aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* Update to v11.05.20 release.ale2011-05-276-10/+32
|
* - Update to 0.4.wxs2011-05-274-27/+35
| | | | | | | | | | - Pass maintainer to submitter. Previous maintainer address bounced, even after removing the anti-spam measure. - Cleanup COMMENT and pkg-descr. - Also, respect PREFIX. PR: ports/157361 Submitted by: Ryan Steinmetz <rpsfa@rit.edu>
* - Update to v0.009brix2011-05-272-4/+5
| | | | - Add LICENSE
* - Update to v2.006brix2011-05-272-5/+5
|
* Increase the size and verbosity of the comment that the versions used inbrooks2011-05-261-1/+5
| | | | | | this port should track security/nss and www/apache13-modssl. No functional impact.
* Document drupal6 multiple vulnerabilities.wxs2011-05-261-0/+35
| | | | Submitted by: Nick Hilliard <nick@foobar.org>
* - Fix self test with Perl 5.14 [1]sunpoet2011-05-261-4/+12
| | | | | | | | | - Add regression-test: - Make portlint happier - Bump PORTREVISION for RSA.pm change PR: ports/157187 [1] Submitted by: Mark Martinec <Mark.Martinec@ijs.si>
* Bump PORTREVISION of all ports dependent on lang/ghc as duringashish2011-05-262-0/+2
| | | | | | | upgrade, lang/ghc cabal package cache gets invalidated causing all dependent ports to be reinstalled. Obtained from: FreeBSD Haskell
* Document Erlang R14B02 ssh library vulnerability (cryptographicallyolgeni2011-05-261-0/+32
| | | | | | weak RNG). Security: CVE-2011-0766
* Document latest www/chromium vulnerabilities.rene2011-05-261-2/+17
| | | | Security: CVE-2011-1801, -1804, -1806, -1807
* - Cleanup Part 1miwi2011-05-251-34/+35
| | | | PS: wonder when pplz start to ask ports-security for review ...
* - Document the last unbound vulnerabilitysem2011-05-251-0/+29
|
* - Update to 1.21jadawin2011-05-253-6/+3
| | | | - Changelog: http://cpansearch.perl.org/src/APERSAUD/Nmap-Parser-1.21/Changes
* - Update to 1.3culot2011-05-252-4/+4
| | | | | PR: ports/157297 Submitted by: Aldis Berjoza <aldis@bsdroot.lv> (maintainer)
* - revert last change of apr-* entryohauer2011-05-251-7/+10
| | | | Broken build reported by wxs@
* - use apr-* and add <gt></gt> entries for all apr0/apr1 issuesohauer2011-05-251-11/+8
| | | | | | | | | | (<gt> .. is needed else the parser cannot make a difference between apr0 and apr1) - lowercase ViewVC -> viewvc Thanks Jun Kuriyama ( kuriyama@ ) for the notice and the patch for the apr entries.
* -Fix install directory namingbeech2011-05-251-0/+3
| | | | | | | -Add examples (where applicable) -Bump portrevision Approved by: itetcu (mentor)(implicit)
* Update the mod_pubcookie entry with an ap20 prefix. The port has alwasybrooks2011-05-251-1/+1
| | | | | | | has USE_APACHE=2.0 in it so we can avoid enumarating all values of APACHE_PKGNAMEPREFIX. Pointy hat: brooks
* Dicewaregen is simple perl script that generated Diceware dictionaries, thatjadawin2011-05-244-0/+43
| | | | | | | | | | | | | | | can be used to create secure passwords. Dicewaregen relies on aspell, to make wordlist. Once you have wordlist you can create Diceware dictionary. You can make few dictionaries using different languages, merge them and then make Diceware dictionary. More info about Diceware: http://world.std.com/~reinhold/diceware.html WWW: http://hg.bsdroot.lv/aldis/dicewaregen/ PR: ports/157251 Submitted by: Aldis Berjoza <aldis at bsdroot.lv>
* Unbreak VuXML web build by changing "ap*-" to "ap-" in package name forsimon2011-05-241-1/+1
| | | | | | | | 1ca8228f-858d-11e0-a76c-000743057ca2 / mod_pubcookie -- Empty Authentication Security Advisory. While the new one is likely not correct, this fixes the build until somebody can put in the right thing.
* Fix build.delphij2011-05-241-1/+1
|
* Partially address several years of neglect of pubcookie. Indicate thebrooks2011-05-241-0/+66
| | | | | | | | | | | | | | | | | security issues in two two ports. I've not use pubcookie in several year and given the lack of complaint about the deprication of mod_pubcookie, I doubt anyone else uses it from ports. The mod_pubcookie port has already expired and I've set a two week expriation for pubcookie-login-server. If not maintainer appears I will send both to the Attic on June 6th. While I'm here, address the use of CONF_FILES and CONF_DIRS in pubcookie-login-server to avoid getting in the way of progress. [0] PR: ports/157164 [0] Security: vuxml:115a1389-858e-11e0-a76c-000743057ca2 vuxml:1ca8228f-858d-11e0-a76c-000743057ca2
* - add entry for ViewVC < 1.1.11ohauer2011-05-241-7/+62
| | | | | | - add entry for apr1 (CVE-2011-1928) - correct version in previous apr1 entry - run tidy
* Update to 10.3r181.14 .nox2011-05-241-0/+52
| | | | | | PR: ports/156996 Submitted by: Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp> Security: http://www.freebsd.org/ports/portaudit/d226626c-857f-11e0-95cc-001b2134ef46.html
* The Horde_Auth package provides a common interface into thebeech2011-05-246-0/+84
| | | | | | various backends for the Horde authentication system. Approved by: itetcu (mentor)(implicit)
* - Update to 1.5wxs2011-05-243-10/+15
| | | | | - Don't hardcode py2.7 - Respect custom LOCALBASE
* - Update to 1.5.wxs2011-05-233-4/+31
| | | | - Switch to devel/re2 instead of PCRE.
* Document Opera Frameset unload code injection vulnerability.mandree2011-05-231-0/+28
|
* Document pure-ftpd multiple vulnerabilities prior to 1.0.32.delphij2011-05-231-0/+30
|
* Update to 1.8.1p2wxs2011-05-232-5/+5
|
* - Upgrade to 0.02.ashish2011-05-212-4/+3
|
* - Upgrade to 5.62.ashish2011-05-212-3/+3
|
* - Update to 0.50.ashish2011-05-212-4/+3
|
* - Update to 0.9culot2011-05-204-15/+7
| | | | | PR: ports/157150 Submitted by: Matthew Donovan <kitchetech@gmail.com> (maintainer)
* Add missing USE_NCURSESmakc2011-05-201-0/+1
| | | | | PR: ports/157142 Submitted by: Raphael Kubo da Costa <kubito at gmail.com>
* - update to 1.0.14dinoex2011-05-202-4/+3
|
* - s/CONF_FILES/CLAM_CONF_FILES/ to avoid a conflict in the future with newgarga2011-05-192-6/+6
| | | | | | | options with the same name that will be added to bsd.port.mk PR: ports/157161, ports/157162 Submitted by: Chris Rees <utisoft@gmail.com>
* Add pam_google_authenticator 20110519, PAM module for two-steplwhsu2011-05-194-0/+36
| | | | | | | authentication from Google. PR: ports/157152 Submitted by: Jui-Nan Lin <jnlin at csie.nctu.edu.tw>
* - Add patch to properly escape paths and passwords in shell calls.stefan2011-05-183-1/+117
| | | | | | | | - While here, remove MD5 from distinfo. Reported by: Keith Waters <keith@waters.co.za> Patch by: Richard Corner Obtained from: https://bugs.launchpad.net/ubuntu/+source/fcrackzip/+bug/350640
* - Cleaning MD5 in perl@'s portsjadawin2011-05-1749-49/+0
| | | | Approved by: erwin@ (portmgr)
* Fix plistjohans2011-05-172-0/+3
| | | | Reported by: pointyhat via erwin
* - Update to 5.62culot2011-05-172-3/+3
| | | | Changes: http://search.cpan.org/dist/Digest-SHA/Changes
* Update KDE Software Compilation ports to 4.6.3makc2011-05-178-14/+126
| | | | Special thanks to Raphael Kubo da Costa for his work on this update.
* - add patch to barnyard2 to allow build with postgresql and tclohauer2011-05-1610-2173/+213
| | | | | | | | | | | | | (reported and fixed upstream) - display option TCL only for Master port, it makes no sense if the slave can de-select a required option - remove broken barnyard-sguil (master port was removed 2011-04-04) - add new port barnyard2-sguil [1] - add entry to MOVED PR: ports/156188 [1] Submitted by: me Approved by: maintainer timeout
* Update gsasl to 1.6.1johans2011-05-152-4/+3
|
* Update xmlsec to 1.2.18johans2011-05-152-3/+3
|
* Remove painful examples of foo="", with particular prejudice againstdougb2011-05-156-11/+12
| | | | | | | | | | | | | | | constructions that parse out to [ -z "$foo" ] && foo="" These are bad examples that get copied and pasted into new code, so the hope is that with less bad examples there will be less need for me to bring this up in review. In a few of these files all that were changed were comments so that next time I search for these patterns I won't trip on the file for no reason. In a few places, add $FreeBSD$ No functional changes, so no PORTREVISION bumps
* Remove check for 6.x. It's EoL. Forgot to do this in the previous commit.wxs2011-05-151-4/+0
|
* Update to 1.88bwxs2011-05-152-4/+3
| | | | | PR: ports/157043 Submitted by: Ryan Steinmetz <rpsfa@rit.edu> (maintainer)
* -Restore maintainership to submitterbeech2011-05-151-1/+1
| | | | | | PR: ports/157030 Submitted by: Kurt Jaeger <fbsd-ports@opsec.eu> Approved by: itetcu (mentor)(implicit)
* - add OPTION tcl (default off) to allow sguil* ports build against barnyard2ohauer2011-05-151-1/+8
| | | | | | PR: ports/156341 Submitted by: Brandon <m37a11 _at_ gmail.com> Approved by: maintainer timeout
* - update to version 0.6.1ohauer2011-05-152-3/+3
| | | | | PR: ports/156976 Submitted by: Ryan Steinmetz <rpsfa _at_ rit.edu>
* mail/exim: document CVE-2011-1764 and CVE-2011-1407rea2011-05-151-0/+46
| | | | | | | Both vulnerabilities are in the DKIM code and were fixed in 4.76. Approved-by: erwin (mentor) Feature-safe: yes
* Update to 2.6.1arved2011-05-142-7/+7
| | | | | PR: 156140 Submitted by: maintainer
* - document Apache APR DoS vulnerabilitiesohauer2011-05-141-0/+30
|
* - Document www/zend-framework (potential SQL injection when using PDO_MySQL)glarkin2011-05-131-0/+29
| | | | Security: http://framework.zend.com/security/advisory/ZF2011-02
* Add an AUDIT option, which is off by default for now. I will turn it onwxs2011-05-131-1/+6
| | | | | | with the next significant bump. Submitted by: Mike Kelly (private mail)
* - Update to 1.43jadawin2011-05-132-3/+3
| | | | - Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.43/Changes
* Document mediawiki multiple vulnerabilities.wxs2011-05-131-0/+29
| | | | | PR: ports/156914 Submitted by: Ryan Steinmetz <rpsfa@rit.edu>
* Document CVE-2011-1799 and CVE-2011-1800 for www/chromiumrene2011-05-131-2/+10
|
* Incorporate changes recommended by the tidy target. While here, properlywxs2011-05-131-8/+4
| | | | label dc9f8335-2b3b-11e0-a91b-00e0815b8da8.
* Update 4.2.1 --> 4.2.2. This is a bugfix release.cy2011-05-123-4/+5
| | | | Notified by: Vadim Kurland <vadim@netcitadel.com> (Fwbuilder upline)
* Add archive master site, in the case when a new pam_krb5 is released and thiscy2011-05-121-1/+2
| | | | | | port has not been updated yet. Submitted by: "Kevin Thompson" <antiduh@csh.rit.edu>
* Update 4.3 --> 4.4cy2011-05-122-4/+3
|
* - update tinc to build with lzo2dinoex2011-05-122-2/+2
|
* Remove support for lzo-1.mandree2011-05-111-8/+0
|
* Update 4.2.0 --> 4.2.1. This is a bugfix release.cy2011-05-113-4/+7
| | | | Notified by: Vadim Kurland <vadim@netcitadel.com> (Fwbuilder upline)
* - Disable the new bufferevents code by default in tor-devel,bf2011-05-103-8/+13
| | | | | | | | until some problems are solved [1] - Add a note that was in the pkg-deinstall scripts of tor and tor-devel to the pkg-messages of the respective ports Reported by: H. Krusken [1]
* Fix build on AMD64. Debugging information caused failure on pointyhat duecy2011-05-091-2/+10
| | | | | | | to ulimit. Rremoval of debugging information reduces the size of a static library file by 80%. Discovered by: pointyhat on amd64 8
* Document CVE-2011-1720: Postfix memory corruption error.sahil2011-05-091-0/+38
|
* - Please welcome GHC 7.0.3ashish2011-05-096-50/+12
| | | | | | | | | | | | | | | | | GHC in the ports tree has been updated to 7.0.3 and all other Haskell ports are also updated to their corresponding Haskell Platform versions, or latest versions. We would like to acknowledge the support of the FreeBSD Donations Team and Eotvos Lorand University, Faculty of Informatics who contributed to the server that we used for testing. We would also like to thank all the testers who tested FreeBSD Haskell ports and provided their feedback. PR: ports/156642 Approved by: tabthorpe (mentor) Obtained from: FreeBSD Haskell
* - update tor-devel to 0.2.3.1-alphabf2011-05-087-227/+37
| | | | | | | - remove [de]install scripts from both tor ports in favor of GROUPS/USERS - fix mistakes in the _tor uid entry introduced in the GROUPS/USERS changes
* Update to 2.8.4.lx2011-05-062-3/+3
|
* Update libevent2 to 2.0.11mm2011-05-051-0/+1
|
* - Update to 1.008culot2011-05-052-8/+23
| | | | | PR: ports/156822 Submitted by: Jase Thew <freebsd@beardz.net>
* - Add p5-String-MkPasswdsunpoet2011-05-055-0/+38
| | | | | | | | | | | | This Perl library defines a single function, mkpasswd(), to generate random passwords. The function is meant to be a simple way for developers and system administrators to easily generate a relatively secure password. WWW: http://search.cpan.org/dist/String-MkPasswd PR: ports/156714 Submitted by: Frank Wall <fw@moov.de>
* - Update to 1.2.1decke2011-05-052-4/+3
| | | | | | | - Remove MD5 checksum PR: ports/156820 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
* - Update to 201118dhn2011-05-053-3/+4
| | | | | PR: ports/156812 Submitted by: Eric F Crist <ecrist@secure-computing.net> (maintainer)
* - Update to 1.40jadawin2011-05-042-3/+3
| | | | - Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.40/Changes
* Update to 2.2.0. Add LICENSE (GPLv2). Add a local mirror of the distfile (filemandree2011-05-043-4/+8
| | | | | | has been uploaded and will propagate soonish). Changelog: http://openvpn.net/index.php/open-source/documentation/change-log/425-changelog-for-openvpn-22.html
* Update 4.1.3 --> 4.2.0.cy2011-05-035-33/+137
| | | | Libfwbuilder has been merged into fwbuilder.
* Libfwbuilder has been merged into fwbuilder 4.2.0.cy2011-05-035-269/+0
|
* Libfwbuilder has been merged into fwbuilder.cy2011-05-031-1/+0
|
* Add rubygem-net-ssh-multi 1.0.1, SSH connection multiplexing library forstas2011-05-034-0/+30
| | | | | | | Ruby. PR: ports/ports/156780 Submitted by: Renaud Chaput <renchap at cocoa-x.com>
* - Update to 2.1.4.stas2011-05-032-4/+4
| | | | | PR: ports/156780 Submitted by: Renaud Chaput <renchap@cocoa-x.com>
* - Mark BROKEN on 9-CURRENT: fails to configurepav2011-05-021-0/+4
| | | | | | configure: error: Objective C preprocessor "/lib/cpp" fails sanity check Reported by: pointyhat
* Remove unmaintained expired ports from securitybapt2011-05-02137-6018/+0
| | | | | | | | | | | | | | | | | | | | | | | | 2011-05-01 security/aafid2: Upstream disapear and distfile is no more available 2011-05-01 security/bjorb: Upstream disapear and distfile is no more available 2011-05-01 security/borzoi: Upstream disapear and distfile is no more available 2011-05-01 security/cmd5checkpw: Upstream disapear and distfile is no more available 2011-05-01 security/cops: Upstream disapear and distfile is no more available 2011-05-01 security/find_ddos: Upstream disapear and distfile is no more available 2011-05-01 security/ftpmap: Upstream disapear and distfile is no more available 2011-05-01 security/hafiye: Upstream disapear and distfile is no more available 2011-05-01 security/ident2: Upstream disapear and distfile is no more available 2011-05-01 security/liedentd: Upstream disapear and distfile is no more available 2011-05-01 security/pam_pop3: Upstream disapear and distfile is no more available 2011-05-01 security/poc: Upstream disapear and distfile is no more available 2011-05-01 security/portscanner: Upstream disapear and distfile is no more available 2011-05-01 security/ppgen: Upstream disapear and distfile is no more available 2011-05-01 security/qident: Upstream disapear and distfile is no more available 2011-05-01 security/quintuple-agent: Upstream disapear and distfile is no more available 2011-05-01 security/rc5pipe: Upstream disapear and distfile is no more available 2011-05-01 security/rid: Upstream disapear and distfile is no more available 2011-05-01 security/ssh: Upstream disapear and distfile is no more available 2011-05-01 security/tea-total: Upstream disapear and distfile is no more available 2011-05-01 security/uberkey: Upstream disapear and distfile is no more available
* Update to 0.2.2.25-alphabf2011-05-012-3/+3
|
* Document www/chromium vulnerabilities fixed in version 11.0.696.57rene2011-04-301-2/+84
| | | | Security: CVE-2011-[1303-1305, 1434-1452, 1454-1456]
* No longer interesteddes2011-04-301-1/+1
|
* Fix broken PKGORIGINskreuzer2011-04-291-1/+1
| | | | Reported by: erwin@
* - Update to 1.5 [1]culot2011-04-292-7/+10
| | | | | | | | - Make use of the CPAN:USER macro Changes: http://search.cpan.org/dist/AuthCAS/Changes PR: ports/156715 [1] Submitted by: Frank Wall <fw@moov.de> (maintainer)
* - Update to 4.5.1 [1]culot2011-04-295-113/+36
| | | | | | | - Pet portlint(1) (change spaces into tabs and reformat IGNORE message) PR: ports/156711 [1] Submitted by: Riaan Kruger <riaank@gmail.com> (maintainer)
* Document mozilla -- multiple vulnerabilitiesflo2011-04-291-0/+59
|
* - add a patch to fix a use-after-freebapt2011-04-292-0/+23
| | | | | | | - bump portrevision Submitted by: pilot <pilot@monkey.org> (upstream) (by mail) Obtained from: OpenBSD port
* - Reset maintainer due to email bouncestabthorpe2011-04-291-1/+1
| | | | | | | | | | | | Final-Recipient: rfc822; fbsd-ports@opsec.eu Original-Recipient: rfc822;fbsd-ports@opsec.eu Action: failed Status: 5.0.0 Remote-MTA: dns; home.opsec.eu Diagnostic-Code: smtp; 550 Unrouteable address Submitted by: erwin With hat: portmgr
* - update to 2.02:bapt2011-04-283-3/+5
| | | | | | | | | | | | - changes: supported -T option socket connect timeout supported -p option with multi-port scan eg) -p 22,80,8080 - see a multiport.rb added ariprint function in arirang script added $ari_sport variable in arirang script changed default processes count 30 to 60 changed default connect timeout seconds 2 to 3 changed printing style fixed few bugs
* - Update nettle to 2.1 release [1]johans2011-04-283-10/+14
| | | | | | | | | | The latest stable release of GnuTLS requires this version. This includes a shared library bump - Grab maintainership for myself (to catch any issues that may arise) PR: ports/156173 [1] Submitted by: Hirohisa Yamaguchi <umq@ueo.co.jp> Approved by: Charlie Kester <corky1951@comcast.net> (old maintainer)
* arpCounterattack is a program for detecting and remedying "ARP attacks." Itskreuzer2011-04-287-0/+111
| | | | | | | | | | | | | | | | | | monitors traffic on any number of Ethernet interfaces and examines ARP replies and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP request that is in conflict with its notion of "correct" Ethernet/IP address pairs, it logs the attack if logging is enabled, and, if the Ethernet interface that the attack was seen on is is configured as being in aggressive mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables of hosts on the local network segment. The corrective gratuitous ARP request and corrective gratuitous ARP reply can be sent from an Ethernet interface other than the one that the attack was seen on. WWW: http://acm.poly.edu/wiki/ARP_Counterattack PR: ports/151973 Submitted by: Boris Kochergin <spawk@acm.poly.edu>
* - over to new volunteerbapt2011-04-271-1/+1
| | | | | PR: ports/156670 Submitted by: Oliver Heesakkers <dev2 _at_ heesakkers.info>
* By Maintainer's request, toss these ports back into the pooldougb2011-04-274-4/+4
|
* Update to 0.03skreuzer2011-04-272-4/+3
|
* - Update to 3.6.0sunpoet2011-04-273-7/+14
| | | | | | | | | | | - Use OPTIONS while I'm here - Add OPTIONS: SVN_FBSD (inspired by devel/git) Changes: http://blog.metasploit.com/2011/03/metasploit-framework-360-released.html PR: ports/156301 [1], ports/156444 [2] Submitted by: Lyubomir Grigorov <nm.knife@gmail.com> [1], Dax Labrador <semprix@gmx.com> [2] Approved by: maintainer (timeout, 18 days)
* Add the wanted version on package depends or it won't work as expectedbapt2011-04-241-2/+7
| | | | | | re introduce the perl version check accidentally removed Submitted by: Géraud Continsouzas (GeJ on irc)
* Update to 3.9.nobutaka2011-04-232-3/+3
|
* Update to 1.15.1martymac2011-04-222-4/+3
|
* Chase libp11 library and bump PORTREVISION.ale2011-04-222-3/+4
|
* Update to 0.2.8 release.ale2011-04-223-7/+9
|
* - document recent asterisk vulnerabilitiesflo2011-04-221-1/+49
| | | | - fix topic in RT entry
* - fix crash due to a null pointer dereferenceohauer2011-04-212-0/+13
| | | | Thanks to Christian Peron csjp@
* - Update MASTER_SITESskreuzer2011-04-213-4/+3
| | | | - Remove MD5
* - Install sample configuration filesbz2011-04-202-0/+11
| | | | | | | | - Add LICENSE PR: ports/153024 Submitted by: Trond Endrestøl <Trond.Endrestol at ximalas.info> Approved by: jadawin@ (mentor)
* - Add missing dependency on devel/p5-TimeDateashish2011-04-202-3/+3
| | | | | | | | - Remove MD5 checksum from distinfo PR: ports/156209 Submitted by: skreuzer Approved by: pgj (implicit)
* - update 0.67bapt2011-04-192-11/+5
| | | | | - remove freebsd 5 lines - changes: http://cpansearch.perl.org/src/FLORA/Module-Signature-0.67/Changes
* Remove unmaintained port that depends on expired security/newpki-lib:rene2011-04-195-119/+0
| | | | security/newpki-client
* Remove most expired ports:rene2011-04-1924-797/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 2011-04-17 cad/tclspice: has been broken for more than a year 2011-04-17 comms/hcfmdm: does not compile on 7.X or higher 2011-04-17 databases/mysqlcc: has been broken for almost a year 2011-04-17 devel/ruby-rjudy: does not compile on FreeBSD 7.x or newer 2011-04-17 devel/xfc: does not compile on FreeBSD 7.x or newer 2011-04-17 devel/lamson: has been broken for a half year 2011-04-17 devel/cocktail: does not build on FreeBSD 7.x or newer 2011-04-17 devel/djgpp-gcc: has been broken for half a year 2011-04-17 devel/gauche-sdl: has been broken for a year 2011-04-17 devel/gdb53-act: does not compile on FreeBSD 7.x and up 2011-04-17 editors/zed: does not compile on FreeBSD 7.x or newer 2011-04-17 games/aqbubble: does not compile on FreeBSD 7.x or newer 2011-04-17 graphics/libvisual-plugins: has been broken for 3 years 2011-04-17 japanese/roundcube: has been broken for almost a year 2011-04-17 japanese/tkstep80: does not compile on FreeBSD 7.x or newer 2011-04-17 lang/u++: has been broken for over a half year 2011-04-17 lang/pugs: has been broken for over a year 2011-04-17 lang/mozart: does not compile on FreeBSD 7.x or newer 2011-04-17 math/linalg: does not build on FreeBSD 7.x or newer 2011-04-17 math/R-cran-igraph: has been broken for over a half year 2011-04-17 misc/ftree: has been broken for over a half year 2011-04-17 multimedia/katchtv: has been broken for a half year 2011-04-17 multimedia/libomxil-bellagio: has been broken for almost a year 2011-04-17 multimedia/banshee-mirage: has been broken for over a half year 2011-04-17 net-p2p/trackerbt: has been broken for a half year 2011-04-17 net/cap: does not compile on FreeBSD 7.x or newer 2011-04-17 net/ggsd: does not compile on FreeBSD 7.x or newer 2011-04-17 net/b2bua: does not compile on FreeBSD 7.x or newer 2011-04-17 net/penguintv: has been broken for a half year 2011-04-17 news/openftd: has been broken for almost a year 2011-04-17 palm/romeo: does not compile on FreeBSD 7.x or newer 2011-04-17 science/pcp: does not compile on FreeBSD 7.x or newer 2011-04-17 science/elmer-fem: has been broken for over a year 2011-04-17 security/newpki-lib: does not compile on FreeBSD 7.x or newer 2011-04-17 security/newpki-server: does not compile on FreeBSD 7.x or newer 2011-04-17 security/xmlsec: does not compile on FreeBSD 7.x or newer 2011-04-17 security/f-protd: has been broken for over a year 2011-04-17 sysutils/xwlans: does not compile on FreeBSD 7.x or newer 2011-04-17 www/bk_edit: does not compile on FreeBSD 7.x and newer 2011-04-17 www/bricolage: has been broken for a half year 2011-04-17 x11-toolkits/gauche-gtk: has been broken for a year 2011-04-17 x11-toolkits/gambas2-gb-qt: has been broken for over a year 2011-04-17 x11-toolkits/php-gtk2: has been broken for over a half year 2011-04-17 x11-toolkits/p5-Tcl-Tk: has been broken for 2 year 2011-04-17 x11/metisse: has been broken for over a half year
* Document VideoLAN-SA-1103. Heap corruption in MP4 demultiplexer in VLC.jsa2011-04-181-0/+26
|
* Update to 10.2r159.1 .nox2011-04-181-0/+48
| | | | Security: http://www.freebsd.org/ports/portaudit/32b05547-6913-11e0-bdc4-001b2134ef46.html
* Update to 1.8.1p1.wxs2011-04-174-33/+7
| | | | | No longer need to worry about etc/sudoers.d problem, as it is no longer a fatal error.
* Document multiple vulnerabilities in RT www/rt36 and www/rt38flo2011-04-171-0/+38
|
* Update to 3.8.nobutaka2011-04-162-3/+3
|
* Update to 0.52.nobutaka2011-04-163-8/+12
|
* Hand over to a new maintainer.shaun2011-04-161-1/+1
| | | | | Submitted by: Laurent LEVIER <llevier@argosnet.com> (maintainer) via freebsd-ports
* - Don't overwrite/remove config files on package installation/uninstallswills2011-04-163-23/+40
| | | | | | | | - Obey shibboleth_sp_flags, shibboleth_sp_program and shibboleth_sp_pidfile PR: ports/155876 Submitted by: Craig Leres <leres at ee.lbl.gov> Approved by: maintainer timeout
* Document www/chromium vulnerabilitiesrene2011-04-151-2/+10
| | | | Security: CVE-2011-1301, CVE-2011-1302
* Unbreak file format:simon2011-04-151-5/+5
| | | | | | | - Place <vuxml> tag at the start of the file. - Close topic tags. Pointy hat to: cy
* Add the following for security/krb5:cy2011-04-151-0/+157
| | | | | | | MITKRB5-SA-2011-001 - kpropd denial of service MITKRB5-SA-2011-002 - KDC denial of service attacks MITKRB5-SA-2011-003 - KDC vulnerable to double-free when PKINIT enabled MITKRB5-SA-2011-004 - kadmind invalid pointer free()
* Document a root exploit via rogue hostname in xrdb.kwm2011-04-141-0/+32
|
* Apply patch for MITKRB5-SA-2011-004, kadmind invalid pointer free()cy2011-04-142-2/+4
| | | | | | | [CVE-2011-0285] Security: MITKRB5-SA-2011-004, CVE-2011-0285 Feature safe: yes
* - Forget to add SNORTSAM patchset to distinfo,dhn2011-04-131-0/+2
| | | | | | Users fail to build snort when WITH_SNORTSAM is set. Reported by: sunpoet@
* - Update to 1.2.8sbz2011-04-132-4/+10
| | | | | | - Add LICENSE Approved by: jadawin@ (mentor)
* Limit affected mupdf version to <0.8bapt2011-04-131-1/+1
| | | | Submitted by: tobez@ (irc)
* Update to 0.2.2.24-alphabf2011-04-132-5/+3
|
* Upgrade to a later snapshot, to allow build with newer BDB versions.mandree2011-04-135-24/+151
| | | | | | PR: ports/155760 Submitted by: mandree Approved by: Graham Todd <gtodd@bellanet.org>
* Remove expired ports:rene2011-04-137-93/+0
| | | | | 2011-04-11 lang/gpc: development has ceased; use lang/fpc instead 2011-04-11 security/mypasswordsafe: development has ceased; try security/gorilla instead
* Document "otrs" - several XSS attacks possible.skv2011-04-131-0/+32
|
* Fix typoerwin2011-04-121-1/+1
| | | | Submitted by: Dan Langille <dan@langille.org>
* - Fix OPTIONS processing in previous commitsunpoet2011-04-121-2/+3
| | | | | | - Bump PORTREVISION for package change Noticed by: stas
* Update to 1.1 release.ale2011-04-122-3/+3
|
* Optimize C_GetAttributeValues: remove not needed call.ale2011-04-122-3/+32
|
* - Update to 2.9.0.5dhn2011-04-124-129/+4
| | | | | PR: ports/156334 Submitted by: Dean Freeman <wfreeman@sourcefire.com> (maintainer)
* - Add google mirrormiwi2011-04-121-1/+4
| | | | | PR: 156067 Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru>
* Fix a typo in pkg-install. Should use -m and not -M for install(1).wxs2011-04-121-1/+1
| | | | Noticed by: sunpoet@
* The install process checks the validity of sudoers before installingwxs2011-04-122-1/+19
| | | | | | | | | | etc/sudoers.d. If you have an sudoers with the includedir directive the install will fail. Fix this by creating the directory in a pre-install target. This should fix "The Great sudo Debacle of 2011" once and for all. Tested by: dougb@
* Revert the removal of sudoers.d. It is a POLA violation. While here removewxs2011-04-124-17/+11
| | | | the UPDATING entry as it no longer applies.
* We don't install a sudoers.d, remove that from the default sudoers file.wxs2011-04-112-2/+11
| | | | | | PR: ports/156305 Submitted by: Helmut Schneider <jumper99@gmx.de> Anatoly Borodin <anatoly.borodin@gmail.com>
* Add a new macro to deal with conflict between ncurses from base and ncurses ↵bapt2011-04-111-2/+3
| | | | | | | | | | | | | | | | from ports. If a ports is linked against ncurses from base or from the ports, it should then add: USE_NCURSES=yes it is also possible to specify the hard dependency on the ports ncurses or one the base one adding the following macros: WITH_NCURSES_PORT=yes or WITH_NCURSES_BASE=yes PR: ports/155269 Submitted by: me Reviwed by: pav@ Approved by: portmgr (pav@) Exp-run by: portmgr (pav@)
* Document isc-dhcp41-client and isc-dhcp31-client vulnerabilities.wxs2011-04-111-0/+34
| | | | | PR: ports/156246 Submitted by: Douglas Thrift <douglas@douglasthrift.net>
* - Mark broken with Ruby 1.9swills2011-04-115-5/+25
|
* CMAKE_BUILD_TYPE is set in bsd.cmake.mk now, remove it from Makefilesmakc2011-04-101-4/+0
|
* Update to 1.8.1. There are a lot of behind-the-scenes changes in this port,wxs2011-04-106-38/+48
| | | | | | including a plugin system now. While here, do some whitespace fixes.
* - Update to 0.21.1lwhsu2011-04-092-6/+4
| | | | | | PR: ports/154232 Submitted by: lwhsu Approved by: maintainer timeout
* Add CVE entry for recent tinyproxy vulnerability.wxs2011-04-091-0/+1
|
* Bump PORTREVISION.cy2011-04-091-1/+1
|
* Adjust krb5-config when $KRB5_HOME is specified. This will allow applicationscy2011-04-091-4/+6
| | | | linking aganst the MIT krb5 libraries to link using the correct ones.
* - tinyproxypav2011-04-081-0/+23
|
* - update to 0.14.3dinoex2011-04-082-3/+3
| | | | | PR: 156238 Submitted by: Takefu
* The FreeBSD KDE Team is pleased to announce April updates for KDEavilla2011-04-074-6/+4
| | | | | | | Software Compilation: 4.6.2, codename "Congrats". Read the full announcement here: http://kde.org/announcements/announce-4.6.2.php. Special thanks to Raphael Kubo da Costa who ported the release.
* pkcs11-gateway is a software that allows you to use a Linux 32-bit PKCS#11ale2011-04-064-0/+50
| | | | | | | | | | | module on FreeBSD i386/amd64. It consists of a FreeBSD Cryptoki wrapper library that serializes and forwards PKCS#11 function calls to a Linux server program that dlopen() and use the real module. The communication between the two components is via a UNIX socket. pkcs11-gateway is based on the rpc-layer of Gnome Keyring. - Alex Dupre ale@FreeBSD.org
* pkcs11-dump is a small utility to dump PKCS#11 token contents.ale2011-04-065-0/+73
| | | | WWW: http://sites.google.com/site/alonbarlev/pkcs11-utilities
* - Bump portrevisions on all ocaml libraries, as it appears that compiledstas2011-04-063-2/+3
| | | | | | | | interface files (.cmi) are not backward compatible with a newer ocaml version. PR: ports/156195 Suggested by: mandree
* - mark port broken barnyard is gone and port does not build with barnyard2ohauer2011-04-051-1/+3
| | | | I'll look into this during the next days
* - make snort and suricata optionalohauer2011-04-051-5/+13
| | | | | | | | - bump portrevision PR: ports/156172 Submitted by: Nikolay Denev <ndenev _at_ gmail.com> Approved by: Paul Schmehl <pauls _at_ utdallas.edu> (maintainer)
* - remove expired port security/barnyardohauer2011-04-0513-254/+0
| | | | - remove barnyard from security/Makefile
* Garbage collect expired portsrene2011-04-059-238/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 2011-04-01 accessibility/linux-f8-atk: End of Life since Jan 7, 2009 2011-04-01 archivers/linux-f8-ucl: End of Life since Jan 7, 2009 2011-04-01 archivers/linux-f8-upx: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-alsa-lib: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-arts: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-esound: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-freealut: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-libaudiofile: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-libogg: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-libvorbis: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-mikmod: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-nas-libs: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-openal: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-sdl_mixer: End of Life since Jan 7, 2009 2011-04-01 databases/linux-f8-sqlite3: End of Life since Jan 7, 2009 2011-04-02 databases/postgresql81-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy 2011-04-02 databases/postgresql73-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy 2011-04-02 databases/postgresql74-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy 2011-04-02 databases/postgresql80-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy 2011-04-01 devel/linux-f8-libglade: End of Life since Jan 7, 2009 2011-04-01 devel/linux-f8-sdl12: End of Life since Jan 7, 2009 2011-04-01 devel/linux-f8-allegro: End of Life since Jan 7, 2009 2011-04-01 devel/linux-f8-libsigc++20: End of Life since Jan 7, 2009 2011-04-01 devel/linux-f8-libglade2: End of Life since Jan 7, 2009 2011-04-01 devel/linux-f8-nspr: End of Life since Jan 7, 2009 2011-04-01 dns/linux-f8-libidn: End of Life since Jan 7, 2009 2011-04-01 emulators/linux_base-f8: End of Life since Jan 7, 2009 2011-04-01 emulators/linux_base-f9: End of Life since Jul 10, 2009 2011-04-01 emulators/linux_base-fc6: End of Life since December 7, 2007 2011-04-01 emulators/linux_base-f7: End of Life since June 13, 2008 2011-04-01 ftp/linux-f8-curl: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-sdl_image: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-ungif: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-imlib: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-cairo: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-dri: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-gdk-pixbuf: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-jpeg: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-png: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-libGLU: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-libmng: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-png10: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-tiff: End of Life since Jan 7, 2009 2011-04-01 lang/linux-f8-libg2c: End of Life since Jan 7, 2009 2011-04-01 lang/linux-f8-tcl84: End of Life since Jan 7, 2009 2011-04-01 multimedia/linux-f8-libtheora: End of Life since Jan 7, 2009 2011-04-02 net-p2p/dcd: No fetch sources and looks like project abandoned 2011-03-31 net/straw: abandoned upstream and does not work with python 2.6+ 2011-04-01 security/linux-f8-libssh2: End of Life since Jan 7, 2009 2011-04-01 security/linux-f8-nss: End of Life since Jan 7, 2009 2011-04-01 security/linux-f8-openssl: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-libxml2: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-scim-gtk: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-scim-libs: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-expat: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-libxml: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-aspell: End of Life since Jan 7, 2009 2011-04-01 www/linux-f8-flashplugin10: End of Life since Jan 7, 2009 2011-03-30 www/mediawiki112: abandoned upstream 2011-03-30 www/mediawiki113: abandoned upstream 2011-03-30 www/mediawiki114: abandoned upstream 2011-03-30 www/mediawiki16: abandoned upstream 2011-04-01 x11-fonts/linux-f8-fontconfig: End of Life since Jan 7, 2009 2011-03-01 x11-themes/gnome-icons-cool-gorilla: "no mastersite" 2011-04-01 x11-themes/linux-f8-hicolor-icon-theme: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-gtk: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-gtk2: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-openmotif: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-pango: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-qt33: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-tk84: End of Life since Jan 7, 2009 2011-04-01 x11/linux-f8-xorg-libs: End of Life since Jan 7, 2009
* - Update to 0.2.1dhn2011-04-043-8/+9
| | | | | PR: ports/156125 Submitted by: Gvozdikov Veniamin <g.veniamin@googlemail.com> (maintainer)
* - Update maintainer mail adressdhn2011-04-032-2/+1
| | | | | | | - Remove MD5 checksum, While I'm here PR: ports/156142 Submitted by: Dax Labrador <semprix@gmx.com> (maintainer)
* - Update maintainer's address [1]culot2011-04-032-2/+1
| | | | | | | - Remove MD5 checksum while I am here PR: ports/156141 [1] Submitted by: Dax Labrador <semprix AT gmx.com> (maintainer)
* Update to xmlsec 1.2.17johans2011-04-033-5/+4
|
* Document two quagga DoS vulnerabilitiessem2011-04-021-0/+33
|
* - update to version 0.6.0ohauer2011-03-303-8/+3
| | | | Changelog: http://code.google.com/p/pulledpork/wiki/Timeline
* Add a missing </p>.kwm2011-03-291-1/+1
| | | | Pointed out by: jadawin@
* Document gdm privilege escalation vulnerabilitykwm2011-03-291-0/+32
|
* - Depend on newer libarchive (and fix plist) on 7.x and 8.0.avilla2011-03-292-2/+4
| | | | | | - Bump PORTREVISION. Reported by: pointyhat via pav
* Update libksba to 1.2.0, and update dependent ports.dougb2011-03-286-10/+18
| | | | | | | | | | | | | | | | | The patch also adds a verify target for the PGP signature of the distfile. Noteworthy changes in version 1.2.0 (2011-03-01) ------------------------------------------------ * New functions to allow the creation of X.509 certificates. This release adds features required by the GnuPG 2.1 development version. PR: ports/155506 Submitted by: me Approved by: maintainer timeout
* - Update to RC2dhn2011-03-273-3/+4
| | | | | PR: ports/155951 Submitted by: Eric F Crist <ecrist@secure-computing.net> (maintainer)
* Document vulnerabilities before Chromium 10.0.648.204rene2011-03-271-2/+22
| | | | Obtained from: http://googlechromereleases.blogspot.com/search/label/Stable%20updates
* - update to 1.7bapt2011-03-262-5/+9
| | | | - changes: http://search.cpan.org/src/DANIEL/Crypt-Cracklib-1.7/Changes
* - update to 2.01bapt2011-03-263-4/+10
|
* - update to 0.02bapt2011-03-263-5/+8
| | | | | | - add licenses - add WWW - changes: http://cpansearch.perl.org/src/BTROTT/Digest-BubbleBabble-0.02/Changes
* Add entries for php5-exif and php5-zip before 5.3.6 release.ale2011-03-251-0/+57
| | | | | PR: ports/155922 Submitted by: Chris Tandiono <christandiono@tbp.berkeley.edu>
* The FreeBSD KDE Team is pleased to announce KDE SC 4.6.1 and KDE PIMavilla2011-03-256-870/+52
| | | | | | | | | 4.4.10. The official 4.6.1 release notes can be found at: http://www.kde.org/announcements/announce-4.6.1.php We'd like to say thanks to all helpers and submitters. Tested by: exp-run via miwi
* Apply patch for MITKRB5-SA-2011-003, KDC vulnerable to double-free whency2011-03-252-2/+5
| | | | | | | | PKINIT enabled. Obtained from: http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt Security: MITKRB5-SA-2011-003, CVE-2011-0284 Feature safe: yes
* Update to 10.2r153.nox2011-03-251-0/+44
| | | | | | Security: http://www.freebsd.org/ports/portaudit/501ee07a-5640-11e0-985a-001b2134ef46.html PR: ports/155874 Submitted by: Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp>
* - Document mozilla -- update to HTTPS certificate blacklistbeat2011-03-241-0/+46
|
* - update to 0.8.0flo2011-03-244-85/+78
| | | | | PR: ports/155883 Submitted by: vanhu (maintainer)
* - Update MASTER_SITES/WWWdhn2011-03-243-6/+2
| | | | | | | - Remove MD5 checksum PR: ports/155798 Submitted by: KATO Tsuguru <tkato432@yahoo.com>
* - Update to 1.0dhn2011-03-245-41/+22
| | | | | | | | - Update WWW - Remove MD5 checksum PR: ports/155797 Submitted by: KATO Tsuguru <tkato432@yahoo.com>
* - Update MASTER_SITES/WWWdhn2011-03-243-6/+2
| | | | | PR: ports/155796 Submitted by: KATO Tsuguru <tkato432@yahoo.com>
* - Update to 4.31dhn2011-03-243-5/+15
| | | | | PR: ports/155795 Submitted by: KATO Tsuguru <tkato432@yahoo.com>
* - Add LICENSE knob(s)mm2011-03-237-1/+18
|
* - Update to 2.26sunpoet2011-03-232-7/+4
| | | | | | | | | | | | | | | | | | | | - Use bsd.port.mk Changes: - Fix potential crash on relative HTTP redirect. - Use correct TUN/TAP device node on Android. - Check client certificate expiry date. - Implement CSTP and DTLS rekeying (both by reconnecting CSTP). - Add --force-dpd option to set minimum DPD interval. - Don't print webvpn cookie in debug output. - Fix host selection in NetworkManager auth dialog. - Use SSLv3 instead of TLSv1; some servers (or their firewalls) don't accept any ClientHello options. - Never include address family prefix on script-tun connections. PR: ports/155705 Submitted by: Ben <ben@gibbed.org> Approved by: Damian Gerow <dgerow@afflictions.org> (maintainer)
* Update to 2.8.3a.lx2011-03-232-9/+9
|
* Update to latest snapshot.jpaetzel2011-03-222-3/+3
| | | | | | PR: ports/155770 Submitted by: Eric F Crist <ecrist@secure-computing.net> Sponsored by: ClaimLynx, Inc
* Update to 2.09_20110125sbz2011-03-221-1/+1
| | | | Approved by: jadawin@ (mentor)
* - Update to 2.09sbz2011-03-222-5/+5
| | | | | | - Changes: http://cpansearch.perl.org/src/GOMOR/Net-SinFP-2.09/Changes Approved by: jadawin@ (mentor)
* - Update to 0.43clsung2011-03-213-5/+7
|
* Join the party, remove MD5 from the last of my portsdougb2011-03-212-4/+0
|
* Bump PORTREVISION for ports linking to default libmysqlclient.ale2011-03-197-4/+7
|
* - Readd p5-IP-Anonymous port in a correct directorypav2011-03-191-1/+1
|
* Document CVE-2011-0411: Postfix "STARTTLS" Plaintextsahil2011-03-191-0/+38
| | | | | | Injection Vulnerability. Reviewed by: miwi (secteam)
* - Add create-cert 2.0sunpoet2011-03-194-0/+36
| | | | | | | | create-cert is a script that uses openssl(1) to create self-signed host certificates and private keys for fully qualified domain names (FQDNs). PR: ports/155014 Submitted by: Craig Leres <leres@ee.lbl.gov>
* Update my MAINTAINER address to sbz at FreeBSD.org.sbz2011-03-1815-15/+15
| | | | Approved by: jadawin@ (mentor)
* - Fix INDEXmiwi2011-03-181-1/+1
|
* - Documented integer overflow in hiawatha web serverglarkin2011-03-181-0/+32
| | | | Submitted by: C-S <c-s@c-s.li>
* - Add missing RUN_DEPSmiwi2011-03-182-2/+5
| | | | | PR: 154343 Submitted by: Paul Schmehl <pauls@utdallas.edu>
* Get weak or strong random data from pluggable sourcesmiwi2011-03-175-0/+69
| | | | | | | WWW: http://search.cpan.org/dist/Crypt-Random-Source PR: ports/155572 Submitted by: Dereckson <dereckson at gmail.com>
* - Mark ports that have been broken for six month or more, or never compiled onpav2011-03-174-23/+18
| | | | 7.X and up, for removal in one month
* Document asterisk multiple vulnerabilities.delphij2011-03-171-0/+39
|
* Update to 0.2.2.23-alphabf2011-03-152-5/+4
|
* Mark chromium-9.0.597.107 and chromium-10.0.648.127 as vulnerable.rene2011-03-151-2/+57
|
* - Cleanup a bitmiwi2011-03-151-1/+1
|
* - Add correct infos to the avahi issusmiwi2011-03-151-5/+9
| | | | - Add url to original advisory
* Fix date in avahi entry.kwm2011-03-151-1/+1
|
* Add avahi denial of services attack.kwm2011-03-151-0/+35
|
* - Bump PORTREVISION to chase the update of dns/libidnwen2011-03-143-5/+6
|
* Deprecate unmaintained ports from security where upstream disapear and/orbapt2011-03-1426-0/+78
| | | | where no distfiles can be found and are not used by maintained ports
* Make hidden dependency on GnuTLS explicitjohans2011-03-131-0/+2
| | | | Reported by: Bjoern Koenig <bkoenig@alpha-tierchen.de>
* Unbreak build with LPK option (broken after commit 1.674 in bsd.port.mk).skv2011-03-121-1/+1
|
* Upgrade to 1.8.0bapt2011-03-112-3/+4
|
* Fix discovery for mailman XSS vulnerabilities.wxs2011-03-101-1/+1
| | | | | Noticed by: erwin@ Pointyhat to: wxs@
* Document mail/mailman XSS vulnerabilities.wxs2011-03-101-0/+29
|
* - Update to 5.61swills2011-03-102-3/+4
| | | | | | - Use new CPAN SUBDIR Changelog: http://cpansearch.perl.org/dist/Digest-SHA/Changes
* - Update to 2.08_20101224wen2011-03-081-2/+7
| | | | | PR: ports/155246 Submitted by: Sofian Brabez <sbrabez@gmail.com> (maintainer)
* - Update to 2.08wen2011-03-083-25/+51
| | | | | | | - Add LICENSE PR: ports/155245 Submitted by: Sofian Brabez <sbrabez@gmail.com> (maintainer)
* - Document redmine -- XSS vulnerabilitydecke2011-03-081-0/+29
|
* - Fix plistpav2011-03-081-85/+85
| | | | | | | | - No portrevision bump because this port abuses portrevision PR: ports/155224 Submitted by: wen With hat: portmgr
* Two new ports: security/yara and security/py-yara. The latter is the pythonwxs2011-03-089-0/+99
| | | | | | | | | | | | bindings for the former. "YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic." WWW: http://code.google.com/p/yara-project/
* This module extends existing IO::Async classes with extra methods todhn2011-03-075-0/+38
| | | | | | | | | allow the use of SSL or TLS-based connections using IO::Socket::SSL. WWW: http://search.cpan.org/dist/IO-Async-SSL/ PR: ports/155336 Submitted by: "ports@c0decafe.net" <ports@c0decafe.net>
* - Update to 1.39jadawin2011-03-072-3/+3
| | | | - Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.39/Changes
* Document subversion -- remote HTTP DoS vulnerabilitylev2011-03-051-0/+32
| | | | Obtained from http://subversion.apache.org/security/CVE-2011-0715-advisory.txt
* - Security update to 0.14.2dinoex2011-03-052-3/+4
| | | | | | Security: Fix possible "man in the middle" attack - make portlint happy
* Update to RCjpaetzel2011-03-052-3/+4
| | | | | | PR: ports/155271 Submitted by: Eric F Crist <ecrist@secure-computing.net> Sponsored by: ClaimLynx, Inc
* The OpenVPN Radius Plugin provides RADIUS authenticationmiwi2011-03-054-0/+53
| | | | | | | | | and accounting support for OpenVPN. WWW: http://www.nongnu.org/radiusplugin/index.html PR: ports/155259 Submitted by: Mikhail T. <m.tsatsenko at gmail.com>
* Update to 3.4.0 release and add support for amd64.ale2011-03-047-42/+42
|
* Update to 1.08 release and add LICENSE.ale2011-03-042-5/+9
|
* Remove extra spaces after port namesmartymac2011-03-041-1/+1
| | | | Approved by: portmgr@, ehaupt (mentor)
* - Update to 6.1miwi2011-03-043-19/+18
| | | | | | PR: 154905 Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru> Approved by: maintainer
* Patch a assumtion that uname -m returns the architecture value instead of ↵kwm2011-03-041-0/+11
| | | | | | | | | | MACHINE. This makes it unbuildable on platforms where these differ (pc98, powerpc64, sun4v). Use uname -p to fix this. PR: ports/155228 Submitted by: Nathan Whitehorn <nwhitehorn@FreeBSD.org>
* Add a more reliable mirrors for fc4 and f10 linux emulation ports.ehaupt2011-03-034-0/+4
| | | | | Triggered by: distilator Reviewed by: netchild (emulation)
* - Update to 0.30clsung2011-03-032-4/+3
|
* - Update to 1.0.8clsung2011-03-036-28/+28
| | | | | | | | | - This uses the newest GPGME library instead of the ancient security/gpgme03 - Add LICENSE - Update pkg-descr PR: ports/154640 Submitted by: Jason E dot Hale <bsdkaffee_AT_gmail dot com>
* Update to 3.12.9.kwm2011-03-023-15/+5
| | | | Submitted by: beat
* - Installing of libraries in ${OCAML_SITELIBDIR)/stublibs, which is not ↵wen2011-03-024-6/+16
| | | | | | | | | searched; - Creation of an install directory before the privilege switch. PR: ports/155171 Submitted by: Jaap Boender <jaapb@kerguelen.org> (maintainer)
* - Document mozilla -- multiple vulnerabilitiesbeat2011-03-021-0/+83
|
* - change the port to use devel/libevent2bf2011-03-021-4/+13
| | | | | | | - remove two problematic mirrors, and add others - bump PORTREVISION Approved by: makc, miwi (mentors, implicit)
* - update to 0.2.1.30 (also submittedbf2011-03-022-12/+11
| | | | | | | | | independently by J. Snabb) - remove two problematic mirrors, and add others - reduce the diff against tor-devel PR: 155159 Approved by: makc, miwi (mentors, implicit)
* Document Chromium versions 9.0.597.[84,94,107]rene2011-03-021-2/+71
| | | | Obtained from: http://googlechromereleases.blogspot.com/search/label/Stable%20updates
* - Update to 0.76sunpoet2011-03-012-3/+3
| | | | Changes: http://search.cpan.org/dist/zxid/
* Deprecate all non-default Fedora based linux_base respectively linux-fx-*netchild2011-02-283-0/+9
| | | | | | | | | ports. All of them are End of Life (no security updates) since a loooong time. As they are not the default, I decided to go with a short expiration date (one month). The maintainer of the few ports which depend upon the f8 infrastructure is informed to take action (update to the default f10 infrastructure, or to deprecate).