4cdd7a5 Don't wrap a couple of lines. No other entries wrap these lines, so when
in Rome...
2011-12-26 23:23:28 +00:00
Wesley Shields
0e8197912e Whitespace cleanup in a BIND topic. 2011-12-26 23:00:58 +00:00
Wesley Shields
24f6ed61e1 Fix the build. Missing a quote on the blockquote citation and a missing </p>. 2011-12-26 22:42:26 +00:00
Cy Schubert
d6f8fffb99 Document CVE-2011-4862 (FreeBSD-SA-11:08.telnetd) as it affects krb5-appl too.
Security:	CVE-2011-4862, FreeBSD-SA-11:08.telnetd
Feature safe:	yes
2011-12-26 21:51:02 +00:00
Cy Schubert
bec162cca7 Fix when an encryption key is supplied via the TELNET protocol, its length
is not validated before the key is copied into a fixed-size buffer.

Security:	FreeBSD-SA-11:08.telnetd, CVE-2011-4862
Feature safe:	yes
2011-12-26 21:38:58 +00:00
Wesley Shields
05c123b55c Switch to using bsd.port.options.mk and remove unnecessary assignments.
While here, be explicit with RUN_DEPENDS (pet pet portlint).

PR:		ports/162754
Submitted by:	Matthew Seaman <m.seaman@infracaninophile.co.uk>
Approved by:	miwi@ (maintainer timeout)
2011-12-25 19:34:40 +00:00
Xin LI
d203068125 Add vuxml entry for proftpd chroot vulnerability.
Feature safe:	yes
2011-12-23 20:37:32 +00:00
Philip M. Gollucci
ac5f8249b5 - I meant LIBDIR not SITELIBDIR
Pointhat to:	myself
2011-12-23 18:23:50 +00:00
Michael Scheidell
ffb8909855 - Add USE_PERL5_BUILD
PR:		ports/163414
Submitted by:	portmgr (pav)
Approved by:	gabor (mentor)
2011-12-23 12:52:28 +00:00
MANTANI Nobutaka
51765b0dc4 Update to 0.62. 2011-12-23 12:26:49 +00:00
Michael Scheidell
746a25f1ed - openssh-portable needs perl to build (reported by Gleb Smirnoff via mail)
- add ssh_engine.5 man page when openssh-portable WITH_X509 is turned on (reported by John Hein via mail)

PR:		ports/163414
Submitted by:	Grzegorz Blach <magik@roorback.net>
Approved by:	gabor (mentor)
2011-12-23 12:24:23 +00:00
Li-Wen Hsu
6ae8556778 - Update to 1.2.2 2011-12-23 03:19:51 +00:00
Ruslan Makhmatkhanov
8c626e0923 - Add fifth portion of dependencies needed for Plone 4 import.
Approved by:   novel (mentor)
2011-12-22 14:38:23 +00:00
Ryan Steinmetz
c0e6f29158 - Document recent vulnerabilities in databases/phpmyadmin (PMASA-2011-19 and PMASA-2011-20) 2011-12-22 12:11:16 +00:00
Mark Linimon
52e72117b2 Mark broken on tier-2: fails to link.
Hat:		portmgr
2011-12-22 10:54:25 +00:00
Sunpoet Po-Chuan Hsieh
b44b3c35ca - Add p5-CACertOrg-CA 20110724.001
CACertOrg::CA provides a copy of Certificate Authority certificate for
CACert.org. This is the Class 1 PKI Key.

sha1 13:5C:EC:36:F4:9C:B8:E9:3B:1A:B2:70:CD:80:88:46:76:CE:8F:33
md5  A6:1B:37:5E:39:0D:9C:36:54:EE:BD:20:31:46:1F:6B

WWW: http://search.cpan.org/dist/CACertOrg-CA/
2011-12-21 12:47:47 +00:00
Beat Gaetzi
02b26392e0 - Also fix SeaMonkey version range 2011-12-21 12:40:43 +00:00
Beat Gaetzi
3f104f9eef - Fix cvename in latest mozilla vulnerability 2011-12-21 11:28:36 +00:00
Beat Gaetzi
0533572d51 - Document mozilla -- multiple vulnerabilities 2011-12-21 07:48:50 +00:00
Philip M. Gollucci
98205ee04c - Update 2.1.3 -> 2.1.4 2011-12-21 03:43:45 +00:00
David Thiel
15b743bb29 Update to 3.0.1.
Feature safe:	yes
2011-12-20 18:58:04 +00:00
Jason Helfman
d343539d3a move contributor address => jgh
Approved by:	crees (mentor)
2011-12-20 17:10:19 +00:00
Vsevolod Stakhov
6b3901cb2a - Remove expired security/p5-Digest-SHA256: use the builtin
Digest::SHA instead
2011-12-20 16:40:43 +00:00
Philip M. Gollucci
e9865872f1 - chef 0.10.8 requires ~> 0.10.8
so revert the last update
- set PORTEPOCH
2011-12-20 16:39:58 +00:00
Li-Wen Hsu
869f2d6bd1 - Remove explicit dependency in setup.py for python ./setup.py test
Requested by:	clsung
2011-12-20 06:31:36 +00:00
Philip M. Gollucci
e1e2a4516d - Update to 2.2.0
With Hat:       ruby@
Sponsored by:   RideCharge Inc. / TaxiMagic
2011-12-20 05:11:40 +00:00
Li-Wen Hsu
ab60de8b2d - Add missing dependency 2011-12-20 04:10:33 +00:00
Li-Wen Hsu
ee0c6512c4 Add py-ssh 1.7.11, python SSH2 protocol library. 2011-12-20 03:21:09 +00:00
Philip M. Gollucci
7832ddf953 - Point at the homepage consistently as defined by rubygems.org 2011-12-20 00:21:54 +00:00
Sergey Matveychuk
5a5fcfe6d8 unbound DoS vulnerability 2011-12-19 13:15:50 +00:00
Baptiste Daroussin
91b4ed8d8a Fix build on CURRENT using m4 -g instead of m4
Approved by:	johans
2011-12-18 22:47:56 +00:00
Baptiste Daroussin
c42ac35de4 use m4 -g instead of m4 to activate the gnu extension for m4, this fixes build on CURRENT 2011-12-18 22:30:35 +00:00
Ruslan Makhmatkhanov
9ebd3bc0cd - Add first portion of dependencies needed for Plone 4 import.
Submitted by:   rm (myself, via github)
Approved by:    novel (mentor)
2011-12-18 19:27:58 +00:00
Martin Wilke
270475ef65 - Cleanup
* correct line limit
	* sort cvename
2011-12-18 14:24:38 +00:00
Ryan Steinmetz
99c467dc89 - Correct package name in previous commit
Reported by:	crees@
2011-12-18 13:30:50 +00:00
Ryan Steinmetz
8acc3ea912 - Document vulnerabilities in www/typo3 and www/typo345 2011-12-18 13:07:02 +00:00
Alexey Dokuchaev
72fd1ce002 Limit PORTSCOUT version check to -jumbo releases and explain why. 2011-12-17 17:27:12 +00:00
Brendan Fabeny
dcf68404b1 update security/tor to 0.2.2.35 and security/tor-devel to 0.2.3.10-alpha
Security:	CVE-2011-2778
2011-12-17 13:21:42 +00:00
Mark Linimon
e2ec2feed5 Work around duplicate ruby 1.8/1.9 dependency if RUBY_VER is 1.9.
Discussed with:		pgollucci
2011-12-17 03:26:22 +00:00
Philip M. Gollucci
05959841a4 - Update to 1.1
PR:             ports/163365
Submitted by:   Scott Sanders <scott@jssjr.com>
With Hat:	ruby@
Approved by:    renchap@cocoa-x.com (maintainer, implicit required for chef-server)
Sponsored by:   RideCharge Inc. / TaxiMagic
2011-12-16 22:24:41 +00:00
Ryan Steinmetz
b0b4b44ed7 - Cleanup snortsam integration 2011-12-16 14:45:39 +00:00
Ruslan Makhmatkhanov
db836b18f5 - change USE_PYTHON to yes, because this port working
with any supported python version
- move pkg-plist into PLIST_FILES
- remove Author field from pkg-descr
- bump PORTREVISION because of dependencies change

PR:             163329
Submitted by:   rm (myself)
Approved by:    joris dedieu <joris.dedieu at gmail.com> (maintainer),
                miwi (mentor)
2011-12-16 10:26:11 +00:00
Alex Dupre
8aa17b99b8 Update to v11.12.13 release. 2011-12-15 14:04:37 +00:00
Frederic Culot
40fb36ae94 - Update to 20110113
PR:		ports/163298
Submitted by:	Nikos Ntarmos <ntarmos@cs.uoi.gr> (maintainer)
2011-12-15 07:58:49 +00:00
Ryan Steinmetz
b3b6b454d8 - Update to 2.9.2 2011-12-15 00:50:34 +00:00
Sunpoet Po-Chuan Hsieh
7e80fc7dff - Update to 5.70
- Add TEST_DEPENDS

Changes:	http://search.cpan.org/dist/Digest-SHA/Changes
2011-12-14 14:14:31 +00:00
Martin Matuska
38188e07b9 Update to 1.4.7 2011-12-14 11:12:54 +00:00
Martin Matuska
f90e8d2eaf Update to 1.1.0 2011-12-14 11:12:45 +00:00
Cy Schubert
4cb5bba3a9 PORTREVISION bump.
PR:		163272
Feature safe:	yes
2011-12-14 04:33:23 +00:00
Cy Schubert
9544f5eff2 Apply patch for MITKRB5-SA-2011-007, KDC null pointer dereference in TGS
handling.

PR:		163272
Submitted by:	zi
Security:	6c7d9a35-2608-11e1-89b4-001ec9578670
Feature safe:	yes
2011-12-14 04:31:21 +00:00
Ryan Steinmetz
a33e3e7600 - Document security/krb5 vulnerability as described in MITKRB5-SA-2011-007 2011-12-14 04:07:06 +00:00
Ryan Steinmetz
d002d8a42b - Add CVE for recent asterisk vulnerabilities
Feature safe:	yes
2011-12-14 03:52:27 +00:00
Ryan Steinmetz
a3e7045f16 - Bring back snortsam patches
- Do not bump PORTREVISION

PR:		ports/162740
Submitted by:	Michael Scheidell <scheidell@freebsd.org>
Feature safe:	yes
2011-12-14 00:58:26 +00:00
Xin LI
b5aed2f09a Document Opera multiple vulnerabilities.
Requested by:	tabthorpe
Feature safe:	yes
2011-12-13 20:35:31 +00:00
Rene Ladan
219c318d39 Document vulnerabilities fixed in Chromium 16.0.912.63
Security:	CVE-2011-[3903-3917]
2011-12-13 20:17:29 +00:00
Matthias Andree
1dd1de759f Add cvename tag with content CVE-2011-4607 for PuTTY password 'vulnerability'.
Feature safe: yes
Submitted by: eadler
2011-12-13 17:45:46 +00:00
Ryan Steinmetz
ff1d3e109e - Correct package name for asterisk18
Feature safe:	yes
2011-12-13 17:34:52 +00:00
Philippe Audeoud
e01aaffc95 - Update to 1.53
- Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.53/Changes

Feature safe:	yes
2011-12-13 08:12:07 +00:00
Matthias Andree
1450d5bdf8 Update PuTTY to new upstream security and bug fix release 0.62,
and add a new VuXML entry.

Changelog:      http://lists.tartarus.org/pipermail/putty-announce/2011/000017.html
Security:       bbd5f486-24f1-11e1-95bc-080027ef73ec
Feature safe:   yes
2011-12-12 19:57:18 +00:00
Sunpoet Po-Chuan Hsieh
a892fc1b05 - Update to 0.23
Changes:	http://search.cpan.org/dist/Crypt-OpenSSL-CA/Changes
Feature safe:	yes
2011-12-12 13:08:21 +00:00
Ruslan Makhmatkhanov
ae664a863e - update to 2.13.7
Approved by:   novel (mentor)
Feature safe:  yes
2011-12-12 13:01:12 +00:00
Martin Matuska
63d5c135dd Update to 1.0.6
Feature safe:	yes
2011-12-11 17:51:08 +00:00
Martin Matuska
2cfee1eaa6 Update to 1.4.6
Feature safe:	yes
2011-12-11 17:50:43 +00:00
Wen Heping
4579a192c2 - Update to 0.5.12
Feature safe:	yes
2011-12-11 09:50:09 +00:00
Matthias Andree
43f9536371 Revise OPTIONS wording.
Feature safe: yes
2011-12-11 03:18:10 +00:00
Brendan Fabeny
2c46fe3314 update and sort MASTER_SITES
Feature safe:	yes
2011-12-09 14:56:17 +00:00
Brendan Fabeny
a55a9be5de update to 0.2.3.9-alpha; update and sort MASTER_SITES
Feature safe:	yes
2011-12-09 14:50:59 +00:00
Philippe Audeoud
3f06d66b17 - Update to 1.52
- Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.52/Changes

Feature safe:	yes
2011-12-09 09:33:30 +00:00
Ryan Steinmetz
8107e23200 - Document asterisk vulnerabilities
Feature safe:	yes
2011-12-09 01:52:42 +00:00
Greg Larkin
f9e38e1568 - Updated to 1.3.14
ChangeLog: http://packages.debian.org/changelogs/pool/main/l/logcheck/logcheck_1.3.14/changelog

PR:		ports/162810
Submitted by:	Takefu <takefu@airport.fm>
Feature safe:	yes
2011-12-08 23:13:34 +00:00
Michael Scheidell
20b1281876 - Mark security/gpgme03 and security/cryptplug DEPRECATED and set EXPIRATION_DATE to 30 days from now.
- security/cryptplug has not been developed since 2003 and is not used by any other port in the ports tree. It is the last port depending on security/gpgme03.
- security/gpgme03 is an ancient version of GpgME (2003) and with cryptplug gone, no other ports need it. New ports should use security/gpgme instead.

PR:		ports/155200
Submitted by:	Jason E. Hale <bsdkaffee@gmail.com>
Approved by:	markun@onohara.to (maintainer)
Feature safe:	yes
2011-12-08 20:10:05 +00:00
Michael Scheidell
d8be07e9b6 -Update to 2.4
PR:		ports/162242
Submitted by:	Denis Generalov <gd@rambler-co.ru>
Approved by:	k@stereochro.me (maintainer timeout, 30 days), gabor (mentor)
Feature safe:	yes
2011-12-08 11:18:08 +00:00
Ganael LAPLANCHE
788d40dcf8 Update to 1.18.2
Feature safe:	yes
2011-12-08 07:27:36 +00:00
Ryan Steinmetz
c8137d6478 - Introduce multi-interface/instance support in rc script
PR:		ports/161286
Submitted by:	Michael Scheidell <scheidell@secnap.net>
Feature safe:	yes
2011-12-07 23:54:45 +00:00
Ryan Steinmetz
a6d2af5582 - Document vulnerabilities in isc-dhcp: CVE-2011-4539
Feature safe:	yes
2011-12-07 23:49:09 +00:00
Jun Kuriyama
75aaa3462e TLS/SSL proxy in front of the application creates a transparent
encryption tunnel.

WWW: http://search.cpan.org/dist/App-TLSMe/

Feature safe:	yes
2011-12-06 14:02:20 +00:00
Pav Lucistnik
a4ff3ba8b3 - Try to fix plist on 9.X
Reported by:	pointyhat
Feature safe:	yes
2011-12-05 17:38:45 +00:00
Michael Scheidell
8f76afd746 - upgrade to 1.8.13
- race condition could cause crashes
- upgrade to 1.8.12
- fixed memory leak (botan pr 144)
- added patch from upstream in repo for python portability issues

PR:	161167
Submitted by:	jreed@isc.org
Approved by:	maintainer (timeout), gabor (mentor)
Feature safe:	yes
2011-12-03 18:39:29 +00:00
Doug Barton
3f91066eab Update to version 3.4.8
This is the formal release of the fix to CVE-2011-4634, but there are
no code differences from the preliminary fixes released in 3.4.8-rc1
except for the updated version number.

PMSA-2011-18 has now been published; vuxml entry attached.

PR:		ports/163001
Submitted by:	Matthew Seaman <m.seaman@infracaninophile.co.uk> (maintainer)

Feature safe:	yes
2011-12-01 21:03:31 +00:00
Chris Rees
1364ce5160 Scannedonly is a samba VFS module and a scanning daemon that ensure that only
files that have been  scanned for viruses are visible and accessible to the end
user.

Scannedonly was developed because of scalability problems with samba-vscan: high
server loads when (the same) files were requested often, and timeouts when large
zip files were requested. Scannedonly doesn't have these problems, but it does
introduce some other issues.  Choose the product that suits you best.

Scannedonly is available under the open source GPL licence. The source code
repository is available on Sourceforge.

WWW: http://olivier.sessink.nl/scannedonly/

PR:		ports/154202
Submitted by:	girald@etcom.ufrgs.br
Feature safe:	yes
2011-12-01 20:01:57 +00:00
Ashish SHUKLA
8a00874141 - Update to 0.51
Feature safe:	yes
2011-12-01 13:15:46 +00:00
Ashish SHUKLA
da9a01198c - Update to 5.63
Feature safe:	yes
2011-12-01 13:14:23 +00:00
Johan van Selst
d9cbdb58d0 - Update gss to 1.0.2
- Touch doc/Makefile* to prevent unnecessary automake run

Feature safe:	yes
2011-11-30 21:00:31 +00:00
Pav Lucistnik
7bf2963adf - Add a link to a nice documentation in PH
Suggested by:	dougb
Feature safe:	yes
2011-11-30 09:31:35 +00:00
Pav Lucistnik
eae29d1b13 - Add a quick guide to adding a new entry to this unfriendly file
Feature safe:	yes
2011-11-30 08:45:12 +00:00
Cy Schubert
9fe263ae96 Fix build with GSSAPI under 9.0.
Approved by:	tabthorp (portmgr)
Feature safe:	yes
2011-11-30 04:03:15 +00:00
Roman Bogorodskiy
af7ccbde06 Update to 2.11.
Feature safe:	yes
2011-11-30 00:40:38 +00:00
Michael Scheidell
8bb636c5ee - pkg-plist had missing lines
PR:		161226
Approved by:	maintainer timeout gabor(mentor)
Feature safe:	yes
2011-11-29 22:39:55 +00:00
Michael Scheidell
a6acced551 - Submitter is now Maintainer
- There's one more commit after version 0.2 on github. After that, the
software discontinued. This version is adopted
  by Debian
  - added alocal/automake
  - Committed with changed (added IGNORE for FreeBSD < 8.x since libusb
1.0 is needed, see libfprint)

PR:		161225
Submitted by:	Zhihao Yuan <lichray@gmail.com>
Approved by:	ports (maintainer timeout) gabor (mentor)
Feature safe:	yes
2011-11-29 14:56:21 +00:00
Michael Scheidell
cb72cb1b9a - Submitter is now Maintainer
- There's one more commit after version 0.2 on github. After that, the software discontinued. This version is adopted
by Debian
- added alocal/automake
- Committed with changed (added IGNORE for FreeBSD < 8.x since libusb 1.0 is needed, see libfprint)

PR:		161225
Submitted by:	Zhihao Yuan <lichray@gmail.com>
Approved by:	ports (maintainer timeout) gabor (mentor)
Feature safe:	yes
2011-11-29 12:59:55 +00:00
Michael Scheidell
e9886a9452 - on some (amd64, 7.4 at least), return from successful system call
- was generating a 0x4700.  system calls sb short (0xff)
- this patch masks the 0xff bits only, and is safe for all disto
- Also sent upstream to author
- Maintainer Timeout

PR:		161383
Approved by:	urisso@bsd.com.br (maintainer timeout) gabor (mentor)
Feature safe:	yes
2011-11-29 12:47:07 +00:00
Sunpoet Po-Chuan Hsieh
b3d69bc506 - Update to 2.20
Changes:	http://search.cpan.org/dist/App-Genpass/Changes
Feature safe:	yes
2011-11-28 08:59:49 +00:00
Martin Wilke
27bc7dc133 - Update to 0.91
PR:		162788
Submitted by:	maintainer
Feature safe:	yes
2011-11-27 10:28:20 +00:00
Brendan Fabeny
5d57d97db9 update math/R to 2.14.0, math/R-cran-sp to 0.9-91, and adjust
dependent ports

Approved by:	linimon (portmgr), thierry, tota, wen
Feature safe:	yes
2011-11-27 07:02:15 +00:00
Brendan Fabeny
809641ac39 update to 0.2.3.8-alpha
Feature safe:	yes
2011-11-26 05:58:57 +00:00
Alex Dupre
c6b36a80cf Update to 1.10.4 release.
Feature safe:	yes
2011-11-25 14:25:30 +00:00
Martin Wilke
260cdab2ec - Respect CC/CFLAGS
PR:		162533
Submitted by:	Jan Beich <jbeich@tormail.net>
Approved by:	maintainer
Feature safe:	yes
2011-11-24 15:55:53 +00:00
Martin Matuska
aca4771437 Update to 1.4.5
Feature safe:	yes
2011-11-24 08:36:04 +00:00
Martin Matuska
250e35aa09 Update to 1.0.6
Feature safe:	yes
2011-11-24 08:35:54 +00:00
Greg Larkin
8f7496f7d8 - Applied the startup script patch from PR ports/161524 to the local
installation type [1]
- Streamlined the rc.d file to use fewer functions
- Added a precmd to the rc.d file to ensure the proper ownership on
  some queue files. OSSEC daemons don't properly chown them upon creation.
- Bumped PORTREVISION

Reported by:	Albert Gabas <agabas@astabis.com> (via email) [1]
Feature safe:	yes
2011-11-23 22:26:41 +00:00