1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-18 03:46:03 +00:00
Commit Graph

301700 Commits

Author SHA1 Message Date
Baptiste Daroussin
e7b16f486f Convert to new options framework 2013-06-05 14:23:04 +00:00
Baptiste Daroussin
1d99007bdd Push the DOCS test into the right section 2013-06-05 14:12:59 +00:00
Baptiste Daroussin
f0a27c9d1e Convert to new options framework 2013-06-05 14:11:19 +00:00
Marcus von Appen
3d895fa859 - Unbreak build for new libX11
- Trim Makefile headers
- OPTIONize DOCS and EXAMPLES
2013-06-05 13:59:19 +00:00
Pietro Cerutti
4df1cde4ff - Avoid using deprecated features of Tcl 8.6 2013-06-05 13:50:26 +00:00
Baptiste Daroussin
a340f31742 Convert to new options framework 2013-06-05 13:45:33 +00:00
Pietro Cerutti
e44e782a6a - Set tcl 86 as an invalid version, segfaults 2013-06-05 13:35:16 +00:00
Bryan Drewery
d746e3650b Remove unneeded :dist group now that manpages are fixed 2013-06-05 13:29:47 +00:00
Bryan Drewery
1392a92da7 Update to 3.8.1 2013-06-05 13:27:47 +00:00
Baptiste Daroussin
91cb18c603 Convert to new options framework 2013-06-05 12:51:05 +00:00
Baptiste Daroussin
eae6ba083d Convert to new options framework, while here cleanup linknx 2013-06-05 12:22:03 +00:00
Erwin Lansing
c971701b31 Update to 9.9.3-P1
Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

   Now supports NAPTR regular expression validation on all platforms,
   and avoids memory exhaustion compiling pathological regular
   expressions. (CVE-2013-2266)  [RT #32688]

   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of specific queries that are received.  (CVE-2012-5688)
   [RT #30792 / #30996]

   Prevents an assertion failure in named when RPZ and DNS64 are
   used together. (CVE-2012-5689) [RT #32141]

See release notes for further features and bug fixes:
https://kb.isc.org/article/AA-00970/0/BIND-9.9.3-P1-Extended-Support-Version-Release-Notes.html

Security:	CVE-2013-3919
		CVE-2013-2266
		CVE-2012-5688
		CVE-2012-5689
2013-06-05 11:51:29 +00:00
Erwin Lansing
92b781fac4 Update to 9.8.5-P1
Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

   A deliberately constructed combination of records could cause
   named to hang while populating the additional section of a
   response. (CVE-2012-5166) [RT #31090]

   Now supports NAPTR regular expression validation on all platforms,
   and avoids memory exhaustion compiling pathological regular
   expressions. (CVE-2013-2266)  [RT #32688]

   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of specific queries that are received.  (CVE-2012-5688)
   [RT #30792 / #30996]

   Prevents an assertion failure in named when RPZ and DNS64 are
   used together. (CVE-2012-5689) [RT #32141]

See release notes for further features and bug fixes:
https://kb.isc.org/article/AA-00969/0/BIND-9.8.5-P1-Release-Notes.html

Security:	CVE-2013-3919
		CVE-2012-5166
		CVE-2013-2266
		CVE-2012-5688
		CVE-2012-5689
2013-06-05 11:49:51 +00:00
Erwin Lansing
47f031680b Update to 9.6-ESV-R9-P1
Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

   Prevents a named assert (crash) when validating caused by using
   "Bad cache" data before it has been initialized. [CVE-2012-3817]
   [RT #30025]

   A condition has been corrected where improper handling of
   zero-length RDATA could cause undesirable behavior, including
   termination of the named process. [CVE-2012-1667] [RT #29644]

See release notes for further features and bug fixes:
https://kb.isc.org/article/AA-00968/0/BIND-9.6-ESV-R9-P1-Release-Notes.html

Security:	CVE-2013-3919
		CVE-2012-3817
		CVE-2012-1667
2013-06-05 11:46:54 +00:00
Bryan Drewery
51f6c32ae5 - Update to 1.8.004.20130531
- Pass maintainership to submitter
- Added option descriptions

PR:		ports/179040
Submitted by:	Danilo Egea Gondolfo <danilogondolfo@gmail.com>
2013-06-05 11:44:37 +00:00
Steve Wills
7127618887 - Update to 1.4.14 2013-06-05 11:18:53 +00:00
Steve Wills
d1d1cab382 - Update to 1.2.3 2013-06-05 11:18:30 +00:00
Steve Wills
1ce79ed760 - Update to 1.7.6 2013-06-05 11:18:16 +00:00
William Grzybowski
63856003dc - Update to 0.3 [1]
- Remove USE_GCC (builds with clang) [1]
- Add LICENSE (GPLv2)

This is a new upstream, the original is dead.

PR:		ports/179029
Submitted by:	Herbert J. Skuhra <h.skuhra@gmail.com>
Approved by:	culot (mentor), maintainer
2013-06-05 11:15:06 +00:00
Pietro Cerutti
71b35cf640 - Fix build with Tcl/Tk 8.6
- Also, make clang happier, even if GCC is still required

Reported by:	miwi (Tcl/Tk 8.6 exp-run late comers)
2013-06-05 10:43:43 +00:00
Baptiste Daroussin
263dbfb37b Convert to new options framework 2013-06-05 10:38:43 +00:00
Rene Ladan
50cf8379c1 Update to 27.0.1453.110
Security:	http://www.vuxml.org/freebsd/4865d189-cd62-11e2-ae11-00262d5ed8ee.html
2013-06-05 10:36:26 +00:00
Martin Matuska
7f6b8b60ad Horde package update:
mail/pear-Horde_Imap_Client 2.11.3 -> 2.11.4
mail/pear-Horde_Mime 2.2.0 -> 2.2.1
2013-06-05 10:30:47 +00:00
Baptiste Daroussin
badd7f819b Convert to new options framework 2013-06-05 10:21:04 +00:00
Baptiste Daroussin
922a68de00 Convert to new options framework 2013-06-05 10:11:41 +00:00
Baptiste Daroussin
7795dbc6af Convert to new options framework 2013-06-05 10:04:51 +00:00
Baptiste Daroussin
d83378e19e Convert to new options framework 2013-06-05 09:25:43 +00:00
Frederic Culot
4e36e80489 - Update to 1.0003
- Trim Makefile's header
- Pet portlint(1) by changing tab into space in WWW link

Changes:	http://search.cpan.org/dist/POSIX-Regex/Changes
2013-06-05 09:25:16 +00:00
Mathieu Arnold
60b3520df4 Update to 4.023. 2013-06-05 09:13:25 +00:00
Frederic Culot
239bc37c09 - Update to 0.15.3
PR:		ports/179265
Submitted by:	Christer Edwards <christer.edwards@gmail.com> (maintainer)
2013-06-05 09:05:45 +00:00
Koop Mast
218db049e2 Update to 0.16.6.
Obtained from:	GNOME dev repo
Security:	CVE-2013-1431
2013-06-05 09:02:46 +00:00
Palle Girgensohn
f0aa98db05 Don't remove /var/*/shibboleth with rm -rf, so we don't "pull out the carpet from underneath" a running shibd. Hence allow updating while the old shibd is still running. 2013-06-05 09:02:10 +00:00
Baptiste Daroussin
e451e43da7 Convert to new option framework
Approve by:	gnome (kwm)
Obtained from:	gnome dev repo
2013-06-05 08:59:14 +00:00
Mathieu Arnold
77cee7b84b Update to 0.81. 2013-06-05 08:50:32 +00:00
Marcus von Appen
772e243768 - Add WEBP image support
- Trim Makefile headers
- Switch to USES
2013-06-05 08:34:01 +00:00
Mathieu Arnold
66b8abede9 Update to 1.7.0. 2013-06-05 08:09:23 +00:00
Mathieu Arnold
bac361c8e9 Update to 1.7.0. 2013-06-05 08:08:59 +00:00
Mathieu Arnold
ea0be977ce Update to 1.053. 2013-06-05 08:04:01 +00:00
Jason Helfman
dc287e59c0 -another conversion fix for PGSQL
Reported by: qat
2013-06-05 08:01:09 +00:00
Jason Helfman
e8d3d92beb - DB selection needs to be OPTIONS_MULTI 2013-06-05 07:51:38 +00:00
Mathieu Arnold
8e3359fa29 Update to 1.06. 2013-06-05 07:47:56 +00:00
Jason Helfman
3093d0f8af - fix conversion of PGSQL 2013-06-05 07:25:18 +00:00
Jason Helfman
5ac1de8628 - adoption of optionsNG
Approved by:	portmgr (bapt)
2013-06-05 07:04:03 +00:00
Baptiste Daroussin
e8f4f44fa1 Convert to new options framework 2013-06-05 06:59:44 +00:00
Jason Helfman
4443b4c75d - adoption of optionsNG
Approved by:	portmgr (bapt)
2013-06-05 06:53:35 +00:00
Baptiste Daroussin
764b2d06e7 Removed due to dependency on expired linux-js.
Consider using emulators/joytran from the same author.

Approved by:	Timothy Beyer <beyert@cs.ucr.edu> (maintainer)
2013-06-05 06:41:32 +00:00
Baptiste Daroussin
e1fc6b86e7 Remove unwanted changes 2013-06-05 06:08:26 +00:00
Baptiste Daroussin
4f80aec8ef Propertly makes config.sub working as expecting on amd64
Reported by:	many
2013-06-05 06:06:03 +00:00
Steve Wills
29f0594346 - Update to 0.12.1 2013-06-05 03:04:21 +00:00
Steve Wills
b489f4a597 - Update to 2.1.0 2013-06-05 02:09:01 +00:00