1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-20 08:27:15 +00:00
Commit Graph

274886 Commits

Author SHA1 Message Date
Sunpoet Po-Chuan Hsieh
8239700e11 - Update to 2012.03.11
Feature safe:	yes
2012-03-12 02:28:19 +00:00
Sunpoet Po-Chuan Hsieh
456a07c3b9 - Update to 20120311
Feature safe:	yes
2012-03-12 02:27:48 +00:00
Wesley Shields
5bc12cbf97 Typo fix.
Feature safe:	yes
2012-03-12 02:23:58 +00:00
Doug Barton
e346523d43 Restore support for ${PERL_LEVEL} < 501000
Feature safe:	yes
2012-03-12 00:32:09 +00:00
Matthias Andree
375fa2ae28 Update to new upstream release 2.60. Notable new features are:
- The LUA port option enables Lua support for DHCP lease-change scripts
- DHCPv6 support
- IPv6 Router Advertisement support

Changelog:    http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
Feature safe: yes
2012-03-11 23:59:44 +00:00
Mark Linimon
83df4f9a4b Note re-addition of lang/perl5.8 and lang/perl5.10.
Feature safe:	yes
2012-03-11 23:54:32 +00:00
Mark Linimon
984c3924ee Restore lang/perl5.8 and lang/perl5.10 from the Attic.
PR:		ports/165467 (reversal of)
Feature safe:	yes (actually restoring for POLA)
Hat:		portmgr
2012-03-11 23:52:40 +00:00
Mark Linimon
7047959f24 Undo ports/165457 to not violate POLA. As far as I knew, the PR
was to test what happened when we did eventually delete these two
ports, not to delete them immediately.

A subsequent commit will add appropriate deprecation messages.

Hat:		portmgr
PR:		ports/165457
Feature safe:	yes (actually no, however, this is to preserve POLA)
2012-03-11 23:49:09 +00:00
Simon L. B. Nielsen
09e8089e23 Portaudit 0.6.0:
Fix remote code execution which can occur with a specially crafted
audit file.  The attacker would need to get the portaudit(1) to
download the bad audit database, e.g. by performing a man in the
middle attack.

Add signature verification of the portaudit database.  The public key
is for the database generated for portaudit.FreeBSD.org is included
in the distribution.

(This parts add the portaudit public key missed in initial commit.)

Submitted by:   Michael Gmelin <freebsd@grem.de>
Reported by:    Michael Gmelin <freebsd@grem.de>, Joerg Scheinert
Security:       Remote code execution
Security:       http://vuxml.FreeBSD.org/6d329b64-6bbb-11e1-9166-001e4f0fb9b1.html
Feature safe:   yes
With hat:       so
2012-03-11 22:05:39 +00:00
Simon L. B. Nielsen
8659bcc60f - Document portaudit -- auditfile remote code execution.
- Update (c) year.

Feature safe:	yes
2012-03-11 21:37:42 +00:00
Simon L. B. Nielsen
23dc1240c1 Portaudit 0.6.0:
Fix remote code execution which can occur with a specially crafted
audit file.  The attacker would need to get the portaudit(1) to
download the bad audit database, e.g. by performing a man in the
middle attack.

Add signature verification of the portaudit database.  The public key
is for the database generated for portaudit.FreeBSD.org is included
in the distribution.

Submitted by:	Michael Gmelin <freebsd@grem.de>
Reported by:	Michael Gmelin <freebsd@grem.de>, Joerg Scheinert
Security:	Remote code execution
Security:	http://vuxml.FreeBSD.org/6d329b64-6bbb-11e1-9166-001e4f0fb9b1.html
Feature safe:	yes
With hat:	so
2012-03-11 21:32:58 +00:00
Simon L. B. Nielsen
4d22b6af09 Make bsd.port.mk not parse port audit's auditfile directly to
check for vulnerabilities, but call portaudit instead.

This fixes a remote command execution vulnerability for users who have
portaudit installed.

While changing the code anyway, remove the annoying and very verbose
"Vulnerability check disabled, database not found" warning.

Security:	Remote code execution
Security:	http://vuxml.FreeBSD.org/6d329b64-6bbb-11e1-9166-001e4f0fb9b1.html
Approved by:	portmgr
Feature safe:	yes (or at least approved)
With hat:	so
2012-03-11 21:30:49 +00:00
Doug Barton
7c588a6b6d Fix OPTIONS broken by the perl < 5.12 sweep [1]
While I'm here, reduce the number of docs variables.

PR:		ports/165930 [1]
Submitted by:	Alexey Markov <redrat@mail.ru> [1]

Feature safe:	yes
2012-03-11 21:25:55 +00:00
Ryan Steinmetz
d391588c75 - Do not install examples whenever NOPORTEXAMPLES is defined [1]
- Do not install duplicate sample config files
- Do not bump PORTREVISION

PR:		ports/165800 [1]
Submitted by:	Michael Scheidell <scheidell@FreeBSD.org> [1]
Feature safe:	yes
2012-03-11 19:26:45 +00:00
Michael Scheidell
cbaaba0909 - Revert all changes made to p5-Mail-SpamAssassin/Makefile [1]
- This closed pr's ports/165924 [2] and ports/165935 [3]
- No PORTREVISION bump

PR:		ports/165605 [1]
Submitted by:	scheidell (me) [1]
Reported by: 	Alexey Markov <redrat@mail.ru> [2], Helge Oldach <ports-mail-spamass@oldach.net> [3]
Feature safe:	yes
2012-03-11 18:14:12 +00:00
Ashish SHUKLA
577fce0c18 - Fix typo in perl entry
Feature safe:	yes
2012-03-11 17:57:11 +00:00
Wesley Shields
00071a3c04 Appease the tidy target. ;)
Feature safe:	yes
2012-03-11 16:07:58 +00:00
Jun Kuriyama
a44bf74af0 - Upgrade to 2.2.4.
Feature safe:	yes
2012-03-11 14:56:42 +00:00
Chris Rees
28f214ef25 Use new USE_PGSQL hooks for depending on server:build
Approved by:	kuriyama (maintainer)
Feature safe:	yes
2012-03-11 14:38:36 +00:00
Chris Rees
339b7c53f8 Use new USE_PGSQL hooks for depending on server:build
Approved by:	kuriyama (maintainer)
Feature safe:	yes
2012-03-11 14:33:16 +00:00
Jun Kuriyama
61f4ca043b - Add missing depends and unbroken.
Feature safe:	yes
2012-03-11 13:58:18 +00:00
Jun Kuriyama
a357338f28 - Upgrade to 1.3.9.2.
Feature safe:	yes
2012-03-11 13:51:07 +00:00
Sergey A. Osokin
805363f73b Update from 0.09rc6 to 0.09rc7.
Feature safe:	yes
2012-03-11 13:12:32 +00:00
Chris Rees
23c612e95e - Add dependency logic: USE_PGSQL= component[:target] for versioned ports
- Fix postgresql version logic-- now falls back to default version only if
  WANT_ isn't set, thus preserving package building for non-default versions

Feature safe:	yes
2012-03-11 13:07:59 +00:00
Sergey A. Osokin
21ce12b208 Update from 2.0.0 to 2.1.0.
Feature safe:	yes
2012-03-11 13:07:53 +00:00
Rene Ladan
ab0f267739 Update to 17.0.963.79
Security:	http://www.vuxml.org/freebsd/ab1f515d-6b69-11e1-8288-00262d5ed8ee.html
Feature safe:	yes
2012-03-11 12:47:42 +00:00
Jun Kuriyama
1890f65302 - Upgrade to 1.000009.
- Add run depends on required p5-version>=0.87.  perl-5.10.1 and later
  has version.pm, but its version is only 0.77 [1].

PR:		ports/164913 [1]
Submitted by:	swills [1]
Feature safe:	yes
2012-03-11 11:37:32 +00:00
Jun Kuriyama
779b9498bb - Upgrade to 0.3000.
Feature safe:	yes
2012-03-11 11:25:10 +00:00
Rene Ladan
6f56c36e73 Document vulnerabilities in www/chromium < 17.0.963.79
Security:	CVE-2011-3047
Feature safe:	yes
2012-03-11 11:16:48 +00:00
Jun Kuriyama
d507cfd3b2 - Upgrade to 0.1020.
Feature safe:	yes
2012-03-11 11:14:12 +00:00
Jun Kuriyama
5610a480f7 - Upgrade to 1.08.
Feature safe:	yes
2012-03-11 10:33:58 +00:00
Jun Kuriyama
192805c967 - Upgrade to 0.05.
Feature safe:	yes
2012-03-11 10:32:43 +00:00
Jun Kuriyama
8272278d8e - Upgrade to 0.00003.
Feature safe:	yes
2012-03-11 10:31:34 +00:00
Martin Matuska
705d53962e Update to 6.7.5.10
Feature safe:	yes
2012-03-11 10:29:44 +00:00
Jun Kuriyama
ff44606c78 - Upgrade to 0.21.
Feature safe:	yes
2012-03-11 10:24:14 +00:00
Jun Kuriyama
c7407e9ed0 - Upgrade to 1.10.
Feature safe:	yes
2012-03-11 10:19:04 +00:00
Jun Kuriyama
7c62c5bdeb - Upgrade to 0.46.
Feature safe:	yes
2012-03-11 10:14:09 +00:00
Jun Kuriyama
2c8c132e20 - Upgrade to 0.04001.
Feature safe:	yes
2012-03-11 10:12:05 +00:00
Jun Kuriyama
b645247d84 - Upgrade to 0.120490.
Feature safe:	yes
2012-03-11 10:04:58 +00:00
Jun Kuriyama
8fe8185980 - Upgrade to 1.3093.
Feature safe:	yes
2012-03-11 10:04:08 +00:00
Jun Kuriyama
b65509bbb2 - Upgrade to 0.87.
Feature safe:	yes
2012-03-11 09:20:21 +00:00
Jun Kuriyama
9df0cdcb7d - Upgrade to 0.12.
Feature safe:	yes
2012-03-11 09:19:43 +00:00
Jun Kuriyama
2cdef002ca - Upgrade to 1.14.
Feature safe:	yes
2012-03-11 09:16:08 +00:00
Jun Kuriyama
5e3a340af9 - Upgrade to 0.10.
Feature safe:	yes
2012-03-11 09:15:38 +00:00
Jun Kuriyama
b712c1e76d - Upgrade to 3.00.
Feature safe:	yes
2012-03-11 09:08:37 +00:00
Jun Kuriyama
c55ac58e0f - Upgrade to 2.09.
Feature safe:	yes
2012-03-11 09:05:48 +00:00
Jun Kuriyama
35b019eb43 - Upgrade to 0.20.
Feature safe:	yes
2012-03-11 09:05:17 +00:00
Jun Kuriyama
c74160acd0 - Upgrade to 0.09.
Feature safe:	yes
2012-03-11 08:59:00 +00:00
Jun Kuriyama
6c72da6d9c - Upgrade to 1.64.
Feature safe:	yes
2012-03-11 08:52:53 +00:00
Jun Kuriyama
d579eea8c0 - Upgrade to 0.34.
Feature safe:	yes
2012-03-11 08:44:19 +00:00