Commit graph

207 commits

Author SHA1 Message Date
wiz
3dbeee8487 *: recursive bump for icu 74.1 2023-11-08 13:18:02 +00:00
wiz
90f4599de1 *: bump for openssl 3 2023-10-24 22:08:07 +00:00
wiz
34f4b776b4 wget: update to 1.21.4.
* Noteworthy changes in release 1.21.4 (2023-05-11)

** Document --retry-on-host-error in help text

** Increase read buffer size to 64k. This should speed up downloads on gigabit and faster connections

** Update deprecated option '--html-extension' to '--adjust-extension' in documentation

** Update gnulib compatibility layer.
   Fixes HSTS test failures on i686. (Thanks to Andreas Enge for ponting it out)
2023-05-16 20:33:01 +00:00
adam
b8410cfcaf revbump after textproc/icu update 2023-04-19 08:08:03 +00:00
wiz
dbe1a54e9d *: bump PKGREVISION for libunistring shlib major bump 2022-10-26 10:31:34 +00:00
wiz
8292204475 *: recursive bump for perl 5.36 2022-06-28 11:30:51 +00:00
wiz
1f465b371d wget: update to 1.21.3.
* Noteworthy changes in release 1.21.3 (2022-02-26)

** Fix computation of total bytes downloaded during FTP trasnfers (#61277)

** Add option to select TLS 1.3 on the command line

** Fix HSTS build issues on some 64-bit big-endian systems

** Hide password during status report in --no-verbose

** Remove a sprurious print statement that showed up even during --quiet

** Some more cleanups and bug-fixes
2022-03-08 08:37:17 +00:00
adam
b6d9bd86bc revbump for icu and libffi 2021-12-08 16:01:42 +00:00
nia
ab845b2028 net: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Not committed (merge conflicts...):

net/radsecproxy/distinfo

The following distfiles could not be fetched (fetched conditionally?):

./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz
./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch
./net/djbdns/distinfo djbdns-1.05-test28.diff.xz
./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch
./net/djbdns/distinfo djbdns-1.05-multiip.diff
./net/djbdns/distinfo djbdns-cachestats.patch
2021-10-26 11:05:20 +00:00
nia
5c85662953 net: Remove SHA1 hashes for distfiles 2021-10-07 14:41:10 +00:00
adam
5e7c36d9d2 revbump for boost-libs 2021-09-29 19:00:02 +00:00
wiz
55cb9eb48b wget: remove unused patch after update 2021-09-12 09:18:26 +00:00
wiz
51a4447b5c wget: update to 1.21.2.
* Noteworthy changes in release 1.21.2 (2021-09-07)

** Support for autoconf 2.71

** Fix a double free in FTP when using an absolute path

** Release tarballs no longer have a dependency on Python.

** --page-requisites will now also download links marked as "alternate
   stylesheet" or "icon"
2021-09-12 09:15:10 +00:00
wiz
6eae1297d5 *: recursive bump for perl 5.34 2021-05-24 19:49:01 +00:00
adam
da0a125726 revbump for boost-libs 2021-04-21 13:24:06 +00:00
schmonz
6be807873a Use the macro used elsewhere to fix build on at least macOS. Also
build-tested on CentOS 7 and Tribblix m24.
2021-01-14 16:31:00 +00:00
ryoon
8c9710d1ba wget: Update to 1.21.1
Changelog:
* Noteworthy changes in release 1.21.1 (2021-01-09)

** Fix compilation on MacOS and Solaris 9

** Resove bashism from configure.ac

** Fix a compilation warning on 32-bit systems
2021-01-12 12:04:46 +00:00
schmonz
832d6e1283 Instead of auto-choosing openssl if gnutls is not selected, use
PKG_OPTIONS_OPTIONAL_GROUPS and allow building with neither.
The default remains openssl.
2021-01-08 18:18:58 +00:00
schmonz
b95c48097d Apply upstream patch to fix compilation error on macOS and Solaris 9. 2021-01-08 16:14:55 +00:00
wiz
77b8ea0957 wget: remove patch for perl-5.18 2021-01-04 12:30:37 +00:00
wiz
b008963a17 wget: update to 1.21.
* Changes in Wget 1.21

** Improve the number of translated strings

** Remove all uses of alloca
   In some places the length of untrusted strings has been used, e.g.
   strings from the command line or from remote.

** Fix buffer overflows in progress bar code in some locales

** Fix two null pointer accesses

** Amend cookie file header to be recognized by the 'file' command

** Post Handshake Authentication for OpenSSL

** Require gettext version 0.19.3+

** Add configure flags --enable-fsanitize-ubsan, --enable-fsanitize-asan
   and --enable-fsanitize-msan for gcc and clang

** Make several smaller fixes, enhance fuzzing, enhance building
2021-01-04 12:27:41 +00:00
ryoon
2831546220 *: Recursive revbump from textproc/icu-68.1 2020-11-05 09:07:25 +00:00
wiz
00da7815c0 *: bump PKGREVISION for perl-5.32. 2020-08-31 18:06:29 +00:00
adam
6bd0c30da6 Revbump for icu 2020-06-02 08:22:31 +00:00
adam
d62c903eea revbump after updating security/nettle 2020-05-22 10:55:42 +00:00
adam
24daafa112 Recursive revision bump after textproc/icu update 2020-04-12 08:27:48 +00:00
wiz
f669fda471 *: recursive bump for libffi 2020-03-08 16:47:24 +00:00
rillig
b686dd9180 all: migrate several HOMEPAGEs to https
pkglint --only "https instead of http" -r -F

With manual adjustments afterwards since pkglint 19.4.4 fixed a few
indentations in unrelated lines.

This mainly affects projects hosted at SourceForce, as well as
freedesktop.org, CTAN and GNU.
2020-01-18 23:30:43 +00:00
jperkin
26c1bffc9f *: Recursive revision bump for openssl 1.1.1. 2020-01-18 21:48:19 +00:00
jperkin
510dbe5aae *: Remove USE_OLD_DES_API.
OpenSSL 1.1.1d no longer ships des_old.h, and the time for this being
necessary appears to be behind us.
2020-01-16 13:33:50 +00:00
rillig
eb3c2b436e net: align variable assignments
pkglint -Wall -F --only aligned --only indent -r

No manual corrections.
2019-11-03 11:45:28 +00:00
wiz
84e123ddd2 Bump PKGREVISIONs for perl 5.30.0 2019-08-11 13:17:48 +00:00
wiz
c30c5fbc0b *: recursive bump for nettle 3.5.1 2019-07-20 22:45:58 +00:00
leot
f6b63e4436 wget: Fix https:// handling with OpenSSL 1.1.1
Backport upstream commit 14e3712b8c39165219fa227bd11f6feae7b09a33
to fix https:// handling when openssl.cnf file is not found.

PKGREVISION++
2019-05-26 18:10:48 +00:00
gutteridge
e6f8e2e05f Update wget to 1.20.3, which fixes CVE-2019-5953
It appears that the buffer overflow issue referred to is the same in
both 1.20.2 and 1.20.3 (they had to fix the fix).

Upstream changelog:
* Changes in Wget 1.20.3

** Fixed a buffer overflow vulnerability

* Changes in Wget 1.20.2

** NTLM authentication will retry under certain cases

** Fixed a buffer overflow vulnerability
2019-04-07 09:02:00 +00:00
ryoon
6fc378bce9 Recursive revbump from textproc/icu 2019-04-03 00:32:25 +00:00
spz
40cb98f26e updating wget to 1.20.1, which fixes CVE-2018-20483
Upstream changelog:
   * Changes in Wget 1.20.1

   ** --xattr is no longer default since it introduces privacy issues.

   ** --xattr saves the Referer as scheme/host/port, user/pw/path/query/fragment
      are no longer saved to prevent privacy issues.

   ** --xattr saves the Original URL without user/password to prevent
      privacy issues.


   * Changes in Wget 1.20

   ** Add new option `--retry-on-host-error` to treat local errors as
      transient and hence Wget will retry to download the file after
      a brief waiting period.

   ** Fixed multiple potential resource leaks as found by static analysis

   ** Wget will now not create an empty wget-log file when running with
      -q and -b switches together

   ** When compiled using the GnuTLS >= 3.6.3, Wget now has support for TLSv1.3

   ** Now there is support for using libpcre2 for regex pattern matching

   ** When downloading over FTP recursively, one can now use the
      --{accept,reject}-regex switches to fine-tune the downloaded files

   ** Building Wget from the git sources now requires autoconf 2.63 or above.
      Building from the Tarballs works as it used to.
2019-02-10 19:49:58 +00:00
adam
16dd5de231 revbump after updating textproc/icu 2018-12-09 18:51:58 +00:00
bsiegert
b5e35e8ad7 Enable the psl option by default for wget.
Enabling the PSL is a good thing for security and privacy, as it protects
against all sorts of cookie shenanigans.

Bump revision.
2018-11-04 16:34:57 +00:00
wiz
93b46879c7 Recursive bump for perl5-5.28.0 2018-08-22 09:43:40 +00:00
bsiegert
22bda5bdc0 Add a "psl" option (off by default) to build wget with PSL.
This improves privacy by restricting cookies to a well-known list of
public suffixes.

We can consider turning that option on by default in the future.

Fixes PR pkg/53459.
2018-07-28 12:29:20 +00:00
wiz
3f01e60a5b wget: update to 1.19.5.
* Changes in Wget 1.19.5

* Fix cookie injection (CVE-2018-0494)

* Enable TLS1.3 with recent OpenSSL environment

* New option --ciphers to set GnuTLS / OpenSSL ciphers directly

* Updated CSS grammar to CSS 2.2

* Fixed several memleaks found by OSS-Fuzz

* Fixed several buffer overflows found by OSS-Fuzz

* Fixed several integer overflows found by OSS-Fuzz

* Several minor bug fixes


* Changes in Wget 1.19.4

* A major bug that caused GZip'ed pages to never be decompressed has been fixed

* Support for Content-Encoding and Transfer-Encoding have been marked as
  experimental and disabled by default


* Changes in Wget 1.19.3

* Prevent erroneous decompression of .gz and .tgz files with broken servers

* Added support for HTTP 308 Permanent Redirect response

* Fix a segfault in some cases where the Content-Type header is not sent

* Support OpenSSL 1.1 builds without using deprecated features

* Fix netrc file detection on Windows

* Several minor bug fixes
2018-05-07 06:48:39 +00:00
wiz
e5209a786e Add p11-kit to gnutls/bl3.mk and bump dependencies. 2018-04-17 22:29:31 +00:00
wiz
bb13844603 wget: update to 1.19.2.
* Changes in Wget 1.19.2

* Fix CVE-2017-13089 (Stack overflow in HTTP protocol handling)

* Fix CVE-2017-13090 (Heap overflow in HTTP protocol handling)

* New option --compression for gzip Content-Encoding

* New option --[no]-netrc to control .netrc parsing

* Added GNU extensions to .netrc parsing

* Improved IDNA 2003 compatibility

* Fix VPATH issues

* Improved and extended the test suite

* Support Wayback Machine's X-Archive-Orig-last-modified

* Several bug fixes
2017-11-23 16:03:29 +00:00
leot
0ac0e67ad3 wget: Use devel/libidn2 and adjust `idn' option logic in options.mk
Since wget-1.19, libidn2 is needed for the IDN/IRIs support. Adjust
the `idn' package option logic to reflect that and explicitly ask
for it via CONFIGURE_ARGS. This should also fix the build without
the `idn' option selected pointed out by john heasley via PR pkg/52726.

Bump PKGREVISION
2017-11-14 09:51:13 +00:00
tez
ed9b20ecfe wget: patches for VE-2017-13089 and CVE-2017-13090 2017-10-26 15:01:38 +00:00
kim
8780cedd46 Add a patch for CVE-2017-6508 from upstream. 2017-05-15 05:10:09 +00:00
ryoon
8fc5f8b565 Update to 1.19.1
Changelog:
* Changes in Wget 1.19.1

* Fix bugs, a regression, portability/build issues

* Add new option --retry-on-http-error


* Changes in Wget 1.19

* New option --use-askpass=COMMAND. Fetch user/password by calling
  an external program.

* Use IDNA2008 (+ TR46 if available) through libidn2

* When processing a Metalink header, --metalink-index=<number> allows
  to process the header's application/metalink4+xml files.

* When processing a Metalink file, --trust-server-names enables the
  use of the destination file names specified in the Metalink file,
  otherwise a safe destination file name is computed.

* When processing a Metalink file, enforce a safe destination path.
  Remove any drive letter prefix under w32, i.e. 'C:D:file'.  Call
  libmetalink's metalink_check_safe_path() to prevent absolute,
  relative, or home paths:
  https://tools.ietf.org/html/rfc5854#section-4.1.2.1
  https://tools.ietf.org/html/rfc5854#section-4.2.8.3

* When processing a Metalink file, --directory-prefix=<prefix> sets
  the top of the retrieval tree to prefix for Metalink downloads.

* When processing a Metalink file, reject downloaded files which don't
  agree with their own metalink:size value:
  https://tools.ietf.org/html/rfc5854#section-4.2.16

* When processing a Metalink file, with --continue resume partially
  downloaded files and keep fully downloaded files even if they fail
  the verification.

* When processing a Metalink file, create the parent directories of a
  "path/file" destination file name:
  https://tools.ietf.org/html/rfc5854#section-4.1.2.1
  https://tools.ietf.org/html/rfc5854#section-4.2.8.3

* On a recursive download, append a .tmp suffix to temporary files
  that will be deleted after being parsed, and create them
  readable/writable only by the owner.

* New make target 'check-valgrind'

* Fix several bugs

* Fix compatibility issues
2017-02-20 12:25:48 +00:00
spz
ea3e8cff75 add a patch for CVE-2016-7098 from upstream 2016-10-30 20:55:39 +00:00
wiz
a82aa43c18 Recursive PKGREVISION bump for gnutls shlib major bump. 2016-09-19 13:04:18 +00:00