1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-20 08:27:15 +00:00
Commit Graph

274996 Commits

Author SHA1 Message Date
Jason Helfman
63180e3a24 - drop unknown post-deinstall target and move into SUB_FILES
- bump PORTREVISION accordingly

PR:     ports/164341
Submitted by:   jgh@
Approved by:    maintainer timeout ( 51 days )
Feature safe:   yes
2012-03-12 05:17:42 +00:00
Jason Helfman
ea387de62b - Update to 4.25.0
PR:	ports/165958
Submitted by:	jgh@
Approved by:	maintainer, question+fbsdports@closedsrc.org
Feature safe:	yes
2012-03-12 04:52:55 +00:00
Sunpoet Po-Chuan Hsieh
1c8f3a4cfd - Update to 1.9.61
Changes:
- setup.py: Version 1.9.61.
- cupsipp.c (IPPRequest_getAttributes): Hardened for Py* failures.
- cupsppd.c (PPD_emitString): Fixed some more reference count issues (trac #17).
- cupsipp.c: Fixed reference count issue with called object result (trac #17).
  (cupsipp_iocb_read): Prevent NULL dereference when Py_BuildValue fails (trac
  #17).
- cupsconnection.c, cupsmodule.c, cupsppd.c: Use Py_RETURN_NONE where
  appropriate.
- cupsmodule.c, cupsppd.c: Fixed reference count issues with Py_None (trac #17).
- cupsmodule.c: Fixed typo in fix for trac #16.
- cupsmodule.c: HTTP_AUTHORIZATION_CANCELED constant requires CUPS 1.4 (trac
  #16).
- cupsppd.c: Object lifecycle debugging.

Feature safe:	yes
2012-03-12 02:46:10 +00:00
Sunpoet Po-Chuan Hsieh
435358fd31 - Update to 1.1.3
Changes:	http://lists.gnu.org/archive/html/freeipmi-announce/2012-03/msg00000.html
Feature safe:	yes
2012-03-12 02:44:55 +00:00
Sunpoet Po-Chuan Hsieh
7f489a4bad - Update to 0.06
- Add TEST_DEPENDS

Changes:	http://search.cpan.org/dist/Carp-Always-Color/Changes
Feature safe:	yes
2012-03-12 02:39:21 +00:00
Sunpoet Po-Chuan Hsieh
62f474a261 - Update to 0.42
Changes:	http://search.cpan.org/dist/Test-Spec/Changes
Feature safe:	yes
2012-03-12 02:31:01 +00:00
Sunpoet Po-Chuan Hsieh
5b2c343913 - Update to 2.000
Changes:	http://search.cpan.org/dist/Socket/Changes
Feature safe:	yes
2012-03-12 02:30:30 +00:00
Sunpoet Po-Chuan Hsieh
5223c11aa8 - Update to 0.89
Changes:	http://search.cpan.org/dist/Unicode-Collate/Changes
Feature safe:	yes
2012-03-12 02:29:58 +00:00
Sunpoet Po-Chuan Hsieh
b7d9d56925 - Update to 1.0.1
Changes:	https://github.com/guard/guard/blob/master/CHANGELOG.md
Feature safe:	yes
2012-03-12 02:29:30 +00:00
Sunpoet Po-Chuan Hsieh
266c9f1aef - Update to 2012.03.12
Feature safe:	yes
2012-03-12 02:28:32 +00:00
Sunpoet Po-Chuan Hsieh
8239700e11 - Update to 2012.03.11
Feature safe:	yes
2012-03-12 02:28:19 +00:00
Sunpoet Po-Chuan Hsieh
456a07c3b9 - Update to 20120311
Feature safe:	yes
2012-03-12 02:27:48 +00:00
Wesley Shields
5bc12cbf97 Typo fix.
Feature safe:	yes
2012-03-12 02:23:58 +00:00
Doug Barton
e346523d43 Restore support for ${PERL_LEVEL} < 501000
Feature safe:	yes
2012-03-12 00:32:09 +00:00
Matthias Andree
375fa2ae28 Update to new upstream release 2.60. Notable new features are:
- The LUA port option enables Lua support for DHCP lease-change scripts
- DHCPv6 support
- IPv6 Router Advertisement support

Changelog:    http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
Feature safe: yes
2012-03-11 23:59:44 +00:00
Mark Linimon
83df4f9a4b Note re-addition of lang/perl5.8 and lang/perl5.10.
Feature safe:	yes
2012-03-11 23:54:32 +00:00
Mark Linimon
984c3924ee Restore lang/perl5.8 and lang/perl5.10 from the Attic.
PR:		ports/165467 (reversal of)
Feature safe:	yes (actually restoring for POLA)
Hat:		portmgr
2012-03-11 23:52:40 +00:00
Mark Linimon
7047959f24 Undo ports/165457 to not violate POLA. As far as I knew, the PR
was to test what happened when we did eventually delete these two
ports, not to delete them immediately.

A subsequent commit will add appropriate deprecation messages.

Hat:		portmgr
PR:		ports/165457
Feature safe:	yes (actually no, however, this is to preserve POLA)
2012-03-11 23:49:09 +00:00
Simon L. B. Nielsen
09e8089e23 Portaudit 0.6.0:
Fix remote code execution which can occur with a specially crafted
audit file.  The attacker would need to get the portaudit(1) to
download the bad audit database, e.g. by performing a man in the
middle attack.

Add signature verification of the portaudit database.  The public key
is for the database generated for portaudit.FreeBSD.org is included
in the distribution.

(This parts add the portaudit public key missed in initial commit.)

Submitted by:   Michael Gmelin <freebsd@grem.de>
Reported by:    Michael Gmelin <freebsd@grem.de>, Joerg Scheinert
Security:       Remote code execution
Security:       http://vuxml.FreeBSD.org/6d329b64-6bbb-11e1-9166-001e4f0fb9b1.html
Feature safe:   yes
With hat:       so
2012-03-11 22:05:39 +00:00
Simon L. B. Nielsen
8659bcc60f - Document portaudit -- auditfile remote code execution.
- Update (c) year.

Feature safe:	yes
2012-03-11 21:37:42 +00:00
Simon L. B. Nielsen
23dc1240c1 Portaudit 0.6.0:
Fix remote code execution which can occur with a specially crafted
audit file.  The attacker would need to get the portaudit(1) to
download the bad audit database, e.g. by performing a man in the
middle attack.

Add signature verification of the portaudit database.  The public key
is for the database generated for portaudit.FreeBSD.org is included
in the distribution.

Submitted by:	Michael Gmelin <freebsd@grem.de>
Reported by:	Michael Gmelin <freebsd@grem.de>, Joerg Scheinert
Security:	Remote code execution
Security:	http://vuxml.FreeBSD.org/6d329b64-6bbb-11e1-9166-001e4f0fb9b1.html
Feature safe:	yes
With hat:	so
2012-03-11 21:32:58 +00:00
Simon L. B. Nielsen
4d22b6af09 Make bsd.port.mk not parse port audit's auditfile directly to
check for vulnerabilities, but call portaudit instead.

This fixes a remote command execution vulnerability for users who have
portaudit installed.

While changing the code anyway, remove the annoying and very verbose
"Vulnerability check disabled, database not found" warning.

Security:	Remote code execution
Security:	http://vuxml.FreeBSD.org/6d329b64-6bbb-11e1-9166-001e4f0fb9b1.html
Approved by:	portmgr
Feature safe:	yes (or at least approved)
With hat:	so
2012-03-11 21:30:49 +00:00
Doug Barton
7c588a6b6d Fix OPTIONS broken by the perl < 5.12 sweep [1]
While I'm here, reduce the number of docs variables.

PR:		ports/165930 [1]
Submitted by:	Alexey Markov <redrat@mail.ru> [1]

Feature safe:	yes
2012-03-11 21:25:55 +00:00
Ryan Steinmetz
d391588c75 - Do not install examples whenever NOPORTEXAMPLES is defined [1]
- Do not install duplicate sample config files
- Do not bump PORTREVISION

PR:		ports/165800 [1]
Submitted by:	Michael Scheidell <scheidell@FreeBSD.org> [1]
Feature safe:	yes
2012-03-11 19:26:45 +00:00
Michael Scheidell
cbaaba0909 - Revert all changes made to p5-Mail-SpamAssassin/Makefile [1]
- This closed pr's ports/165924 [2] and ports/165935 [3]
- No PORTREVISION bump

PR:		ports/165605 [1]
Submitted by:	scheidell (me) [1]
Reported by: 	Alexey Markov <redrat@mail.ru> [2], Helge Oldach <ports-mail-spamass@oldach.net> [3]
Feature safe:	yes
2012-03-11 18:14:12 +00:00
Ashish SHUKLA
577fce0c18 - Fix typo in perl entry
Feature safe:	yes
2012-03-11 17:57:11 +00:00
Wesley Shields
00071a3c04 Appease the tidy target. ;)
Feature safe:	yes
2012-03-11 16:07:58 +00:00
Jun Kuriyama
a44bf74af0 - Upgrade to 2.2.4.
Feature safe:	yes
2012-03-11 14:56:42 +00:00
Chris Rees
28f214ef25 Use new USE_PGSQL hooks for depending on server:build
Approved by:	kuriyama (maintainer)
Feature safe:	yes
2012-03-11 14:38:36 +00:00
Chris Rees
339b7c53f8 Use new USE_PGSQL hooks for depending on server:build
Approved by:	kuriyama (maintainer)
Feature safe:	yes
2012-03-11 14:33:16 +00:00
Jun Kuriyama
61f4ca043b - Add missing depends and unbroken.
Feature safe:	yes
2012-03-11 13:58:18 +00:00
Jun Kuriyama
a357338f28 - Upgrade to 1.3.9.2.
Feature safe:	yes
2012-03-11 13:51:07 +00:00
Sergey A. Osokin
805363f73b Update from 0.09rc6 to 0.09rc7.
Feature safe:	yes
2012-03-11 13:12:32 +00:00
Chris Rees
23c612e95e - Add dependency logic: USE_PGSQL= component[:target] for versioned ports
- Fix postgresql version logic-- now falls back to default version only if
  WANT_ isn't set, thus preserving package building for non-default versions

Feature safe:	yes
2012-03-11 13:07:59 +00:00
Sergey A. Osokin
21ce12b208 Update from 2.0.0 to 2.1.0.
Feature safe:	yes
2012-03-11 13:07:53 +00:00
Rene Ladan
ab0f267739 Update to 17.0.963.79
Security:	http://www.vuxml.org/freebsd/ab1f515d-6b69-11e1-8288-00262d5ed8ee.html
Feature safe:	yes
2012-03-11 12:47:42 +00:00
Jun Kuriyama
1890f65302 - Upgrade to 1.000009.
- Add run depends on required p5-version>=0.87.  perl-5.10.1 and later
  has version.pm, but its version is only 0.77 [1].

PR:		ports/164913 [1]
Submitted by:	swills [1]
Feature safe:	yes
2012-03-11 11:37:32 +00:00
Jun Kuriyama
779b9498bb - Upgrade to 0.3000.
Feature safe:	yes
2012-03-11 11:25:10 +00:00
Rene Ladan
6f56c36e73 Document vulnerabilities in www/chromium < 17.0.963.79
Security:	CVE-2011-3047
Feature safe:	yes
2012-03-11 11:16:48 +00:00
Jun Kuriyama
d507cfd3b2 - Upgrade to 0.1020.
Feature safe:	yes
2012-03-11 11:14:12 +00:00
Jun Kuriyama
5610a480f7 - Upgrade to 1.08.
Feature safe:	yes
2012-03-11 10:33:58 +00:00
Jun Kuriyama
192805c967 - Upgrade to 0.05.
Feature safe:	yes
2012-03-11 10:32:43 +00:00
Jun Kuriyama
8272278d8e - Upgrade to 0.00003.
Feature safe:	yes
2012-03-11 10:31:34 +00:00
Martin Matuska
705d53962e Update to 6.7.5.10
Feature safe:	yes
2012-03-11 10:29:44 +00:00
Jun Kuriyama
ff44606c78 - Upgrade to 0.21.
Feature safe:	yes
2012-03-11 10:24:14 +00:00
Jun Kuriyama
c7407e9ed0 - Upgrade to 1.10.
Feature safe:	yes
2012-03-11 10:19:04 +00:00
Jun Kuriyama
7c62c5bdeb - Upgrade to 0.46.
Feature safe:	yes
2012-03-11 10:14:09 +00:00
Jun Kuriyama
2c8c132e20 - Upgrade to 0.04001.
Feature safe:	yes
2012-03-11 10:12:05 +00:00
Jun Kuriyama
b645247d84 - Upgrade to 0.120490.
Feature safe:	yes
2012-03-11 10:04:58 +00:00
Jun Kuriyama
8fe8185980 - Upgrade to 1.3093.
Feature safe:	yes
2012-03-11 10:04:08 +00:00