aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* Update KDE Applications to 18.04.2tcberner2018-06-104-12/+12
|
* Document new vulnerability in www/chromium < 67.0.3396.79cpm2018-06-101-0/+29
| | | | Obtained from: https://chromereleases.googleblog.com/2018/06/stable-channel-update-for-desktop.html
* Remove bogus dependency on libunwind (brought by ruby on tier-1), those portsantoine2018-06-101-1/+0
| | | | | | should build fine on tier-2 archs With hat: portmgr
* Update to 4.16.60antoine2018-06-102-5/+7
|
* Update to 1.3.37antoine2018-06-102-4/+4
|
* - Added missing dependencymiwi2018-06-101-0/+2
| | | | | | - Bump PORTREVISION Submitted by: Yasuhiro Kimura
* Update security/keychain to 2.8.5garga2018-06-102-4/+4
|
* - Fix Flavormiwi2018-06-102-2/+2
| | | | Sponsored by: iXsystems Inc.
* - Update to 0.25.0miwi2018-06-1029-148/+148
| | | | | | - While here switch to PY_FLAVOR Sponsored by: iXsystems Inc.
* security/erlang-fast_tls: Transfer maintainership to erlang@.farrokhi2018-06-101-1/+1
|
* - Add LICENSE_FILEamdmi32018-06-092-1/+2
| | | | | | - Update WWW Approved by: portmgr blanket
* - Fix tests for py-cracklibamdmi32018-06-091-5/+5
| | | | | | | | | | - Specify PYTHONPATH - Specifying correct dictionary path - Fix configure for py-cracklib by using USES=localbase - Switch to new test framework - Whitespace fix Approved by: portmgr blanket
* security/py-ntlm-auth: Update 1.1.0 -> 1.2.0yuri2018-06-092-4/+4
| | | | Reported by: portscout
* security/vault: update to 0.10.2swills2018-06-092-4/+4
|
* Update to 2.5.4 which fixes multiple memory allocation issues:leres2018-06-093-5/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Multiple fixes and improvements to BinPAC generated code related to array parsing, with potential impact to all Bro's BinPAC-generated analyzers in the form of buffer over-reads or other invalid memory accesses depending on whether a particular analyzer incorrectly assumed that the evaulated-array-length expression is actually the number of elements that were parsed out from the input. - The NCP analyzer (not enabled by default and also updated to actually work with newer Bro APIs in the release) performed a memory allocation based directly on a field in the input packet and using signed integer storage. This could result in a signed integer overflow and memory allocations of negative or very large size, leading to a crash or memory exhaustion. The new NCP::max_frame_size tuning option now limits the maximum amount of memory that can be allocated. Other fixes: - A memory leak in the SMBv1 analyzer. - The MySQL analyzer was generally not working as intended, for example, it now is able to parse responses that contain multiple results/rows. Add gettext-runtime to USES to address a poudriere testport warning. Reviewed by: matthew (mentor) Approved by: matthew (mentor) MFH: 2018Q2 Security: 2f4fd3aa-32f8-4116-92f2-68f05398348e Differential Revision: https://reviews.freebsd.org/D15678
* Fix vuxml build.gjb2018-06-081-0/+1
| | | | Sponsored by: The FreeBSD Foundation
* Add entry for gnupg CVEadamw2018-06-081-0/+31
|
* Update gnupg to 2.2.8 (security release)adamw2018-06-082-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CVE-2018-12020: The OpenPGP protocol allows to include the file name of the original input file into a signed or encrypted message. During decryption and verification the GPG tool can display a notice with that file name. The displayed file name is not sanitized and as such may include line feeds or other control characters. This can be used inject terminal control sequences into the out and, worse, to fake the so-called status messages. These status messages are parsed by programs to get information from gpg about the validity of a signature and an other parameters. Status messages are created with the option "--status-fd N" where N is a file descriptor. Now if N is 2 the status messages and the regular diagnostic messages share the stderr output channel. By using a made up file name in the message it is possible to fake status messages. Using this technique it is for example possible to fake the verification status of a signed mail. Also: * gpg: Decryption of messages not using the MDC mode will now lead to a hard failure even if a legacy cipher algorithm was used. The option --ignore-mdc-error can be used to turn this failure into a warning. Take care: Never use that option unconditionally or without a prior warning. * gpg: The MDC encryption mode is now always used regardless of the cipher algorithm or any preferences. For testing --rfc2440 can be used to create a message without an MDC. * gpg: Sanitize the diagnostic output of the original file name in verbose mode. [#4012,CVE-2018-12020] * gpg: Detect suspicious multiple plaintext packets in a more reliable way. [#4000] * gpg: Fix the duplicate key signature detection code. [#3994] * gpg: The options --no-mdc-warn, --force-mdc, --no-force-mdc, --disable-mdc and --no-disable-mdc have no more effect. * agent: Add DBUS_SESSION_BUS_ADDRESS and a few other envvars to the list of startup environment variables. [#3947] MFH: 2018Q2 Security: CVE-2018-12020
* Transfer more Erlang ports to erlang@.olgeni2018-06-082-2/+2
|
* Update to 0.061.vanilla2018-06-082-4/+4
|
* security/vuxml: mark firefox < 60.0.2 as vulnerablejbeich2018-06-081-0/+41
|
* Mark as broken on powerpc64.linimon2018-06-081-3/+6
| | | | | | While here, pet portlint. Approved by: portmgr (tier-2 blanket)
* Document the latest Flash Player vulnerabilities.jkim2018-06-081-0/+38
| | | | https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
* security/ssh-vault: Update to 0.12.4dbaio2018-06-082-4/+4
| | | | | | | Changes: https://raw.githubusercontent.com/ssh-vault/ssh-vault/0.12.4/CHANGELOG.md PR: 228816 Submitted by: nbari@tequila.io (maintainer)
* Update to 4.4.2.tijl2018-06-074-8/+9
|
* Update security/mbedtls to 2.9.0 and bump dependent ports.tijl2018-06-075-8/+11
|
* security/p11-kit: update to 0.23.12novel2018-06-072-4/+4
|
* security/nss: update to 3.37.3jbeich2018-06-075-109/+8
| | | | | | Changes: https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.37.3_release_notes Changes: https://hg.mozilla.org/projects/nss/shortlog/NSS_3_37_3_RTM ABI: https://abi-laboratory.pro/tracker/timeline/nss/
* Mark bro < 2.5.4 as vulnerable as per:leres2018-06-071-0/+27
| | | | | | | | https://www.bro.org/download/NEWS.bro.html Reviewed by: ler (mentor) Approved by: ler (mentor) Differential Revision: https://reviews.freebsd.org/D15677
* security/clamtk: update 4.45 -> 5.25pi2018-06-064-67/+29
| | | | | | | | | | | - new MASTER_SITE - fix dependencies - update WWW PR: 193908 Submitted by: pi, w.schwarzenfeld@utanet.at, dvwerks@cox.net Reported by: nikos60@hushmail.com Approved by: tj (maintainer timeout)
* security/vuxml/vuln.xml: Fix indentation (silences make validate)jrm2018-06-061-3/+3
| | | | Reported by: mfechner
* Document new vulnerabilities in www/gitlab < 10.8.2 or < 10.7.5 or < 10.6.6.mfechner2018-06-051-0/+33
| | | | | | Reviewed by: tz (mentor) Approved by: tz (mentor) Differential Revision: https://reviews.freebsd.org/D15635
* Add LICENSEsunpoet2018-06-052-1/+6
| | | | | | | - Add NO_ARCH - Update WWW Approved by: portmgr (blanket)
* Update linksunpoet2018-06-051-1/+1
|
* Fix LICENSE_FILEsunpoet2018-06-052-2/+2
| | | | | | - Fix and update WWW Approved by: portmgr (blanket)
* Fix and update WWWsunpoet2018-06-051-1/+1
| | | | Approved by: portmgr (blanket)
* Fix and update WWWsunpoet2018-06-051-1/+1
| | | | Approved by: portmgr (blanket)
* Fix and update WWWsunpoet2018-06-051-1/+1
| | | | Approved by: portmgr (blanket)
* Fix and update WWWsunpoet2018-06-051-1/+1
| | | | Approved by: portmgr (blanket)
* Fix and update WWWsunpoet2018-06-051-1/+1
|
* Add LICENSEsunpoet2018-06-052-1/+4
| | | | - Fix and update WWW
* Add LICENSEsunpoet2018-06-052-1/+4
| | | | - Fix and update WWW
* Add LICENSEsunpoet2018-06-052-1/+4
| | | | - Fix and update WWW
* Add LICENSEsunpoet2018-06-052-1/+4
| | | | - Fix and update WWW
* Add LICENSEsunpoet2018-06-052-1/+4
| | | | - Fix and update WWW
* Fix and update WWWsunpoet2018-06-051-1/+1
| | | | Approved by: portmgr (blanket)
* Update to 5.0.1sunpoet2018-06-052-4/+4
| | | | Changes: https://github.com/net-ssh/net-ssh/blob/master/CHANGES.txt
* Fix USE_GITHUB usage.mat2018-06-041-1/+0
| | | | Sponsored by: Absolight
* security/vuxml: Fix version ranges for latest Git vulnerabilitiesjrm2018-06-031-1/+5
| | | | Reported by: jbeich
* Update to 5.0.0sunpoet2018-06-032-4/+4
| | | | Changes: https://github.com/net-ssh/net-ssh/blob/master/CHANGES.txt
* Add rubygem-net-ssh4 4.2.0 (copied from rubygem-net-ssh)sunpoet2018-06-034-0/+45
| | | | - Add PORTSCOUT
* Add rubygem-ed25519 1.2.4sunpoet2018-06-034-0/+35
| | | | | | | | | | | | | | | | ed25519.rb is a Ruby binding to the Ed25519 elliptic curve public-key signature system described in RFC 8032. Two implementations are provided: a MRI C extension which uses the "ref10" implementation from the SUPERCOP benchmark suite, and a pure Java version based on str4d/ed25519-java. Ed25519 is one of two notable algorithms implemented atop the Curve25519 elliptic curve. The x25519 gem is a related project of this one, and implements the X25519 Diffie-Hellman key exchange algorithm on the Montgomery form of Curve25519. WWW: https://github.com/crypto-rb/ed25519
* security/vuxml: Document devel/git CVEs (2018-11233 and 2018-11235)jrm2018-06-031-0/+39
|
* Adjust USES to fix building on gcc-based archs (in particular, powerpc64).linimon2018-06-032-2/+2
| | | | | | | | | | | | On the clang architectures, these changes have no effect: the baser compiler already includes the needed features. While here, remove now-redundant CXXFLAGS statements and pet portlint (no other content change). Tested on both powerpc64 and amd64. Approved by: portmgr (tier-2 blanket)
* - Mark Deprecated both projects are dead since 2016miwi2018-06-031-0/+3
| | | | | | | https://github.com/omab/django-social-auth/blob/master/README.rst https://pypi.org/project/python-social-auth/ Sponsored by: iXsystems Inc.
* Update to 1.4.0sunpoet2018-06-022-4/+4
| | | | Changes: https://github.com/doorkeeper-gem/doorkeeper-openid_connect/blob/master/CHANGELOG.md
* Update to 1.5.0sunpoet2018-06-022-4/+4
| | | | | Changes: https://github.com/GoogleCloudPlatform/google-auth-library-python/releases https://github.com/GoogleCloudPlatform/google-auth-library-python/blob/master/CHANGELOG.rst
* security/logcheck: Update WWWjoneum2018-06-021-1/+1
| | | | | PR: 228664 Submitted by: Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
* Update to 1.809sunpoet2018-06-012-6/+4
| | | | | | - Remove BROKEN_SSL=openssl-devel Changes: https://metacpan.org/changes/distribution/Crypt-OpenSSL-X509
* Update to 2.0.0sunpoet2018-06-012-4/+4
| | | | | Changes: https://github.com/keybase/client/releases https://github.com/keybase/client/commits/master
* Update to 2.0.0sunpoet2018-06-012-5/+4
| | | | Changes: https://github.com/keybase/kbfs/commits/master
* Document security/strongswan multiple vulnerabilitieskrion2018-05-311-0/+37
| | | | | | | ((CVE-2018-10811, CVE-2018-5388) PR: 228631 Submitted by: strongswan@Nanoteq.com
* Update to 5.6.3krion2018-05-313-27/+4
| | | | | | | | | | | | | | | | Fixes: - Denial-of-Service Vulnerability in the IKEv2 key derivation (CVE-2018-10811) - Denial-of-Service Vulnerability in the stroke plugin (CVE-2018-5388) - Crash on FreeBSD that was present in 5.6.2 - The kernel-pfkey plugin optionally installs routes via internal interface (one with an IP in the local traffic selector). On FreeBSD, enabling this selects the correct source IP when sending packets from the gateway itself. PR: 228631 Submitted by: maintainer
* Update to 1.3.19krion2018-05-312-5/+4
| | | | | PR: 228634 Submitted by: maintainer
* USES=emacs ports: Bump PORTREVISION for editors/emacs 26.1 upgradejrm2018-05-311-1/+1
| | | | | Or, mark ports that fail to build as BROKEN. https://lists.freebsd.org/pipermail/freebsd-ports/2018-May/113518.html
* Document new vulnerabilities in www/chromium < 67.0.3396.62cpm2018-05-311-0/+76
| | | | Obtained from: https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
* Update to 1.4.2sunpoet2018-05-312-4/+4
| | | | | Changes: https://github.com/GoogleCloudPlatform/google-auth-library-python/releases https://github.com/GoogleCloudPlatform/google-auth-library-python/blob/master/CHANGELOG.rst
* security/openvpn-devel: Update to 201821joneum2018-05-312-4/+4
| | | | | PR: 228589 Submitted by: ecrist@secure-computing.net (maintainer)
* - Add LICENSE_FILEamdmi32018-05-301-6/+4
| | | | | | | | - Switch to USES=localbase - Switch to new test framework - Switch to options helpers Approved by: portmgr blanket
* security/nss: switch r469336 to upstream fixjbeich2018-05-301-5/+92
|
* - Update MASTER_SITESzi2018-05-291-1/+1
| | | | | | PR: 218085 Submitted by: w.schwarzenfeld@utanet.at Reported by: Alan Somers
* - Update to 5.46zi2018-05-292-4/+4
|
* security/gopass: Update to 1.7.2joneum2018-05-292-4/+4
| | | | | | | Changelog: https://github.com/gopasspw/gopass/releases PR: 228572 Submitted by: Sascha Holzleiter <sascha@root-login.org> (maintainer)
* Bump PORTREVISION on *-sbcl ports after lang/sbcl upgrade.krion2018-05-291-1/+1
|
* - Switch to new test frameworkamdmi32018-05-281-3/+1
| | | | Approved by: portmgr blanket
* Increase the default blacklist threshold from 30 to 120, which is the upstreamadamw2018-05-283-2/+3
| | | | | | | | | default. 30 makes it far too easy to get locked out of your own server. 120 is simply a safer starting point. PR: 227016 Submitted by: Dan McGregor (maintainer) MFH: 2018Q2
* Allow concurrent installation of py-artifactsantoine2018-05-282-1/+8
|
* Update WWWsunpoet2018-05-28213-213/+213
| | | | | | | search.cpan.org is shutting down. It will redirect to metacpan.org after June 25, 2018. With hat: perl
* Update to 0.3.4sunpoet2018-05-272-4/+4
| | | | Changes: https://github.com/zaru/webpush/commits/master
* Update lang/ghc 8.4.2 and the hs-* ports the newer versionstcberner2018-05-2665-111/+152
| | | | | | | | | | | | | | * Update lang/ghc to 8.4.2 * Update the boostrap compiler to 8.4.1 * Update the many hs-* ports * Bump the rest Thanks a lot to arrowd for doing all the heavy lifting :) PR: 227968 Exp-run by: antoine Submitted by: arrowd Differential Revision: https://reviews.freebsd.org/D15005
* security/p5-IO-Socket-SSL: update to 2.056swills2018-05-262-6/+8
| | | | | | | | | While here, give maintainership to submitter since maintainer has timed out repeatedly. PR: 223459 Submitted by: Sergei Vyshenski <svysh.fbsd@gmail.com> Approved by: maintainer timeout (jadawin, >2 weeks, multiple timeouts)
* security/nss: update to 3.37.1jbeich2018-05-254-8/+8
| | | | | | Changes: https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.37.1_release_notes Changes: https://hg.mozilla.org/projects/nss/shortlog/NSS_3_37_1_RTM ABI: https://abi-laboratory.pro/tracker/timeline/nss/
* Update to 1.7.2rc1antoine2018-05-253-10/+27
|
* Update to 1.7.2rc1antoine2018-05-255-67/+70
|
* Update to 0.26.post6antoine2018-05-253-10/+31
|
* New port: security/py-rekall_libantoine2018-05-255-0/+46
| | | | | | Support libraries for the Rekall framework. WWW: http://www.rekall-forensic.com/
* Update to 20180524antoine2018-05-242-29/+34
|
* Update to 20180510antoine2018-05-242-11/+11
|
* Update to 20180329antoine2018-05-242-10/+9
|
* Update to 20180510antoine2018-05-242-5/+5
|
* Update to 20180505antoine2018-05-242-4/+4
|
* Fix typo in WWWsunpoet2018-05-241-1/+1
| | | | Approved by: portmgr (blanket)
* security/openvpn-devel: Update to 201815meta2018-05-242-5/+4
| | | | | | PR: 227567 Submitted by: ecrist@secure-computing.net (maintainer) Approved by: pi (mentor)
* security/tor: Update 0.3.2.10 -> 0.3.3.6yuri2018-05-232-4/+4
| | | | | | | Changelog: https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.3.3.6 Reported by: Nick Mathewson <nickm@torproject.org> (upstream notification)
* Add PY_FLAVOR to Python module dependencies.mat2018-05-223-4/+4
| | | | Sponsored by: Absolight
* Add Python flavors.mat2018-05-221-0/+1
| | | | | | | Even if those ports do not support more than one Python version, it makes it easier to depend on them. Sponsored by: Absolight
* Update to 4.0.4.mat2018-05-222-4/+4
| | | | Sponsored by: Absolight
* - Update to 5.45zi2018-05-222-5/+4
|
* Update to 1.16.1sunpoet2018-05-212-4/+4
| | | | Changes: https://github.com/capistrano/sshkit/releases
* - Update to 1.4.8zi2018-05-213-6/+7
| | | | - Support a uid/gid other than nobody
* Update to 4.16.57antoine2018-05-212-6/+7
|
* Update to 0.3.8antoine2018-05-212-4/+4
|
* Update to 1.3.34antoine2018-05-212-4/+4
|
* Update to 2.1.19antoine2018-05-212-4/+4
|
* Document BIND multiple vulnerabilities.delphij2018-05-211-0/+42
|
* Flask-SAML is an extension for the Flask web application micro frameworkmiwi2018-05-215-0/+42
| | | | | | | | | | that implements Security Association Markup Language (SAML) authentication. WWW: https://bitbucket.org/asecurityteam/flask_saml PR: 225202 Submitted by: John W. O'Brien <john@saltant.com> Sponsored by: iXsystems Inc.
* Update VuXML entry for xorg-server issueszeising2018-05-201-3/+11
| | | | | | | | | Update VuXML entry for xorg-server issues related to CVE-2017-10971 and CVE-2017-10972. The version check was wrong missing the portepoch which meant that the entry never matched anything. It was also only added for xorg-server 1.19, while we have 1.18 in base. Fix formatting and edit the overly long lines.
* security/sops: Update to 3.0.5joneum2018-05-192-4/+4
| | | | | | | Changelog: https://github.com/mozilla/sops/releases PR: 228326 Submitted by: Dmitri Goutnik <dg@syrec.org> (maintainer)
* Update to a snapshot of 6 april 2018antoine2018-05-192-5/+5
|
* Update KDE Frameworks to 5.46tcberner2018-05-191-3/+3
| | | | | Exp-run by: antoine PR: 228200
* security/1password-client: upgrade to 0.4.1ler2018-05-182-8/+8
| | | | https://app-updates.agilebits.com/product_history/CLI
* grab this port as I'm a 1Password user.ler2018-05-181-1/+1
|
* Scale back my portfolioadamw2018-05-181-1/+1
| | | | | I'm releasing maintainership on a number of ports that I no longer have time to maintain effectively.
* security/lastpass-cli: fix distinfo after my latest updategahr2018-05-181-3/+3
| | | | Reported by: antoine
* Fix nginx server root pathsunpoet2018-05-181-1/+4
| | | | | | | - Bump PORTREVISION for package change PR: 228294 Reported by: Dhananjay Balan <mail@dbalan.in>
* Update to 3.1.12sunpoet2018-05-182-3/+4
| | | | Changes: https://github.com/codahale/bcrypt-ruby/releases
* security/tor-devel: Update 0.3.3.5-rc -> 0.3.4.1-alphayuri2018-05-172-5/+5
| | | | | | | Changelog: https://gitweb.torproject.org/tor.git/tree/ChangeLog Reported by: Nick Mathewson <nickm@torproject.org> (upstream notification)
* security/lastpass-cli: update to 1.3.1gahr2018-05-172-4/+4
| | | | | | | Fixes https://github.com/lastpass/lastpass-cli/issues/409 PR: 228310 Approved by: portmgr (mat)
* Drop maintainership, I don't have enought time to maintain itbapt2018-05-171-1/+1
|
* Document curl vulnerabilitysunpoet2018-05-171-0/+58
|
* security/libu2f-host: Update to 1.1.6cpm2018-05-163-5/+5
| | | | | | Noteworthy changes in 1.1.6 - Change waiting logic on authenticate to allow for faster feedback
* Update to 0.9sunpoet2018-05-162-4/+4
| | | | Changes: http://search.cpan.org/dist/Parse-Snort/Changes
* Bump PORTREVISION for package change in r469676sunpoet2018-05-161-0/+1
| | | | Notified by: mat
* Update to 1.5.3arved2018-05-162-4/+4
|
* Mark ports as deprecated which are not required by gitlab 10.7.x anymore and ↵mfechner2018-05-166-0/+18
| | | | | | | | have no other dependency on them. Reviewed by: tz (mentor) Approved by: tz (mentor) Differential Revision: https://reviews.freebsd.org/D15434
* security/vault: update to 0.10.1swills2018-05-152-4/+4
|
* Update to 2.7.12joneum2018-05-152-4/+4
|
* net-im/rubygem-earthquake: Remove portmeta2018-05-154-29/+0
| | | | | | | | | | | | This port has been broken for years and no longer maintained by upstream. Also, remove security/rubygem-jugyo_twtter_oauth. It is a fork of twitter_oauth[1] and required only by net-im/rubygem-earthquake. [1] https://rubygems.org/gems/twitter_oauth Approved by: hrs (mentor) Differential Revision: https://reviews.freebsd.org/D15441
* GSSAPI Negotiate HTTP authentication for Flask routes.miwi2018-05-144-0/+30
| | | | | | | | WWW: https://github.com/mkomitee/flask-kerberos PR: 225199 Submitted by: John W. O'Brien <john@saltant.com> Sponsored by: iXsystems Inc.
* Update to the latest MIT commit.cy2018-05-142-5/+5
|
* security/keepassxc: Unbreak build without BROWSERtobik2018-05-141-1/+1
| | | | | | | | | ===> Registering installation for keepassxc-2.3.1 pkg-static: Unable to access file /usr/ports/security/keepassxc/work/stage/usr/local/bin/keepassxc-proxy:No such file or directory *** Error code 74 PR: 228224 Submitted by: Dmitri Goutnik <dg@syrec.org>
* Update to 2.1.1sunpoet2018-05-142-4/+4
| | | | | Changes: https://github.com/ruby/openssl/blob/master/History.md https://github.com/ruby/openssl/commits/master
* Document vulnerabilities in wavpack 5.1.0 and earlierriggs2018-05-131-0/+57
| | | | | PR: 228146 Submitted by: yasu@utahime.org
* Bump maximum description length to 5000riggs2018-05-131-1/+1
| | | | | | | Details: Thanks to www/chromium, we now have a valid entry with 4933 characters. Entries this long will probably remain exceptions, but there should not be a warning for the currently valid entries.
* Bump copyright to 2018riggs2018-05-131-1/+1
|
* Document vulnerabilities in chromium before 66.0.3359.170riggs2018-05-131-0/+37
| | | | Reported by: Tommi Pernila <tommi.pernila@iki.fi> via e-mail
* security/libgpg-error: update to 1.31novel2018-05-133-5/+6
|
* - pywinrm is named pywinrm, not winrmantoine2018-05-124-2/+2
| | | | | | - pywinrm is not python3 ready Reported by: pkg-fallout
* Upgrade gravitational teleport to 2.5.7.seanc2018-05-123-5/+20
| | | | | | | | Explicitly specify the git sha when building teleport. Restrict builds to amd64. Reviewed by: swills, mat Approved by: swills (mentor) Differential Revision: https://reviews.freebsd.org/D15311
* New port: security/py-winrmpi2018-05-124-0/+32
| | | | | | | | | Python library for Windows Remote Management (WinRM) WWW: https://github.com/diyan/pywinrm PR: 226450 Submitted by: rozhuk.im@gmail.com
* New port: security/py-requests-credssppi2018-05-124-0/+29
| | | | | | | | | An authentication handler for using CredSSP with Python Requests. WWW: https://github.com/jborean93/requests-credssp PR: 226448 Submitted by: rozhuk.im@gmail.com
* Add pkg-message for setup instructionssunpoet2018-05-121-0/+3
| | | | | PR: 228156 Submitted by: 0mp
* New port: security/p5-Crypt-Perlpi2018-05-115-0/+126
| | | | | | Cryptography in pure perl, needs no non-core XS dependencies. WWW: http://search.cpan.org/dist/Crypt-Perl/
* New port: security/p5-Bytes-Random-Secure-Tinypi2018-05-114-0/+37
| | | | | | | | | | | | A tiny Perl extension to generate cryptographically-secure random bytes. It provides random bytes from a cryptographically secure random number generator (ISAAC), seeded from strong entropy sources on a wide variety of platforms. It does so without external dependencies (except on Windows), and has a minimal but useful user interface patterned after the module Bytes::Random::Secure. WWW: http://search.cpan.org/dist/Bytes-Random-Secure-Tiny/
* security/py-zxcvbn-python: update to 4.4.26jbeich2018-05-112-4/+4
| | | | Changes: https://github.com/dwolfhub/zxcvbn-python/compare/v4.4.25...v4.4.26
* Update KDE Applications to 18.04.1tcberner2018-05-114-12/+12
|
* Update to 1.0.48sunpoet2018-05-112-4/+4
| | | | | Changes: https://github.com/keybase/client/releases https://github.com/keybase/client/commits/master
* Update to 1.0.48sunpoet2018-05-112-4/+4
| | | | Changes: https://github.com/keybase/kbfs/commits/master
* Document jenkins security issuesswills2018-05-101-0/+41
|
* - Update to 2.0.2wen2018-05-105-373/+603
| | | | | PR: 228075 Submitted by: svysh.fbsd@gmail.com(maintainer)
* Update to 0.8sunpoet2018-05-103-4/+7
| | | | | | - Add TEST_DEPENDS Changes: http://search.cpan.org/dist/Parse-Snort/Changes
* security/vuxml: mark firefox < 60 as vulnerablejbeich2018-05-101-0/+104
| | | | PR: 226476
* New port: security/p5-Crypt-X509-CRLpi2018-05-104-0/+37
| | | | | | | | | | | Crypt::X509::CRL is an object oriented X.509 certificate revocation list parser with numerous methods for directly extracting information from certificate revocation lists WWW: http://search.cpan.org/dist/Crypt-X509-CRL/ PR: 228074 Submitted by: Sergei Vyshenski <svysh.fbsd@gmail.com>
* security/vuxml: document kamailio CVE-2018-8828pi2018-05-101-0/+26
| | | | | PR: 227677 Submitted by: Ben Hood <ben@relops.com>
* Document ftp/wget's cookie injection vulnerabilityvd2018-05-101-0/+27
| | | | | | Submitted by: Yasuhiro KIMURA <yasu@utahime.org> MFH: 2018Q2 Security: CVE-2018-0494
* Changed the MAINTAINER of all my ports to have mfechner@FreeBSD.org listed.mfechner2018-05-0911-11/+11
| | | | | | Reviewed by: tz (mentor) Approved by: tz (mentor) Differential Revision: https://reviews.freebsd.org/D15270
* - Update WWWamdmi32018-05-091-1/+1
| | | | Approved by: portmgr blanket
* Document the latest Flash Player vulnerability.jkim2018-05-091-0/+29
| | | | https://helpx.adobe.com/security/products/flash-player/apsb18-16.html
* - update to miniupnpc 2.1dinoex2018-05-091-1/+1
| | | | | | | | | | | PR: 228050 Submitted by: Hung-Yi Chen - fix python build - add LICENSE for slave port - make portlint happier - bump PORTREVISION on ports using the shared lib
* Document FreeBSD-SA-18:06.debugregfeld2018-05-091-0/+34
|
* Drop FreeBSD 10.3 supportjbeich2018-05-082-21/+1
| | | | | | Reviewed by: yuri (SoPlex), sunpoet (nghttp2), cpm (chromium), brooks (llvm*) Approved by: portmgr (rene) Differential Revision: https://reviews.freebsd.org/D15238
* security/nss: unbreak armv6 after r469333jbeich2018-05-081-0/+14
| | | | | | | | | | | | | cd FreeBSD11.1_OPT.OBJ ; sh 'nss/cmd/shlibsign/.'/sign.sh 'nss/cmd/shlibsign/../../../dist/FreeBSD11.1_OPT.OBJ' \ 'nss/cmd/shlibsign/FreeBSD11.1_OPT.OBJ' FreeBSD \ 'nss/cmd/shlibsign/../../../dist/FreeBSD11.1_OPT.OBJ/lib' 'nss/cmd/shlibsign/../../../dist/FreeBSD11.1_OPT.OBJ/lib/libsoftokn3.so' nss/cmd/shlibsign/FreeBSD11.1_OPT.OBJ/shlibsign -v -i nss/cmd/shlibsign/../../../dist/FreeBSD11.1_OPT.OBJ/lib/libsoftokn3.so C_Initialize failed: 0x00000030, CKR_DEVICE_ERROR NSPR error code: -5977: Failure to load dynamic library Initiailzing softoken failed: 0x00000030, CKR_DEVICE_ERROR NSPR error code: -5977: Failure to load dynamic library moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB gmake[3]: *** [Makefile:92: ../../../dist/FreeBSD11.1_OPT.OBJ/lib/libsoftokn3.chk] Error 1
* security/nss: update to 3.37jbeich2018-05-084-8/+8
| | | | | | Changes: https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.37_release_notes Changes: https://hg.mozilla.org/projects/nss/shortlog/NSS_3_37_RTM ABI: https://abi-laboratory.pro/tracker/timeline/nss/
* security/nextcloud-twofactor_u2f: Update to 1.5.4brnrd2018-05-072-5/+4
|
* security/libressl: Don't stage man3 manpages if MAN3 offbrnrd2018-05-072-2/+2
|
* Update to 0.11.0krion2018-05-072-4/+4
| | | | | PR: 228022 Submitted by: maintainer
* Update to 0.7sunpoet2018-05-062-6/+8
| | | | | | | - Add NO_ARCH - Take maintainership Changes: http://search.cpan.org/dist/Parse-Snort/Changes
* security/libressl-devel: Update to 2.7.3brnrd2018-05-063-25/+5
|
* security/libressl: Update to 2.7.3brnrd2018-05-063-24/+4
|
* New port: openvpn-auth-script/Makefile: Generic script-based deferred auth ↵yuri2018-05-064-0/+34
| | | | | | | plugin for OpenVPN PR: 226492 Submitted by: Phil DeMonaco <pdemon@gmail.com>
* Document python vulnerabilitysunpoet2018-05-061-0/+33
|
* For ports in `security' category: remove redundant PKGMESSAGE assignment,danfe2018-05-054-5/+0
| | | | | which is set appropriately by the b.p.m when `pkg-message' appears on the SUB_FILES list.
* - Sort the knobs for better readabilitydanfe2018-05-051-5/+4
| | | | - Remove redundant PKGMESSAGE assignment
* Update to 1.10krion2018-05-053-6/+7
| | | | | PR: 227972 Submitted by: maintainer
* Update plasma5-kwallet-pam with security fixes released today.adridg2018-05-043-0/+342
| | | | | | | | | | | https://www.kde.org/info/security/advisory-20180503-1.txt CVE-2018-10380 The patches are taken from the git commits referred to in the security notice, hence the unusual naming. Approved by: tcberner (mentor, implicit) Security: 83a548b5-4fa5-11e8-9a8e-001e2a3f778d
* Security notice regarding kwallet-pam (KDE Plasma5).adridg2018-05-041-0/+30
| | | | | | | | | | https://www.kde.org/info/security/advisory-20180503-1.txt The port is not built by default through the regular KDE packages, and has been in the ports tree only a week; the impact is expected to be low. Approved by: tcberner (mentor, implicit)
* Update to 0.060.vanilla2018-05-042-4/+4
|
* Update gnupg to 2.2.7adamw2018-05-042-5/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Also, remove unnecessary USE_LDCONFIG. * gpg: New option --no-symkey-cache to disable the passphrase cache for symmetrical en- and decryption. * gpg: The ERRSIG status now prints the fingerprint if that is part of the signature. * gpg: Relax emitting of FAILURE status lines * gpg: Add a status flag to "sig" lines printed with --list-sigs. * gpg: Fix "Too many open files" when using --multifile. [#3951] * ssh: Return an error for unknown ssh-agent flags. [#3880] * dirmngr: Fix a regression since 2.1.16 which caused corrupted CRL caches under Windows. [#2448,#3923] * dirmngr: Fix a CNAME problem with pools and TLS. Also use a fixed mapping of keys.gnupg.net to sks-keyservers.net. [#3755] * dirmngr: Try resurrecting dead hosts earlier (from 3 to 1.5 hours). * dirmngr: Fallback to CRL if no default OCSP responder is configured. * dirmngr: Implement CRL fetching via https. Here a redirection to http is explictly allowed. * dirmngr: Make LDAP searching and CRL fetching work under Windows. This stopped working with 2.1. [#3937] * agent,dirmngr: New sub-command "getenv" for "getinfo" to ease debugging.
* Update to the latest MIT KRB5 development commit on github.cy2018-05-043-5/+6
|
* Update 1.15.2 --> 1.15.3cy2018-05-042-5/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | Major changes in 1.15.3 (2018-05-03) ==================================== This is a bug fix release. * Fix flaws in LDAP DN checking, including a null dereference KDC crash which could be triggered by kadmin clients with administrative privileges [CVE-2018-5729, CVE-2018-5730]. * Fix a KDC PKINIT memory leak. * Fix a small KDC memory leak on transited or authdata errors when processing TGS requests. * Fix a null dereference when the KDC sends a large TGS reply. * Fix "kdestroy -A" with the KCM credential cache type. * Fix the handling of capaths "." values. * Fix handling of repeated subsection specifications in profile files (such as when multiple included files specify relations in the same subsection).
* Update 1.16 --> 1.16.1cy2018-05-042-5/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Major changes in 1.16.1 (2018-05-03) ==================================== This is a bug fix release. * Fix flaws in LDAP DN checking, including a null dereference KDC crash which could be triggered by kadmin clients with administrative privileges [CVE-2018-5729, CVE-2018-5730]. * Fix a KDC PKINIT memory leak. * Fix a small KDC memory leak on transited or authdata errors when processing TGS requests. * Fix a regression in pkinit_cert_match matching of client certificates containing Microsoft UPN SANs. * Fix a null dereference when the KDC sends a large TGS reply. * Fix "kdestroy -A" with the KCM credential cache type. * Allow validation of Microsoft PACs containing enterprise names. * Fix the handling of capaths "." values. * Fix handling of repeated subsection specifications in profile files (such as when multiple included files specify relations in the same subsection).
* Bump PORTREVISION on *-sbcl ports after lang/sbcl upgrade.krion2018-05-041-1/+1
|
* - Add XMSS option to enable experimental key support added in 7.7 [1]bdrewery2018-05-046-2/+157
| | | | | | | | | | | | | | | - Bring in upstream patches post 7.7 to fix various issues [2]: b81b2d120e9c8a83489e241620843687758925ad - Fix tunnel forwarding broken in 7.7p1 341727df910e12e26ef161508ed76d91c40a61eb - don't kill ssh-agent's listening socket entriely if we fail to accept a connection 85fe48fd49f2e81fa30902841b362cfbb7f1933b - don't free the %C expansion, it's used later for LocalCommand 868afa68469de50d8a43e5daf867d7c624a34d20 - Disable SSH2_MSG_DEBUG messages for Twisted Conch clients f5baa36ba79a6e8c534fb4e0a00f2614ccc42ea6 - Omit 3des-cbc if OpenSSL built without DES PR: 227758 [1] Submitted by: IWAMOTO Kouichi <sue@iwmt.org> [1] PR: 227551 [2] Reported by: rozhuk.im@gmail.com [2] Obtained from: upstream mirror https://github.com/openssh/openssh-portable [2]
* Add --rundir definition to CONFIGURE_ARGS to make sure configure script usesgarga2018-05-041-2/+3
| | | | | | | | /var/run/sudo. Without it, on a system that has /run directory, configure will by default define rundir to /run/sudo Reported by: Walter Schwarzenfeld <w.schwarzenfeld@utanet.at> Sponsored by: Rubicon Communications, LLC (Netgate)
* Document multiple vulnerabilities in www/drupal7 and www/drupal8joneum2018-05-041-0/+33
|
* Update to 0.24.0sunpoet2018-05-0415-43/+43
| | | | | Changes: https://github.com/certbot/certbot/blob/master/CHANGELOG.md https://github.com/certbot/certbot/milestones?state=closed
* Update KDE Plasma Desktop to 5.12.5tcberner2018-05-043-9/+9
| | | | Submitted by: lwhsu
* Fix PLIST without LDAPgarga2018-05-032-1/+2
| | | | | | PR: 227926 Reported by: O. Hartmann Sponsored by: Rubicon Communications, LLC (Netgate)
* Update to 0.6.lx2018-05-032-4/+6
| | | | | PR: 227797 Submitted by: Kai
* Update to version 1.26skreuzer2018-05-023-19/+7
| | | | Define LICENSE
* Update security/sudo to 1.8.23garga2018-05-024-213/+7
| | | | | | PR: 227900 Submitted by: Yasuhiro KIMURA <yasu@utahime.org> Sponsored by: Rubicon Communications, LLC (Netgate)
* security/sqlmap: update to 1.2.4rm2018-05-022-4/+4
|
* Document vulnerabilities in gitlab for several versions.mfechner2018-05-021-0/+30
| | | | | | Reviewed by: eugen_grosbein.net, tz (mentor) Approved by: eugen_grosbein.net, tz (mentor) Differential Revision: https://reviews.freebsd.org/D15248
* Remove expired ports:rene2018-05-025-212/+0
| | | | | 2018-04-30 databases/rubygem-seed-fu236: Obsoleted by update of www/gitlab. Please use databases/rubygem-seed-fu 2018-04-30 security/polarssl13: has reached end of life
* gopass is a rewrite of the pass password manager in Go with the aimkrion2018-05-024-0/+48
| | | | | | | of making it cross-platform and adding additional features. PR: 227845 Submitted by: Sascha Holzleiter <sascha@root-login.org>
* - Add LICENSE_FILEamdmi32018-05-011-1/+3
| | | | | | | - Add NO_ARCH - Switch to new test framework Approved by: portmgr blanket
* Document free-after-use issue in chromium before 66.0.3359.139riggs2018-05-011-0/+30
| | | | | Submitted by: Tommi Pernila <tommi.pernila@iki.fi> via e-mail Security: CVE-2018-6118
* Update to 0.30.1sunpoet2018-05-012-4/+4
| | | | Changes: https://gitlab.com/m2crypto/m2crypto/blob/master/CHANGES
* www/nextcloud: PHP-flavorizebrnrd2018-04-303-6/+9
| | | | | | | | | - Create flavors for all PHP versions - Use releases dir (not pre-) PR: 227510 Approved by: mat Differential Revision: https://reviews.freebsd.org/D15235
* security/signify: Cleanup keystobik2018-04-3015-39/+1
| | | | | | | | | - OpenBSD 6.1 is unsupported now, so retire its keys - Only keep the base keys and remove the rest. All other keys are useless on FreeBSD. Reported by: tj@mrsk.me
* security/libressl: Use -pthreadbrnrd2018-04-302-2/+2
| | | | Reported by: jbeich, eadler
* security/dehydrated: Restore ZSH and BASH options because they make scripts ↵yuri2018-04-302-16/+23
| | | | | | | | | | to use these shells The options were deleted mistakenly in the previous commit. Additionally, moved plist into pkg-plist file, and added @sample instructions for relevant samples. PR: 227848 Reported by: Sascha Holzleiter <sascha@root-login.org> (maintainer)
* security/dehydrated: Update 0.6.1-7 -> 0.6.2yuri2018-04-302-27/+13
| | | | | | | | | | | Port changes: * Add bash to RUN_DEPENDS * Remove BASH and ZSH options as per PHB * Change PORTDOCS to * for simplicity * Silence some commands PR: 227848 Submitted by: Sascha Holzleiter <sascha@root-login.org> (maintainer)
* security/libressl: Force linking libthrbrnrd2018-04-291-0/+2
| | | | - Fixes problems with loading private ssh keys
* security/libressl-devel: Fix AES-NI accelerationbrnrd2018-04-292-1/+21
| | | | - As implemented in non-devel
* - Update to 1.1ashish2018-04-293-4/+6
| | | | - Add pkg-message for information regarding new experimental rclone backend
* Fix phase 1 initiation in the racoon daemon after base system change r285204eugen2018-04-292-1/+65
| | | | | | PR: 192774, 222065 Submitted by: Andreas Longwitz <longwitz@incore.de> Approved by: VANHULLEBUS Yvan (maintainer, implicitly)
* Update to 1.9.2sunpoet2018-04-292-4/+4
| | | | Changes: https://github.com/nov/rack-oauth2/commits/master
* security/libressl: Add version.mk changebrnrd2018-04-291-1/+1
|
* security/libressl: Update to 2.7.2brnrd2018-04-293-20/+276
| | | | | - Most important ports are compatible, see https://wiki.freebsd.org/LibreSSL/2.7 for more info
* Update KDE Applications to 18.04.0tcberner2018-04-296-18/+18
| | | | * Pin multimedia/kdelive at 17.12.3 until we import the mlt update from the dev-repo.
* security/afl: switch to llvm60jbeich2018-04-281-2/+2
|
* Import the KDE Plasma5 portstcberner2018-04-2815-1/+352
| | | | | | | | | | | | | | | | | This is an import of the Plasma5 ports that we have had in the development repository for quite some time now. Please note: * Plasma5 cannot be installed at the same time as KDE SC4. * Qt5 assumes /etc/localtime to be a symlink to a tz file, not a regular file. * To start plasma5, it is recommended to use something like exec ck-launch-session startkde * Powermanagement and such is not working :-) I would like to thank all the people that have helped test it in the past years. Reviewed by: adridg Differential Revision: https://reviews.freebsd.org/D15096
* Update to 0.30.0sunpoet2018-04-272-4/+4
| | | | Changes: https://gitlab.com/m2crypto/m2crypto/blob/master/CHANGES
* Update to 3.17.1antoine2018-04-272-4/+4
|
* Update to 1.2.0.6antoine2018-04-272-4/+4
|
* security/libressl: Bump portrevisionbrnrd2018-04-271-0/+1
| | | | | | - Everybody deserves AES-NI off-load Reported by: adamw
* Update KDE Frameworks to 5.45.0tcberner2018-04-271-3/+3
| | | | | PR: 227512 Exp-run by: antoine
* Update to 1.8.0sunpoet2018-04-272-4/+4
| | | | Changes: https://github.com/onelogin/ruby-saml/releases
* Add new port: security/teleportseanc2018-04-276-0/+145
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Gravitational Teleport ("Teleport") is a modern SSH server for remotely accessing clusters of FreeBSD or Linux servers via SSH or HTTPS. It is intended to be used instead of sshd. Teleport enables teams to easily adopt the best SSH practices like: - Integrated SSH credentials with your organization Google Apps identities or other OAuth identitiy providers. - Teleport uses certificate-based access with automatic expiration time - Enforcement of 2nd factor authentication - Cluster introspection: every Teleport node becomes a part of a cluster and is visible on the Web UI - Record and replay SSH sessions for knowledge sharing and auditing purposes - Collaboratively troubleshoot issues through session sharing - Connect to clusters located behind firewalls without direct Internet access via SSH bastions Teleport is built on top of the high-quality Golang SSH implementation and it is compatible with OpenSSH. Initially submitted by: staticwizard@hotmail.com in ports/219332 PR: ports/219332 Approved by: swills (mentor) Reviewed by: yuri, swills, pi Differential Revision: https://reviews.freebsd.org/D14576
* Document vulnerabilities in quassel before 0.12.5woodsb022018-04-261-0/+47
| | | | Security: https://vuxml.freebsd.org/freebsd/499f6b41-58db-4f98-b8e7-da8c18985eda.html
* security/php70-openssl and security/php71-openssl: fix build with libressl-develtz2018-04-262-0/+22
| | | | | | | | | | LibreSSL 2.7 brings out a number of incompatibilities. The new patch allows PHP to compile against the new LibreSSL version. It is ported from security/php72-openssl in r468343 PR: 226902 Submitted by: Piotr Kubaj <pkubaj@anongoth.pl>
* security/php72-openssl: fix build with libressl-develtz2018-04-261-0/+11
| | | | | | | | LibreSSL 2.7 brings out a number of incompatibilities. The new patch allows PHP to compile against the new LibreSSL version. PR: 226902 Submitted by: Piotr Kubaj <pkubaj@anongoth.pl>
* Update security/erlang-fast_tls to 1.0.22farrokhi2018-04-263-9/+9
|
* Only sleep in ports if BATCH/PACKAGE_BUILDING are not defined.mat2018-04-262-0/+4
| | | | Sponsored by: Absolight
* Update to new upstream bugfix release 2.4.6.mandree2018-04-263-13/+18
| | | | | | | | | | | | | | While here, warn and sleep for 10 s when building against LibreSSL. Remove some cruft. Change summary: <https://github.com/OpenVPN/openvpn/blob/release/2.4/Changes.rst#version-246> Changelog: <https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24#OpenVPN2.4.6> Reported by: portscout
* Fix msgpack dependencysunpoet2018-04-261-0/+3
|
* Fix msgpack dependencysunpoet2018-04-261-1/+4
| | | | - Bump PORTREVISION for package change
* Fix msgpack dependencysunpoet2018-04-261-1/+3
| | | | - Bump PORTREVISION for package change
* Update the KERB_GSSAPI patch from debian.bdrewery2018-04-262-4/+6
| | | | | | | | | | https://sources.debian.org/data/main/o/openssh/1:7.7p1-2/debian/patches/gssapi.patch is mirrored due to not being filename-unique and not gzipped. PR: 226789 Submitted by: Rick Miller <vmiller@verisign.com> (based on) Tested by: Rick Miller <vmiller@verisign.com> Reported by: david@dcrosstech.com
* Switch all pypi.python.org WWWs to a new PyPi home pypi.org whereamdmi32018-04-2643-43/+43
| | | | | | | they now redirect to anyway. All new urls checked to return 200, I've fixed a couple of them in the process. Approved by: portmgr blanket, mat
* security/libressl: Fix AES-NI assembly detectionbrnrd2018-04-252-3/+21
| | | | | | - While here, fix broken man3 option Reported by: Franco Fichtner <franco opnsense org>
* Document vulnerabilities in chromium before 66.0.3359.117riggs2018-04-251-0/+95
| | | | | Submitted by: tommi.pernila@iki.fi (via mail to ports-secteam) Reviewed by: riggs
* Add a new version of the patch committed in r468197 that fixes a regressiongarga2018-04-252-34/+147
| | | | | | | | | | | introduced by that version. PR: 223587 Submitted by: Todd C. Miller <Todd.Miller@sudo.ws> Reported by: vas@mpeks.tomsk.su Obtained from: https://bugzilla.sudo.ws/show_bug.cgi?id=831 MFH: 2018Q2 Sponsored by: Rubicon Communications, LLC (Netgate)
* Add a patch to fix cryptographic digest in command specification for shellgarga2018-04-242-1/+96
| | | | | | | | | | | | | scripts and other interpreted files. Error happens because fexecve() requires /dev/fd to be mounted. This patch detects if /dev/fd/N exists before attempt to use fexecve and workaround the issue. PR: 223587 Submitted by: Todd C. Miller <Todd.Miller@sudo.ws> Reported by: vas@mpeks.tomsk.su Obtained from: https://bugzilla.sudo.ws/show_bug.cgi?id=831 MFH: 2018Q2 Sponsored by: Rubicon Communications, LLC (Netgate)
* - Add LICENSEamdmi32018-04-241-0/+3
| | | | Approved by: portmgr blanket
* security/py-obfsproxy-tor: Fix runtime dependency errorloader2018-04-243-15/+10
| | | | | | | | | | | - Change runtime dependency entry point Twisted_Core back to Twisted - Update checksum for CHEESESHOP - Add test target Reviewed by: cs, koobs Approved by: cs (maintainer), koobs (ports) Differential Revision: https://reviews.freebsd.org/D13452 MFH: 2018Q2
* security/py-pyptlib: Limit Python version to 2.7loader2018-04-241-1/+1
| | | | | | | | | | | | | This port is not Python 3 compatible, failing with: File "/usr/local/lib/python3.6/site-packages/pyptlib/util/__init__.py", line 56 m = re.match(ur'^\[(.+)\]:(\d*)$', spec) ^ SyntaxError: invalid syntax Reviewed by: koobs, cs Approved by: cs (maintainer), koobs (ports) Differential Revision: https://reviews.freebsd.org/D13464
* Update security/mbedtls to 2.8.0 and bump dependent ports.tijl2018-04-245-7/+7
| | | | | MFH: 2018Q2 Security: https://tls.mbed.org/tech-updates/releases/mbedtls-2.8.0-2.7.2-and-2.1.11-released
* Document mbed TLS vulnerabilitiestijl2018-04-241-0/+42
| | | | Security: https://tls.mbed.org/tech-updates/releases/mbedtls-2.8.0-2.7.2-and-2.1.11-released
* Last commit was supposed to be a local change for testing. Patch was not yetgarga2018-04-242-93/+1
| | | | ready for production. Reverting it for now.
* Add a patch to fix cryptographic digest in command specification for shellgarga2018-04-242-1/+93
| | | | | | | | | | | | | scripts and other interpreted files. Error happens because fexecve() requires /dev/fd to be mounted. This patch detects if /dev/fd/N exists before attempt to use fexecve and workaround the issue. PR: 223587 Submitted by: Todd C. Miller <Todd.Miller@sudo.ws> Reported by: vas@mpeks.tomsk.su Obtained from: https://www.sudo.ws/repos/sudo/rev/30f7c5d64104 MFH: 2018Q2 Sponsored by: Rubicon Communications, LLC (Netgate)
* security/xmlsec1: Fix build with LibreSSL 2.7brnrd2018-04-244-19/+135
| | | | | | | | | | - LibreSSL 2.7 implements most of OpenSSL 1.1 API PR: D14851 Submitted by: Charlie Li <ml+freebsd vishwin info> Approved by: maintainer time-out Obtained from: https://github.com/lsh123/xmlsec/pull/167 Differential Revision: https://reviews.freebsd.org/D14851
* Update to 0.15sunpoet2018-04-242-4/+4
| | | | Changes: http://search.cpan.org/dist/Crypt-OpenSSL-Random/Changes
* security/vault: update to 0.10.0swills2018-04-242-5/+5
|
* Pass maintainership to submitterjoneum2018-04-231-1/+1
| | | | PR: 227676
* Update to 0.6.1bapt2018-04-232-4/+4
|
* Move devel/py-msgpack-python to devel/py-msgpacksunpoet2018-04-233-5/+6
| | | | | | | | - Update to 0.5.6 - Update pkg-descr - Update WWW Changes: https://github.com/msgpack/msgpack-python/blob/master/ChangeLog.rst
* - Update 1.800201 to 1.9wen2018-04-223-6/+10
| | | | | | | | | | | Changes: http://cpansearch.perl.org/src/MRSCOTTY/Crypt-PKCS10-1.9/Changes - Bump PORTEPOCH - Add LICENSE_FILE - Add PORTSCOUT=ignore:1.800201,1.8002 - Switch configure stage to modbuildtiny PR: 227617 Submitted by: svysh.fbsd@gmail.com(maintainer)
* Update to 0.14sunpoet2018-04-222-5/+5
| | | | Changes: http://search.cpan.org/dist/Crypt-OpenSSL-Random/Changes