| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
|
|
|
|
| |
PR: ports/85855
Submitted by: Daniel Roethlisberger <daniel@roe.ch>
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
Reported by: linimon
Log:
Mark broken for OSVERSION >= 500000. Does not build without
S/Key libraries and headers.
PR: ports/85256
Submitted by: Christoph Weber-Fahr <wefa@tnd37.tnd.arcor.net>
|
|
|
|
|
|
|
| |
S/Key libraries and headers.
PR: ports/85256
Submitted by: Christoph Weber-Fahr <wefa@tnd37.tnd.arcor.net>
|
|
|
|
| |
Noted by: David Thiel <lx@redundancy.redundancy.org>
|
|
|
|
| |
vulnerability"
|
|
|
|
|
|
|
|
| |
- remove redundant entries in pkg-plist
PR: 85189
Submitted by: Michael Butler
Reviewed by: Michael Ranner <mranner@inode.at> (maintainer)
|
| |
|
|
|
|
|
| |
PR: ports/85486
Submitted by: Frank Laszlo <laszlof@vonostingroup.com>
|
|
|
|
|
| |
PR: ports/85775
Submitted by: Marcus Alves Grando <marcus@corp.grupos.com.br>
|
| |
|
| |
|
|
|
|
|
| |
PR: 85309
Submitted by: Daniel Roethlisberger <daniel@roe.ch>
|
| |
|
|
|
|
|
|
|
|
| |
is the only one which is maintained and have lots of new features.
PR: 85544
Submitted by: VANHULLEBUS Yvan <vanhu@netasq.com>
Approved by: perky (mentor)
|
|
|
|
|
|
|
|
|
|
| |
Included patch fix this bug by moving socket creation after daemonizing as
suggested in mailing list clamsmtp-users@lists.sourceforge.net
http://sourceforge.net/mailarchive/forum.php?thread_id=8060741&forum_id=42732
- bump PORTREVISION
PR: ports/85706
Submitted by: Alex L. Demidov <alexd AT vinf dot ru>
|
| |
|
|
|
|
|
| |
PR: ports/85585
Submitted by: maintainer
|
|
|
|
|
| |
PR: ports/84725
Submitted by: maintainer
|
|
|
|
| |
Spotted by: simon
|
|
|
|
|
|
| |
code injection vulnerability.
Inspired by: pav's commit, updating the port.
|
|
|
|
|
|
|
|
|
|
| |
- Remove obsolete vpnc-wrapper leftovers to make portlint happy
- Use PLIST_FILES and PORTDOCS instead of pkg-plist
- Bump PORTREVISION
PR: ports/84491
Submitted by: Daniel Roethlisberger <daniel@roe.ch>
Approved by: Christian Lackas <delta@lackas.net> (maintainer)
|
|
|
|
| |
Reviewed by: simon
|
|
|
|
|
| |
PR: ports/85688
Submitted by: Thomas-Martin Seck <tmseck@netcologne.de> (squid maintainer)
|
|
|
|
|
|
|
| |
Also merge the FreeBSD-SA-05:12.bind9 advisory in the entry. [1]
Suggested by: simon [1]
Reviewed by: simon
|
|
|
|
|
|
|
| |
portability.
PR: ports/84798
Submitted by: Emanuel Haupt <ehaupt@critical.ch>
|
|
|
|
|
|
|
|
|
|
| |
listed in 'ethers' file. If it recieves one with MAC/IP pair, which is
not listed in 'ethers' file, it will send ARP reply with configured
fake address. This will prevent not permitted host to work properly
in this ethernet segment. Especially Windows(TM) hosts.
PR: ports/84627, ports/85671
Submitted by: SeaD <sead@mail.ru>
|
| |
|
|
|
|
|
| |
PR: 85550
Submitted by: Tsung-Han Yeh <snowfly@yuntech.edu.tw>
|
|
|
|
|
| |
(Thanks to Jack Raats <jack AT raats dot org>)
- bump PORTREVISION
|
|
|
|
|
| |
PR: 85673
Submitted by: David Thiel (maintainer)
|
| |
|
| |
|
|
|
|
|
| |
PR: ports/85125
Submitted by: Simon Dick <simond@irrelevant.org>
|
|
|
|
| |
is too old.
|
| |
|
|
|
|
|
| |
PR: ports/85635
Submitted by: maintainer
|
|
|
|
|
|
|
| |
a valid entry. The reference simply references the VuXML entry itself,
but at least it fixes the build for now.
Missed by: simon
|
|
|
|
| |
Approved by: simon
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
OpenID is a decentralized identity system, but one that's actually
decentralized and doesn't entirely crumble if one company turns evil
or goes out of business.
An OpenID identity is just a URL. You can have multiple identities in
the same way you can have multiple URLs. All OpenID does is provide a
way to prove that you own a URL (identity).
Anybody can run their own site using OpenID, and anybody can be an
OpenID server, and they all work with each other without having to
register with or pay anybody to "get started". An owner of a URL can
pick which OpenID server to use.
WWW: http://www.openid.net
PR: ports/85284
Submitted by: Alex Kapranoff <kappa@rambler-co.ru>
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Data::Password checks potential passwords for crackability. It checks that the
password has the appropriate length, that it has enough character groups, that
it does not contain the same characters repeatedly, that it does not contain
ascending or descending characters, or characters close to each other on the
keyboard. It also searches for the password in the ispell word file.
WWW: http://search.cpan.org/~razinf/Data-Password/
PR: ports/84513
Submitted by: ports@c0decafe.net
|
|
|
|
|
| |
PR: ports/85578
Submitted by: Marcus Grando <marcus@corp.grupos.com.br>
|
|
|
|
| |
Submitted by: skv
|
| |
|
|
|
|
|
|
|
| |
- what a lovely number!
PR: ports/85500
Submitted by: J Randolph <snortsms@servangle.net> (maintainer)
|
|
|
|
|
| |
PR: ports/85332
Submitted by: ports@c0decafe.net <ports@c0decafe.net> (maintainer)
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
- samhainrc.sample file is chgrp'd to wheel
- RUNAS_USER now defaults to "yule" properly
- XML logging is now on by default and tunable
PR: ports/85448
Submitted by: David Thiel <lx@redundancy.redundancy.org> (maintainer)
|
|
|
|
|
|
| |
PR: ports/84131
Submitted by: Thorolf <thorolf@grid.einherjar.de>
Approved by: maintainer timeout (1 month)
|
| |
|
|
|
|
|
| |
use), and a RELEASE bump. There is no need to reinstall this port if you
already have it installed.
|
|
|
|
|
|
|
| |
rather than the FreeBSD 4 binary.
Prodded by: ache
Approved by: netchild
|
|
|
|
|
|
| |
PR: 85476
Submitted by: Andrej Zverev <az@inec.ru>
Approved by: Frank Laszlo (maintainer)
|
| |
|
|
|
|
| |
Reported by: few
|
|
|
|
| |
Roman Bogorodskiy (novel) who kindly agreed to look after them
|
|
|
|
|
| |
is no longer being released upstream since 1.2.0 update of the stable
branch. Thus, it does not make sense that we keep it anymore.
|
| |
|
|
|
|
|
| |
PR: 85388
Submitted by: Ports Fury
|
|
|
|
|
| |
PR: 85389
Submitted by: Ports Fury
|
|
|
|
| |
It was necessary for 4.0-RELEASE.
|
|
|
|
| |
format string vulnerabilities.
|
|
|
|
|
|
|
|
|
|
| |
- fix bug that would exhaust file descriptors as the routing table was modified
(this had already been part of the port previously)
- fix bug that would block the management socket until the peer connected
- fix pkitool sh incompatibilities (from NetBSD)
PR: ports/85299
Submitted by: maintainer
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
- Provide options for new mathematical backends
- Transfer maintainership to submitter
PR: ports/83040
Submitted by: Wesley Shields <wxs@csh.rit.edu>
Approved by: Afarsec <afarsec@012.net.il> (maintainer)
|
|
|
|
|
|
|
|
| |
- Update WWW in pkg-descr
- Pass maintainership to submitter
PR: ports/84998
Submitted by: Emanuel Haupt <ehaupt@critical.ch>
|
|
|
|
|
|
|
|
| |
- Reformat pkg-descr
- Pass maintainership to submitter
PR: ports/85002
Submitted by: Emanuel Haupt <ehaupt@critical.ch>
|
|
|
|
| |
- Chase changed location of bglibs files
|
| |
|
|
|
|
|
|
| |
Updated the version in VuXML (was 0).
Approved by: nectar (mentor)
|
|
|
|
|
|
|
| |
Start amavisd as root so that it works both with and without chroot. [2]
PR: ports/85241 [1], ports/83988 [2]
Submitted by: Blaz Zupan (maintainer)
|
|
|
|
|
| |
PR: 85404
Submitted by: Marcus Grando <marcus AT corp dot grupos dot com dot br>
|
|
|
|
|
|
|
| |
- Mark acroread 7.0.1 as fixed for acroread -- XML External Entity
vulnerability. [1]
Reported by: Sverre H. Huseby [1]
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
|
| |
Security: Fixes a security vulnerability described at
http://www.kb.cert.org/vuls/id/778916
Requested by: simon
Approved by: portmgr (implicit)
|
|
|
|
|
|
|
| |
injection vulnerability.
Reported by: olgeni
Approved by: portmgr (blanket, VuXML)
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
| |
Submitted by: lesi
Approved by: portmgr (self)
|
|
|
|
| |
Approved by: portmgr (self)
|
|
|
|
| |
Approved by: portsmgr (clement)
|
|
|
|
|
|
| |
execution vulnerability.
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
| |
PR: ports/85225
Submitted by: Kevin Day <toasty@dragondata.com> (elm maintainer)
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
|
|
|
| |
actual variables.
PR: ports/85156
Submitted by: maintainer
Reported by: Benjamin Lutz <benlutz@datacomm.ch>
Approved by: portmgr (krion)
|
|
|
|
|
|
| |
PR: ports/84573
Submitted by: Adi Pircalabu <apircalabu@bitdefender.com> (maintainer)
Approved by: portmgr (krion)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CAN-2005-2531, CAN-2005-2532, CAN-2005-2533, CAN-2005-2534
- Drop old init script and add a modern rcNG script in its place,
requested by Matthias Grimm and Dirk Gouders (although the script below is
one I, Matthias Andree, wrote). It can automatically load tun/tap drivers.
- move pkg-message to files/pkg-message.in, revise it, list it in SUB_FILES
to expand ${PREFIX}.
- print pkg-message after installation from port
- switch to official "make check" as smoke-test, rather than wiring our own.
- prefer LZO2 in most situations, as OpenVPN will pick up LZO2 rather than
LZO1 if both are installed.
PR: ports/85109
Submitted by: maintainer
Approved by: portmgr (krion)
|
|
|
|
|
|
|
|
|
|
| |
* openvpn -- multiple TCP clients connecting with the same certificate at the same time can crash the server
* openvpn -- denial of service: malicious authenticated "tap" client can deplete server virtual memory
* openvpn -- denial of service: undecryptable packet from authorized client can disconnect unrelated clients
* openvpn -- denial of service: client certificate validation can disconnect unrelated clients
Approved by: portsmgr (blanket VuXML)
Submitted by: Matthias Andree <matthias dot andree at gmx dot de>
|
|
|
|
|
|
| |
- Unbreak.
Approved by: portmgr (krion)
|
|
|
|
|
|
|
| |
approved for commit during the port freeze.
Submitted by: Marcus Grando <marcus@corp.grupos.com.br>
Approved by: portmgr (mcl)
|
|
|
|
|
|
| |
injection vulnerability".
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
|
|
|
| |
update is there.
Also fix some indentation that i overlooked.
Noticed by: simon (both of the items)
Approved by: portsmgr (blanket VuXML)
|
|
|
|
|
| |
Submitted by: Michal Bartkowiak <michal at nonspace dot net>
Approved by: portsmgr (blanket VuXML)
|
|
|
|
|
|
| |
as such.
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
| |
remote PHP code injection vulnerability".
Approved by: portmgr (blanket, VuXML)
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
|
|
|
|
| |
injection vulnerability" entry since they contain an embedded version of
pear-XML_RPC.
Fix typo in body of the latest xpdf entry (note: no modified date bump
as this is a minor typo fix which does change <affects>).
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
| |
Submitted by: hrs
Approved by: portmgr (blanket, VuXML)
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
libgadu, at least not any in any current version, and from looking at
the gnugadu code there is no direct indication that this code should
actually be vulnerable to the other libgadu vulnerabilities. [1]
The gaim part of libgadu -- multiple vulnerabilities was fixed in
1.4.0_1. [2]
Polish translation clue: pjd [1]
General clue by: markus [2]
Not enough checking: simon
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
|
| |
vulnerabilities, since it turns out that they use libgadu from the ekg
port.
Approved by: portmgr (blanket, VuXML)
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
| |
AIM/ICQ non-UTF-8 filename crash.
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
|
| |
fill DoS vulnerability, since it includes xpdf 2, which should not be
affected.
Approved by: portmgr (blanket, VuXML)
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
| |
PR: ports/84648
Approved by: portsmgr (marcus)
|
|
|
|
| |
Approved by: portsmgr (marcus)
|
|
|
|
| |
Approved by: portsmgr (marcus)
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
| |
Reported by: Ion-Mihai Tetcu <itetcu@people.tecnik93.com>
Approved by: portmgr (clement)
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
| |
Also correct proper ranges for the zlib advisory.
Approved by: portsmgr (blanket VuXML)
|
|
|
|
|
|
|
|
| |
o devfs -- ruleset bypass.
o zlib -- buffer overflow vulnerability.
o ipsec -- Incorrect key usage in AES-XCBC-MAC.
Approved by: portsmgr (blanket VuXML)
|
|
|
|
|
|
| |
PR: ports/84312
Submitted by: Dmitry A Grigorovich <odip at bionet dot nsc dot ru>
Approved by: portsmgr (blanket VuXML)
|
|
|
|
|
|
|
| |
a read-only port directory. More investigation is needed.
Reported by: GNOME Tinderbox
Approved by: portmgr (implicit)
|
|
|
|
|
| |
Reported by: pointyhat via kris
Approved by: portmgr (implicit)
|
|
|
|
| |
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
|
| |
vulnerability in gnupg is not complete (see entry for details).
Discussed with: nectar
Approved by: portmgr (blanket, VuXML)
|
|
|
|
|
|
|
| |
OpenPGP symmetric encryption vulnerability.
Reminded by: nectar
Approved by: portmgr (blanket, VuXML)
|
| |
|
| |
|
|
|
|
| |
Reported by: "Sander Holthaus - Orange XL" <info@orangexl.com>
|
|
|
|
| |
Approved by: nectar (mentor)
|
|
|
|
|
|
| |
vulnerability.
Thanks to lawrance and netchild for fast fixes.
|
| |
|
|
|
|
|
| |
PR: ports/84289
Submitted by: Vasil Dimov <vd@datamax.bg>
|
|
|
|
| |
Reported by: mjl on #freebsd-gnome
|
|
|
|
|
|
| |
PR: 83960
Submitted by: Babak Farrokhi <babak (at) farrokhi.net>
Approved by: maintainer
|
|
|
|
|
|
| |
PR: 83639
Submitted by: leeym
Approved by: maintainer timeout
|
|
|
|
| |
vulnerability.
|
| |
|
|
|
|
| |
Note: this is mainly a theoretical vulnerability.
|
|
|
|
|
| |
PR: ports/83455
Submitted by: maintainer
|
|
|
|
|
| |
Forgotten by: remko
Spotted by: simon
|
|
|
|
| |
Discussed with: nectar, simon
|
|
|
|
|
| |
PR: ports/84360
Submitted by: maintainer
|
|
|
|
|
|
|
|
| |
* Add a target for regression testing, and run that target automatically
when building on the package build cluster [1]
* Cleanup some portlint nits
Submitted by: mi [1]
|
|
|
|
|
|
| |
1.6r2,1.
Noted by: Michal Kalkowski
|
|
|
|
|
| |
PR: 84349
Submitted by: Matthias Andree <matthias.andree@gmx.de>
|
|
|
|
|
| |
paraview to recent libtiff vulnerabilities since they contain (and
compile) an embedded version of libtiff...
|
|
|
|
|
|
| |
secteam@ instead of security@ to make it more clear that the ports are
not maintained by the freebsd-security@ mailing list. Both addresses
go to the same people.
|
| |
|
|
|
|
|
|
|
| |
- Collapse a few package entries from the latest apache entry (still
matches same package names, is just shorter markup-wise).
- Use standard topic style for jaberd entry.
- Fix entry date for jaberd entry.
|
|
|
|
| |
Approved by: perky (mentor)
|
|
|
|
| |
vulnerabilities as used for previous entries.
|
|
|
|
| |
dialog spoofing vulnerability.
|
| |
|
|
|
|
|
|
|
|
|
|
| |
PR: ports/84156
Submitted by: Hirohisa Yamaguchi
Approved by: maintainer
Note w.r.t. 4.x: The .depend-issue can be fixed through 'gmake'.
However, then it still needs a patch for a missing <sys/time.h>, and still
won't build with neither gcc-2.95, 3.4 or 4.0, so I didn't bother.
|
|
|
|
| |
Approved by: actual maintainer
|
|
|
|
|
| |
PR: ports/84281
Submitted by: rik <freebsd-ports@rikrose.net> (maintainer)
|
|
|
|
|
|
| |
PR: ports/84261
Submitted by: Jean Milanez Melo <jmelo@freebsdbrasil.com.br>
Approved by: maintainer timeout - BROKEN over to 4 months
|
|
|
|
| |
* Update to DAT 4545
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
devised by Eli Biham and Paul Kocher.
This program applies a known plaintext attack to an encrypted file.
A known-plaintext-attack recovers a password using the encrypted file and
(part of) the unencrypted file.
Please note that cryptographers use the word 'plaintext' for any kind of
unencrypted data - not necessarily readable ASCII text.
Before you ask why somebody may want to know the password when he already knows
the plaintext think of the following situations:
- Usually there's a large number of files in a ZIP-archive. Usually all these
files are encrypted using the same password. So if you know one of the files,
you can recover the password and decrypt the other files.
- You need to know only a part of the plaintext (at least 13 bytes). Many files
have commonly known headers, like DOS .EXE-files. Knowing a reasonably long
header you can recover the password and decrypt the entire file.
WWW: http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html
PR: ports/84192
Submitted by: Emanuel Haupt <ehaupt@critical.ch>
|
|
|
|
|
|
|
| |
upgrading.
Pointyhat to: clement, remko
Reviewed by: erwin
|
| |
|
|
|
|
| |
entry.
|
| |
|
|
|
|
|
|
| |
PR: ports/84104
Submitted by: maintainer
Reported by: Erin Fortenberry <kahn@deadbbs.com>
|
|
|
|
| |
Noticed by: nectar
|
|
|
|
|
|
|
|
| |
installations (when Apache is used as a HTTP proxy in combination with some
web servers). I didn't make that clear in the first commit.
Requested by: nectar
Discussed with: clement
|
| |
|
|
|
|
|
| |
Requested by: clement
Glanced at by: clement
|
|
|
|
| |
for the courier imap/pop3 system.
|
|
|
|
|
| |
PR: ports/84149
Submitted by: maintainer
|
|
|
|
|
|
| |
PR: ports/84074
Submitted by: Andrej Zverev <az@inec.ru>
Approved by: Keith J. Jones <kjones@realdigitalforensics.com> (maintainer)
|
|
|
|
| |
Submitted by: Dru Lavigne via Dan Langille
|
| |
|
|
|
|
|
|
|
|
|
|
| |
use your favourite FTP client with any TLS/SSL-enabled FTP server.
WWW: http://tlswrap.sunsite.dk/
PR: ports/84028
Submitted by: Daniel J. O'Connor <darius@dons.net.au>
Thanks to: novel
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Yersinia is a layer 2 vulnerability scanner with support for the
following protocols:
- Cisco Discovery Protocol (CDP)
- Dynamic Host Configuration Protocol (DHCP)
- Dynamic Trunking Protocol (DTP)
- Hot Standby Router Protocol (HSRP)
- IEEE 802.1q
- Spanning Tree Protocol (STP, RSTP)
- Virtual Trunking Protocol (VTP)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Features:
- create SFV files, verify downloaded single files or whole releases
- add banners to your SFV files
- very flexible and compatible with all other SFV tools currently known,
including SFVNIX compatibility mode concerning SFV files created
- easy to console application
- plug & play support for glFTPd and other demons including
count-missing-files feature for race scripts
WWW: http://bsdsfv.sourceforge.net/
PR: ports/84108
Submitted by: Emanuel Haupt <ehaupt@critical.ch>
Approved by: flz (mentor)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
files.
Features:
* Recursive directories handling
* Automatic checksum file naming ability in create mode
* Meaningful and documented exit values for easy scripting
* Wildcards for file names
* Creation of PAR (Parity Archive) files
* Create Multiple recovery sets if number of files in SFV greater than 255
WWW: http://pure-sfv.sourceforge.net/
PR: ports/84127
Submitted by: Emanuel Haupt <ehaupt@critical.ch>
Approved by: flz (mentor)
|
|
|
|
| |
Cluebat swung by: simon
|
|
|
|
|
| |
Prodded by: garga
Glanced at by: remko
|
| |
|
|
|
|
|
|
| |
PR: ports/84038
Submitted by: dawnshade <h-k@mail.ru>
Approved by: maintainer
|
| |
|
|
|
|
|
|
|
|
| |
instead of -d FILE.
Damaged by: ume
Wept by: ume
Approved by: maintainer slience
|
|
|
|
|
| |
PR: ports/83927
Submitted by: Udo Schweigert <udo.schweigert@siemens.com> (maintainer)
|
| |
|
|
|
|
|
|
|
| |
(I compared the new distfile with the old one. The author didn't change
anything, just repacked the distfile)
Noticed by: kris
|
|
|
|
|
|
|
| |
vulnerabilty). [1]
- Use standard title format for latest egroupware entry.
Reminded by: Panagiotis Christias [1]
|
|
|
|
| |
at that time and no PRs have been submitted to fix it.
|
| |
|
|
|
|
|
| |
Reported by: Matthias Andree <matthias.andree@gmx.de>
Reviewed by: simon
|
|
|
|
| |
Approved by: perky (mentor)
|
|
|
|
|
|
| |
few references while here anyway.
Prodded by: Tobias Roth (I think :-) )
|
|
|
|
|
|
| |
here
Approved by: flz (mentor)
|
| |
|
|
|
|
| |
Noticed by: Matthias Andree <matthias.andree@gmx.de>
|
|
|
|
|
|
| |
while here anyway.
Submitted by: Matthias Andree <matthias.andree@gmx.de> [1]
|
|
|
|
|
|
| |
PR: ports/76289
Reported by: Kenichi Morioka <morioka@openloop.co.jp>
Fixed by: Vsevolod Stakhov <vsevolod@highsecure.ru> (maintainer)
|
|
|
|
|
| |
PR: ports/83823
Submitted by: Travis Poppe <tlp@liquidx.org>
|
| |
|
| |
|
|
|
|
|
|
| |
server.
Submitted by: Matthias Andree <matthias.andree@gmx.de>
|
|
|
|
|
|
|
|
|
|
|
|
| |
Squidclam is a replacement for SquidClamAV-Redirector.py written
in C using libclamav and libcurl
Author: squidclam@users.sourceforge.net
WWW: http://sourceforge.net/projects/squidclam/
PR: ports/82652
Submitted by: Alexander Novitsky <alecn2002@yandex.ru>
Approved by: flz (mentor)
|
|
|
|
| |
Reported by: oliver
|
|
|
|
|
|
|
| |
- Reset maintainership
PR: ports/76917
Submitted by: IWATSUKI Hiroyuki <don@na.rim.or.jp>
|
|
|
|
|
|
|
|
|
| |
- Clean up Makefile and update pkg-message handling
PR: ports/81492 [1], ports/83128 [2]
Submitted by: Boris B. Samorodov <bsam@ipt.ru>,
Norikatsu Shigemura <n-shigemura@ensure.jp>
Approved by: maintainer timeout (2 months)
|
|
|
|
|
| |
PR: ports/83679
Submitted by: vadim@vk.crocodile.org <vadim@vk.crocodile.org> (maintainer)
|
|
|
|
|
| |
PR: ports/83678
Submitted by: vadim@vk.crocodile.org <vadim@vk.crocodile.org> (maintainer)
|
|
|
|
|
| |
PR: ports/83741
Submitted by: Marcus Grando <marcus@corp.grupos.com.br>
|
|
|
|
|
|
|
|
| |
- Update WWW and MASTER_SITES
- Now install examples too
PR: 83740
Submitted by: Marcus Grando (maintainer)
|
| |
|
|
|
|
|
| |
PR: ports/83659
Submitted by: Meno Abels <meno.abels@adviser.com> (maintainer)
|
|
|
|
|
|
|
| |
- Add Author: to pkg-descr
PR: ports/83683
Submitted by: Andrej Zverev <az@inec.ru>
|
|
|
|
| |
Reviewed by: simon
|
|
|
|
|
| |
PR: ports/83657
Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
|
|
|
|
|
| |
PR: ports/83654
Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
|
| |
|
|
|
|
|
|
|
|
| |
strength. To achieve this noble aim it uses the well known cracklib toolkit,
hence the name.
PR: ports/83603
Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
|
| |
|
| |
|
|
|
|
|
|
| |
PR: ports/80238
Submitted by: Vasil Dimov <vd@datamax.bg>
Approved by: maintainer timeout (3 months)
|
| |
|
|
|
|
|
|
| |
several months (not responding to email).
Discussed among: portmgr team
|
|
|
|
|
| |
PR: 83604
Submitted by: Blaz Zupan <blaz@si.FreeBSD.org>
|
| |
|
|
|
|
|
| |
- Minor style nit in drupal entry: Use port name (i.e. lower case) as
first part of the title.
|
|
|
|
| |
Noted by: pointyhat via kris
|
| |
|
| |
|
|
|
|
| |
Approved by: nectar (mentor)
|
|
|
|
|
| |
PR: ports/83146
Submitted by: Udo Schweigert <udo.schweigert@siemens.com> (maintainer)
|
| |
|
|
|
|
|
|
|
|
|
|
| |
through a database, which provides a much more flexible PKI than with OpenSSL,
such as seeking a certificate with a search engine.
CA implementation.
PR: ports/83387
Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
|
|
|
|
|
|
|
|
|
|
| |
through a database, which provides a much more flexible PKI than with OpenSSL,
such as seeking a certificate with a search engine.
GUI client that uses wxWidgets.
PR: ports/83386
Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
|
|
|
|
|
|
|
| |
PR: 82494
Submitted by: Landon Fuller <landonf@threerings.net>
Reviewed by: Matthias Andree <matthias.andree@gmx.de> (maintainer)
Approved by: mantainer, flz (mentor)
|
|
|
|
|
|
|
|
| |
through a database, which provides a much more flexible PKI than with OpenSSL,
such as seeking a certificate with a search engine.
PR: ports/83385
Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
|
|
|
|
| |
Approved by: maintainer
|
|
|
|
|
| |
PR: ports/83401
Submitted by: Marcus Grando <marcus@corp.grupos.com.br>
|
|
|
|
|
| |
PR: ports/83402
Submitted by: Marcus Grando <marcus@corp.grupos.com.br>
|
| |
|
|
|
|
|
|
|
|
|
| |
Remove our local patches for ucontext/pthread/fork model choice, since
this is handled by a configure argument now.
Note that ucontext is not supported on FreeBSD versions less than 5.0.
PR: 83245 (mostly)
Submitted by: Vasil Dimov <vd@datamax.bg>
|
| |
|
|
|
|
|
|
| |
- MIT KRB5 Security Advisory 2005-002: Buffer overflow, heap corruption in KDC
- MIT KRB5 Security Advisory 2005-003: Double free in krb5_recvauth
|
|
|
|
|
|
|
|
|
|
|
| |
C++ ports, since the fnmatch.h which was uselessly installed by
heimdal did not wrap the fnmatch() declaration in extern C {}) [1]
- Fix the packing list on 4.x
[1]
PR: ports/80366
Submitted by: Joan Picanyol i Puig <lists-freebsd-gnats@biaix.org>
Approved by: maintainer timeout (76 days)
|
| |
|