| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
PR: 198861
Submitted by: venture37@geeklan.co.uk
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- update to 1.0.1e_4
Approved by: swills (mentor)
Differential Revision: https://reviews.freebsd.org/D2125
Security: 9d15355b-ce7c-11e4-9db0-d050992ecde8
Security: CVE-2015-0286
Security: CVE-2015-0287
Security: CVE-2015-0289
Security: CVE-2015-0292
Security: CVE-2015-0293
MFH: 2015Q1
|
|
|
|
| |
Approved by: swills (mentor)
|
|
|
|
|
| |
- Update to 0.9.1
- Remove no longer needed patch
|
| |
|
|
|
|
| |
PR: 197854
|
|
|
|
| |
PR: 197854
|
|
|
|
| |
PR: 198401
|
| |
|
| |
|
|
|
|
| |
PR: 198749, 198750
|
|
|
|
|
|
|
|
| |
- While I'm here, reorder knobs
Changes: http://search.cpan.org/dist/Crypt-Sodium/Changes
PR: 198825
Submitted by: Thomas von Dein <freebsd@daemon.de> (maintainer)
|
|
|
|
|
|
| |
time the last release was made, was still known as RUBY_19.
While here, fix an ancient bug reported by clang.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The port now uses VersionAddendum in the sshd_config to allow overriding
this value. Using "none" allows disabling the default of the port
version string. The default is kept to show the port version string to
remain close to the base version.
Support for the client VersionAddendum may be added soon as well to better
match base and not give surprises when switching from base to the port.
PR: 193127
Requested by: many, including myself when this was broken years ago.
|
|
|
|
|
| |
PR: 198754
Submitted by: spil.oss@gmail.com
|
|
|
|
|
| |
- Remove obsoleted patch (included to the upstream)
- Honor openssl CFLAGS and LDFLAGS to use the proper version
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Update NSS and ca_root_nss to 3.18
- Update Firefox to 36.0.4
- Update Firefox ESR and libxul to 31.5.3
- Update SeaMonkey to 2.33.1
- Update Enigmail to 1.8
Changes: https://github.com/cisco/openh264/releases/tag/v1.4.0
Changes: https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.18_release_notes
Changes: https://www.mozilla.org/firefox/36.0.4/releasenotes/
Changes: https://www.mozilla.org/firefox/31.5.3/releasenotes/
Changes: http://www.seamonkey-project.org/releases/seamonkey2.33/
Changes: https://www.enigmail.net/download/changelog.php#enig1.8
MFH: 2015Q1
X-MFH-With: r380090
Security: https://vuxml.freebsd.org/freebsd/76ff65f4-17ca-4d3f-864a-a3d6026194fb.html
|
| |
|
|
|
|
|
|
|
|
|
| |
tests in tests/sys/opencrypto to validate parts of the OpenCrypto
subsystem...
Sponsored by: The FreeBSD Foundation
Approved by: mat (mentor)
Differential Revision: https://reviews.freebsd.org/D2064
|
|
|
|
|
|
|
| |
This backports some upstream fixes.
PR: 197909
Submitted by: Fabian Keil <fk@fabiankeil.de> (maintainer)
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The PHP developers stopped providing security patches for the 5.3
branch on 14 August 2014. They "strongly urge" to upgrade to current
versions "as using older versions may expose you to security
vulnerabilities and bugs that have been fixed in more recent versions"
of PHP.
The PHP53 branch was released from maintainership today, so it's being
deprecated with removal set for 15 April 2015.
There were only 8 ports limited to php53, six of which were pecl- ports.
These ports must be upgraded to use a later version of php (5.6 is
recommended) soon, or they will be removed with php53.
Note that all 8 ports incorrectly set the PHP_DEFAULT_VERSION, so this
was changed to use IGNORE_WITH_PHP instead while here.
PR: 198150
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- termios.h now default
- fix patches
- fix manpage generation
- option ZLIB removed from default
- restore padlock support
- restore RFC-5705
- restore patch history
- restore build on older FreeBSD
- restore soname
Security: https://www.openssl.org/news/secadv_20150319.txt
Security: CVE-2015-0291
Security: CVE-2015-0204
Security: CVE-2015-0290
Security: CVE-2015-0207
Security: CVE-2015-0286
Security: CVE-2015-0208
Security: CVE-2015-0287
Security: CVE-2015-0289
Security: CVE-2015-0292
Security: CVE-2015-0293
Security: CVE-2015-1787
Security: CVE-2015-0285
Security: CVE-2015-0209
Security: CVE-2015-0288
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
GH_TAGNAME is defaulted to the new DISTVERSIONPREFIX/DISTVERSION/DISTVERSIONSUFFIX
change in r381689.
This actually fixes the build for sysutils/zfstools, broken in r381704.
With hat: portmgr
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
- Remove incorrectly added patch files
PR: 198718
Submitted by: Bernard Spil <spil.oss at gmail.com>
Security: CVE-2015-0209, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289
|
|
|
|
| |
PR: 198718 [1]
|
|
|
|
|
| |
Reported by: ohauer
Pointy hat to: delphij
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
r381648 which were expecting DISTVERSIONPREFIX/SUFFIX to be used in the
tag fetched from github by defaulting GH_TAGNAME to the same value
as DISTVERSION would get by only when GH_COMMIT is not set (when using the
new scheme).
With hat: portmgr
|
|
|
|
| |
With hat: so
|
|
|
|
|
|
|
|
| |
In some cases no-sendmail support was in place but missing CFLAGS or
LDFLAGS, but in others it needed to be added. Problems found as a result
of DragonFly removing sendmail from base.
Approved by: just fix it.
|
|
|
|
|
| |
- Add empty directory to plist
- Strip binaries
|
|
|
|
|
|
|
|
|
|
|
| |
GITHUB.
The new GITHUB MASTER_SITE from r381618 now supports not setting GH_COMMIT and
only having GH_TAGNAME default to DISTVERSION.
All of these ports as-is.
With hat: portmgr
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Using this new scheme allows only setting the _tag_ or _commit hash_ in
GH_TAGNAME and not having to know the hash for a tag. This scheme will
download a tarball that has a different checksum than before due to a changed
directory name for extraction.
The following MASTER_SITES are provided to retain the old checksum and
directory structure (that require GH_COMMIT):
GH -> GHL
GITHUB -> GITHUB_LEGACY
Differential Revision: https://reviews.freebsd.org/D748
Submitted by: amdmi3
Reviewed by: mat, swills, antoine, bdrewery
With hat: portmgr
|
|
|
|
|
| |
PR: 153859
Submitted by: shun <shun.fbsd.pr@dropcut.net>
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2015-0207 Segmentation fault in DTLSv1_listen moderate
CVE-2015-0209 Use After Free following d2i_ECPrivatekey error low
CVE-2015-0286 Segmentation fault in ASN1_TYPE_cmp moderate
CVE-2015-0287 ASN.1 structure reuse memory corruption moderate
CVE-2015-0289 PKCS7 NULL pointer dereferences moderate
- Enable libtls component [2]
- Bump portrevision
PR: 198681 [1]
Submitted by: Bernard Spil <spil.oss at gmail.com> [1], naddy [2]
|
| |
|
|
|
|
|
| |
PR: 198671
Submitted by: maintainer
|
|
|
|
|
| |
PR: 198651
Submitted by: Bernard Spil <spil.oss at gmail.com>
|
| |
|
|
|
|
|
|
|
|
|
| |
Changes:
https://tls.mbed.org/tech-updates/releases/polarssl-1.2.13-released
PR: 197780
Submitted by: takefu@airport.fm
Approved by: jase (maintainer timeout)
|
|
|
|
|
| |
See http://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog for list
of changes since version 2.3.
|
|
|
|
|
|
|
|
|
|
|
| |
This port failed to build on gcc5-aux because 3 data types could not
be inlined after an explicit pragma requested it (the pragmas were
removed).
I noticed half the port was building in the stage phase, so I changed
the ALL_TARGET to make all of it build during the build phase. This
probably didn't need revbump, but I'm going to anyway to make sure the
FreeBSD builders are still happy.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2015-0332
CVE-2015-0333
CVE-2015-0334
CVE-2015-0335
CVE-2015-0336
CVE-2015-0337
CVE-2015-0338
CVE-2015-0339
CVE-2015-0340
CVE-2015-0341
CVE-2015-0342
Differential Revision: https://reviews.freebsd.org/D2061
Approved by: swills (mentor)
|
|
|
|
|
|
|
|
| |
- Do not silence installation message
PR: 196336
Submitted by: Kevin Zheng <kevinz5000@gmail.com>
Approved by: <theis@gmx.at> (maintainer)
|
|
|
|
| |
- Strip library
|
|
|
|
| |
- Strip library
|
|
|
|
|
| |
PR: 198525
Submitted by: Sergei Vyshenski <svysh.fbsd@gmail.com>
|
|
|
|
|
| |
PR: 198017
Submitted by: dim
|
|
|
|
|
|
| |
PR: 197779
Submitted by: takefu@airport.fm
Approved by: maintainer (with minor changes)
|
|
|
|
|
|
|
| |
hash sums of files. It is based on the same code as existing Perl wrapper,
`security/p5-Crypt-RHash' port.
Also, properly sort `security/Makefile' while here.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Remove dependencies on modules distributed as part of perl core
- Remove references to FreeBSD < 8 and perl < 5.16
- Ensure that DOCS and EXAMPLES options exist for ports installing
PORTDOCS or PORTEXAMPLES
- Reduce unnecessary inclusions of bsd.port.options.mk by using
OPTIONS helpers and the like
- Fix some cases where dependencies were only assigned to BUILD_DEPENDS
- Fix a few of the cases where dependencies were only assigned to RUN_DEPENDS.
This one happens in many, many ports. I only applied it in cases where
it interfered with 'make test' but it should maybe be done more generally.
- Mute ${MKDIR} in installation
- Parethesize compound commands
- In www/p5-URI-Fetch, remove the ZLIB option that wasn't used
|
|
|
|
|
|
|
|
| |
- Drop GCC usage
- Maintainer's timeout (wen@FreeBSD.org)
PR: 183849
Submitted by: <senno@example.com>
|
|
|
|
| |
Changes: http://search.cpan.org/dist/Unix-Passwd-File/Changes
|
|
|
|
| |
- Strip library
|
|
|
|
| |
- Strip library
|
| |
|
| |
|
|
|
|
|
|
| |
PR: 198529
Submitted by: Sergei Vyshenski <svysh.fbsd@gmail.com>
Approved by: bapt
|
|
|
|
|
| |
Approved by: bapt
Security: CVE-2015-1306
|
|
|
|
| |
- Sort PLIST
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
comms/pear-Horde_ActiveSync 2.26.0 -> 2.26.1
devel/pear-Horde_Core 2.19.0 -> 2.19.2
security/pear-Horde_Group 2.0.4 -> 2.0.5
databases/pear-Horde_HashTable 1.2.2 -> 1.2.3
www/pear-Horde_Http 2.1.3 -> 2.1.4
mail/pear-Horde_Imap_Client 2.26.1 -> 2.27.0
mail/pear-Horde_Mime 2.7.0 -> 2.8.0
mail/pear-Horde_Smtp 1.8.0 -> 1.9.0
net/pear-Horde_Socket_Client 1.1.2 -> 2.0.0
devel/pear-Horde_Util 2.5.3 -> 2.5.4
|
|
|
|
|
| |
PR: 198534
Submitted by: maintainer
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The kde@ team presents KDE SC 4.14.3, the last planed release
of the KDE SC 4 series.
In addition to the updates provided by the KDE SC developers, this
update also addresses numerous FreeBSD and PORTS specific
issues, found and solved by the kde@ team and area51 testers,
most notorously Tobias C. Berner <tcberner@gmail.com>
PR: 197751
PR: 197871
PR: 184996
Reviewed by: rakuco (mentor)
Differential: https://reviews.freebsd.org/D1950
|
|
|
|
|
|
| |
- Cleanup plist
Reported by: pkg-fallout
|
|
|
|
| |
Changes: https://metacpan.org/changes/distribution/Unix-Passwd-File
|
|
|
|
| |
- Strip library
|
|
|
|
| |
- Strip library
|
|
|
|
| |
- Drop @dirrm* from plist
|
|
|
|
|
| |
PR: 154085
Submitted by: maintainer
|
|
|
|
|
|
|
|
| |
security/lsh has had vulnerabilities with a CPE identifier assigned
(e.g. CVE-2006-0353).
PR: 198473
Submitted by: shun.fbsd.pr@dropcut.net
|
|
|
|
|
|
|
|
| |
deprecated by OpenSSL 0.9.7 and will be removed in OpenSSL 1.1.0.
This patch replaces the des_ methods and types with their new DES_ counterparts.
PR: 198364
Submitted by: Bernard Spil <spil.oss@gmail.com>
|
|
|
|
| |
Changes: http://search.cpan.org/dist/Unix-Passwd-File/Changes
|
|
|
|
|
| |
- Add LICENSE_FILE
- Strip binary
|
|
|
|
|
|
|
| |
the codebase, or touches code paths that aren't accessed.
PR: 191901
Submitted by: Trond.Endrestol@ximalas.info
|
|
|
|
|
|
|
|
|
| |
instead of a LIB_DEPENDS. I think this is the right way to use
WITH_OPENSSL_PORT, but it's tough to know given the lack of documentation
on it.
PR: 198111
Submitted by: Bernard Spil
|
|
|
|
|
|
|
| |
use @sample [4]
PR: 197839 [1], 197494 [2], 197998 [3], 198164 [4]
Submitted by: C. Sturm [1], J. Beich [3], amdmi3 [4]
|
|
|
|
|
|
|
|
| |
- metasploit to 4.11.1
- rubygem-metasploit-credential to 0.13.17
- rubygem-metasploit_data_models to 0.22.6
- rubygem-meterpreter_bins to 0.0.13
- rubygem-recog to 1.0.7
|
| |
|
|
|
|
|
|
| |
CVE-2014-9472
CVE-2015-1165
CVE-2015-1464
|
| |
|
|
|
|
| |
Changes: https://github.com/net-ssh/net-ssh/blob/master/CHANGES.txt
|
|
|
|
| |
Changes: http://search.cpan.org/dist/Unix-Passwd-File/Changes
|
|
|
|
| |
Reported by: delphij
|
|
|
|
|
|
| |
- Fix *_DEPENDS
Changes: http://search.cpan.org/dist/Unix-Passwd-File/Changes
|
|
|
|
|
| |
- Add LICENSE
- Drop @dirrm* from plist
|
|
|
|
|
| |
PR: 198369
Submitted by: shun.fbsd.pr@dropcut.net
|
|
|
|
|
|
|
|
|
| |
This fixes a security bug, various other bugs, and supports SSH
connection sharing between multiple instances of PuTTY and its tools.
MFH: 2015Q1
Security: 92fc2e2b-c383-11e4-8ef7-080027ef73ec
Security: CVE-2015-2157
|
| |
|
|
|
|
| |
PR: 197465
|
|
|
|
| |
PR: 197465, 197466, 197467
|
|
|
|
| |
Changes: https://github.com/capistrano/sshkit/blob/master/CHANGELOG.md
|
|
|
|
|
|
|
| |
- Include upstream accepted Clang 3.6.0 fixes by Dimitry Andric <dim@FreeBSD.org>
PR: 198113
Submitted by: Stefan Grundmann <sg2342@googlemail.com>
|
|
|
|
|
| |
Submitted by: Carlos Jacobo Puga Medina
Obtained from: http://googlechromereleases.blogspot.nl/
|
| |
|
|
|
|
|
| |
PR: 198018
Submitted by: Craig Leres <leres@ee.lbl.gov>
|
|
|
|
|
|
| |
- Fix USE_LDCONFIG [2].
Spotted by: sunpoet [1] and bdrewery [2]
|
|
|
|
|
| |
PR: 198269
Submitted by: Bernard Spil <spil.oss at gmail.com>
|
|
|
|
| |
Approved by: portmgr blanket
|
|
|
|
|
|
|
|
| |
went into the main loop, no esp could be sent.
PR: 197835 (based on)
Submitted by: markiyan.kushnir@gmail.com
Fix confirmed: xmj
|
|
|
|
| |
Changes: https://github.com/capistrano/sshkit/blob/master/CHANGELOG.md
|
|
|
|
|
|
|
|
|
| |
functions to macros, so the constraints requirements are satisfied at
compile time. It is almost exactly the same as the patch for
libtomcrypt itself, in PR 198017.
Approved by: maintainer (vanilla)
PR: 198190
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
- Add LICENSE
Changes: https://github.com/codahale/bcrypt-ruby/blob/master/CHANGELOG
|
|
|
|
|
|
|
|
|
| |
The scrypt key derivation function is designed to be far more secure against
hardware brute-force attacks than alternative functions such as PBKDF2 or
bcrypt.
WWW: https://github.com/pbhogan/scrypt
RG: https://rubygems.org/gems/scrypt
|
| |
|
|
|
|
|
| |
PR: 198115
Submitted by: rsimmons0@gmail.com
|
|
|
|
|
| |
PR: 197470
Submitted by: maintainer (Sergei Vyshenski)
|
|
|
|
|
| |
PR: 197471
Submitted by: maintainer (Sergei Vyshenski)
|
|
|
|
|
|
|
|
|
|
| |
With the previous change, libgpg-error does not pass configure target
on FreeBSD 11 due tradcpp failing "sanity checks". This is a regression
since this port builds fine on FreeBSD 10. However, 2037 ports get
skipped (this port is *way* too important) as a result, so revert the
gcc-5 fix until a solution can be found.
PR: 197562
|
|
|
|
|
|
|
|
|
|
| |
This port relies on CPP behavior that changes on GCC 5. To ensure
libgpg-error keeps building on the newest GCC, add a build dependency
on tradcpp and use it instead.
PR: 197562
Submitted by: marino
Approved by: maintainer (novel)
|
|
|
|
|
|
| |
- Fix shebangs
MFH: 2015Q1
|
|
|
|
|
|
| |
- Fix version requirement of BUILD_DEPENDS
- Sort PLIST
- Bump PORTREVISION for dependency change
|
|
|
|
|
|
| |
- Sort PLIST
Changes: http://search.cpan.org/dist/Filter-Crypto/Changes
|
| |
|
|
|
|
| |
Reviewed by: zi
|
|
|
|
|
|
|
|
| |
Changes:
http://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
PR: 198109
Submitted by: Carlos Jacobo Puga Medina <cpm@fbsd.es> (maintainer)
|
| |
|
|
|
|
|
| |
- Fix whitespace
- Drop @dirrm* from plist
|
|
|
|
| |
Approved by: portmgr blanket
|
|
|
|
| |
https://bugzilla.mozilla.org/show_bug.cgi?id=1137604
|
| |
|
|
|
|
| |
Approved by: zi (mentor)
|
|
|
|
|
|
|
| |
The modules in this distribution implement the Salted Challenge Response
Authentication Mechanism (SCRAM) from RFC 5802.
WWW: http://search.cpan.org/dist/Authen-SCRAM/
|
|
|
|
|
|
|
| |
PBKDF2::Tiny provides an RFC 2898 compliant PBKDF2 implementation using
HMAC-SHA1 or HMAC-SHA2 in under 100 lines of code.
WWW: http://search.cpan.org/dist/PBKDF2-Tiny/
|
|
|
|
|
|
|
|
| |
Authen::SASL::SASLprep implements the SASLprep specification, which describes
how to prepare Unicode strings representing user names and passwords for
comparison. SASLprep is a profile of the stringprep algorithm.
WWW: http://search.cpan.org/dist/Authen-SASL-SASLprep/
|
|
|
|
|
|
| |
sufficient.
Thanks to az for showing me the light here.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This is a bugfix release. The krb5-1.11 release series has reached
the end of its maintenance period, and krb5-1.11.6 is the last planned
release in the krb5-1.11 series. For new deployments, installers
should prefer the krb5-1.13 release series or later.
This commit deprecates this port.
* Work around a gcc optimizer bug that could cause DB2 KDC database
operations to spin in an infinite loop
* Fix a backward compatibility problem with the LDAP KDB schema that
could prevent krb5-1.11 and later from decoding entries created by
krb5-1.6.
* Handle certain invalid RFC 1964 GSS tokens correctly to avoid
invalid memory reference vulnerabilities. [CVE-2014-4341
CVE-2014-4342]
* Fix memory management vulnerabilities in GSSAPI SPNEGO.
[CVE-2014-4343 CVE-2014-4344]
* Fix buffer overflow vulnerability in LDAP KDB back end.
[CVE-2014-4345]
* Fix multiple vulnerabilities in the LDAP KDC back end.
[CVE-2014-5354 CVE-2014-5353]
* Fix multiple kadmind vulnerabilities, some of which are based in the
gssrpc library. [CVE-2014-5352 CVE-2014-9421 CVE-2014-9422
CVE-2014-9423]
Security: dbf9e66c-bd50-11e4-a7ba-206a8a720317
CVE-2014-4341, CVE-2014-4342, CVE-2014-4343, CVE-2014-4344
CVE-2014-4345, CVE-2014-5354, CVE-2014-5353, CVE-2014-5352
CVE-2014-9421, CVE-2014-9422, CVE-2014-9423
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Handle certain invalid RFC 1964 GSS tokens correctly to avoid
invalid memory reference vulnerabilities. [CVE-2014-4341
CVE-2014-4342]
* Fix memory management vulnerabilities in GSSAPI SPNEGO.
[CVE-2014-4343 CVE-2014-4344]
* Fix buffer overflow vulnerability in LDAP KDB back end.
[CVE-2014-4345]
* Fix multiple vulnerabilities in the LDAP KDC back end.
[CVE-2014-5354 CVE-2014-5353]
* Fix multiple kadmind vulnerabilities, some of which are based in the
gssrpc library. [CVE-2014-5352 CVE-2014-9421 CVE-2014-9422
CVE-2014-9423]
Security: CVE-2014-4341, CVE-2014-4342, CVE-2014-4343, CVE-2014-4344
CVE-2014-4345, CVE-2014-5354, CVE-2014-5353, CVE-2014-5352
CVE-2014-9421, CVE-2014-9422, CVE-2014-9423
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
- Add pkgconfig to the list of dependencies
- Enable IKEv1 OPTION by default
- Bump PORTREVISION
PR: 197824
Submitted by: Franco Fichtner <franco@lastsummer.de> (based on)
Reworked by: strongswan@Nanoteq.com (maintainer)
Approved by: strongswan@Nanoteq.com (maintainer)
|
|
|
|
| |
Obtained from: bapt@, mat@
|
|
|
|
|
| |
- Add LICENSE_FILE
- Drop @dirrm* from plist
|
|
|
|
|
| |
PR: 197994
Submitted by: madpilot
|
|
|
|
|
|
|
|
|
| |
- Add p0f-analyzer.pl to SHEBANG_FILES [1]
- Remove reference to deprecated virus scanners [2]
- Use conventional sample file naming [2]
PR: 195870 [1], 194412 [2]
Submitted by: me@nileshgr.com [1], takefu@airport.fm [2]
|
|
|
|
|
| |
2: switch to USES=tar:tgz
3: switch to DEFAULT_VERSIONS.
|
|
|
|
| |
Noticed by: jbeich
|
|
|
|
| |
- Drop @dirrm* from plist
|
|
|
|
| |
2: switch to USES=tar:tgz
|
|
|
|
| |
2: switch to USES=tar:tgz
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
<URL:http://vuxml.freebsd.org/0f488b7b-bbb9-11e4-903c-080027ef73ec.html>
Topic: e2fsprogs -- potential buffer overflow in closefs()
Affects:
e2fsprogs < 1.42.12_2
References:
url:http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?h=maint&id=49d0fe2a14f2a23da2fe299643379b8c1d37df73
cvename:CVE-2015-1572
<URL:http://vuxml.freebsd.org/2a4bcd7d-bbb8-11e4-903c-080027ef73ec.html>
Security: CVE-2015-0247
Security: CVE-2015-1572
Security: 0f488b7b-bbb9-11e4-903c-080027ef73ec
Security: 2a4bcd7d-bbb8-11e4-903c-080027ef73ec.html
|
| |
|
|
|
|
| |
- Strip library
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This bug was first discovered by Fedora 22 team building with gcc5 and
they reported it upstream:
https://github.com/dsully/perl-crypt-openssl-x509/issues/39
I believe this patch is equivalent but a bit nicer than the fix suggested
there. The problem is "not (c < 0)" is desired but "(not c) < 0)" is
what the condition evaluates to. The joy of C.
Approved by: Just fix it
|
|
|
|
|
|
|
| |
Honggfuzz fails -pedantic checks on gcc-5. This wouldn't be a problem
except for the fact -Werror was also set, so Werror is getting removed.
Approved by: blanket
|
|
|
|
|
|
|
|
| |
- While I'm here, fix and sort PLIST
Changes: http://search.cpan.org/dist/Dancer2-Plugin-Auth-Extensible/Changes
PR: 197914
Submitted by: Henk van Oers <hvo.pm@xs4all.nl> (maintainer)
|
|
|
|
| |
- Drop @dirrm* from plist
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This port breaks if it violates standards according to the -pedantic flag.
Accord to gcc-5, it indeed does with dozens of warnings like this:
/wrkdirs/security/libssh/work/libssh-0.6.3/include/libssh/priv.h:200:33:
error: ISO C does not support '__FUNCTION__' predefined identifier
[-Wpedantic] _ssh_set_error(error, code, __FUNCTION__, __VA_ARGS__)
The maintainer has been MIA for over a year with PRs on 8 ports. I'm not
waiting for this one to time out too. While here, reset MAINTAINER.
PR: 197785
Submitted by: marino
Approved by: maintainer reset
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
vulnerabilities, some previously committed by point patches and others
newly fixed in this release.
* Fix multiple vulnerabilities in the LDAP KDC back end.
[CVE-2014-5354] [CVE-2014-5353]
* Fix multiple kadmind vulnerabilities, some of which are based in the
gssrpc library. [CVE-2014-5352 CVE-2014-5352 CVE-2014-9421
CVE-2014-9422 CVE-2014-9423]
Security: VuXML: 63527d0d-b9de-11e4-8a48-206a8a720317
Security: CVE-2014-5354, CVE-2014-5353
Security: CVE-2014-5352, CVE-2014-5352, CVE-2014-9421
Security: CVE-2014-9422, CVE-2014-9423
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
security/krb5-112. This fixes multiple vulnerabilities, some previously
committed by point patches and others newly fixed in this release.
* Fix multiple vulnerabilities in the LDAP KDC back end.
[CVE-2014-5354] [CVE-2014-5353]
* Fix multiple kadmind vulnerabilities, some of which are based in the
gssrpc library. [CVE-2014-5352 CVE-2014-5352 CVE-2014-9421
CVE-2014-9422 CVE-2014-9423]
Security: CVE-2014-5354, CVE-2014-5353
Security: CVE-2014-5352, CVE-2014-5352, CVE-2014-9421
Security: CVE-2014-9422, CVE-2014-9423
|
| |
|
|
|
|
| |
- Drop @dirrm* from plist
|
|
|
|
| |
Submitted by: hrs
|
|
|
|
| |
- Bump revision (package is changed).
|
|
|
|
| |
With hat: python
|
|
|
|
| |
- Clarify LICENSE
|
|
|
|
|
| |
PR: 195935
Submitted by: jbeich
|
|
|
|
|
| |
PR: 197737
Submitted by: adamw@
|
|
|
|
|
| |
PR: 197609
Submitted by: egypcio@googlemail.com
|
| |
|
| |
|
|
|
|
| |
Changes: http://twistedmatrix.com/trac/browser/tags/releases/twisted-15.0.0/twisted/conch/topfiles/NEWS
|
|
|
|
| |
PR: ports/197772
|
|
|
|
| |
Noticed by: kwm (thanks)
|
|
|
|
|
|
| |
PR: 194865
Submitted by: Mike Kuznetsov
Sponsored by: Absolight
|
| |
|
|
|
|
|
|
| |
Remove stale dependency on Any::Moose and add dependency on Math::BigInt.
Changes: https://metacpan.org/changes/distribution/GnuPG-Interface
|
| |
|
| |
|
|
|
|
| |
Changes: https://metacpan.org/changes/distribution/Crypt-Password-Util
|
|
|
|
| |
interfaces to elliptic curve functions from OpenSSL.
|
|
|
|
| |
Changes: https://metacpan.org/changes/distribution/Crypt-OpenSSL-Random
|
|
|
|
| |
Changes: https://metacpan.org/changes/distribution/Crypt-OpenSSL-DSA
|
|
|
|
| |
Changes: https://metacpan.org/changes/distribution/Crypt-OpenSSL-Bignum
|
|
|
|
|
|
|
|
|
|
|
| |
- Unbreak install with LOCALBASE != PREFIX [2]
Changes: http://lcamtuf.coredump.cx/afl/ChangeLog.txt
PR: 197564 [1]
PR: 197644 [2]
Submitted by: fk@fabiankeil.de (maintainer) [1]
Approved by: fk@fabiankeil.de (maintainer) [2]
Approved by: mentors (implicit)
|
|
|
|
|
|
|
| |
for krb5-111 and krb5-112.
Obtained from: Greg Hudson <ghudson@mit.edu>
Security: CVE-2014-5353, CVE-2014-5354
|
|
|
|
|
|
|
| |
for krb5-111 and krb5-112.
Obtained from: Greg Hudson <ghudson@mit.edu>
Security: CVE-2014-5353, CVE-2014-5354
|
|
|
|
|
|
| |
start with one instance and add others without complexity.
- Bump PORTREVISION
|
|
|
|
|
| |
PR: 197751
Submitted by: garga
|
| |
|
| |
|
|
|
|
|
| |
Security: CVE-2014-5353, CVE-2014-5354
Security: VUXML: 3a888a1e-b321-11e4-83b2-206a8a720317
|
|
|
|
| |
Security: CVE-2014-5353, CVE-2014-5354
|
|
|
|
| |
r378417).
|
|
|
|
|
| |
PR: 197561
Submitted by: marino
|
|
|
|
| |
version we want to check.
|
|
|
|
| |
Information leak in the XkbSetGeometry request of X servers
|
|
|
|
| |
Remove commented out *FLAGS
|
|
|
|
|
|
|
|
|
|
|
| |
reop is a simple, semi-modern wannabe PGP clone.
Supported operations include signing -S and verifying -V messages, plus
a variety of options for encrypting messages (-D -E). It does everything
you'd expect a PGP program to do. More accurately, it does everything I
expect you to expect a PGP program to do.
WWW: https://github.com/tedu/reop
|
|
|
|
|
|
|
|
|
|
|
| |
This library is used to gain direct access to the functions exposed by
Daniel J. Bernstein's nacl library via libsodium or tweetnacl. It has
been constructed to maintain extensive documentation on how to use nacl
as well as being tely portable. The file in libnacl/__init__.py can be
pulled out and placed directly in any project to give a single file
binding to all of nacl.
WWW: https://libnacl.readthedocs.org
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
comms/pear-Horde_ActiveSync 2.24.0 -> 2.24.1
devel/pear-Horde_Alarm 2.2.3 -> 2.2.4
devel/pear-Horde_Core 2.18.3 -> 2.19.0
security/pear-Horde_Crypt 2.5.2 -> 2.5.3
databases/pear-Horde_HashTable 1.2.1 -> 1.2.2
graphics/pear-Horde_Image 2.1.0 -> 2.2.0
devel/pear-Horde_Prefs 2.7.1 -> 2.7.2
net/pear-Horde_Rpc 2.1.2 -> 2.1.3
devel/pear-Horde_Stream_Wrapper 2.1.1 -> 2.1.2
www/horde-ansel 3.0.1 -> 3.0.2
www/horde-base 5.2.3 -> 5.2.4
mail/horde-imp 6.2.6 -> 6.2.7
mail/horde-ingo 3.2.3 -> 3.2.4
deskutils/horde-kronolith 4.2.4 -> 4.2.5
deskutils/horde-mnemo 4.2.3 -> 4.2.4
deskutils/horde-nag 4.2.3 -> 4.2.4
mail/horde-turba 4.2.4 -> 4.2.5
devel/horde-whups 3.0.1 -> 3.0.2
|
| |
|
|
|
|
|
| |
PR: 196829
Submitted by: N. Chauhan
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Since 2.7.9, Python verifies SSL certificates by default. Currently,
even with security/ca_root_nss installed, Python fails certificate
verification.
Upon investigation, Python uses OpenSSL's standard
SSL_CTX_load_verify_locations function to load a list of CA root
certificates.
Support was added to ca_root_nss for "out of the box" certificate
verification for a number of base utilities in r372629 [1], but this
did not include support for software that uses OpenSSL's
SSL_CTX_load_verify_locations function.
[1] https://svnweb.freebsd.org/changeset/ports/372629
OpenSSL defaults (at compile time) to the following paths and filenames
for certificate and CAFile lookup:
Base:
SSL_CERT_DIR=/etc/ssl/certs
SSL_CERT_FILE/etc/ssl/cert.pem
Ports:
SSL_CERT_DIR=/usr/local/openssl/certs
SSL_CERT_FILE=/usr/local/openssl/cert.pem
This change installs a symlink which points to the root certificate
bundle in the location that OpenSSL from ports looks for them.
This allows any and all software utilising SSL_CTX_load_verify_locations
function to verify SSL certificates by default after installation of
this package.
Additionally, display a pkg-message to the user about the lack of
warranty associated with these certificates.
Note: This is *NOT* related to solving for SSL certificate verification
for OpenSSL in Base, which is covered in bug 189811.
While I'm here:
- Add LICENSE
- Use options helpers and OPTIONS_SUB
- Fix typo in !!! message !!!
PR: 196431
Submitted by: koobs
Reviewed by: jbeich
Approved by: maintainer timeout (1 month)
|
|
|
|
| |
Submitted by: kuriyama@
|
| |
|
|
|
|
|
|
|
| |
Hardware Security Module (HSM)
PR: 196096
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl>
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
- Fix crash at cipher/salsa20.c module on amd64.
- Fix strip shared object.
- Bump PORTREVISION.
PR: 197146
Submitted by: cpm@fbsd.es (maintainer)
|
|
|
|
| |
Submitted by: bz via bot
|
| |
|
|
|
|
|
| |
Submitted by: Carlos Jacobo Puga Medina
Obtained from: http://googlechromereleases.blogspot.nl/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
From ChangeLog:
- Fix admin port establish-sa for tunnel mode SAs (Alexander Sbitnev)
- Fix source port selection regression from version 0.8.1
- Various logging improvements
- Additional compliance and build fixes
From submitter:
- extra patch to adding wildcard psk option
PR: 196930
Submitted by: Harald Schmalzbauer <bugzilla.freebsd@omnilan.de>,
Ed Schouten <ed@80368.nl>
Approved by: vanhu (maintainer)
|
|
|
|
|
| |
- Fix build on FreeBSD < 10
- Do not bump revision since this only affects broken systems
|
|
|
|
|
|
|
|
|
|
|
| |
This update fixes multiple security issues reported in PostgreSQL over the past
few months. All of these issues require prior authentication, and some require
additional conditions, and as such are not considered generally urgent.
However, users should examine the list of security holes patched below in case
they are particularly vulnerable.
Security: CVE-2015-0241,CVE-2015-0242,CVE-2015-0243,
CVE-2015-0244,CVE-2014-8161
|
|
|
|
|
|
|
|
| |
- Resolve undefined reference for pre-10 i386 FreeBSD [1]
- Do not touch dependant ports as SONAME is unchanged
PR: 193281 [1]
Submitted by: Andriy Voskoboinyk <s3erios at gmail.com> [1]
|
|
|
|
|
|
|
| |
WWW: http://www.defora.org/os/project/334/gputty
PR: 197331 (based on)
Submitted by: Olivier Cochard-Labbe <olivier@cochard.me>
|
|
|
|
|
| |
isn't affected. See February 2 revision of
https://helpx.adobe.com/security/products/flash-player/apsa15-02.html
|
|
|
|
|
|
|
|
|
| |
- Libraries are not installed stripped;
- pkgconfig files should be installed to libdata;
- Use of deprecated @dirrm[try]
PR: PR/197338
Submitted by: delphij
|
|
|
|
| |
- Bump PORTREVISION
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
gss_process_context_token VU#540092
CVE-2014-5352: gss_process_context_token() incorrectly frees context
CVE-2014-9421: kadmind doubly frees partial deserialization results
CVE-2014-9422: kadmind incorrectly validates server principal name
CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
Security: VUXML: 24ce5597-acab-11e4-a847-206a8a720317
Security: MIT KRB5: VU#540092
Security: CVE-2014-5352, CVE-2014-9421, CVE-2014-9422, CVE-2014-9423
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
k5start is a modified version of kinit that can use keytabs to authenticate,
can run as a daemon and wake up periodically to refresh a ticket, and can run
single commands with their own authentication credentials and refresh those
credentials until the command exits.
It is commonly used to maintain Kerberos tickets for services that need to
authenticate to minimize the amount of Kerberos-related logic that must be
in the service itself.
WWW: http://www.eyrie.org/~eagle/software/kstart/
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2014-5352: gss_process_context_token() incorrectly frees context
CVE-2014-9421: kadmind doubly frees partial deserialization results
CVE-2014-9422: kadmind incorrectly validates server principal name
CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
Security: CVE-2014-5352, CVE-2014-9421, CVE-2014-9422, CVE-2014-9423
|
|
|
|
|
|
|
| |
While here, remove the __FreeBSD_version check as this will always
pass on supported releases of FreeBSD.
Approved by: blanket (non-invasive DragonFly support)
|
| |
|
|
|
|
| |
PR: ports/197300
|
|
|
|
| |
- Drop @dirrm* from plist
|
|
|
|
|
|
| |
- Add LICENSE_FILE
- Fix whitespace
- Remove unneeded options.mk include
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This updates bro and broccoli from 2.3 and 2.3.2, which is a security
update.
Changes to the bro port:
- Rework openssl option logic
- Remove obsolete
- pkgng related changes
Changes to the broccoli port:
- Remove unused DOCS option
- Enable PYTHON by default
- pkgng related changes
- Minor portlint changes
Changes in 2.3.2:
- DNP3: fix reachable assertion and buffer over-read/overflow.
CVE number pending. (Travis Emmert, Jon Siwek)
- Update binpac: Fix potential out-of-bounds memory reads in
generated code. CVE-2014-9586. (John Villamil and Chris Rohlf
- Yahoo Paranoids, Jon Siwek)
- BIT-1234: Fix build on systems that already have ntohll/htonll.
(Jon Siwek)
- BIT-1291: Delete prebuilt python bytecode files from git. (Jon Siwek)
- Adding call to new binpac::init() function. (Robin Sommer)
Changes in 2.3.1:
- Fix a reference counting bug in ListVal ctor. (Jon Siwek)
- Fix possible buffer over-read in DNS TSIG parsing. (Jon Siwek)
- Change EDNS parsing code to use rdlength more cautiously. (Jon Siwek)
- Fix null pointer dereference in OCSP verification code in
case no certificate is sent as part as the ocsp reply. Addresses
BIT-1212. (Johanna Amann)
- Fix OCSP reply validation. Addresses BIT-1212 (Johanna Amann)
- Make links in documentation templates protocol relative. (Johanna Amann)
PR: 197107
Submitted by: Craig Leres <leres@ee.lbl.gov> (maintainer)
Reviewed by: koobs
|
|
|
|
|
|
|
|
|
| |
2015-01-31 audio/py-eyed3-06: In audio/abcde dependency has been changed to audio/py-eyed3
2015-01-31 mail/postfix210: Use mail/postfix instead.
2015-01-31 net-im/venom: No more support from the project
2015-02-01 security/openssh-portable66: security/openssh-portable now has all patches working. This port is obsolete.
2015-01-31 www/p5-WWW-Scraper-ISBN-Driver: Merged to www/p5-WWW-Scraper-ISBN by upstream
2015-01-31 www/p5-WWW-Scraper-ISBN-Record: Merged to www/p5-WWW-Scraper-ISBN by upstream
|
|
|
|
|
| |
PR: 197274
Submitted by: fk@fabiankeil.de (maintainer)
|
|
|
|
|
|
| |
the CVE-2015-0235 entry from 2015-01-28.
Approved by: swills (mentor)
|
| |
|
|
|
|
|
| |
Spotted by: kwm
Approved by: swills (mentor)
|
| |
|
| |
|
|
|
|
| |
administrative client library (libkadm5clnt).
|
|
|
|
| |
p5-Authen-Simple.
|
| |
|