the target user is in some arbitrary plaintext list. Similar to module
pam_ftpusers from the FreeBSD Project and is based on it's code.
WWW: http://sourceforge.net/projects/pam-search-list/
PR: ports/169877
Submitted by: Victor Popov
- Remove -A parameter from fetch to fix download from funtoo
- Add LICENSE
- Fix COMMENT
- Use GENTOO macro for MASTER_SITES
- Replace some hardcoded keychain by ${PORTNAME}
PR: ports/173972
Submitted by: nemysis <nemysis@gmx.ch>
While here fix some consistency in PEAR options name
bumped revision of net/icpld and net/ipsumdump because IPV6 is now on
Approved by: miwi (maintainer)
security/libprelude:
- Remove BROKEN, update to version 1.0.1 [1]
- Add missing deps, port requires pkg-config during build
security/libpreludedb:
- Update to version 1.0.1p1
- Add missing deps
- Make options deterministic and not dependent on what's installed
security/prelude-lml:
- Update to version 1.0.1
- Add missing deps, port requires pkg-config during build
- Convert to OptionsNG
security/prelude-manager:
- Update to version 1.0.2
- Add missing deps, port requires pkg-config during build
- Convert to OptionsNG, remove PRELUDEDB option - it can't be turned off
by CONFIGURE_ARGS, package links to preludedb at all times if available
security/pflogger:
- Bump PORTREVISION, libprelude ABI version changed
www/py-prewikka:
- Update to version 1.0.1p1
- Convert to OptionsNG
- Sort plist
PR: 172056 [1]
Submitted by: KATO Tsuguru <tkato432@yahoo.com> [1]
- convert all fuse ports to use the new macro
The macro makes sure sysutils/fusefs-libs gets installed and depending on
fuse being in base or not it installs sysutils/fusefs-kmod.
Approved by: portmgr (bapt)
vulnerabilities that could cause a crash and potentially allow an
attacker to take control of the affected system.
Submitted by: Tsurutani Naoki <turutani scphys kyoto-u ac jp>
Trim headers where applicable and in the cases where the maintainer
is the original author remove the headers entirely.
Update mirror to point to the newer location (old one redirected).
Submitted by: Nicolas Jombart <ecu@200ok.org> (maintainer, private mail)
For dns/openresolv give proper attribution. This was a copy/paste
mistake the submitter made, which incorrectly gave me attribution
for that file. I did not create it.
BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
vulnerable to a software defect that allows a crafted query to
crash the server with a REQUIRE assertion failure. Remote
exploitation of this defect can be achieved without extensive
effort, resulting in a denial-of-service (DoS) vector against
affected servers.
Security: 2892a8e2-3d68-11e2-8e01-0800273fe665
CVE-2012-5688
Feature safe: yes