aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* The KDE/FreeBSD team is pleased to announce KDE SC 4.7.4, whichavilla2012-01-254-6/+6
| | | | | | | | | | concludes the 4.7 series. The official release notes can be found at: http://kde.org/announcements/announce-4.7.4.php PR: 162216 PR: 163662
* Apply utmp patch from ${FILESDIR} (not files) if OSVERSION < 900007jgh2012-01-251-2/+2
| | | | | Spotted by: Jason Hellenthal <jhell at DataIX.net> Approved by: crees,rene (mentors,implicit)
* - Update to 1.3.1jgh2012-01-253-13/+14
| | | | | | | | - Move to plist to account for non-default configuration files PR: ports/164266 Submitted by: maintainer Approved by: rene (mentor)
* update to 0.2.3.11-alphabf2012-01-242-3/+3
| | | | Security: CVE-2011-4576; Infinite-length circuit DOS
* update lang/sbcl to 1.0.55, and adjust dependent portsbf2012-01-241-1/+1
|
* Dancer::Plugin::Passphrase manages the hashing of passwords for Dancer apps,culot2012-01-245-0/+49
| | | | | | | | | | | | allowing developers to follow best cryptography practice without having to become a cryptography expert. It uses the bcrypt algorithm as the default, wrapping Crypt::Eksblowfish::Bcrypt, and also supports any hashing function provided by Digest. WWW: http://search.cpan.org/dist/Dancer-Plugin-Passphrase/ PR: ports/164427 Submitted by: Grzegorz Blach <magik@roorback.net>
* - update entry fixed in chromium-16.0.912.75 (CVE-2011-3925)rene2012-01-241-0/+40
| | | | | | - add entry for vulnerabilities fixed in chromium-16.0.912.77 Security: CVE-2011-[3924-3928]
* Fix build while chanting "I will run make validate". :(wxs2012-01-241-1/+1
| | | | Pointyhat to: wxs@
* Add CVE for recent spamdyke buffer overflows.wxs2012-01-241-0/+1
|
* Document multiple vulnerabilities in wireshark, all of which havewxs2012-01-241-0/+58
| | | | already been fixed in our port.
* Whitespace cleanup.wxs2012-01-241-2/+2
|
* - Document buffer overflows in spamdyke.wxs2012-01-241-0/+33
|
* - update to DISTVERSION 201204ohauer2012-01-243-7/+6
| | | | | | | - sort pkg-plist with help from ports-mgmt/genplist PR: 164407 Submitted by: Eric F Crist <ecrist@secure-computing.net> (maintainer)
* Update to 4.0.1.nobutaka2012-01-232-3/+3
|
* Fixup to please "make tidy". No need to wrap this line.wxs2012-01-231-2/+1
|
* - Add CVE for spamdyke STARTTLS plaintext injection.wxs2012-01-231-0/+2
|
* - Fix affected rubygem-rack version: add ,3 as PORTEPOCH=3 is restoredsunpoet2012-01-221-1/+1
|
* - Update to 0.22culot2012-01-223-5/+8
| | | | | | | | - Add LICENSE (Artistic 1 & GPLv1) - Change MAINTAINER from ports@ to perl@ - Update WWW link in pkg-descr (was pointing to wrong CPAN module) Changes: http://search.cpan.org/dist/Authen-TacacsPlus/Changes
* - Correct package range in 5c5f19ce-43af-11e1-89b4-001ec9578670zi2012-01-221-1/+5
| | | | - Add databases/redis to the affected list for 91be81e7-3fea-11e1-afc7-2c4138874f7d
* At the moment 1385 ports use BUILD_DEPENDS= ${RUN_DEPENDS} and 450eadler2012-01-2272-72/+72
| | | | | | | | | | ports use BUILD_DEPENDS:= ${RUN_DEPENDS}. This patch fixes ports that are currently broken. This is a temporary measure until we organically stop using := or someone(s) spend a lot of time changing all the ports over. Explicit duplication > := > = and this just moves ports one step to the left Approved by: portmgr
* - Fix issue when NOPORTDOCS and SNORTSAM are both definedzi2012-01-211-1/+3
|
* - Update to 2.9.2.1zi2012-01-212-3/+5
| | | | - Fix issue when NOPORTDOCS is defined
* - Fix formatting/topic in 91be81e7-3fea-11e1-afc7-2c4138874f7dzi2012-01-211-6/+25
| | | | Reviewed by: wxs
* - Document security vulnerability in security/openssl (CVE-2012-0050)zi2012-01-211-0/+28
|
* fix uuid on latest tomcat vulnerabilityjgh2012-01-211-1/+1
| | | | Approved by: crees, rene (implicit)
* - Fix modified date;delphij2012-01-211-1/+3
| | | | - Add more ruby variants.
* Update 91be81e7-3fea-11e1-afc7-2c4138874f7d to cover ruby+no-pthreads asdelphij2012-01-211-0/+2
| | | | | | well. Spotted by: Kevin Oberman <kob6558 gmail.com>
* Remove license infodougb2012-01-202-4/+0
|
* Add pcsc-tools, tools for testing PCSC cards and readersarved2012-01-206-0/+63
| | | | | | First submission: PR: 42702 Submitted by: bms
* - document asterisk remote crash vulnerabilityflo2012-01-201-0/+31
|
* Document recent vulnerability of Apache Tomcat Server.jgh2012-01-201-0/+43
| | | | Approved by: rene (mentor)
* - Security update to 1.0.0gdinoex2012-01-202-10/+10
| | | | Security: http://www.openssl.org/news/secadv_20120118.txt
* Sigh, should have used <lt> instead of <gt>.delphij2012-01-201-1/+1
| | | | Pointy hat to: delphij
* php52-exif no longer vulnerable to CVE-2011-4566 as of 5.2.17_6delphij2012-01-201-1/+2
|
* Fix the version range for ruby. The stock version is affected.knu2012-01-191-1/+1
|
* There was no patch release in rubygem-rack 1.3.5_*, so just say < 1.3.6.knu2012-01-191-1/+1
|
* - Fix affected rubygem-rack version: it should be _3 for PORTREVISION=3sunpoet2012-01-191-1/+1
|
* update math/R to 2.14.1, and adjust dependent portsbf2012-01-192-2/+2
|
* Fix CVE URL in recent OpenTTD entry.danfe2012-01-171-1/+1
|
* Unexpand (convert leading spaces to tabs when possible).danfe2012-01-171-871/+871
|
* Document recent vulnerability of OpenTTD game server.danfe2012-01-171-0/+34
| | | | Reported by: Ilya Arkhipov
* - transfer maintainership for my zope-ports to zope@rm2012-01-1623-46/+46
| | | | - add them to virtual category `zope'
* PHP5 had its own entry for this vulnerability, so remove this.knu2012-01-161-5/+0
| | | | Pointed out by: ohauer
* Add node < 0.6.7 (for V8).knu2012-01-161-0/+4
|
* Add v8 < 3.8.5 (CVE-2011-5037).knu2012-01-161-0/+5
|
* Add PHP < 5.3.9 (CVE-2011-4885).knu2012-01-161-0/+5
|
* Add Multiple implementations denial-of-service via hash algorithm collision.knu2012-01-161-0/+41
| | | | Currently only JRuby, Ruby, and Rack are mentioned. More to follow.
* Add missing dependency to gnutls. [1]netchild2012-01-151-1/+2
| | | | | | Fix the fix of adding a missing dependency to the linux cups-libs port. Reported by: Da Rock <freebsd-emulation@herveybayaustralia.com.au> [1]
* Certifi: Python Mozilla's SSL Certificates.miwi2012-01-155-0/+37
| | | | | | | WWW: http://pypi.python.org/pypi/certifi/ PR: ports/163970 Submitted by: Olivier Duchateau <duchateau.olivier@gmail.com>
* - Update to 110511miwi2012-01-152-3/+3
| | | | | | PR: 164014 Submitted by: Kurt Jaeger <fbsd-ports@opsec.eu> Approved by: maintainer
* - fix runtime with ruby18 (add dependency on converters/ruby-iconv)rm2012-01-151-9/+5
| | | | | | | | | - drop option SVN_FBSD, because there is no more subversion-freebsd - bump portrevision because of dependency changes PR: 163831 Submitted by: Guilherme Oliveira <guilherme.oliveira at gmail dot com> Approved by: maintainer
* - escape shell namesdinoex2012-01-141-1/+1
|
* Add missing URL reference to last commitmm2012-01-141-0/+1
|
* Add relevant FFmpeg vulnerabilities from Ubuntu USN-1320-1mm2012-01-141-0/+55
|
* In the rc.d scripts, change assignments to rcvar to use thedougb2012-01-1480-82/+80
| | | | | | | | | | | literal name_enable wherever possible, and ${name}_enable when it's not, to prepare for the demise of set_rcvar(). In cases where I had to hand-edit unusual instances also modify formatting slightly to be more uniform (and in some cases, correct). This includes adding some $FreeBSD$ tags, and most importantly moving rcvar= to right after name= so it's clear that one is derived from the other.
* - clean upmiwi2012-01-141-42/+42
|
* - Document vulnerabilities in security/opensslzi2012-01-141-0/+49
| | | | | -- CVE-2011-4108, CVE-2011-4109, CVE-2011-4576 -- CVE-2011-4577, CVE-2011-4619, CVE-2012-0027
* - Document vulnerability in net/isc-dhcp42-server (CVE-2011-4868)zi2012-01-131-0/+32
|
* - update to NSS_3_13_1_WITH_CKBI_1_88_RTMflo2012-01-132-8/+10
| | | | | | - some fixes to make the regression tests actually run [1] Submitted by: mi [1]
* - update to NSS_3_13_1_WITH_CKBI_1_88_RTMflo2012-01-132-4/+3
|
* Document PowerDNS DoS vulnerability.delphij2012-01-131-0/+28
| | | | | PR: ports/164066 Submitted by: Ralf van der Enden <tremere cainites.net>
* - update to 1.1.0dinoex2012-01-123-3/+7
|
* The Authen::OATH module provides a Perl implementation of theculot2012-01-125-0/+43
| | | | | | | | | | HOTP and TOTP One Time Password algorithms as defined by OATH (http://www.openautentication.org). WWW: http://search.cpan.org/dist/Authen-OATH/ PR: ports/164035 (based on) Submitted by: Jui-Nan Lin <jnlin@csie.nctu.edu.tw>
* Update to 2.12.16.novel2012-01-122-3/+3
|
* Document PHP multiple vulnerabilities.delphij2012-01-121-0/+42
|
* - use /etc/rc.d/ipfilter quietresyncdinoex2012-01-111-1/+1
| | | | | PR: 163959 Submitted by: Nick Hibma
* - Build with obsolte MD2 hash by defaultdinoex2012-01-112-27/+16
| | | | | | | | | | | | - Security Update to 1.0.0f Security: http://openssl.org/news/secadv_20120104.txt Security: CVE-2011-4108 Security: CVE-2011-4109 Security: CVE-2011-4576 Security: CVE-2011-4577 Security: CVE-2011-4619 Security: CVE-2012-0027 Submitted by: Tim Zingelman
* - Update to 1.1.1.wxs2012-01-114-29/+9
| | | | | | | | | - Use libhtp from ports instead of the bundled one. - Remove check for 6.x. PR: ports/163603 Submitted by: wxs@ Approved by: eksffa@freebsdbrasil.com.br (maintiner timeout)
* Update to 1.4.6 release.ale2012-01-102-3/+3
|
* Update to 1.10.5 release.ale2012-01-102-3/+4
|
* Update to 3.4.1 release.ale2012-01-103-7/+7
|
* - update to 4.0.10rm2012-01-102-4/+3
|
* Document a untrusted local library exploit in games/torcs.rene2012-01-101-0/+31
| | | | Security: CVE-2010-3384
* - The proper acronym for Apache Software License 2 is really AL2tabthorpe2012-01-099-9/+9
| | | | | | | | | - Thanks to crees@ for generating the initial patch PR: ports/163521 Submitted by: Pedro Giffuni <pfg apache.org> Hat: portmgr Exp run by: pav
* The port asks the user a question. Tools like portmaster need tolbr2012-01-091-0/+2
| | | | | | | know this so that they can inform the user. PR: 162072 Submitted by: Doug Barton <dougb@freebsd.org>
* - Remove outdated version checkseadler2012-01-093-6/+0
| | | | Reviewed by: nox
* Document spamdyke STARTTLS plaintext injection vulnerability.wxs2012-01-091-0/+31
|
* 2012-01-08 security/cryptplug: development has ceasedeadler2012-01-0918-280/+0
| | | | 2012-01-08 security/gpgme03: superceded by security/gpgme
* - Update to 0.10novel2012-01-092-4/+4
| | | | - Disable debug build
* - Update to version 1.7.9-jumbo-5danfe2012-01-083-8/+15
| | | | | | | | - Add an OPTION to build with OpenMP support (disabled by default) - Adjust `pre-build' target message to mention OpenMP support (with/without) - Fix overly aggressive CFLAGS patching via REINPLACE_CMD - Remove unneeded global modifiers from sed(1) expressions and kill one superfluous empty line while I am here
* Expand 11 (number) into `eleven' (word) to make port description look better.danfe2012-01-081-1/+1
|
* Repeated words are are hard to to find sometimes.eadler2012-01-089-9/+9
| | | | Approved by: portmgr (itetcu)
* - Update to 1.6.wxs2012-01-082-4/+4
|
* Update to 1.6.wxs2012-01-083-29/+4
| | | | While here, fix build with clang by setting USE_CSTD=gnu89.
* Remove HTML entity from a VuXML entry as they are not allowed insimon2012-01-081-1/+1
| | | | | | | | VuXML, only Unicode charecter entities are allowed. This should fix the portaudit build. If anyone care enough to insert the correct umlaut, feel free to fix.
* - update to 0.3rm2012-01-085-31/+13
| | | | | | | | | | | | - replace patches with REINPLACE_CMD - switch to bzip2 distribution - move license to proper Makefile section Changelog: https://gitorious.org/nmapsi4/pages/Released PR: 163869 Submitted by: Veniamin Gvozdikov <g.veniamin at googlemail dot com> (maintainer)
* - Add BUILD_DEPENDS to silence build warningsswills2012-01-081-1/+2
|
* Update to 4.0.0.nobutaka2012-01-072-3/+3
|
* - Selectivly adds mysql/and/or postgresql to rc script 'REQUIRES:'scheidell2012-01-072-3/+7
| | | | | | PR: ports/163825 Submitted by: scheidell Approved by: pauls@utdallas.edu (maintainer), gabor (mentor, implicit)
* Add new vulnerabilities for www/chromium.rene2012-01-071-0/+32
| | | | Security: CVE-2011-[3919,3921-3922]
* Update to 1.3.1ehaupt2012-01-062-3/+3
|
* Fix build.delphij2012-01-061-1/+0
|
* - document bugzilla and bugzilla3 security issuesohauer2012-01-061-0/+61
|
* - update to 1.7.6rm2012-01-053-3/+6
|
* - Reassignment of ECHO_MSG breaks 'make readme', so remove and reformat IGNORE.jgh2012-01-051-9/+6
| | | | | | PR: ports/163258 Submitted by: jgh (me) Approved by: maintainer, crees (mentor)
* - update to 5.61TEST4ohauer2012-01-054-26/+65
| | | | | | | | | | | | | | | | | | | | | | | | | For detailed Changes see http://nmap.org/changelog.html (List is simply to long ...) Some highlights * [NSE] Added a new httpspider library which is used for recursively crawling web sites for information. New scripts using this functionality include http-backup-finder, http-email-harvest, http-grep, http-open-redirect, and http-unsafe-output-escaping. See http://nmap.org/nsedoc/ or the list later in this file for details on these. * [NSE] Added a vulnerability management library (vulns.lua) to store and to report discovered vulnerabilities. * [NSE] Added a new script force feature. You can force scripts to run against target ports (even if the "wrong" service is detected) by placing a plus in front of the script name passed to --script. See http://nmap.org/book/nse-usage.html#nse-script-selection. * [NSE] Added 51(!) NSE scripts, bringing the total up to 297. Build tests sponsored by redports.org
* Document wordpress xss vulnerability.delphij2012-01-041-0/+36
| | | | Feature safe: yes
* Import plone4 dependencies part 8/15rm2012-01-029-0/+353
|
* - Reassign to the heaptabthorpe2012-01-021-1/+1
|
* - change required APACHE version from 13+ to 20+ohauer2012-01-022-4/+2
| | | | | | | | (prepare to remove www/apache13) - no PORTREVISION bump since apache22 is the default with hat apache@
* The murmur hash algorithm by Austin Appleby is an exteremely fastkuriyama2011-12-315-0/+36
| | | | | | | algorithm that combines both excellent collision resistence and distribution characteristics. WWW: http://search.cpan.org/dist/Digest-MurmurHash/
* Update to the latest development build (now same as primary port).cy2011-12-312-3/+4
| | | | | | | Developmnent branch not active since Dec 18, flag IGNORE until development resumes. Feature safe: yes
* Update 5.0.0 --> 5.0.1cy2011-12-313-4/+5
| | | | Feature safe: yes
* Add additional MITKRB5 reference.cy2011-12-301-1/+1
| | | | | Security: MITKRB5-SA-2011-008 Feature safe: yes
* Replace local patch file with identical MIT patch.cy2011-12-303-13/+4
| | | | | Security: FreeBSD-SA-11:08.telnetd, CVE-2011-4862, MITKRB5-SA-2011-008 Feature safe: yes
* - Add missing BUILD_DEPENDS to silence build warningsswills2011-12-301-1/+4
| | | | - Add TEST_DEPENDS to enable testing
* - Update to 0.4.6miwi2011-12-292-4/+3
| | | | | PR: 163403 Submitted by: Jaap Boender <jaapb@kerguelen.org> (maintainer)
* Fix build by adding a reference to the original URL.remko2011-12-291-0/+1
|
* Document XSS vulnerability in net-mgmt/zabbix-frontendcrees2011-12-291-0/+26
| | | | | | PR: ports/163691 Obtained from: https://support.zabbix.com/browse/ZBX-4015 Security: ZBX-4015
* update to CKBI version 1.88 which includes the latest mozilla cert dataflo2011-12-294-7/+8
|
* Update to new upstream release v2.2.2.mandree2011-12-292-7/+3
| | | | Changelog: http://openvpn.net/index.php/open-source/documentation/change-log/425-changelog-for-openvpn-22.html
* Update to 20111228garga2011-12-282-3/+3
|
* Document remote DoS vulnerability in lighttpd HTTP authenticationmm2011-12-281-0/+30
| | | | Security: CVS-2011-4362
* End WWW CPAN URL with a "/"ehaupt2011-12-2819-19/+19
|
* - Fix compile if WITH_STATIC is enabled [1]scheidell2011-12-282-3/+3
| | | | | | | | - Also pr ports/163593, which is a duplicate of this one. root@42.org [2] PR: ports/163217 Submitted by: Mattia Rossi <mrossi@swin.edu.au> [1], root@42.org [2] Approved by: spam@rm-rf.kiev.ua (maintainer), gabor (mentor)
* Pacify portlintehaupt2011-12-272-4/+4
| | | | Feature safe: yes
* - Fix most of the duplicate words in vuxml, a few affect 'blockquotes' but ↵eadler2011-12-271-10/+10
| | | | that should be okay as no information is lost.
* Install schema files with pam_ldap.marcus2011-12-271-2/+8
| | | | | PR: 163492 Submitted by: Mel.Flynn@datakitty.lan.rachie.is-a-geek.net
* Don't wrap a couple of lines. No other entries wrap these lines, so whenwxs2011-12-271-4/+2
| | | | in Rome...
* Whitespace cleanup in a BIND topic.wxs2011-12-271-1/+1
|
* Fix the build. Missing a quote on the blockquote citation and a missing </p>.wxs2011-12-271-2/+2
|
* Document CVE-2011-4862 (FreeBSD-SA-11:08.telnetd) as it affects krb5-appl too.cy2011-12-271-0/+28
| | | | | Security: CVE-2011-4862, FreeBSD-SA-11:08.telnetd Feature safe: yes
* Fix when an encryption key is supplied via the TELNET protocol, its lengthcy2011-12-272-0/+13
| | | | | | | is not validated before the key is copied into a fixed-size buffer. Security: FreeBSD-SA-11:08.telnetd, CVE-2011-4862 Feature safe: yes
* Switch to using bsd.port.options.mk and remove unnecessary assignments.wxs2011-12-261-6/+2
| | | | | | | | While here, be explicit with RUN_DEPENDS (pet pet portlint). PR: ports/162754 Submitted by: Matthew Seaman <m.seaman@infracaninophile.co.uk> Approved by: miwi@ (maintainer timeout)
* Add vuxml entry for proftpd chroot vulnerability.delphij2011-12-241-0/+34
| | | | Feature safe: yes
* - I meant LIBDIR not SITELIBDIRpgollucci2011-12-241-1/+1
| | | | Pointhat to: myself
* - Add USE_PERL5_BUILDscheidell2011-12-231-0/+1
| | | | | | PR: ports/163414 Submitted by: portmgr (pav) Approved by: gabor (mentor)
* Update to 0.62.nobutaka2011-12-233-3/+6
|
* - openssh-portable needs perl to build (reported by Gleb Smirnoff via mail)scheidell2011-12-231-0/+3
| | | | | | | | - add ssh_engine.5 man page when openssh-portable WITH_X509 is turned on (reported by John Hein via mail) PR: ports/163414 Submitted by: Grzegorz Blach <magik@roorback.net> Approved by: gabor (mentor)
* - Update to 1.2.2lwhsu2011-12-232-4/+3
|
* - Add fifth portion of dependencies needed for Plone 4 import.rm2011-12-2237-0/+1224
| | | | Approved by: novel (mentor)
* - Document recent vulnerabilities in databases/phpmyadmin (PMASA-2011-19 and ↵zi2011-12-221-0/+34
| | | | PMASA-2011-20)
* Mark broken on tier-2: fails to link.linimon2011-12-221-0/+3
| | | | Hat: portmgr
* - Add p5-CACertOrg-CA 20110724.001sunpoet2011-12-215-0/+39
| | | | | | | | | | CACertOrg::CA provides a copy of Certificate Authority certificate for CACert.org. This is the Class 1 PKI Key. sha1 13:5C:EC:36:F4:9C:B8:E9:3B:1A:B2:70:CD:80:88:46:76:CE:8F:33 md5 A6:1B:37:5E:39:0D:9C:36:54:EE:BD:20:31:46:1F:6B WWW: http://search.cpan.org/dist/CACertOrg-CA/
* - Also fix SeaMonkey version rangebeat2011-12-211-1/+2
|
* - Fix cvename in latest mozilla vulnerabilitybeat2011-12-211-5/+5
|
* - Document mozilla -- multiple vulnerabilitiesbeat2011-12-211-0/+58
|
* - Update 2.1.3 -> 2.1.4pgollucci2011-12-212-3/+3
|
* Update to 3.0.1.lx2011-12-212-3/+3
| | | | Feature safe: yes
* move contributor address => jghjgh2011-12-211-1/+1
| | | | Approved by: crees (mentor)
* - Remove expired security/p5-Digest-SHA256: use the builtinvsevolod2011-12-216-70/+0
| | | | Digest::SHA instead
* - chef 0.10.8 requires ~> 0.10.8pgollucci2011-12-212-3/+4
| | | | | so revert the last update - set PORTEPOCH
* - Remove explicit dependency in setup.py for `python ./setup.py test`lwhsu2011-12-202-1/+11
| | | | Requested by: clsung
* - Update to 2.2.0pgollucci2011-12-202-4/+3
| | | | | With Hat: ruby@ Sponsored by: RideCharge Inc. / TaxiMagic
* - Add missing dependencylwhsu2011-12-201-0/+3
|
* Add py-ssh 1.7.11, python SSH2 protocol library.lwhsu2011-12-204-0/+31
|
* - Point at the homepage consistently as defined by rubygems.orgpgollucci2011-12-201-1/+1
|
* unbound DoS vulnerabilitysem2011-12-191-0/+32
|
* Fix build on CURRENT using m4 -g instead of m4bapt2011-12-191-0/+1
| | | | Approved by: johans
* use m4 -g instead of m4 to activate the gnu extension for m4, this fixes ↵bapt2011-12-191-0/+3
| | | | build on CURRENT
* - Add first portion of dependencies needed for Plone 4 import.rm2011-12-1937-0/+775
| | | | | Submitted by: rm (myself, via github) Approved by: novel (mentor)
* - Cleanupmiwi2011-12-181-29/+30
| | | | | * correct line limit * sort cvename
* - Correct package name in previous commitzi2011-12-181-4/+1
| | | | Reported by: crees@
* - Document vulnerabilities in www/typo3 and www/typo345zi2011-12-181-0/+33
|
* Limit PORTSCOUT version check to -jumbo releases and explain why.danfe2011-12-181-0/+8
|
* update security/tor to 0.2.2.35 and security/tor-devel to 0.2.3.10-alphabf2011-12-174-6/+6
| | | | Security: CVE-2011-2778
* Work around duplicate ruby 1.8/1.9 dependency if RUBY_VER is 1.9.linimon2011-12-171-4/+5
| | | | Discussed with: pgollucci
* - Update to 1.1pgollucci2011-12-172-5/+4
| | | | | | | | PR: ports/163365 Submitted by: Scott Sanders <scott@jssjr.com> With Hat: ruby@ Approved by: renchap@cocoa-x.com (maintainer, implicit required for chef-server) Sponsored by: RideCharge Inc. / TaxiMagic
* - Cleanup snortsam integrationzi2011-12-161-29/+21
|
* - change USE_PYTHON to yes, because this port workingrm2011-12-163-4/+4
| | | | | | | | | | | | with any supported python version - move pkg-plist into PLIST_FILES - remove Author field from pkg-descr - bump PORTREVISION because of dependencies change PR: 163329 Submitted by: rm (myself) Approved by: joris dedieu <joris.dedieu at gmail.com> (maintainer), miwi (mentor)
* Update to v11.12.13 release.ale2011-12-155-10/+11
|
* - Update to 20110113culot2011-12-153-5/+5
| | | | | PR: ports/163298 Submitted by: Nikos Ntarmos <ntarmos@cs.uoi.gr> (maintainer)
* - Update to 2.9.2zi2011-12-154-9/+17
|
* - Update to 5.70sunpoet2011-12-142-5/+8
| | | | | | - Add TEST_DEPENDS Changes: http://search.cpan.org/dist/Digest-SHA/Changes
* Update to 1.4.7mm2011-12-142-3/+3
|
* Update to 1.1.0mm2011-12-142-3/+3
|
* PORTREVISION bump.cy2011-12-141-0/+1
| | | | | PR: 163272 Feature safe: yes
* Apply patch for MITKRB5-SA-2011-007, KDC null pointer dereference in TGScy2011-12-142-2/+5
| | | | | | | | | handling. PR: 163272 Submitted by: zi Security: 6c7d9a35-2608-11e1-89b4-001ec9578670 Feature safe: yes
* - Document security/krb5 vulnerability as described in MITKRB5-SA-2011-007zi2011-12-141-0/+30
|
* - Add CVE for recent asterisk vulnerabilitieszi2011-12-141-0/+2
| | | | Feature safe: yes
* - Bring back snortsam patcheszi2011-12-142-2/+3
| | | | | | | | - Do not bump PORTREVISION PR: ports/162740 Submitted by: Michael Scheidell <scheidell@freebsd.org> Feature safe: yes
* Document Opera multiple vulnerabilities.delphij2011-12-141-0/+50
| | | | | Requested by: tabthorpe Feature safe: yes
* Document vulnerabilities fixed in Chromium 16.0.912.63rene2011-12-141-0/+73
| | | | Security: CVE-2011-[3903-3917]
* Add cvename tag with content CVE-2011-4607 for PuTTY password 'vulnerability'.mandree2011-12-141-0/+1
| | | | | Feature safe: yes Submitted by: eadler
* - Correct package name for asterisk18zi2011-12-141-1/+1
| | | | Feature safe: yes
* - Update to 1.53jadawin2011-12-132-3/+3
| | | | | | - Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.53/Changes Feature safe: yes
* Update PuTTY to new upstream security and bug fix release 0.62,mandree2011-12-133-4/+36
| | | | | | | | and add a new VuXML entry. Changelog: http://lists.tartarus.org/pipermail/putty-announce/2011/000017.html Security: bbd5f486-24f1-11e1-95bc-080027ef73ec Feature safe: yes
* - Update to 0.23sunpoet2011-12-122-3/+3
| | | | | Changes: http://search.cpan.org/dist/Crypt-OpenSSL-CA/Changes Feature safe: yes
* - update to 2.13.7rm2011-12-122-3/+3
| | | | | Approved by: novel (mentor) Feature safe: yes
* Update to 1.0.6mm2011-12-122-3/+3
| | | | Feature safe: yes
* Update to 1.4.6mm2011-12-122-3/+3
| | | | Feature safe: yes
* - Update to 0.5.12wen2011-12-113-14/+11
| | | | Feature safe: yes
* Revise OPTIONS wording.mandree2011-12-111-2/+2
| | | | Feature safe: yes
* update and sort MASTER_SITESbf2011-12-091-3/+17
| | | | Feature safe: yes
* update to 0.2.3.9-alpha; update and sort MASTER_SITESbf2011-12-092-6/+27
| | | | Feature safe: yes
* - Update to 1.52jadawin2011-12-092-3/+3
| | | | | | - Changelog: http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.52/Changes Feature safe: yes
* - Document asterisk vulnerabilitieszi2011-12-091-0/+37
| | | | Feature safe: yes
* - Updated to 1.3.14glarkin2011-12-094-26/+18
| | | | | | | | ChangeLog: http://packages.debian.org/changelogs/pool/main/l/logcheck/logcheck_1.3.14/changelog PR: ports/162810 Submitted by: Takefu <takefu@airport.fm> Feature safe: yes
* - Mark security/gpgme03 and security/cryptplug DEPRECATED and set ↵scheidell2011-12-092-0/+6
| | | | | | | | | | | | EXPIRATION_DATE to 30 days from now. - security/cryptplug has not been developed since 2003 and is not used by any other port in the ports tree. It is the last port depending on security/gpgme03. - security/gpgme03 is an ancient version of GpgME (2003) and with cryptplug gone, no other ports need it. New ports should use security/gpgme instead. PR: ports/155200 Submitted by: Jason E. Hale <bsdkaffee@gmail.com> Approved by: markun@onohara.to (maintainer) Feature safe: yes
* -Update to 2.4scheidell2011-12-084-34/+46
| | | | | | | PR: ports/162242 Submitted by: Denis Generalov <gd@rambler-co.ru> Approved by: k@stereochro.me (maintainer timeout, 30 days), gabor (mentor) Feature safe: yes
* Update to 1.18.2martymac2011-12-084-3/+25
| | | | Feature safe: yes
* - Introduce multi-interface/instance support in rc scriptzi2011-12-081-3/+30
| | | | | | PR: ports/161286 Submitted by: Michael Scheidell <scheidell@secnap.net> Feature safe: yes
* - Document vulnerabilities in isc-dhcp: CVE-2011-4539zi2011-12-081-0/+32
| | | | Feature safe: yes
* TLS/SSL proxy in front of the application creates a transparentkuriyama2011-12-065-0/+45
| | | | | | | | encryption tunnel. WWW: http://search.cpan.org/dist/App-TLSMe/ Feature safe: yes
* - Try to fix plist on 9.Xpav2011-12-062-7/+5
| | | | | Reported by: pointyhat Feature safe: yes
* - upgrade to 1.8.13scheidell2011-12-043-4/+207
| | | | | | | | | | | | - race condition could cause crashes - upgrade to 1.8.12 - fixed memory leak (botan pr 144) - added patch from upstream in repo for python portability issues PR: 161167 Submitted by: jreed@isc.org Approved by: maintainer (timeout), gabor (mentor) Feature safe: yes
* Update to version 3.4.8dougb2011-12-021-0/+32
| | | | | | | | | | | | | This is the formal release of the fix to CVE-2011-4634, but there are no code differences from the preliminary fixes released in 3.4.8-rc1 except for the updated version number. PMSA-2011-18 has now been published; vuxml entry attached. PR: ports/163001 Submitted by: Matthew Seaman <m.seaman@infracaninophile.co.uk> (maintainer) Feature safe: yes
* Scannedonly is a samba VFS module and a scanning daemon that ensure that onlycrees2011-12-026-0/+146
| | | | | | | | | | | | | | | | | | | files that have been scanned for viruses are visible and accessible to the end user. Scannedonly was developed because of scalability problems with samba-vscan: high server loads when (the same) files were requested often, and timeouts when large zip files were requested. Scannedonly doesn't have these problems, but it does introduce some other issues. Choose the product that suits you best. Scannedonly is available under the open source GPL licence. The source code repository is available on Sourceforge. WWW: http://olivier.sessink.nl/scannedonly/ PR: ports/154202 Submitted by: girald@etcom.ufrgs.br Feature safe: yes
* - Update to 0.51ashish2011-12-012-3/+3
| | | | Feature safe: yes
* - Update to 5.63ashish2011-12-012-3/+3
| | | | Feature safe: yes
* - Update gss to 1.0.2johans2011-12-013-4/+7
| | | | | | - Touch doc/Makefile* to prevent unnecessary automake run Feature safe: yes
* - Add a link to a nice documentation in PHpav2011-11-301-0/+4
| | | | | Suggested by: dougb Feature safe: yes
* - Add a quick guide to adding a new entry to this unfriendly filepav2011-11-301-0/+9
| | | | Feature safe: yes
* Fix build with GSSAPI under 9.0.cy2011-11-301-1/+1
| | | | | Approved by: tabthorp (portmgr) Feature safe: yes
* Update to 2.11.novel2011-11-302-3/+3
| | | | Feature safe: yes
* - pkg-plist had missing linesscheidell2011-11-303-3/+19
| | | | | | PR: 161226 Approved by: maintainer timeout gabor(mentor) Feature safe: yes
* - Submitter is now Maintainerscheidell2011-11-297-53/+100
| | | | | | | | | | | | | | - There's one more commit after version 0.2 on github. After that, the software discontinued. This version is adopted by Debian - added alocal/automake - Committed with changed (added IGNORE for FreeBSD < 8.x since libusb 1.0 is needed, see libfprint) PR: 161225 Submitted by: Zhihao Yuan <lichray@gmail.com> Approved by: ports (maintainer timeout) gabor (mentor) Feature safe: yes
* - Submitter is now Maintainerscheidell2011-11-294-13/+30
| | | | | | | | | | | | - There's one more commit after version 0.2 on github. After that, the software discontinued. This version is adopted by Debian - added alocal/automake - Committed with changed (added IGNORE for FreeBSD < 8.x since libusb 1.0 is needed, see libfprint) PR: 161225 Submitted by: Zhihao Yuan <lichray@gmail.com> Approved by: ports (maintainer timeout) gabor (mentor) Feature safe: yes
* - on some (amd64, 7.4 at least), return from successful system callscheidell2011-11-292-0/+14
| | | | | | | | | | | - was generating a 0x4700. system calls sb short (0xff) - this patch masks the 0xff bits only, and is safe for all disto - Also sent upstream to author - Maintainer Timeout PR: 161383 Approved by: urisso@bsd.com.br (maintainer timeout) gabor (mentor) Feature safe: yes
* - Update to 2.20sunpoet2011-11-282-3/+4
| | | | | Changes: http://search.cpan.org/dist/App-Genpass/Changes Feature safe: yes
* - Update to 0.91miwi2011-11-275-21/+26
| | | | | | PR: 162788 Submitted by: maintainer Feature safe: yes
* update math/R to 2.14.0, math/R-cran-sp to 0.9-91, and adjustbf2011-11-272-2/+2
| | | | | | | dependent ports Approved by: linimon (portmgr), thierry, tota, wen Feature safe: yes
* update to 0.2.3.8-alphabf2011-11-263-19/+10
| | | | Feature safe: yes
* Update to 1.10.4 release.ale2011-11-252-3/+3
| | | | Feature safe: yes
* - Respect CC/CFLAGSmiwi2011-11-241-0/+7
| | | | | | | PR: 162533 Submitted by: Jan Beich <jbeich@tormail.net> Approved by: maintainer Feature safe: yes
* Update to 1.4.5mm2011-11-242-3/+3
| | | | Feature safe: yes
* Update to 1.0.6mm2011-11-242-3/+3
| | | | Feature safe: yes
* - Applied the startup script patch from PR ports/161524 to the localglarkin2011-11-243-17/+41
| | | | | | | | | | | installation type [1] - Streamlined the rc.d file to use fewer functions - Added a precmd to the rc.d file to ensure the proper ownership on some queue files. OSSEC daemons don't properly chown them upon creation. - Bumped PORTREVISION Reported by: Albert Gabas <agabas@astabis.com> (via email) [1] Feature safe: yes
* - Updated the PAM ssh rule file to match messages emitted on FreeBSD vs.glarkin2011-11-242-0/+17
| | | | | | | | | the Linux messages contained in the distro rule file - Bumped PORTREVISION PR: ports/162330 Submitted by: Shuichi KITAGUCHI <ki@hh.iij4u.or.jp> Feature safe: yes
* The OATH Toolkit contains a shared library, command line toolale2011-11-235-0/+74
| | | | | | | | | | | | | | | | and a PAM module that makes it possible to build one-time password authentication systems. Supported technologies include the event-based HOTP algorithm and the time-based TOTP algorithm. OATH is the Open AuTHentication organization which specify the algorithms. The components included in the package is: - liboath: A shared and static C library for OATH handling. - oathtool: A command line tool for generating and validating OTPs. - pam_oath: A PAM module for pluggable login authentication for OATH. Feature safe: yes
* - make portlint happierdinoex2011-11-222-16/+24
| | | | | | | - update patches PR: 161379 Feature safe: yes
* - cleanup homepagedinoex2011-11-221-4/+0
| | | | Feature safe: yes
* - Revert previous commitzi2011-11-221-2/+2
| | | | Feature safe: yes
* - Update hash to reflect file deployed to the official mirrors. (source ↵zi2011-11-221-2/+2
| | | | | | | | code was diff'd--no code changes detected) - Not bumping PORTREVISION Feature safe: yes
* Update to 2.1.4cs2011-11-213-4/+7
| | | | | Approved by: wen@ (co-mentor) Feature safe: yes
* Unbreak security/py-htpasswdjpaetzel2011-11-211-0/+3
| | | | | | PR: ports/162707 Approved by: Aldis Berjoza <graudeejs@gmail.com> (maintainer) Feature safe: yes
* - Update to 0.2.6miwi2011-11-193-8/+8
| | | | | | PR: 162629 Submitted by: Armin Pirkovitsch <armin@frozen-zone.org> Feature safe: yes
* - Update to 1.0miwi2011-11-192-4/+3
| | | | | | PR: 162628 Submitted by: Armin Pirkovitsch <armin@frozen-zone.org> Feature safe: yes
* - mark 1.3.41+2.8.31_4 as not vulnerabledinoex2011-11-191-2/+2
| | | | Feature safe: yes
* Add security/clamav-milter, clamav's meta-port with MILTER ongarga2011-11-192-0/+18
| | | | | Submitted by: bz@ Feature safe: yes
* - Remove unecessary dependency (libcheck) when option TESTS is off [1]garga2011-11-192-4/+4
| | | | | | | | - Add clamav-milter as CONFLICTS, this new meta port will be added soon PR: ports/161872 Submitted by: Alexey Markov <redrat@mail.ru> Feature safe: yes
* Sync up with main version of this port.cy2011-11-192-12/+11
| | | | | | | | | | Adjust -devel bits to fetch port from new URL. Emply new CONFIGURE_ARGS CPPFLAGS and LDFLAGS as in main version of this port. Update from build 3585 to build 3588. Feature safe: yes
* Adjust -devel bits for use in -devel version of this port.cy2011-11-191-6/+5
| | | | Feature safe: yes
* Remove trailing whitespaces.ehaupt2011-11-192-2/+2
| | | | Feature safe: yes
* hiawatha -- memory leak in PreventSQLi routinecs2011-11-191-0/+27
| | | | | Approved by: glarkin@ (mentor) Feature safe: yes
* Bump modified date for previous commit.delphij2011-11-191-0/+1
| | | | Feature safe: yes
* The long-term URL for the latest BIND vulnerability is up at ISC,dougb2011-11-191-2/+2
| | | | | | so adjust accordingly. Feature safe: yes
* Mark chromium-15.0.874.120 vulnerable.rene2011-11-171-2/+7
| | | | | | Obtained from: http://googlechromereleases.blogspot.com/search/label/Stable%20updates Security: CVE-2011-3900 Feature safe: yes
* niels has returned his commit bit for safekeeping.linimon2011-11-171-1/+1
| | | | | Hat: portmgr Feature safe: yes
* Add an entry for the BIND DOS vulnerability announced todaydougb2011-11-171-0/+45
| | | | Feature safe: yes
* Update 1.0.1 --> 1.0.2cy2011-11-173-8/+17
| | | | Feature safe: yes
* Update 1.9.1 --> 1.9.2. This is a bugfix release.cy2011-11-174-27/+4
| | | | Feature safe: yes
* - Add p5-Net-SSL-ExpireDate 1.10sunpoet2011-11-165-0/+48
| | | | | | | | | | | Net::SSL::ExpireDate get certificate from network (SSL) or local file and obtain its expiration date. WWW: http://search.cpan.org/dist/Net-SSL-ExpireDate/ PR: ports/161258 (based on) Submitted by: Stephon Chen <stephon@gmail.com> Feature safe: yes
* Update to 0.9.novel2011-11-162-3/+3
| | | | Feature safe: yes
* - Move PKGNAMEPREFIX defined in each R-cran- related ports Makefiletota2011-11-162-2/+0
| | | | | | | | | | | | | to Mk/bsd.cran.mk PR: ports/162238 Submitted by: tota (myself) Approved by: wen (maintainer of Mk/bsd.cran.mk and many related ports), David Naylor <naylor_DOT_b_DOT_david_AT_gmail_DOT_com> (maintainer of math/R-cran-RSvgDevice and math/R-cran-car), Dan Rue <drue_AT_therub_DOT_org> (maintainer of math/R-cran-psych, timeout > 2 weeks) Feature safe: yes
* No longer broken under 9.0.cy2011-11-151-4/+0
| | | | Feature safe: yes
* Set default DEVEL option (documentation).cy2011-11-152-13/+15
| | | | | | | | Add version 4 to conflicts. Adjust version 5 nightly builds URL for devel version of this Makefile. Feature safe: yes
* - document apache13 CVE-2011-3368ohauer2011-11-151-0/+60
| | | | Feature safe: yes
* - take maintainershiprm2011-11-152-2/+2
| | | | | Approved by: novel (mentor) Feature safe: yes
* libfwbuilder-devel has been merged into fwbuilder-devel and is no longercy2011-11-151-1/+0
| | | | | | required. Feature safe: yes