Commit graph

266948 commits

Author SHA1 Message Date
taca
e6fd3b27e2 Update contao44 to 4.4.1.
### 4.4.1 (2017-07-12)

 * Prevent arbitrary PHP file inclusions in the back end (see CVE-2017-10993).
 * Correctly handle subpalettes in "edit multiple" mode (see #946).
 * Correctly show the DCA picker in the site structure (see #906).
 * Correctly update the style sheets if a format definition is
   enabled/disabled (see #893).
 * Always show the "show from" and "show until" fields (see #908).
 * Correctly set the "overwriteMeta" field during the database update (see
   contao/core-bundle#888).
2017-07-12 14:52:02 +00:00
taca
af325801c2 Note update of www/contao35 package to 3.5.28. 2017-07-12 14:43:26 +00:00
taca
07ea0f1a98 Update contao35 to 3.5.28.
Version 3.5.28 (2017-07-12)
---------------------------

### Fixed
Prevent arbitrary PHP file inclusions in the back end (see CVE-2017-10993).

### Fixed
Improve the accessibility of the CAPTCHA widget (see #8709).

### Fixed
Fixed the iOS scrolling bug in the simple modal script (see #8708).

### Fixed
Correctly cache the unique keys in the SQL cache (see #8712).
2017-07-12 14:42:55 +00:00
prlw1
c1eb0e3f31 Avoid PKG_FAIL 2017-07-12 14:33:39 +00:00
hauke
a56df64e75 Updated net/netatalk22 to 2.2.6 2017-07-12 13:58:12 +00:00
hauke
f1be08fe1f Update netatalk22 to patch release 2.2.6.
For changes see
<https://github.com/Netatalk/Netatalk/commits/branch-netatalk-2-2>
- the upstream release branch does not have a changelog.

Upstream took a lot of our patches - thanks, guys!

Package changes include untangling ldap support, so that the package
builds with it. There has been confusion between acl and ldap support
upstream as well as in the package - see
patch-include_atalk_ldapconfig.h and
<https://github.com/Netatalk/Netatalk/commits/branch-netatalk-2-2/include/atalk/ldapconfig.h>.
2017-07-12 13:56:00 +00:00
wiz
16776f0c9a Honor LDFLAGS for RELRO builds. 2017-07-12 12:54:28 +00:00
wiz
3e6c699f7f Honor LDFLAGS for RELRO build. 2017-07-12 12:21:56 +00:00
wiz
d003cbfcdc Honor CFLAGS and LDFLAGS. 2017-07-12 12:20:28 +00:00
wiz
9a61fa25ee Honor LDFLAGS. Fixes RELRO build. 2017-07-12 12:17:02 +00:00
wiz
07672d46b5 Honor LDFLAGS for RELRO build. 2017-07-12 12:16:11 +00:00
wiz
1e74b916d4 Honor LDFLAGS. Fixes RELRO build. 2017-07-12 11:04:59 +00:00
wiz
5bf2a39388 Honor LDFLAGS. Fixes RELRO build.
Set LICENSE while here.
2017-07-12 10:56:51 +00:00
wiz
1ee6cd35b6 Honor LDFLAGS. Fixes RELRO build.
Some minor cleanup while here.
2017-07-12 10:53:23 +00:00
wiz
c252c22b09 Honor LDFLAGS. Fixes RELRO build. 2017-07-12 10:49:23 +00:00
tnn
f02301476b add www/grafana 2017-07-12 10:07:12 +00:00
tnn
efd0aac2e7 fix HOMEPAGE 2017-07-12 10:05:58 +00:00
tnn
fb9f3206e2 Import grafana-4.4.1 as www/grafana.
Grafana is a web-based dashboard that allows you to query, visualize and
alert on metrics data stored in Graphite, InfluxFB, OpenTSDB or Prometheus.
2017-07-12 10:03:22 +00:00
wiz
e5b18fa1c2 Honor LDFLAGS. Fixes RELRO build. 2017-07-12 09:38:12 +00:00
he
3e80e09718 Note update of lang/ocaml to 4.04.2nb2. 2017-07-12 09:26:02 +00:00
manu
f926479f35 Back out the calendar option for PHP
The functionnality is already avaialable from pkgsrc/time/php-calendar
moduke. Thnaks to Takahiro Kambe for pointing it out.
2017-07-12 09:11:35 +00:00
wiz
3bc81a8a44 Honor LDFLAGS, fixes RELRO build.
While here, set LICENSE and fix a pkglint warning.
2017-07-12 09:02:04 +00:00
wiz
23fb34cb92 Honor LDFLAGS. Fixes RELRO build. 2017-07-12 09:00:33 +00:00
adam
458dbd38b3 Updated net/lftp to 4.8.0 2017-07-12 08:59:07 +00:00
adam
d43a2cb215 Version 4.8.0:
* mirror: improved performance of --scan-all-first for big trees.
* mirror: new --flat option to flatten the target directory structure.
* mmv: new command for file moving; redirect mv to mmv in certain cases.
* fixed compilation with newer openssl (1.1.0 and later).
* du: allow multiple --exclude options to be combined.
* new setting cmd:nullglob for `glob' command prefix.
* http: use proppatch to set last-modified property.
* new settings net:connection-limit-timer and ftp:too-many-re.
* ftp: dynamically ajust connection limit.
* ftp: fixed core dump on LINK/SYMLINK when the command is not supported.
* get1: fixed -o option.
* sftp,fish: connect-program setting is now passed to the shell for execution.
* get/mget/put/mput: add -P option for parallel transfers and long options.
* appimage: new make target for making an AppImage file.
* fixed "local glob".
2017-07-12 08:58:18 +00:00
wiz
1ccdede6ab Honor LDFLAGS in more places. Fixes RELRO build. 2017-07-12 08:55:36 +00:00
he
a8dee92893 A preexisting pkgsrc patch changed the "man page output suffix" from
.3o to just .3, so adapt this test's Makefile to follow suit.  Brings
the number of failing self-tests down from 1 to 0.
Bump PKGREVISION.
2017-07-12 07:52:28 +00:00
jperkin
713ecd4bb7 Remove ldap as a supported option, no version of python can satisfy
its requirements.
2017-07-12 07:30:46 +00:00
adam
538d8405e8 Updated www/apache22 to 2.2.34, www/apache24 to 2.4.27 2017-07-12 07:02:27 +00:00
adam
a6789dc45d Changes with Apache 2.4.27
*) COMPATIBILITY: mod_lua: Remove the undocumented exported 'apr_table'
     global variable when using Lua 5.2 or later. This was exported as a
     side effect from luaL_register, which is no longer supported as of
     Lua 5.2 which deprecates pollution of the global namespace.

  *) COMPATIBILITY: mod_http2: Disable and give warning when using Prefork.
     The server will continue to run, but HTTP/2 will no longer be negotiated.

  *) COMPATIBILITY: mod_proxy_fcgi: Revert to 2.4.20 FCGI behavior for the
     default ProxyFCGIBackendType, fixing a regression with PHP-FPM.

  *) mod_lua: Improve compatibility with Lua 5.1, 5.2 and 5.3.

  *) mod_http2: Simplify ready queue, less memory and better performance. Update
     mod_http2 version to 1.10.7.

  *) Allow single-char field names inadvertently disallowed in 2.4.25.

  *) htpasswd / htdigest: Do not apply the strict permissions of the temporary
     passwd file to a possibly existing passwd file.

  *) core: Avoid duplicate HEAD in Allow header.
     This is a regression in 2.4.24 (unreleased), 2.4.25 and 2.4.26.
2017-07-12 07:01:34 +00:00
adam
661d5b2f62 Changes with Apache 2.2.34
*) Allow single-char field names inadvertantly disallowed in 2.2.32.

Changes with Apache 2.2.33 (not released)

  *) SECURITY: CVE-2017-7668 (cve.mitre.org)
     The HTTP strict parsing changes added in 2.2.32 and 2.4.24 introduced a
     bug in token list parsing, which allows ap_find_token() to search past
     the end of its input string. By maliciously crafting a sequence of
     request headers, an attacker may be able to cause a segmentation fault,
     or to force ap_find_token() to return an incorrect value.

  *) SECURITY: CVE-2017-3169 (cve.mitre.org)
     mod_ssl may dereference a NULL pointer when third-party modules call
     ap_hook_process_connection() during an HTTP request to an HTTPS port.

  *) SECURITY: CVE-2017-3167 (cve.mitre.org)
     Use of the ap_get_basic_auth_pw() by third-party modules outside of the
     authentication phase may lead to authentication requirements being
     bypassed.

  *) SECURITY: CVE-2017-7679 (cve.mitre.org)
     mod_mime can read one byte past the end of a buffer when sending a
     malicious Content-Type response header.

  *) Fix HttpProtocolOptions to inherit from global to VirtualHost scope.
2017-07-12 07:00:40 +00:00
ryoon
50fb4747b8 Added devel/verifast version 17.06 2017-07-12 01:56:13 +00:00
ryoon
519be849b1 Add verifast 2017-07-12 01:55:17 +00:00
ryoon
0cb8944c07 Import verifast-17.06 as devel/verifast.
VeriFast is a research prototype of a tool for modular formal
verification of correctness properties of single-threaded and
multithreaded C and Java programs annotated with preconditions and
postconditions written in separation logic.

This is recommended by Kiwamu Okabe in Japan NetBSD Users' Group BOF 2017
at the University of Tokyo.
2017-07-12 01:54:16 +00:00
ryoon
a0eaf93c3f Bump required devel/nspr version to fix potential configure error 2017-07-12 01:49:34 +00:00
ryoon
808bd625f5 Bump required devel/nspr version
Fix PR pkg/52392
2017-07-12 01:47:10 +00:00
bsiegert
02ff556957 +caddy 2017-07-11 20:27:31 +00:00
bsiegert
3a873a9374 Import caddy-0.10.4 from wip/caddy.
Caddy is a HTTP/2 web server with automatic HTTPS.

Caddy was born out of the need for a "batteries-included" web server
that runs anywhere and doesn't have to take its configuration with it.
Caddy took inspiration from spark, nginx, lighttpd, Websocketd and
Vagrant, which provides a pleasant mixture of features from each of
them.
2017-07-11 20:26:41 +00:00
adam
4301789a3d Updated lang/py-jsparser to 2.5.2, lang/py-js2py to 0.44, lang/llvm to 4.0.1 2017-07-11 19:51:01 +00:00
adam
0e12e44da9 Changes 4.0.1:
This is a bug-fix release.
2017-07-11 19:47:37 +00:00
joerg
03f704711c Retire CLANG_NO_VALUE_PROPAGATION_PASS. CVP has been fixed in LLVM to
require much less memory.
2017-07-11 19:41:20 +00:00
adam
343b1d6ae1 Changes 0.44:
Unknown
2017-07-11 19:36:40 +00:00
joerg
d22aaee4d1 Deal with former namespace pollution from libbson. 2017-07-11 19:35:51 +00:00
adam
7ca24c64e3 Changes 2.5.2:
Unknown
2017-07-11 19:24:31 +00:00
fhajny
93778b4e6a Updated lang/nodejs4 to 4.8.4 2017-07-11 19:16:56 +00:00
fhajny
c1ec1e0171 Update lang/nodejs4 to 4.8.4.
- Disable V8 snapshots - The hashseed embedded in the snapshot is
  currently the same for all runs of the binary. This opens node up to
  collision attacks which could result in a Denial of Service. We have
  temporarily disabled snapshots until a more robust solution is found
- CVE-2017-1000381 - The c-ares function ares_parse_naptr_reply(), which
  is used for parsing NAPTR responses, could be triggered to read memory
  outside of the given input buffer if the passed in DNS response packet
  was crafted in a particular way. This patch checks that there is
  enough data for the required elements of an NAPTR record (2 int16, 3
  bytes for string lengths) before processing a record.
2017-07-11 19:16:46 +00:00
fhajny
c97341c470 Updated lang/nodejs6 to 6.11.1 2017-07-11 19:10:42 +00:00
fhajny
e042e7228b Update lang/nodejs6 to 6.11.1.
- Disable V8 snapshots - The hashseed embedded in the snapshot is
  currently the same for all runs of the binary. This opens node up to
  collision attacks which could result in a Denial of Service. We have
  temporarily disabled snapshots until a more robust solution is found
- CVE-2017-1000381 - The c-ares function ares_parse_naptr_reply(), which
  is used for parsing NAPTR responses, could be triggered to read memory
  outside of the given input buffer if the passed in DNS response packet
  was crafted in a particular way. This patch checks that there is
  enough data for the required elements of an NAPTR record (2 int16, 3
  bytes for string lengths) before processing a record.
2017-07-11 19:10:32 +00:00
fhajny
4184eb38e5 Updated lang/nodejs to 8.1.4 2017-07-11 19:01:13 +00:00
fhajny
ecb3174965 Update lang/nodejs to 8.1.4.
- Disable V8 snapshots - The hashseed embedded in the snapshot is
  currently the same for all runs of the binary. This opens node up to
  collision attacks which could result in a Denial of Service. We have
  temporarily disabled snapshots until a more robust solution is found
- CVE-2017-1000381 - The c-ares function ares_parse_naptr_reply(), which
  is used for parsing NAPTR responses, could be triggered to read memory
  outside of the given input buffer if the passed in DNS response packet
  was crafted in a particular way. This patch checks that there is
  enough data for the required elements of an NAPTR record (2 int16, 3
  bytes for string lengths) before processing a record. (David Drysdale)
2017-07-11 19:00:57 +00:00