2011-09-01 deskutils/xopps: No more public distfiles
2011-09-01 devel/adocman: No more public distfiles
2011-09-01 devel/bisongen: No more public distfiles
2011-09-01 devel/crow: BROKEN for more than 6 month
2011-09-01 devel/p5-Config-INI-MVP: Disappear from CPAN
2011-09-01 devel/p5-Date-Set: Disappear from CPAN
2011-09-01 devel/p5-File-FTS: No more public distfiles
2011-09-01 devel/p5-PerlMenu: No more public distfiles
2011-09-01 devel/p5-Proc-PIDFile: No more public distfiles
2011-09-01 devel/p5-UNIVERSAL-exports: Disappear from CPAN
2011-09-01 devel/ruby-rbtree: No Master Site
2011-09-01 dns/host: No more public distfiles
2011-09-01 emulators/linux-padjoy: No more public distfiles
2011-09-01 emulators/mame-extras: No more public distfiles
2011-09-01 emulators/snespp: BROKEN for more than 6 month
2011-09-01 emulators/xgs: No more public distfiles
2011-09-01 ftp/gproftpd: No more public distfiles
2011-09-01 ftp/muddleftpd: No more public distfiles
- Fixes compilation on systems that don't have math/gmp installed
PR: ports/159617
Submitted by: Ralf van der Enden <tremere@cainites.net> (maintainer)
- Make use of CPAN:USER macro
- Correct LICENSE (ART10 instead of ART20)
- Pet portlint(1) by reordering LICENSE section
PR: ports/159314
Submitted by: Jase Thew <freebsd@beardz.net> (maintainer)
remove support for them from bsd.java.mk. As Jikes is not available in Java 1.5
or higher, remove it from bsd.java.mk too (suggested by hq@) and from the ports
which used it (only occurences were USE_JIKES=no). Support for the Blackdown VM
is also removed, as it is not available in Java 1.5 and higher.
Also remove the mapping from Java 1.1-1.4 to Java 1.5+ in bsd.java.mk to detect
old, broken ports; therefore bump the minimal value of JAVA_VERSION to 1.5.
While here, replace static values of JAVA_VERSION in files/*.in by
%%JAVA_VERSION%% .
PR: ports/158969
Submitted by: rene
Tested on: pointyhat-west -exp
- Add SPF support
- Added rotation of name servers - SF Patch ID: 2795929.
- Address sourceforge patch requests 2981978, 2795932 to add revlookupall
and raise DNSError instead of IndexError on server fail.
- Use blocking IO with timeout for TCP replies.
- Don't try to close socket when never opened.
- Clarify CNRI (academic-style) license.
PR: ports/156029
Submited by: Ruslan Mahmatkhanov <cvs-src@yandex.ru>
ALL BIND USERS ENCOURAGED TO UPGRADE IMMEDIATELY
This update addresses the following vulnerabilities:
CVE-2011-2464
=============
Severity: High
Exploitable: Remotely
Description:
A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464https://www.isc.org/software/bind/advisories/cve-2011-2464
CVE-2011-2465
=============
Severity: High
Exploitable: Remotely
Description:
A defect in the affected versions of BIND could cause the "named" process
to exit when queried, if the server has recursion enabled and was
configured with an RPZ zone containing certain types of records.
Specifically, these are any DNAME record and certain kinds of CNAME
records.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2465https://www.isc.org/software/bind/advisories/cve-2011-2465
Additional changes in this version:
* If named is configured to be both authoritative and resursive and
receives a recursive query for a CNAME in a zone that it is
authoritative for, if that CNAME also points to a zone the server
is authoritative for, the recursive part of name will not follow
the CNAME change and the response will not be a complete CNAME
chain. [RT #24455]
Thus the patch for this bug has been removed from the port
* Using Response Policy Zone (RPZ) to query a wildcard CNAME label
with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
query type independant. [RT #24715] [CVE-2011-1907]
ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY
This update addresses the following vulnerability:
CVE-2011-2464
=============
Severity: High
Exploitable: Remotely
Description:
A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464https://www.isc.org/software/bind/advisories/cve-2011-2464