Rewrite the win32-codecs entry to even better explain the vulnerability [2].
Noticed by: Dan Langille (with FreshPorts.org) [1]
Discussed with: simon [2]
as a browser plugin can be directly affected by the remote code
execution.
Also mention that I changed the entry date in the previous entry
(PHP) which I had forgotten to do yesterday and did not mention
in the previous commit.
IGNORE= "foo now contained in the base system"
into
IGNORE= "is now contained in the base system"
since the code which prints this string prefices it with the package
name.
Suggested by: kris
instead of PORTEPOCH) [1]
correct the jdk -- jar directory traversal vulnerability entry, the
FreeBSD Foundation uses different package names [2], [3].
For both entries the modification date was bumped.
Reported by: Gabor Kovesdan (on #bsdports) [1]
David Robillard <david dot robillard at gmail dot com> [2]
Tim Zingelman <zingelman at fnal dot gov>
- Add p0f (passive OS fingerprinting) to OPTIONS and an rc.d script for p0fanalyzer
PR: 102944
Submitted by: Gabor Kovesdan <gkovesdan@t-hosting.hu> (maintainer)
Noticed by: Henrik Schack <henrik@schack.dk>
- Register some dependencies directly that were installed by another dependencies before
- Add BerkeleyDB to OPTIONS for nanny/cache/snmp, it is not a mandatory dependency any more
- Add SQLite to OPTIONS for lookups/logging/quarantine
- Add SASL to OPTIONS for authentication
- Add SpamAssassin to OPTIONS, it is not a mandatory dependency any more
- Add p0f (passive OS fingerprinting) to OPTIONS and an rc.d script for p0fanalyzer
- Add file to OPTIONS to use ports' file(1) instead of system file(1)
- Add nomarch and cabextract to OPTIONS, they are not mandatory any more
- Provide some alternatives for archiver dependencies (rar/unrar, arj/unar, etc.)
- Cleanup deprecated PLIST_SUB and pkg-plist entries
- Use reinplace editing instead of patches where possible
- Ensure that the config file is installed with proper attributes
- Add some p0f explanation to pkg-message
- Style
PR: 102944
Submitted by: Gabor Kovesdan <gkovesdan@t-hosting.hu> (maintainer)
1.1. TLS Lite supports non-traditional authentication methods such as SRP,
shared keys, and cryptoIDs in addition to X.509 certificates. TLS Lite is pure
Python, however it can access OpenSSL, cryptlib, pycrypto, and GMPY for faster
crypto operations. TLS Lite integrates with httplib, xmlrpclib, poplib,
imaplib, smtplib, SocketServer, asyncore, and Twisted.
WWW: http://trevp.net/tlslite/
PR: ports/102923
Submitted by: Alexander Botero-Lowry <alex at foxybanana.com>