1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-12 03:00:28 +00:00
Commit Graph

22230 Commits

Author SHA1 Message Date
Martin Wilke
8e50d19daa - Update to 2015-48
PR:		        204805
Submitted by:	ecrist@secure-computing.net (maintainer)
Approved by:	mat (mentor)
2015-11-30 11:08:56 +00:00
Antoine Brodin
a1af583929 Deprecate ports broken for more than 6 months 2015-11-29 09:51:30 +00:00
Sunpoet Po-Chuan Hsieh
f6c05904fb - Add LICENSE_FILE 2015-11-29 07:00:31 +00:00
Sunpoet Po-Chuan Hsieh
a055985634 - Cosmetic change 2015-11-29 07:00:11 +00:00
Sunpoet Po-Chuan Hsieh
77906a59ed - Update to 2015.11.20
Changes:	https://github.com/certifi/python-certifi/commits/master
2015-11-28 09:29:25 +00:00
Michael Moll
a3920b6946 security/gnupg1: fix build on arm
PR:		197793
Submitted by:	Mikael Urankar <mikael.urankar@gmail.com>
Approved by:	kuriyama (maintainer, timeout)
2015-11-27 17:52:56 +00:00
Martin Wilke
db53585487 - Take Maintainership
Approved by:	mat (mentor)
2015-11-26 14:39:58 +00:00
Martin Wilke
b233276d78 - Take Maintainership
Approved by:	mat (mentor)
2015-11-26 12:04:00 +00:00
Kubilay Kocak
6c541cb678 security/suricata: Update to 3.0 RC1
- Update to 3.0 release candidate 1 (Welcome Netmap support!)
- Update pkg-plist accordingly
- Add NETMAP option (Enabled by default for packages)
- Sort OPTIONS_* alphabetically
- Enable verbose builds
- Remove patches (upstreamed)
- Update test target
2015-11-26 11:25:42 +00:00
Wen Heping
54cffdb817 - Update to 0.7.3.2
PR:		203975
Submitted by:	ports@toco-domains.de
Approved by:	maintainer(timeout, >30 days)
2015-11-25 01:33:04 +00:00
Johan van Selst
c0bef11d66 Update to ocaml-ssl 0.5.2 2015-11-24 19:41:12 +00:00
Sunpoet Po-Chuan Hsieh
c9a79f52ad - Use ASCII characters 2015-11-23 19:01:10 +00:00
Dan Langille
a78471b459 Upgrade to 0.7.0
Approved by: mat (mentor)
Differential Revision: D4195
2015-11-23 18:46:58 +00:00
John Marino
53cc9a007c security/putty: Fix typo 2015-11-23 11:44:33 +00:00
John Marino
6ce31df13d security/putty: Fix krb5 dependency
Due to using both <bsd.port.pre.mk> and <bsd.port.options.mk>, the
USES+= gssapi:mit directive was ignored and not included in the build
dependency list.  Remove <pre>/<post> includes to fix.

Approved by:	mandree (maintainer)
2015-11-23 11:42:11 +00:00
Renato Botelho
234208603b Remove mirrors.mit.edu from MASTER_SITES, no 2.x tarball available there
Approved by:	koobs (maintainer)
Sponsored by:	Rubicon Communications (Netgate)
2015-11-23 11:40:24 +00:00
Thomas Zander
3743fadb61 Allow to select pf instead of default ipfw for firewall backend
PR:		204334
Submitted by:	jan0sch@mykolab.com
Reviewed by:	sean.greven@gmail.com (maintainer)
2015-11-23 06:20:46 +00:00
Jason Unovitch
b89cb3bca0 security/libyubikey: update 1.12 -> 1.13, add install-strip
PR:		204242
Submitted by:	oleksii.tsai@gmail.com
Approved by:	matt@mjslabs.com (maintainer)
2015-11-22 22:16:36 +00:00
Kurt Jaeger
ffb2f86e9f security/libgcrypt: Re-add missing patch
- This patch was removed when updating to 1.6.4, so the patch needs
  to be put back in order to solve the bug 204399.

PR:		204600
Submitted by:	Carlos J. Puga Medina <cpm@fbsd.es> (maintainer)
2015-11-22 17:33:05 +00:00
Jason Unovitch
2ac3d93b1b Document Kibana CSRF attack vulnerability
Security:	CVE-2015-8131
Security:	https://vuxml.FreeBSD.org/freebsd/fb2475c2-9125-11e5-bd18-002590263bf5.html
2015-11-22 14:41:24 +00:00
Jason Unovitch
062498b31d Document code execution via a format string vulnerability in a2ps
Security:	CVE-2015-8107
Security:	https://vuxml.FreeBSD.org/freebsd/e359051d-90bd-11e5-bd18-002590263bf5.html
2015-11-22 02:12:43 +00:00
Jason Unovitch
019a165667 security/govpn: update 4.1 -> 4.2
Changes:
- Fixed non-critical bug when server may fail if up-script is not executed
  successfully.

PR:		204609
Submitted by:	Sergey Matveev <stargrave@stargrave.org> (maintainer)
2015-11-22 01:41:28 +00:00
Dirk Meyer
598b762566 - make portlint happier 2015-11-21 20:02:43 +00:00
Dirk Meyer
6fbeaa1d06 - use USES=tar
- use @sample
2015-11-21 18:56:06 +00:00
Dirk Meyer
6ca111ee08 - use post-install-DOCS-on
- cleanup text in IGNORE
2015-11-21 18:36:50 +00:00
Cy Schubert
a23b98b01a Introduce the new krb5 1.14:
- move (copy) krb5 (krb5 1.13.2) to krb5-113 (new, added)
- update krb5 1.13.2 --> 1.14
- update CONFLICTS in krb5, krb5-112 and krb5-113.
- update krb5-appl to allow optional dependency on krb5-113.
- update security/Makefile with copied krb5-113.
- deprecate and expire krb5-112 (krb5-1.12) on November 20, 2016, as it
  will EOL twelve months after the release of krb5-1.14.
2015-11-21 08:47:13 +00:00
Sunpoet Po-Chuan Hsieh
db7e131390 - Add LICENSE
Approved by:	portmgr (blanket)
2015-11-21 02:10:13 +00:00
Koop Mast
6a9dbcbed9 Document libxslt:
CVE-2015-7995

Document libxml2 :
CVE-2015-5312 CVE-2015-7497 CVE-2015-7498 CVE-2015-7499 CVE-2015-7500
CVE-2015-7941 CVE-2015-7942 CVE-2015-8035 CVE-2015-8241 CVE-2015-8242
2015-11-20 20:37:18 +00:00
Matthias Andree
ef927bc2fa Add optional extra patch for Tunnelblick obfuscation.
Adds a --scramble method to the executable but not documentation.
Requires careful review of implications before enabling, and has not
been accepted upstream.  https://tunnelblick.net/cOpenvpn_xorpatch.html

PR:		200215
Submitted by:	Franco Fichtner
2015-11-20 18:41:15 +00:00
Jimmy Olgeni
f4fc8519f7 Upgrade security/elixir-comeonin to version 1.6. 2015-11-20 13:38:47 +00:00
Sunpoet Po-Chuan Hsieh
dc73e8c328 - Add LICENSE
Approved by:	portmgr (blanket)
2015-11-20 09:15:45 +00:00
Sunpoet Po-Chuan Hsieh
1faec3f16c - Update distinfo (missing in r401990)
Approved by:	portmgr (blanket)
2015-11-20 09:03:43 +00:00
Bernard Spil
e1f412acc5 security/py-letsencrypt: Update to version 20151114
- Update py-letsencrypt and py-acme (to v0.0.0dev20151114)
  - Add regression test target for py-acme

Changes:

  - Turn off old/insecure challenge types[1]

[1]: https://community.letsencrypt.org/t/turning-off-old-insecure-challenge-types/3825

Reviewed by:	koobs (mentor), Carlos J Puga Medina <cpm@fbsd.es> (maintainer)
Approved by:	koobs (mentor, maintainer), Carlos J Puga Medina <cpm@fbsd.es> (maintainer)
DifferentialRevision:	https://reviews.freebsd.org/D4162
2015-11-20 08:16:19 +00:00
Olli Hauer
0962fbef57 - update to version 7.00
Changelog:
Nmap 7.00 [2015-11-19]

o This is the most important release since Nmap 6.00 back in May 2012!
  For a list of the most significant improvements and new features,
  see the announcement at: https://nmap.org/7

o [NSE] Added 6 NSE scripts from 6 authors, bringing the total up to 515!
  They are all listed at https://nmap.org/nsedoc/, and the summaries are below
  (authors are listed in brackets):

  + targets-xml extracts target addresses from previous Nmap XML results files.
    [Daniel Miller]

  + [GH#232] ssl-dh-params checks for problems with weak, non-safe, and
    export-grade Diffie-Hellman parameters in TLS handshakes. This includes the
    LOGJAM vulnerability (CVE-2015-4000). [Jacob Gajek]

  + nje-node-brute does brute-forcing of z/OS JES Network Job Entry node names.
    [Soldier of Fortran]

  + ip-https-discover detectings support for Microsoft's IP over HTTPS
    tunneling protocol. [Niklaus Schiess]

  + [GH#165] broadcast-sonicwall-discover detects and extracts information from
    SonicWall firewalls. [Raphael Hoegger]

  + [GH#38] http-vuln-cve2014-8877 checks for and optionally exploits a
    vulnerability in CM Download Manager plugin for Wordpress. [Mariusz Ziulek]

o [Ncat] [GH#151] [GH#142] New option --no-shutdown prevents Ncat from shutting
  down when it reads EOF on stdin. This is the same as traditional netcat's
  "-d" option. [Adam Saponara]

o [NSE] [GH#229] Improve parsing in http.lua for multiple Set-Cookie headers in
  a single response.  [nnposter]
2015-11-20 06:32:38 +00:00
Jason Unovitch
c862bdb809 security/pecl-crypto: update 0.1.1 -> 0.2.1
- Update PORTVERSION and distinfo for the new release (0.2.1)
- USES: tar:tgz instead of EXTRACT_SUFX
- Regenerate patch while here (portlint)

Changes:
| 0.2.1
* Fixed C89 compatibility issue in Base64
| 0.2.0
* Support for PHP 7
* Added Crypto stream BIO wrapper
* Improved error handling
* Added an integer overflow checking
* Removed Algorithm class and AlogirithmException class
* Introduced a MAC class as a subclass of Hash and parent of HMAC and CMAC
* Added MACException class subclassing HashException
* Fixed HMAC and CMAC implementation and added key param to constructor
* Fixed and tested CCM mode
* Added new error code for failed tag verification (TAG_VERIFY_FAILED)
* Add setTagLength Cipher method replacing length param in getTag
* Removed Rand::egd
* Created a complete API documentation

PR:		204668
Submitted by:	Gasol Wu <gasol.wu@gmail.com> (maintainer)
2015-11-20 03:55:34 +00:00
Jan Beich
a178b8850d Document recent Mozilla vulnerabilities 2015-11-20 00:39:40 +00:00
Jan Beich
a356bf5bac gecko: catch up with 2015-11-03 release train
- Update NSPR to 4.10.10 [1]
- Update NSS to 3.20.1 [2]
- Update Firefox ESR and libxul to 38.4.0
- Update Firefox to 42.0 [2]
- Update SeaMonkey to 2.39

Changes:	http://mozilla.6506.n7.nabble.com/ANNOUNCE-NSPR-4-10-10-Release-td346822.html
Changes:	https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
Changes:	https://www.mozilla.org/en-US/firefox/42.0/releasenotes/
Changes:	http://www.seamonkey-project.org/news#2015-11-08
PR:		204277 [1], 204332 [2], 203099
Submitted by:	swills, Christoph Moench-Tegeder
MFH:		2015Q4
Security:	9d04936c-75f1-4a2c-9ade-4c1708be5df9
2015-11-20 00:38:40 +00:00
Muhammad Moinur Rahman
cb433d279b security/p5-Crypt-GeneratePassword: Update version 0.04=>0.05
- Mark NO_ARCH
2015-11-19 10:02:20 +00:00
Ruslan Makhmatkhanov
f637b43fec devel/py-asn1: move to devel/py-pyasn1 to match PyPI name
- move to devel/py-pyasn1 to match PyPI name
- update *_DEPENDS and bump PORTREVISION in dependent ports
- reset PORTEPOCH

PR:		204567
Submitted by:	John W. O'Brien <john@saltant.com>
Approved by:	mhjacks@swbell.net (maintainer of devel/py-asn1)
2015-11-18 21:41:48 +00:00
Ruslan Makhmatkhanov
e6d8c6ef5a security/py-keyring: update to 5.6
Changes:
* Allow keyring to be invoked from command-line with
  python -m keyring.

See PR for full upstream changelog.

PR:		204582
Submitted by:	douglas@douglasthrift.net (maintainer)
2015-11-18 20:07:25 +00:00
Ruslan Makhmatkhanov
8473ec99c9 security/py-SecretStorage: update to 2.1.2
SecretStorage 2.1.2, 2015-06-30
===============================

* Add Item.unlock() method.
* Use setuptools when it is available.
* Documentation now uses Alabaster sphinx theme.
* Other documentation fixes and improvements.

While here let it build with python3 by picking correct py-dbus port
according to python version used in the build.

PR:		204581
Submitted by:	douglas@douglasthrift.net (maintainer)
2015-11-18 20:05:25 +00:00
Ruslan Makhmatkhanov
1c4d9cba5f security/py-keyczar: update to 0.715
Overview of Changes:
  * Change version numbering to match PEP-0440
  * Unpadding happens after MAC validation to prevent padding oracle attacks
  * Added Encoding options to all crypto operations to select whether or not
    not encoding should be used.
  * Python version setup improved for PyPi.
  * AttachedSign with empty nonce now correctly functions.

While here limit python version to 2.x, because it doesn't build with 3.x

PR:		204576
Submitted by:	douglas@douglasthrift.net (maintainer)
2015-11-18 20:03:41 +00:00
Koop Mast
656fe96fd7 Document gdm lock screen bypass
Security:	CVE-2015-7496
2015-11-18 10:18:23 +00:00
Vanilla I. Shu
b49191e046 Upgrade to 1.4.0. 2015-11-18 02:46:16 +00:00
Vanilla I. Shu
dcf4b21d03 Upgrade to 1.4.0. 2015-11-18 02:46:05 +00:00
Dan Langille
c0c203f387 Commit message will be:
Optionally use Kerberos from base, heimdal, or from MIT
take maintainership
PR: 199123
Approved by: mat (mentor)
2015-11-17 15:17:01 +00:00
Jason Unovitch
8f9602862d Fix a bad URL caused by an errant 'i' in the <url></url> tags 2015-11-16 23:46:04 +00:00
Lars Engels
4a9aada5f7 Remove bogus DISTREVISION variable.
Noticed by:	mat
2015-11-16 20:39:07 +00:00
Renato Botelho
39618f2a30 Update security/strongswan to 5.3.4
PR:		204597
Submitted by:	strongswan@nanoteq.com (maintainer)
MFH:		2015Q4
Security:	CVE 2015-8023
Security:	453e204ac4
Sponsored by:	Rubicon Communications (Netgate)
2015-11-16 14:08:25 +00:00
Renato Botelho
fb22be0918 Register CVE 2015-8023 on VuXML. It affects strongswan < 5.3.4 2015-11-16 14:06:56 +00:00