1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-31 10:46:16 +00:00
Commit Graph

29336 Commits

Author SHA1 Message Date
Tobias Kortkamp
88c53bfe31 security/vuls: USES=go does not take any arguments
Submitted by:	Dmitri Goutnik <dg@syrec.org>
Differential Revision:	https://reviews.freebsd.org/D19803
2019-04-02 19:45:48 +00:00
Danilo Egea Gondolfo
ae1a85e388 - Use GO_* variables to simplify the Makefile 2019-04-02 18:19:01 +00:00
Bernard Spil
7c51a0ae65 security/vuxml: Document Apache httpd vulnerabilities 2019-04-02 07:58:42 +00:00
Yuri Victorovich
2f31716e5c dns/libidn: Update to 1.35
Bump 48 ports.
Previous update to 1.34 broke jabberd.

PR:		228048
2019-04-02 03:35:54 +00:00
Danilo Egea Gondolfo
cafe07b3a8 - Document sysutils/kubectl CVE-2019-1002101 2019-04-01 19:29:46 +00:00
Tobias Kortkamp
84cc7e9924 Remove expired ports:
2019-03-31 archivers/go-compress: Go libraries should not be packaged
2019-03-31 textproc/go.text: Go libraries should not be packaged
2019-03-31 devel/go-hashicorp-logutils: Go libraries should not be packaged
2019-03-31 devel/go-cpuid: Go libraries should not be packaged
2019-03-31 devel/go-nuid: Go libraries should not be packaged
2019-03-31 devel/go-yaml: Go libraries should not be packaged
2019-03-31 devel/go-raw: Go libraries should not be packaged
2019-03-31 devel/go-go.uuid: Go libraries should not be packaged
2019-03-31 devel/go-goregen: Go libraries should not be packaged
2019-03-31 devel/go-runewidth: Go libraries should not be packaged
2019-03-31 devel/go-cobra: Go libraries should not be packaged
2019-03-31 devel/go-pflag: Go libraries should not be packaged
2019-03-31 devel/go-slices: Go libraries should not be packaged
2019-03-31 devel/go-form: Go libraries should not be packaged
2019-03-31 devel/go-bayesian: Go libraries should not be packaged
2019-03-31 devel/go-uuid: Go libraries should not be packaged
2019-03-31 devel/go-logrus: Go libraries should not be packaged
2019-03-31 devel/go-metrics: Go libraries should not be packaged
2019-03-31 devel/go-codec: Go libraries should not be packaged
2019-03-31 devel/go-faker: Go libraries should not be packaged
2019-03-31 devel/go-crc32: Go libraries should not be packaged
2019-03-31 security/goptlib: Go libraries should not be packaged
2019-03-31 security/go.crypto: Go libraries should not be packaged
2019-03-31 net/go-httppath: Go libraries should not be packaged
2019-03-31 net/go-amqp: Go libraries should not be packaged
2019-03-31 net/go.net: Go libraries should not be packaged
2019-03-31 net/go-nats: Go libraries should not be packaged
2019-03-31 net/go-httptreemux: Go libraries should not be packaged
2019-03-31 databases/gosqlite3: Go libraries should not be packaged
2019-03-31 databases/redigo: Go libraries should not be packaged
2019-03-31 databases/gomdb: Go libraries should not be packaged
2019-03-31 databases/radix.v2: Go libraries should not be packaged
2019-03-31 databases/levigo: Go libraries should not be packaged
2019-03-31 www/unit-go: Go libraries should not be packaged
2019-03-31 www/webgo: Go libraries should not be packaged
2019-03-31 www/go-fasthttp: Go libraries should not be packaged
2019-04-01 19:10:15 +00:00
Danilo G. Baio
76b6465ee5 security/vuxml: Document irc/znc issue
Security:	CVE-2019-9917
2019-03-31 13:50:45 +00:00
Sunpoet Po-Chuan Hsieh
e853501c73 Remove expired security/rubygem-sshkey1 2019-03-31 13:42:21 +00:00
Sunpoet Po-Chuan Hsieh
2c28a6e3d5 Remove expired security/kbfs 2019-03-31 13:41:25 +00:00
Sunpoet Po-Chuan Hsieh
73b1e3abe6 Update devel/protobuf to 3.7.1
- Bump PORTREVISION of dependent ports for shlib change

Changes:	https://github.com/protocolbuffers/protobuf/releases
PR:		236157
Exp-run by:	antoine
2019-03-31 13:41:02 +00:00
Tobias C. Berner
6fa27dcfe7 Mark almost all Haskell ports for expiration by mid April
Ports for Haskell *libraries* are going to be removed from the ports tree.
Haskell *applications* are going to be statically linked with all dependencies
( https://reviews.freebsd.org/D19730  ), so there is no reason to keep
Haskell libraries in tree.

If you think a port is wrongly marked and should stay, please contact haskell@

Submitted by:	arrowd
Differential Revision:	https://reviews.freebsd.org/D19244
2019-03-30 17:39:36 +00:00
Sunpoet Po-Chuan Hsieh
98064f0618 Document py-notebook vulnerability 2019-03-29 16:36:03 +00:00
Steve Wills
b5547d532e security/teleport: update to 3.1.5
PR:		235295
Approved by:	maintainer timeout (seanc, >2 months)
2019-03-29 14:34:07 +00:00
Sunpoet Po-Chuan Hsieh
f345d876dd Update openjpeg status 2019-03-29 14:17:12 +00:00
Renato Botelho
6248a7aaea security/sshguard: Update to 2.3.1
PR:		236496
Approved by:	maintainer timeout (> 2 weeks)
Sponsored by:	Rubicon Communications, LLC (Netgate)
2019-03-29 12:24:32 +00:00
Antoine Brodin
1e3b70be02 Update to 4.9.0 2019-03-29 09:32:53 +00:00
Sunpoet Po-Chuan Hsieh
beaeac5b88 Convert to options target helper
- Add NO_ARCH

Approved by:	portmgr (blanket)
2019-03-28 18:09:41 +00:00
Jesper Schmitz Mouridsen
0f8e28c12e Upgrade the LXQt desktop environment to 0.14.0
Upstream announcement https://forum.lxqt.org/t/release-lxqt-0-14-0/572

Approved by: miwi (mentor)
Differential Revision: https://reviews.freebsd.org/D19056
2019-03-28 17:59:33 +00:00
Sunpoet Po-Chuan Hsieh
96c7ef1554 Update to 0.8.1
Changes:	https://github.com/googleapis/google-auth-library-ruby/blob/master/CHANGELOG.md
2019-03-28 17:33:28 +00:00
Dmitry Marakasov
06248565ea Add missing python categories 2019-03-28 14:06:53 +00:00
Dmitry Marakasov
043c4d19a2 You wrote a cool network client or server. It encrypts connections
using TLS. Your test suite needs to make TLS connections to itself.

Uh oh. Your test suite probably doesn't have a valid TLS certificate.
Now what?

trustme is a tiny Python package that does one thing: it gives you
a fake certificate authority (CA) that you can use to generate fake
TLS certs to use in your tests. Well, technically they're real
certs, they're just signed by your CA, which nobody trusts. But you
can trust it. Trust me.

WWW: https://github.com/python-trio/trustme
2019-03-28 14:03:14 +00:00
Emanuel Haupt
42e4c2683b Update to 0.7.3 2019-03-28 13:15:05 +00:00
Larry Rosenman
c32d138002 vuxml: Document mail/dovecot buffer overflow. 2019-03-28 12:21:36 +00:00
Matthias Fechner
f5797f4a4f Bump revision to use new libgit2 version 0.28.1.
Reported by:	jbeich
2019-03-28 09:43:18 +00:00
Kirill Ponomarev
327d231f38 Change from gmake to cmake to support more ARCHs.
PR:		235376
Submitted by:	Ralf van der Enden <tremere at cainites_net>
2019-03-28 09:28:51 +00:00
Jochen Neumeister
ee6ee6c2af Add modified line for drupal after r496987
Sponsored by:	Netzkommune GmbH
2019-03-28 08:26:50 +00:00
Jason E. Hale
b0276a1466 Update security/*gpgme* to 1.13.0
Changes:	https://lists.gnupg.org/pipermail/gnupg-devel/2019-March/034272.html
2019-03-28 05:22:03 +00:00
Jose Alonso Cardenas Marquez
f7ed7e21d4 - Update 94d63fd7-508b-11e9-9ba0-4c72b94353b5 entry 2019-03-27 21:51:40 +00:00
Jan Beich
480c577baa devel/icu: update to 64.1
Changes:	http://site.icu-project.org/download/64
ABI:		https://abi-laboratory.pro/tracker/timeline/icu4c/
PR:		236325
Exp-run by:	antoine
Differential Revision:	https://reviews.freebsd.org/D19479
2019-03-27 21:11:08 +00:00
Sunpoet Po-Chuan Hsieh
5742a6d17b Update Python vulnerability (d74371d2-4fee-11e9-a5cd-1df8a848de3d) 2019-03-27 19:23:40 +00:00
Jochen Neumeister
9717d9fea1 Add entry for www/drupal7
Sponsored by:	Netzkommune GmbH
2019-03-27 17:44:06 +00:00
Eugene Grosbein
6f8db91167 security/ipsec-tools: small correction NATT patch
This change fixes rare case for "site to site" IPSec tunnel mode
when remote peer is behind NAT and has its own LAN behind.
Now this works too (previously NATT worked only for single host behind NAT).
2019-03-27 08:56:35 +00:00
Adam Weinberger
b526986409 Update gnupg to 2.2.15
* sm: Fix --logger-fd and --status-fd on Windows for non-standard
    file descriptors.

  * sm: Allow decryption even if expired keys are configured.  [#4431]

  * agent: Change command KEYINFO to print ssh fingerprints with other
    hash algos.

  * dirmngr: Fix build problems on Solaris due to the use of reserved
    symbol names.  [#4420]

  * wkd: New commands --print-wkd-hash and --print-wkd-url for
    gpg-wks-client.

  Release-info: https://dev.gnupg.org/T4434
2019-03-27 02:18:50 +00:00
Matthias Andree
af71bac37e Reinstate GSSAPI_NONE option.
Not bumping PORTREVISION as the default build is unaffected.

Obtained from:	Jacob Nevins, upstream Git commit 7ad08649
2019-03-26 23:58:56 +00:00
Sunpoet Po-Chuan Hsieh
269d1bfae8 Document Python vulnerability 2019-03-26 18:12:23 +00:00
Gleb Popov
85bfd07243 security/klee: Update to 2.0 and switch to LLVM 8.
PR:		230516
Submitted by:	brooks
Approved by:	tcberner (mentor)
2019-03-26 04:38:52 +00:00
Cy Schubert
12cbcbc86a Update to the latest MIT krb5 github commit. 2019-03-26 04:10:46 +00:00
Adam Weinberger
0cd3ae1ab4 Update gnupg to 2.2.14, pet portlint, and remove a redundant readline
dependency.

  * gpg: Allow import of PGP desktop exported secret keys.  Also avoid
   importing secret keys if the secret keyblock is not valid.  [#4392]

  * gpg: Do not error out on version 5 keys in the local keyring.

  * gpg: Make invalid primary key algo obvious in key listings.

  * sm: Do not mark a certificate in a key listing as de-vs compliant
    if its use for a signature will not be possible.

  * sm: Fix certificate creation with key on card.

  * sm: Create rsa3072 bit certificates by default.

  * sm: Print Yubikey attestation extensions with --dump-cert.

  * agent: Fix cancellation handling for scdaemon.

  * agent: Support --mode=ssh option for CLEAR_PASSPHRASE.  [#4340]

  * scd: Fix flushing of the CA-FPR DOs in app-openpgp.

  * scd: Avoid a conflict error with the "undefined" app.

  * dirmngr: Add CSRF protection exception for protonmail.

  * dirmngr: Fix build problems with gcc 9 in libdns.

  * gpgconf: New option --show-socket for use wity --launch.

  * gpgtar: Make option -C work for archive creation.

  Release-info: https://dev.gnupg.org/T4412

PR:		236777
Submitted by:	Yasuhiro Kimura
2019-03-26 00:05:12 +00:00
Dmitry Marakasov
0eeeb07225 - Update to 2.24.0 2019-03-25 14:57:41 +00:00
Koichiro Iwao
d2791353b7 security/py-scp: Update to 0.13.2
Fix AssertionError in recursive get() when _rename is set and server sends
a POPD at the end (_depth > 0).

PR:		236778
Submitted by:	Sergey Akhmatov <sergey@akhmatov.ru> (maintainer)
Relnotes:	https://github.com/jbardin/scp.py/blob/v0.13.2/CHANGELOG.md
2019-03-25 11:48:35 +00:00
Adriaan de Groot
b681f9b307 New ports security/olm and net-im/mtxclient
These are support libraries for Matrix clients; Nheko in particular.
Until I wrap-up Nheko, they aren't used by anything.
2019-03-25 10:40:41 +00:00
Guido Falsi
89e14cfcde Import upstream paatch which fixes build when KEESHARE is disabled.
PR:		236774
Submitted by:	myself
Approved by:	portmgr (blanket: bugfix, build/run fix)
Obtained from:	eb9ff677d0
2019-03-25 09:36:31 +00:00
Kurt Jaeger
c6eceeb0ec security/keepassxc: update 2.3.4 -> 2.4.0
- removed deprecated KeePassHTTP option
- added KeeShare option (Sharing integration with KeeShare)

PR:		236726
Submitted by:	Andrew Romanenko <melanhit@gmail.com>
Relnotes:	https://github.com/keepassxreboot/keepassxc/blob/develop/CHANGELOG
2019-03-24 20:53:48 +00:00
Koop Mast
df924bc36d Drop the GUI option which uses expired www/py-webkitgtk. 2019-03-24 15:34:40 +00:00
Antoine Brodin
a8157e7f43 Update to 5.0.13 2019-03-24 15:18:18 +00:00
Antoine Brodin
c2e560c887 Update to 3.0.8 2019-03-24 15:14:18 +00:00
Antoine Brodin
f0137d2822 Update to 2.2.1 2019-03-24 15:13:27 +00:00
Antoine Brodin
b72dfe4da1 Update to 0.1.17 2019-03-24 15:13:04 +00:00
Sunpoet Po-Chuan Hsieh
9349cd6d99 Fix build on powerpc
PR:		236744
Submitted by:	Piotr Kubaj <pkubaj@anongoth.pl>
2019-03-24 14:33:37 +00:00
Sunpoet Po-Chuan Hsieh
076fe5f346 Mark DEPRECATED and set EXPIRATION_DATE to 2019-03-31 2019-03-24 14:32:53 +00:00