1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-14 07:43:06 +00:00
Commit Graph

16765 Commits

Author SHA1 Message Date
Tom Judge
9aa3fca8d5 Upgrade to 4.43
Changes: http://clamtk.sourceforge.net/CHANGES

Feature safe:	yes
Approved by:	eadler, db (mentors, implicit)
2012-12-09 06:05:36 +00:00
Beech Rintoul
3cb3192a5a - Update MASTER_SITES
- Fix build with clang
- Support CFLAGS properly
- Support PLIST_FILES
Feature safe: yes

PR:		ports/174200
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
2012-12-07 17:03:31 +00:00
Ryan Steinmetz
cf9bd998c7 - Reset MAINTAINER on ports with addresses that have unrecoverable bounces.
Reported by:	portscout
Feature safe:	yes
2012-12-06 16:39:07 +00:00
Kevin Lo
72aa8a0002 Add missing patch.
Feature safe:	yes
2012-12-06 01:59:29 +00:00
Ryan Steinmetz
69ba078f35 - Fix recent vulnerability entry for www/tomcat[67]
Reported by:	Victor Balada Diaz <victor@bsdes.net>
Feature safe:	yes
2012-12-05 23:52:35 +00:00
Bryan Drewery
cf84cfcb04 - Update mirror site for HPN patch
Feature safe:	yes
2012-12-05 22:32:29 +00:00
Ryan Steinmetz
2705e94e03 - Document recent vulnerabilities in www/tomcat6 and www/tomcat7
Requested by:	Victor Balada Diaz <victor@bsdes.net>
Feature safe:	yes
2012-12-05 18:47:24 +00:00
Jason Helfman
511e990ef3 - update to 1.10, trim historical header
- adopt optionsNG and general cleanup

PR:             174137 (based on)
Submitted by:   maintainer, dev2@heesakkers.info
Approved by:    maintainer
Feature safe:	yes
2012-12-05 18:26:50 +00:00
Alex Dupre
54b0cbfde4 Update to 0.13.0 release.
Feature safe:	yes
2012-12-05 10:22:18 +00:00
Erwin Lansing
f7345394fe Update to the latest patch level from ISC:
BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
  vulnerable to a software defect that allows a crafted query to
  crash the server with a REQUIRE assertion failure.  Remote
  exploitation of this defect can be achieved without extensive
  effort, resulting in a denial-of-service (DoS) vector against
  affected servers.

Security:	2892a8e2-3d68-11e2-8e01-0800273fe665
		CVE-2012-5688
Feature safe:	yes
2012-12-05 07:46:03 +00:00
Sunpoet Po-Chuan Hsieh
ab0aad4f10 - Update to 2.33
- Cleanup Makefile header

Changes:	http://search.cpan.org/dist/App-Genpass/Changes
Feature safe:	yes
2012-12-05 00:46:37 +00:00
Ryan Steinmetz
c4786a9368 - Reset MAINTAINER due to unrecoverable bounce
Reported by:	portscout
Feature safe:	yes
2012-12-04 20:39:22 +00:00
Ryan Steinmetz
62259d23d8 - Update to 2.9.4
Feature safe:	yes
2012-12-04 16:35:08 +00:00
Philippe Audeoud
0c2f06b959 - Update to 1.80
- Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.80/Changes

Feature safe:	yes
2012-12-04 09:46:24 +00:00
Ruslan Makhmatkhanov
86897a606e - update to 1.3.4
while here:
- trim Makefile header
- remove indefinite article from COMMENT

PR:		174095
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Feature safe:	yes
2012-12-04 08:38:48 +00:00
Matthias Andree
905a78cc66 Add URL for recent bogofilter heap vuln', CVE-2012-5468, aka. vuln vid=
f524d8e0-3d83-11e2-807a-080027ef73ec

Feature safe: yes
2012-12-03 22:49:42 +00:00
Ruslan Makhmatkhanov
f5731ed473 - revert PORTDOCS change from r308105 - it made this port not DOCS-safe
Reported by:	sunpoet
Feature safe:	yes
2012-12-03 21:07:36 +00:00
Matthias Andree
d8c09eec63 Update bogofilter to new upstream release 1.2.3.
Security update to fix a heap corruption bug with invalid base64 input,
reported and fixed by Julius Plenz, FU Berlin, Germany.

Feature safe:   yes
Security:       CVE-2012-5468
Security:       f524d8e0-3d83-11e2-807a-080027ef73ec
2012-12-03 20:16:21 +00:00
Ruslan Makhmatkhanov
06d9219644 - set explicit value for StartupNotify in DESKTOP_ENTRIES
Suggested by:	danfe
Feature safe:	yes
2012-12-03 06:46:25 +00:00
Kevin Lo
1f12fd1bad Update to 2.1.
Feature safe:	yes

PR:	ports/174016
Submitted by:	Paul Schmehl <pauls at utdallas dot edu>
2012-12-03 05:20:38 +00:00
Sofian Brabez
0ba0f1db67 - Update to 1.4.3
Feature safe:	yes
2012-12-02 17:12:51 +00:00
Ruslan Makhmatkhanov
910d4fde6e - pass maintainership to submitter
- add license (GPLv2)
- add desktop icon and make .desktop file
- update WWW

while here:
- trim Makefile header
- remove Author filed from pkg-descr

PR:		173978
Submitted by:	nemysis <nemysis@gmx.ch>
Feature safe:	yes
2012-12-02 13:11:25 +00:00
Ruslan Makhmatkhanov
1a08b304c1 - update to 1.11
- add new port options

PR:		174024
Submitted by:	Paul Schmehl <pauls@utdallas.edu> (maintainer)
Feature safe:	yes
2012-12-02 12:56:59 +00:00
Ruslan Makhmatkhanov
4bbecee287 - fix wording of "RUN_DEPENDS"
- use INSTALL_DATA to not set execution bit for plugins
- remove trailing whitespace in pkg-descr, while here

PR:		174047
Submitted by:	antoine (maintainer)
Feature safe:	yes
2012-12-02 12:24:40 +00:00
Ruslan Makhmatkhanov
b52aaee534 - correct displaying of pkg-message
while here:
- use one space in Created by:
- some whitespace aligning
- correct python versions in USE_PYTHON
- use PYDISTUTILS_PKGVERSION to set correct package version instead of crafting
  full PYDISTUTILS_EGGINFO
- remove trailin whitespace in pkg-descr and unneded newlines in pkg-message

PR:		174044
Submitted by:	Sayetsky Anton <vsjcfm@gmail.com>
Approved by:	Christoph Theis <theis@gmx.at> (maintainer)
Feature safe:	yes
2012-12-02 10:53:00 +00:00
Armin Pirkovitsch
e8646409cd - Update to version 6.01
- Add MASTER_SITES
- Add LICENSE

PR:           ports/170169
Submitted by: KATO Tsuguru <tkato432 _at_ yahoo.com>
              Chris Petrik <c.petrik.sosa _at_ gmail.com> (maintainer)
Approved by:  beat (mentor)
Feature safe: yes
2012-12-01 00:00:20 +00:00
Armin Pirkovitsch
1dcc6b441b - Update to version 3.3
- Update MASTER_SITES
- Add LICENSE
- Convert to optionsng

PR:           ports/170168
Submitted by: KATO Tsuguru <tkato432 _at_ yahoo.com>
Approved by:  beat (mentor)
Feature safe: yes
2012-11-30 23:50:42 +00:00
Baptiste Daroussin
b4f9e6a392 Fix compilation with clang on head
Feature safe:	yes
2012-11-30 10:47:14 +00:00
Rene Ladan
c68f649d19 Document vulnerabilities in www/chromium < 23.0.1271.95
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-11-30 09:13:32 +00:00
Sofian Brabez
2cfaf1eaf0 The Volatility Framework is a completely open collection of tools, implemented
in Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples.

WWW: http://code.google.com/p/volatility

PR:		ports/172910
Submitted by:	antoine@FreeBSD.org
Feature safe:	yes
2012-11-29 20:51:45 +00:00
Olli Hauer
ef2bdd9595 www/yahoo-ui
- fix CVE-2012-5881

security/vuxml
 - adjust version (we have only 2.8.2 in the tree)

Feature safe: yes

Approved by:	glarkin (maintainer) explicit
2012-11-29 20:33:19 +00:00
Pawel Pekala
790e08b68e Supplemental plugins for Harlan Carvey's RegRipper.
WWW: http://code.google.com/p/regripperplugins/

PR:		ports/172900
Submitted by:	antoine@FreeBSD.org
Feature safe:	yes
2012-11-29 19:31:26 +00:00
Pawel Pekala
151da04dcc RegRipper is an open source tool, written in Perl, for extracting/parsing
information (keys, values, data) from the Registry and presenting it for
analysis.

WWW: http://code.google.com/p/regripper/

PR:		ports/172899
Submitted by:	antoine@FreeBSD.org
Feature safe:	yes
2012-11-29 19:30:25 +00:00
Frederic Culot
9e0da3c3e9 - Update to 0.46
Changes:	http://search.cpan.org/dist/GnuPG-Interface/ChangeLog
Feature safe:	yes
2012-11-29 17:33:35 +00:00
Wesley Shields
ff9560f056 Fix date in yahoo-ui entry.
Noticed by:	dvl@
Feature safe:	yes
2012-11-28 14:37:24 +00:00
Baptiste Daroussin
44ab5cf477 2012-11-28 editors/glimmer: Depends on the expired gtkglarea through py-gtk
2012-11-26 palm/txt2pdbdoc: No more public distfiles
2012-11-26 sysutils/xloadface: No more public distfiles
2012-11-26 shells/gscommander: Abandonware
2012-11-26 security/saferpay: No more public distfiles
2012-11-26 x11-wm/qvwm: No more public distfiles

Feature safe:	yes
2012-11-28 08:00:54 +00:00
Raphael Kubo da Costa
26801e4cf7 Update to 2.0.3.
This new version includes a migration from Perl to C and support for
ipfw and pf.

While here, trim the Makefile headers.

PR:		ports/171951
Submitted by:	Sean Greven <sean.greven@gmail.com> (maintainer)
Feature safe:	yes
2012-11-27 21:41:29 +00:00
Olli Hauer
3bcd3fdd25 - document www/yahoo-ui security issue and mark port forbidden [1]
pet portlint (maintainer is already notified)

- adjust CVE entries for bugzilla (CVE-2012-5475 was rejected) [2]

Feature safe: yes

Security:	CVE-2012-5881 [1][2]
		CVE-2012-5882 [1][2]
		CVE-2012-5883 [2]

Approved by:	glarkin (implicit) [1]
2012-11-27 20:09:34 +00:00
Rene Ladan
11e9990c10 Describe new vulnerabilities in www/chromium < 23.0.1271.91
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-11-27 10:02:25 +00:00
TAKATSU Tomonari
91f95126fd - Update to 0.6.0
- Convert to new Makefile header
- Trim WWW: line in pkg-descr

Feature safe:	yes
2012-11-26 22:57:07 +00:00
Jase Thew
70dc19873f - Update to 1.2.3
- Assume maintainership

Changes:	https://raw.github.com/polarssl/polarssl/fb1ba781b398d39f4444515381babcc9e5a8dcd2/ChangeLog

Feature safe:	yes
2012-11-26 19:49:22 +00:00
Anton Berezin
1623ed7497 Update to 5.74.
Changes: http://cpansearch.perl.org/src/MSHELOR/Digest-SHA-5.74/Changes

Feature safe:	yes
2012-11-26 12:31:17 +00:00
Alex Dupre
0b6035194b Update to 1.5.3 release.
Feature safe:	yes
2012-11-26 10:59:28 +00:00
Florian Smeets
abbf32d4b2 - Update backports patch to 20121114
- Bump PORTREVISION

Changes:
- CVE-2006-7243
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow
context-dependent attackers to bypass intended access restrictions by placing a
safe file extension after this character, as demonstrated by .php\0.jpg at the
end of the argument to the file_exists function

Secuity 3761df02-0f9c-11e0-becc-0022156e8794 fixed by check in fopen functions
for strlen(filename) != filename_len

- CVE-2012-4388
The sapi_header_op function in main/SAPI.c does not properly determine a pointer
during checks for %0D sequences (aka carriage return characters), which allows
remote attackers to bypass an HTTP response-splitting protection mechanism via a
crafted URL, this vulnerability exists because of an incorrect fix for
CVE-2011-1398.

- Timezone database updated to version 2012.9 (2012i)

PR:		ports/173685
Submitted by:	Svyatoslav Lempert <svyatoslav.lempert@gmail.com>
Approved by:	maintainer
Feature safe:	yes
2012-11-25 15:42:22 +00:00
Wesley Shields
5fb60dc50f Add entries for the following advisories:
FreeBSD-SA-12:08.linux
FreeBSD-SA-12:07.hostapd
FreeBSD-SA-12:06.bind

Feature safe:	yes
2012-11-25 04:02:28 +00:00
Steve Wills
ebdf97f80b - Update to 0.8.7.1
- Fix installation so it doesn't overwrite your config files every time you
  upgrade the port
- Fix some space/tab issues to make portlint happy
- Use dirrmtry in a few places because some people have their own custom
  filters, actions, etc.

PR:		ports/171708
Submitted by:	Mark Felder <feld@feld.me>
Approved by:	Christoph Theis <theis@gmx.at> (maintainer)
Feature safe:	yes
2012-11-24 03:08:36 +00:00
Jase Thew
8c849a82df - Remove hardcoded dependency on security/gpg. Instead, add OPTIONS to allow
choice of GnuPG version.

PR:		ports/172323
Approved by:	jadawin (perl@)

Feature safe:	yes
2012-11-23 15:55:30 +00:00
Dirk Meyer
96e5bf3440 - opera -- execution of arbitrary code
Feature safe: yes
2012-11-22 20:27:45 +00:00
Brendan Fabeny
a6d283edd6 update to 0.2.4.6-alpha
Feature safe:	yes
2012-11-22 11:30:22 +00:00
David Thiel
0a7059d585 Update to 3.0.8, unbreak with utmpx.
Feature safe: Yes
2012-11-21 20:36:28 +00:00