aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* security/p5-IO-Socket-SSL: Update to 2.069Lewis Cook2021-01-252-10/+9
| | | | | | | | | | While here, pet portclippy. Changes: https://metacpan.org/changes/distribution/IO-Socket-SSL PR: 252950 Submitted by: Sergei Vyshenski <svysh.fbsd@gmail.com> (maintainer) Approved by: tcberner (mentor) Differential Revision: https://reviews.freebsd.org/D28321
* Update to 2021.01Mateusz Piotrowski2021-01-252-5/+5
| | | | Support for Python 2 has been dropped.
* security/vuls: Update to 0.13.7Dmitri Goutnik2021-01-242-70/+39
| | | | | | | | | | | While here, also - Remove GH_SUBDIR, not needed with go:modules - Remove redundant post-patch target Changes: https://github.com/future-architect/vuls/releases/tag/v0.13.7 PR: 251685 Approved by: Alexandru Ciobanu <iscandr@gmail.com> (maintainer)
* security/helib: Update 1.3.1 -> 2.0.0Yuri Victorovich2021-01-243-7/+8
|
* Update to the latest MIT KRB5 commit on github.Cy Schubert2021-01-242-5/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit captures KRB5-1.19-beta2. The beta2 announcement on krbdev is as follows: MIT krb5-1.19-beta2 is now available for download from https://web.mit.edu/kerberos/dist/testing.html The main MIT Kerberos web page is https://web.mit.edu/kerberos/ Please send comments to the krbdev list. We plan for the final release to occur in about one month. The README file contains a more extensive list of changes. Major changes in 1.19 --------------------- Administrator experience: * When a client keytab is present, the GSSAPI krb5 mech will refresh credentials even if the current credentials were acquired manually. * It is now harder to accidentally delete the K/M entry from a KDB. Developer experience: * gss_acquire_cred_from() now supports the "password" and "verify" options, allowing credentials to be acquired via password and verified using a keytab key. * When an application accepts a GSS security context, the new GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor both provided matching channel bindings. * Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self requests to identify the desired client principal by certificate. * PKINIT certauth modules can now cause the hw-authent flag to be set in issued tickets. * The krb5_init_creds_step() API will now issue the same password expiration warnings as krb5_get_init_creds_password(). Protocol evolution: * Added client and KDC support for Microsoft's Resource-Based Constrained Delegation, which allows cross-realm S4U2Proxy requests. A third-party database module is required for KDC support. * kadmin/admin is now the preferred server principal name for kadmin connections, and the host-based form is no longer created by default. The client will still try the host-based form as a fallback. * Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT extension, which causes channel bindings to be required for the initiator if the acceptor provided them. The client will send this option if the client_aware_gss_bindings profile option is set. User experience: * kinit will now issue a warning if the des3-cbc-sha1 encryption type is used in the reply. This encryption type will be deprecated and removed in future releases. * Added kvno flags --out-cache, --no-store, and --cached-only (inspired by Heimdal's kgetcred).
* security/nikto: set maintainershipFernando Apesteguía2021-01-241-3/+4
| | | | | | | | | Submitter becomes maintainer (already mainter of several ports). Pet linters PR: 252943 Submitted by: mbeis@xs4all.nl
* security/vuxml: Document mail/mutt vulnerabilityJuraj Lutter2021-01-241-0/+33
| | | | | | | | | | | Document mail/mutt vulnerability CVE-2021-3181 PR: 252931 Submitted by: Derek Schrock <dereks@lifeofadishwasher.com> Reported by: Derek Schrock <dereks@lifeofadishwasher.com> Reviewed by: osa (mentor) Approved by: osa (mentor) Differential Revision: https://reviews.freebsd.org/D28308
* Fix build.Glen Barber2021-01-241-1/+1
| | | | Sponsored by: Rubicon Communications, LLC ("Netgate")
* security/vuxml: Add new MySQL vulnerabilitiesBernard Spil2021-01-231-0/+86
|
* security/nss: update to 3.61Jan Beich2021-01-232-4/+4
| | | | | | Changes: https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.61_release_notes Changes: https://hg.mozilla.org/projects/nss/shortlog/NSS_3_61_RTM ABI: https://abi-laboratory.pro/tracker/timeline/nss/
* Document new vulnerabilities in www/chromium < 88.0.4324.96Rene Ladan2021-01-231-0/+117
| | | | Obtained from: https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop_19.html
* security/tor-devel: Updatde 0.4.5.3-rc -> 0.4.5.4-rcYuri Victorovich2021-01-232-4/+4
| | | | Reported by: upstream notification
* security/snuffleupagus: Update to 0.7.0Jason E. Hale2021-01-222-5/+5
| | | | | PR: 252882 Submitted by: Franco Fichtner <franco@opnsense.org> (maintainer)
* Update MAINTAINER fields for myself (lcook)Lewis Cook2021-01-221-1/+1
| | | | | Approved by: tcberner (mentor) Differential Revision: https://reviews.freebsd.org/D28279
* Document CVE-2020-15983 for games/chocolate-doom and games/crispy-doomJason E. Hale2021-01-221-0/+34
|
* Made clear how to test now entries against the newly formatted file.Matthias Fechner2021-01-221-2/+3
|
* Fix build.Glen Barber2021-01-221-1/+1
| | | | | | Yes, please do FIXME. Sponsored by: Rubicon Communications, LLC ("Netgate")
* Added security vulnerability for rubygem-nokogiri.Matthias Fechner2021-01-221-0/+27
|
* Update to 2.2.0.Hajimu UMEMOTO2021-01-212-6/+6
|
* Split vuln.xml file [2/2]Baptiste Daroussin2021-01-211-164114/+37
| | | | | | | | | | | | | | | | | | | The vuln.xml file has grown a lot since 2003. To avoid having to unlock the svn size limitation, the file is now split into 1 file per year up to the current year + previous one. The split is made based on the date when the entry has been added. In order to achieve the split without breaking any consumer we use a standard XML mechanism via the definition of entities. While here add a new target make vuln-flat.xml which will expand the entities in order to be able to regenerate a one uniq file if needed. This useful to for example allow to test with pkg audit directly given the XML parser used in pkg does not support custom entities. The vuxml web site generator has been modified to ensure the vuln.xml file it provides is the expanded version, so for consumers it is still only one single file to download.
* Split vuln.xml file [1/2]Baptiste Daroussin2021-01-2118-0/+164626
| | | | | | | | | | | | | | | | | | | The vuln.xml file has grown a lot since 2003. To avoid having to unlock the svn size limitation, the file is now split into 1 file per year up to the current year + previous one. The split is made based on the date when the entry has been added. In order to achieve the split without breaking any consumer we use a standard XML mechanism via the definition of entities. While here add a new target make vuln-flat.xml which will expand the entities in order to be able to regenerate a one uniq file if needed. This useful to for example allow to test with pkg audit directly given the XML parser used in pkg does not support custom entities. The vuxml web site generator has been modified to ensure the vuln.xml file it provides is the expanded version, so for consumers it is still only one single file to download.
* dns/dnsmasq-devel: mark stale name vulnerable, tooMatthias Andree2021-01-211-0/+4
| | | | | | | | dnsmasq-devel isn't currently in ports, but if someone never switched to dnsmasq, we should also flag the older dnsmasq-devel vulnerable. Security: 5b5cf6e5-5b51-11eb-95ac-7f9491278677
* dns/dnsmasq < 2.83 vulnerabilities (buffer overflow, DNS cache poisoning)Matthias Andree2021-01-211-0/+43
| | | | | | | | | | | Security: 5b5cf6e5-5b51-11eb-95ac-7f9491278677 Security: CVE-2020-25684 Security: CVE-2020-25685 Security: CVE-2020-25686 Security: CVE-2020-25681 Security: CVE-2020-25682 Security: CVE-2020-25683 Security: CVE-2020-25687
* This is the ports version of src commitCy Schubert2021-01-212-2/+11
| | | | | | | | | | | | | | | | | | | | | d70886d063166786ded0007af8cdcbf57b7b4827. wpa_supplicant uses PF_ROUTE to return the routing table in order to determine the length of the routing table buffer. As of 81728a538d24 wpa_supplicant is started before the routing table has been populated resulting in the length of zero to be returned. This causes wpa_supplicant to loop endlessly. (The workaround is to kill and restart wpa_supplicant as by the time it is restarted the routing table is populated.) (Personally, I was not able to reproduce this unless wlan0 was a member of lagg0. However, others experienced this problem on standalone wlan0.) PR: 252844 Submitted by: shu <ankohuu _ outlook.com> Reported by: shu <ankohuu _ outlook.com> Reviewed by: cy Differential Revision: https://reviews.freebsd.org/D28249
* security/suricata: simplify MakefileFernando Apesteguía2021-01-202-45/+22
| | | | | | | | | | Add USES=localbase so we can get rid of *-includes and *-libraries. Reorder some variables too. Regenerate patch. PR: 252571 Submitted by: fernape@FreeBSD.org Reviewed by: franco@opnsense.org (maintainer)
* security/vuxml: Document lang/go vulnerabilitiesDmitri Goutnik2021-01-201-0/+43
|
* security/py-coincurve: Update 13.0.0 -> 14.0.0Yuri Victorovich2021-01-202-5/+8
| | | | Reported by: portscout
* security/vuxml: Fix range of affected cloud-init versionsJoseph Mingrone2021-01-201-2/+1
|
* security/vuxml: Document vulnerability in cloud-init version 20.4Joseph Mingrone2021-01-201-0/+37
| | | | | | https://bugs.launchpad.net/cloud-init/+bug/1911680 Reported by: Mina Galić <me@igalic.co>
* security/fizz: Update 2021.01.11.00 -> 2021.01.18.00Yuri Victorovich2021-01-202-4/+4
|
* Mark as BROKEN on riscv64:Mark Linimon2021-01-191-0/+2
| | | | | | | | | | | configure:26760: checking for /nxb-bin/usr/bin/c++ configure:26788: result: no configure:26797: error: Easybindings require a C++ compiler, but none were found. NB: in my jail, /nxb-bin/usr/bin/c++ does indeed exist. Approved by: portmgr (tier-2 blanket) Obtained from: lonesome.com build testing
* security/cryptopp: Update to 8.4.0Jason E. Hale2021-01-195-15/+31
| | | | | | | | | | | | Bump PORTREVSION on all consumers. ABI-breaking changes were introduced and recompile of consumers is necessary. Remove unused cryptopp dependency from devel/xeus. Upstream migrated to OpenSSL several releases ago. [1] [1] https://github.com/jupyter-xeus/xeus/commit/c98c44c174cafcf424f4203dc3c61564118feb3e Changes: https://www.cryptopp.com/release840.html
* security/gpg-gui: Add missing INSTALLS_ICONSNeel Chauhan2021-01-191-0/+1
|
* security/gpg-gui: Update to 0.2.0Neel Chauhan2021-01-193-6/+14
| | | | | | Changes: https://github.com/AnsgarKlein/GPG-Gui/releases/tag/v0.2.0 Approved by: 0mp (mentor, implicit)
* - Improve pkg-message infoJose Alonso Cardenas Marquez2021-01-192-3/+4
| | | | - Bump PORTREVISION
* - Use configuration fileDmitry Marakasov2021-01-196-17/+40
| | | | PR: 252159
* - Update to 2.35.0Dmitry Marakasov2021-01-192-8/+5
|
* Revert 561829, this is not a correct solutionDmitry Marakasov2021-01-182-15/+3
| | | | PR: 252159
* Update KDE Frameworks to 5.78.0Tobias C. Berner2021-01-181-3/+3
| | | | | | | | | | | | | | | | | | January 09, 2021. KDE today announces the release of KDE Frameworks 5.78.0. KDE Frameworks are 83 addon libraries to Qt which provide a wide variety of commonly needed functionality in mature, peer reviewed and well tested libraries with friendly licensing terms. For an introduction see the KDE Frameworks release announcement. This release is part of a series of planned monthly releases making improvements available to developers in a quick and pred Full Changelog: https://kde.org/announcements/kde-frameworks-5.78.0 PR: 252591 Exp-run by: antoine
* Document CVE-2020-25074 and CVE-2020-15275 for www/moinmoinLi-Wen Hsu2021-01-181-0/+30
|
* pi@ prefers it to be foolproof, so be itBaptiste Daroussin2021-01-181-1/+1
| | | | Reported by: pi
* Document ghostscript9-agpl-base vulnerability committed in r544907Mateusz Piotrowski2021-01-181-0/+31
| | | | | | | | PR: 248580 Requested by: joneum (ports-secteam) Reported by: VVD <vvd@unislabs.com> MFH: 2021Q1 Security: CVE-2020-15900
* security/logcheck: Fix runtime error with bsdgrepSteve Wills2021-01-187-1/+65
| | | | | PR: 251778 Submitted by: Yasuhiro Kimura <yasu@utahime.org> (maintainer)
* security/i2pd: make the port compatible with sysloggingEugene Grosbein2021-01-172-2/+15
| | | | | | | | | | | | | | | | | | | | i2pd supports logging via syslog. This may be enabled with its configuration file, but port's startup script forces logging to a file using command line switches that override configuration file. This change adds syslogging support with following rc.conf setting: i2pd_logfile="syslog" # translates to: --log syslog or i2pd_logfile="syslog:warn" # translates to: --log syslog --loglevel warn The change is backward compatible with previous settings. PR: 252159 Approved by: amdmi3 (maintainer timeout over 3 weeks)
* security/age: Update to v1.0.0-beta6Dmitri Goutnik2021-01-172-9/+14
| | | | Changes: https://github.com/FiloSottile/age/releases/tag/v1.0.0-beta6
* Remove expired ports:Rene Ladan2021-01-174-39/+0
| | | | | | 2021-01-14 net-im/telegram: Upstream unmaintained; please migrate to net-im/telegram-cli 2021-01-14 science/dlpoly-classic: MASTERSITE gone; possibly replaced by https://gitlab.com/DL_POLY_Classic/dl_poly? 2021-01-15 security/py-gtts-token: Obsolete, please use audio/py-gtts instead
* LibreTLS is a port of libtls from LibreSSL to OpenSSL. libtls is "a new TLSBaptiste Daroussin2021-01-175-0/+125
| | | | | | | | | | library, designed to make it easier to write foolproof applications". libtls provides an excellent new API, but LibreSSL can be difficult to install on systems which already use OpenSSL. LibreTLS aims to make the libtls API more easily and widely available. WWW: https://git.causal.agency/libretls/about/
* security/2fa: Update to 1.2.0Dmitri Goutnik2021-01-172-10/+5
| | | | - Remove custom do-test target
* Update the Angr framework to 9.0.5405Mateusz Piotrowski2021-01-175-20/+18
| | | | | | | | | | | - Angr binaries are now tagged as well. We may consider removing ANGR_BINARIES_TAGNAME in the future. - Remove restrictions on the unicorn version for now. This should prevent the port from breaking again in the foreseeable future. PR: 252042 Reported by: nc Event: January 2021 Bugathon
* security/xray-core: Update to 1.2.2Neel Chauhan2021-01-172-4/+4
| | | | Approved by: 0mp (mentor, implicit)
* security/py-bcrypt: Update to 3.2.0Danilo G. Baio2021-01-162-5/+4
|
* Fix buildAntoine Brodin2021-01-161-0/+11
| | | | | Reported by: pkg-fallout MFH: 2021Q1
* security/libscep: Remove Python 2.7 support and PY_SPHINXDanilo G. Baio2021-01-151-2/+2
| | | | Approved by: portmgr blanket
* security/py-ospd: Transfer maintainership to acm@ on his request.Yuri Victorovich2021-01-151-1/+1
| | | | Requested by: acm (via e-mail)
* security/vuxml: document Node.js January 2021 Security ReleasesBradley T. Hughes2021-01-151-0/+46
| | | | | | https://nodejs.org/en/blog/vulnerability/january-2021-security-releases/ Sponsored by: Miles AS
* Remove PY_SPHINX from ports using Python 3Danilo G. Baio2021-01-141-1/+1
| | | | | Approved by: portmgr blanket Differential Revision: https://reviews.freebsd.org/D28093
* Document gitlab vulnerability.Matthias Fechner2021-01-141-0/+27
|
* security/gcr: update to 3.38.1Tobias C. Berner2021-01-142-4/+4
|
* Document integer overflow in wavpack (CVE-2020-35738).Thomas Zander2021-01-141-0/+28
|
* Return to pool as per maintainer's requestKoichiro Iwao2021-01-142-2/+2
| | | | | | | and I take security/dehydrated. PR: 252650 Submitted by: Sascha Holzleiter <sascha@root-login.org>
* security/please: take maintainershipSteve Wills2021-01-141-1/+1
|
* security/lynis: Update to 3.0.3Lars Engels2021-01-142-4/+4
| | | | MFH: 20201Q1
* Document Jenkins Security Advisory 2021-01-13Li-Wen Hsu2021-01-141-0/+49
| | | | Sponsored by: The FreeBSD Foundation
* Update databases/redis to the recent stable version 6.0.10.Sergey A. Osokin2021-01-143-2/+3
| | | | | | | | | | | | Update CONFLICTS for: o) databases/redis4 o) databases/redis5 o) databases/redis o) databases/redis-devel Connect databases/redis5 to the build. Bump PORTREVISIONs for dependant ports.
* Fix key management in security/kleopatraAdriaan de Groot2021-01-134-47/+100
| | | | | | | | | | | | This was reported upstream also as https://bugs.kde.org/show_bug.cgi?id=415168 there has been a patch languishing there for a long time, which I've now (re)submitted upstream. It fixes all of the reported problem: a previous patch by me in FreeBSD ports only dealt with half of them. PR: 242670 Submitted by: Andre Heinecke Reported by: Gerhard Seibert
* Simplify some ports using PYTHON_MAJOR_VER and Python 3.6+Rene Ladan2021-01-131-6/+2
|
* Document phpmyfaq vulnerabilityFlorian Smeets2021-01-131-0/+26
|
* security/tor-devel: Update 0.4.5.2-alpha -> 0.4.5.3-rcYuri Victorovich2021-01-132-4/+4
| | | | Reported by: upstream notification
* security/sudo: Update to 1.9.5p1Renato Botelho2021-01-122-4/+4
| | | | | | | | | | | This version fixes a regression introduced by 1.9.5 Changelog: https://www.sudo.ws/stable.html#1.9.5p1 PR: 252598 Submitted by: cy MFH: 2021Q1 Sponsored by: Rubicon Communications, LLC (Netgate)
* security/gnupg: Update to 2.2.27Adam Weinberger2021-01-122-4/+4
| | | | | | | | | | | | | | * gpg: Fix regression in 2.2.24 for gnupg_remove function under Windows. [#5230] * gpgconf: Fix case with neither local nor global gpg.conf. [9f37d3e6f3] * gpgconf: Fix description of two new options. [#5221] * Build Windows installer without timestamps. Note that the Authenticode signatures still carry a timestamp. Release-info: https://dev.gnupg.org/T5234
* Document sudo CVE-2021-23239.Cy Schubert2021-01-121-0/+37
|
* Fix build on llvm10 and gcc.Cy Schubert2021-01-121-2/+4
| | | | | | PR: 252577 Reported by: David Sieborger <drs-freebsd _ sieborger.nom.za> MFH: 2021Q1
* security/fizz: Update 2021.01.04.00 -> 2021.01.11.00Yuri Victorovich2021-01-122-4/+4
|
* Update 1.9.4p2 --> 1.9.5Cy Schubert2021-01-122-4/+4
| | | | | | | | | PR: 252583 Submitted by: cy Reported by: cy Approved by: garga (maintainer) MFH: 2021Q1 Security: CVE-2021-23239
* Remove logic for Python < 3.6 for ports using Python 3.6+Rene Ladan2021-01-123-21/+3
|
* security/xray-core: Update to 1.2.1Neel Chauhan2021-01-122-4/+4
| | | | | | Reviewed by: 0mp (mentor) Approved by: 0mp (mentor) Differential Revision: https://reviews.freebsd.org/D28094
* security/libtasn1: add a workaround for clang 10+Roman Bogorodskiy2021-01-111-2/+10
| | | | | | | | | | | | When compiled with clang 10+ and -O[2-9], the resulting package fails to parse certificates. As a workaround, downgrade optimization to -O1. Upstream issue: https://gitlab.com/gnutls/libtasn1/-/issues/30 PR: 252548 Reported by: rozhuk.im@gmail.com
* Update version requirement of RUN_DEPENDSSunpoet Po-Chuan Hsieh2021-01-111-1/+1
|
* Update version requirement of RUN_DEPENDSSunpoet Po-Chuan Hsieh2021-01-111-1/+1
|
* Remove empty PY_IPADDRESS from ports using Python 3.6+Rene Ladan2021-01-113-3/+0
| | | | Also remove one manual declaration (net-mgmt/py-aggregate6)
* Remove empty PY_ENUM34 from ports using Python 3.6+Rene Ladan2021-01-105-7/+2
|
* security/go-cve-dictionary: Update to 0.5.5Dmitri Goutnik2021-01-102-101/+114
| | | | | | | | - Pet portclippy while here Changes: https://github.com/kotakanbe/go-cve-dictionary/releases/tag/v0.5.5 PR: 251653 Submitted by: Alexandru Ciobanu <iscandr@gmail.com> (maintainer)
* Document cairosvg vulnerabilitySunpoet Po-Chuan Hsieh2021-01-101-0/+32
|
* Clean up RUN_DEPENDS after r542200 (USES=python:3.6+)Sunpoet Po-Chuan Hsieh2021-01-101-1/+0
|
* Remove PYTHON_REL checkSunpoet Po-Chuan Hsieh2021-01-101-8/+2
|
* Clean up RUN_DEPENDS after r559531 (USES=python:3.6+)Sunpoet Po-Chuan Hsieh2021-01-101-2/+1
|
* Remove PYTHON_REL check after r559531 (USES=python:3.6+)Sunpoet Po-Chuan Hsieh2021-01-101-15/+5
|
* Remove PYTHON_REL check after r559531 (USES=python:3.6+)Sunpoet Po-Chuan Hsieh2021-01-101-7/+1
|
* lang/php80: Update from 8.0.0 to 8.0.1Torsten Zuehlsdorff2021-01-101-11/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Core: Fixed bug #80345 (PHPIZE configuration has outdated PHP_RELEASE_VERSION). Fixed bug #72964 (White space not unfolded for CC/Bcc headers). Fixed bug #80391 (Iterable not covariant to mixed). Fixed bug #80393 (Build of PHP extension fails due to configuration gap with libtool). Fixed bug #77069 (stream filter loses final block of data). Fileinfo: Fixed bug #77961 (finfo_open crafted magic parsing SIGABRT). FPM: Fixed bug #69625 (FPM returns 200 status on request without SCRIPT_FILENAME env). IMAP: Fixed bug #80438 (imap_msgno() incorrectly warns and return false on valid UIDs in PHP 8). Fix a regression with valid UIDs in imap_savebody(). Make warnings for invalid message numbers/UIDs between functions consistent. Intl: Fixed bug #80425 (MessageFormatAdapter::getArgTypeList redefined). Opcache: Fixed bug #80404 (Incorrect range inference result when division results in float). Fixed bug #80377 (Opcache misses executor_globals). Fixed bug #80433 (Unable to disable the use of the AVX command when using JIT). Fixed bug #80447 (Strange out of memory error when running with JIT). Fixed bug #80480 (Segmentation fault with JIT enabled). Fixed bug #80506 (Immediate SIGSEGV upon ini_set("opcache.jit_debug", 1)). OpenSSL: Fixed bug #80368 (OpenSSL extension fails to build against LibreSSL due to lack of OCB support). PDO MySQL: Fixed bug #80458 (PDOStatement::fetchAll() throws for upsert queries). Fixed bug #63185 (nextRowset() ignores MySQL errors with native prepared statements). Fixed bug #78152 (PDO::exec() - Bad error handling with multiple commands). Fixed bug #66878 (Multiple rowsets not returned unless PDO statement object is unset()). Fixed bug #70066 (Unexpected "Cannot execute queries while other unbuffered queries"). Fixed bug #71145 (Multiple statements in init command triggers unbuffered query error). Fixed bug #76815 (PDOStatement cannot be GCed/closeCursor-ed when a PROCEDURE resultset SIGNAL). Fixed bug #79872 (Can't execute query with pending result sets). Fixed bug #79131 (PDO does not throw an exception when parameter values are missing). Fixed bug #72368 (PdoStatement->execute() fails but does not throw an exception). Fixed bug #62889 (LOAD DATA INFILE broken). Fixed bug #67004 (Executing PDOStatement::fetch() more than once prevents releasing resultset). Fixed bug #79132 (PDO re-uses parameter values from earlier calls to execute()). Phar: Fixed bug #73809 (Phar Zip parse crash - mmap fail). Fixed bug #75102 (`PharData` says invalid checksum for valid tar). Fixed bug #77322 (PharData::addEmptyDir('/') Possible integer overflow). Phpdbg: Fixed bug #76813 (Access violation near NULL on source operand). SPL: Fixed bug #62004 (SplFileObject: fgets after seek returns wrong line). Standard: Fixed bug #80366 (Return Value of zend_fstat() not Checked). Fixed bug #77423 (FILTER_VALIDATE_URL accepts URLs with invalid userinfo). (CVE-2020-7071) Tidy: Fixed bug #77594 (ob_tidyhandler is never reset). Tokenizer: Fixed bug #80462 (Nullsafe operator tokenize with TOKEN_PARSE flag fails). XML: XmlParser opaque object renamed to XMLParser for consistency with other XML objects. Zlib: Fixed bug #48725 (Support for flushing in zlib stream). PR: 252508 Submitted by: <michael.glaus@hostpoint.ch>, samm Differential Revision: D28065
* lang/php74: Upgrade from 7.4.13 to 7.4.14Torsten Zuehlsdorff2021-01-101-11/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Core: Fixed bug #74558 (Can't rebind closure returned by Closure::fromCallable()). Fixed bug #80345 (PHPIZE configuration has outdated PHP_RELEASE_VERSION). Fixed bug #72964 (White space not unfolded for CC/Bcc headers). Fixed bug #80362 (Running dtrace scripts can cause php to crash). Fixed bug #80393 (Build of PHP extension fails due to configuration gap with libtool). Fixed bug #80402 (configure filtering out -lpthread). Fixed bug #77069 (stream filter loses final block of data). Fileinfo: Fixed bug #77961 (finfo_open crafted magic parsing SIGABRT). FPM: Fixed bug #69625 (FPM returns 200 status on request without SCRIPT_FILENAME env). Intl: Fixed bug #80425 (MessageFormatAdapter::getArgTypeList redefined). OpenSSL: Fixed bug #80368 (OpenSSL extension fails to build against LibreSSL due to lack of OCB support). Phar: Fixed bug #73809 (Phar Zip parse crash - mmap fail). Fixed bug #75102 (`PharData` says invalid checksum for valid tar). Fixed bug #77322 (PharData::addEmptyDir('/') Possible integer overflow). PDO MySQL: Fixed bug #80458 (PDOStatement::fetchAll() throws for upsert queries). Fixed bug #63185 (nextRowset() ignores MySQL errors with native prepared statements). Fixed bug #78152 (PDO::exec() - Bad error handling with multiple commands). Fixed bug #70066 (Unexpected "Cannot execute queries while other unbuffered queries"). Fixed bug #71145 (Multiple statements in init command triggers unbuffered query error). Fixed bug #76815 (PDOStatement cannot be GCed/closeCursor-ed when a PROCEDURE resultset SIGNAL). Standard: Fixed bug #77423 (FILTER_VALIDATE_URL accepts URLs with invalid userinfo). (CVE-2020-7071) Fixed bug #80366 (Return Value of zend_fstat() not Checked). Fixed bug #80411 (References to null-serialized object break serialize()). Tidy: Fixed bug #77594 (ob_tidyhandler is never reset). Zlib: Fixed #48725 (Support for flushing in zlib stream). PR: 252509 Submitted by: <michael.glaus@hostpoint.ch>
* security/*gpgme*: Update to 1.15.1Jason E. Hale2021-01-107-37/+8
|
* Document gitlab vulnerabilities.Matthias Fechner2021-01-101-0/+36
|
* Remove python 2.7 support from a few portsAntoine Brodin2021-01-103-3/+3
|
* Update ftp/proftpd to 1.3.7aMartin Matuska2021-01-091-3/+3
|
* security/py-[acme|certbot]: Update to 1.11.0Danilo G. Baio2021-01-0919-55/+55
| | | | | | | | Changelog: https://github.com/certbot/certbot/blob/v1.11.0/certbot/CHANGELOG.md PR: 252452 Submitted by: Yasuhiro KIMURA <yasu@utahime.org> Approved by: python (with hat)
* security/govpn: Unbreak with go1.16Dmitri Goutnik2021-01-091-0/+1
| | | | | PR: 252520 Approved by: Sergey Matveev <stargrave@stargrave.org> (maintainer)
* Update KDE Plasma Desktop to 5.20.5Tobias C. Berner2021-01-093-9/+9
| | | | | | | | | | | | | | | | | Tuesday, 5 January 2021. Today KDE releases a bugfix update to KDE Plasma 5, versioned 5.20.5. Plasma 5.20 was released in October with many feature refinements and new modules to complete the desktop experience. This release adds a month’s worth of new translations and fixes from KDE’s contributors. The bugfixes are typically small but important and include: * Plasma NM: Fix password entry jumping to different networks with wifi scanning, by pausing the scan when appropriate. * Plasma PA: Read text color from proper theme. * Plasma Workspace: Move keyboard positioning in the keyboard itself. Announcement: https://kde.org/announcements/plasma-5.20.5/
* Update KDE Release Service ports to 20.12.1Tobias C. Berner2021-01-095-15/+15
| | | | | Full changelog: https://kde.org/announcements/fulllog_releases-20.12.1/
* security/openssl-devel: Update to 3.0.0alpha10Bernard Spil2021-01-093-13/+21
|
* security/ssb: Update to 0.1.1Neel Chauhan2021-01-092-4/+4
| | | | | | Reviewed by: 0mp (mentor) Approved by: 0mp (mentor) Differential Revision: https://reviews.freebsd.org/D28039
* security/teleport: Unbreak with go1.16Dmitri Goutnik2021-01-081-1/+1
| | | | Approved by: swills (maintainer)
* - Update to version 1.4.1Alexey Dokuchaev2021-01-083-64/+4
| | | | | | - GC patch applied upstream Reported by: portscout
* security/snort3: Update version 3.0.3-4=>3.0.3-6Muhammad Moinur Rahman2021-01-083-6/+8
| | | | Relnotes: https://github.com/snort3/snort3/releases/tag/3.0.3-6
* security/gpg-gui: GUI wrapper for symmetric GPG file encryptionNeel Chauhan2021-01-074-0/+37
| | | | | | Reviewed by: 0mp (mentor) Approved by: 0mp (mentor) Differential Revision: https://reviews.freebsd.org/D28014
* Document new vulnerabilities in www/chromium < 87.0.4280.141Rene Ladan2021-01-071-0/+75
| | | | Obtained from: https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
* security/suricata: Update to 5.0.5 [1]Kai Knoblich2021-01-072-14/+10
| | | | | | | | | | | | | | | * Remove the JSON option and convert the relevant parts into fixed components because devel/jansson has become a mandatory dependency since the 5.0.0 release. [2] Changelog: https://github.com/OISF/suricata/blob/suricata-5.0.5/ChangeLog PR: 251887 Submitted by: Franco Fichtner <franco@opnsense.org> (maintainer) [1] Reviewed by: fernape, daniel.engberg.lists@pyret.net Approved by: maintainer [2]
* security/maltrail: Update to 0.28Kai Knoblich2021-01-073-18/+32
| | | | | | | | | Changelog: https://github.com/stamparm/maltrail/compare/0.27...0.28 PR: 252430 Submitted by: Michael Muenz <m.muenz@gmail.com> (maintainer)
* - Remove forgotten lineJose Alonso Cardenas Marquez2021-01-071-1/+0
|
* - pkg-message clean upJose Alonso Cardenas Marquez2021-01-072-6/+7
|
* - Fix installation issues. It BROKEN port in runtimeJose Alonso Cardenas Marquez2021-01-071-12/+14
| | | | | | | - Clean up PR: 245992 Reported by: jorgen at larsendata.dk
* - Bump PORTREVISION. devel/py-defusedxml was updatedJose Alonso Cardenas Marquez2021-01-078-0/+8
|
* Add FIDO2 and PKCS11 optionsSunpoet Po-Chuan Hsieh2021-01-071-2/+7
| | | | - Bump PORTREVISION for dependency change
* Update to 1.10.0Sunpoet Po-Chuan Hsieh2021-01-076-19/+25
| | | | | Changes: http://git.savannah.gnu.org/cgit/gsasl.git/tree/NEWS https://lists.gnu.org/archive/html/info-gnu/2021-01/msg00000.html
* Update to 1.10.0Sunpoet Po-Chuan Hsieh2021-01-078-26/+25
| | | | | Changes: http://git.savannah.gnu.org/cgit/gsasl.git/tree/NEWS https://lists.gnu.org/archive/html/info-gnu/2021-01/msg00000.html
* - Fix buildJose Alonso Cardenas Marquez2021-01-071-2/+3
| | | | | PR: 245992 Reported by: ltning-freebsd at anduin.net
* - Fix buildJose Alonso Cardenas Marquez2021-01-071-1/+0
| | | | | PR: 245992 Reported by: ltning-freebsd at anduin.net
* security/p5-Crypt-X509-CRL: update 0.1 -> 0.4Kurt Jaeger2021-01-072-5/+4
| | | | | | PR: 252397 Submitted by: Sergei Vyshenski <svysh.fbsd@gmail.com> (maintainer) Relnotes: https://metacpan.org/changes/distribution/Crypt-X509-CRL
* security/vuxml: add dovecot CVE-2020-24386Kurt Jaeger2021-01-061-0/+36
| | | | | | PR: 252415 Submitted by: Evilham <contact@evilham.com> Relnotes: https://dovecot.org/pipermail/dovecot-news/2021-January/000448.html
* security/s2n: disable pg-crypto where it's not supportedPiotr Kubaj2021-01-061-0/+6
| | | | /wrkdirs/usr/ports/security/s2n/work/s2n-0.10.23/pq-crypto/sike_r2/config.h:69:2: error: #error -- "Unsupported ARCHITECTURE"
* security/tailscale: Update to 1.2.10Mikael Urankar2021-01-062-7/+7
| | | | | PR: 252429 Submitted by: Denton Gentry
* lang/rust: Update to 1.49.0Mikael Urankar2021-01-067-6/+7
| | | | | | | Changes: https://github.com/rust-lang/rust/releases/tag/1.49.0 Tested by: mikael, pkubaj Differential Revision: https://reviews.freebsd.org/D27940
* Remove python 2.7 support from newly added portsAntoine Brodin2021-01-064-5/+5
|
* - Mark DEPRECATEDJose Alonso Cardenas Marquez2021-01-061-0/+3
|
* - Connect security/gvmJose Alonso Cardenas Marquez2021-01-061-0/+1
|
* - New port: security/gvmJose Alonso Cardenas Marquez2021-01-063-0/+159
| | | | | | This is the metaport to install GVM applications and libraries. WWW: https://www.openvas.org/
* - Connect security/greenbone-security-assistantJose Alonso Cardenas Marquez2021-01-061-0/+1
|
* - Re-add port: security/greenbone-security-assistantJose Alonso Cardenas Marquez2021-01-068-0/+173
| | | | | | | | | | | | | The Greenbone Security Assistant is the web interface developed for the Greenbone Security Manager appliances. It connects to the Greenbone Vulnerability Manager GVM to provide a full-featured user interface for vulnerability management. Greenbone Security Assistant consists of GSA - The webpage written in React and GSAD - The HTTP server talking to the GVM daemon WWW: https://github.com/greenbone/gsa
* - Connect security/py-gvm-toolsJose Alonso Cardenas Marquez2021-01-061-0/+1
|
* - New port: securty/py-gvm-toolsJose Alonso Cardenas Marquez2021-01-064-0/+47
| | | | | | | | | | | | | | | The Greenbone Vulnerability Management Tools gvm-tools are a collection of tools that help with remote controlling a Greenbone Security Manager (GSM) appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools aid in accessing the communication protocols GMP (Greenbone Management Protocol) and OSP (Open Scanner Protocol). This module is comprised of interactive and non-interactive clients. The programming language Python is supported directly for interactive scripting. But it is also possible to issue remote GMP/OSP commands without programming in Python. WWW: https://github.com/greenbone/gvm-tools
* - Connect security/py-ospd-openvasJose Alonso Cardenas Marquez2021-01-061-0/+1
|
* - New port: security/py-ospd-openvasJose Alonso Cardenas Marquez2021-01-066-0/+134
| | | | | | | | | | | This is an OSP server implementation to allow GVM to remotely control OpenVAS, see https://github.com/greenbone/openvas. Once running, you need to configure OpenVAS for the Greenbone Vulnerability Manager, for example via the web interface Greenbone Security Assistant. Then you can create scan tasks to use OpenVAS. WWW: https://github.com/greenbone/ospd-openva
* - Connect security/gvmdJose Alonso Cardenas Marquez2021-01-061-0/+1
|
* - New port: security/gvmdJose Alonso Cardenas Marquez2021-01-0613-0/+354
| | | | | | | | | | | | The Greenbone Vulnerability Manager is the central management service between security scanners and the user clients. It manages the storage of any vulnerability management configurations and of the scan results. Access to data, control commands and workflows is offered via the XML-based Greenbone Management Protocol (GMP). Controlling scanners like OpenVAS is done via the Open Scanner Protocol (OSP). WWW: https://github.com/greenbone/gvmd
* - Connect security/openvasJose Alonso Cardenas Marquez2021-01-061-0/+1
|
* - New port: security/openvasJose Alonso Cardenas Marquez2021-01-0620-0/+435
| | | | | | | | | | | This is the Open Vulnerability Assessment Scanner (OpenVAS) of the Greenbone Vulnerability Management (GVM) Solution. It is used for the Greenbone Security Manager appliances and is a full-featured scan engine that executes a continuously updated and extended feed of Network Vulnerability Tests (NVTs). WWW: https://github.com/greenbone/openvas
* - Connect security/gvm-libsJose Alonso Cardenas Marquez2021-01-061-0/+1
|
* - New port: security/gvm-libsJose Alonso Cardenas Marquez2021-01-0614-0/+526
| | | | | | | | | | This is the libraries module for the Greenbone Vulnerability Management Solution. It is used for the Greenbone Security Manager appliances and provides various functionalities to support the integrated service daemons. WWW: https://github.com/greenbone/gvm-libs
* - Connect security/py-python-gvmJose Alonso Cardenas Marquez2021-01-068-1/+20
|
* - New port: security/py-python-gvmJose Alonso Cardenas Marquez2021-01-064-0/+65
| | | | | | | | | | | | The Greenbone Vulnerability Management Python API library (python-gvm) is a collection of APIs that help with remote controlling a Greenbone Security Manager (GSM) appliance and its underlying Greenbone Vulnerability Manager (GVM). The library essentially abstracts accessing the communication protocols Greenbone Management Protocol (GMP) and Open Scanner Protocol (OSP) WWW: https://github.com/greenbone/python-gvm
* security/ssb: Update to 0.1.0Neel Chauhan2021-01-062-20/+8
| | | | | | | Reviewed by: 0mp (mentor) Approved by: 0mp (mentor) Relnotes: https://github.com/kitabisa/ssb/releases/tag/v0.1.0 Differential Revision: https://reviews.freebsd.org/D27977
* Follow up on devel/py-futures port removal in r559976Rene Ladan2021-01-062-3/+1
| | | | | | | | | | | | The devel/py-futures port was removed in r559976 as it was for Python 2.7 only and no longer referenced in the default cases. However it was still defined in Mk/Uses/python.mk in PY_FUTURES, leaving a dangling reference. Remove it from Mk/Uses/python.mk and from affected ports, as it was already an empty definition for Python 3.6+ Bump minimal Python version of security/theonionbox to 3.6+
* security/botan2: update to 2.17.3Dima Panov2021-01-064-51/+4
| | | | | | | | Changelog: https://botan.randombit.net/news.html#version-2-17-3-2020-12-21 PR: 252441 Submitted by: fluffy Approved by: maintainer
* Set MAINTAINER of my ports to my FreeBSD handle (nc@).Neel Chauhan2021-01-052-2/+2
| | | | | | Reviewed by: 0mp (mentor) Approved by: 0mp (mentor) Differential Revision: https://reviews.freebsd.org/D27966
* New port: security/aws-c-calDanilo Egea Gondolfo2021-01-055-0/+45
| | | | | AWS Crypto Abstraction Layer: Cross-Platform, C99 wrapper for cryptography primitives.
* security/s2n: Update to 0.10.23Danilo Egea Gondolfo2021-01-056-145/+27
|
* - Update to 2.11.0Ashish SHUKLA2021-01-052-46/+46
| | | | Reported by: portscout
* security/nss: switch to upstream distfileJan Beich2021-01-053-156/+3
|
* Update to the latest MIT KRB5 commit on github.Cy Schubert2021-01-052-5/+5
|
* security/fizz: Update 2020.12.28.00 -> 2021.01.04.00Yuri Victorovich2021-01-052-4/+4
|
* Add KERBEROS optionSunpoet Po-Chuan Hsieh2021-01-041-1/+3
|
* Update to 2.5.0Sunpoet Po-Chuan Hsieh2021-01-042-4/+4
| | | | Changes: https://github.com/ronf/asyncssh/blob/master/docs/changes.rst
* Add rubygem-securerandom 0.1.0Sunpoet Po-Chuan Hsieh2021-01-044-0/+29
| | | | | | | Securerandom is an interface to secure random number generators which are suitable for generating session keys in HTTP cookies, etc. WWW: https://github.com/ruby/securerandom
* security/php80-openssl: add patch to support LibreSSL buildTorsten Zuehlsdorff2021-01-041-0/+11
| | | | | | Take over the Patch to enable LibreSSL build from PHP 7.4 to PHP 8.0 Reported by: Nicola Tiling <nti@w4w.net>
* ecurity/softether: enable on powerpc64lePiotr Kubaj2021-01-041-1/+1
|
* - Purge backup file, committed by mistake. Sorry!Ashish SHUKLA2021-01-041-95/+0
|
* A transparent wrapper that adds support for regex, aliases, gateways,Ashish SHUKLA2021-01-045-0/+339
| | | | | | | dynamic hostnames, graphviz, json output, yaml configuration, and more to SSH. WWW: https://manfred.life/assh
* Remove python 2.7 support from a few portsAntoine Brodin2021-01-033-3/+3
|
* Remove expired ports:Rene Ladan2021-01-0211-183/+0
| | | | | | | | | | | | | | lang/julia: metaport, useless without any consumers 2020-12-31 lang/julia10: Uses Python 2.7 which is EOLed upstream 2020-12-31 lang/spidermonkey24: Uses Python 2.7 which is EOLed upstream 2020-12-31 mail/getmail: Uses deprecated version of python 2020-12-31 security/broccoli: Depends lang/python27 which is EOLed upstream 2020-12-31 security/orthrus: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 sysutils/ori: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 sysutils/osquery: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/cliqz: Uses deprecated version of python 2020-12-31 www/trac: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-accountmanager: Uses Python 2.7 which is EOLed upstream
* security/barnyard2: remove optional dependency on expired security/broccoliRene Ladan2021-01-021-5/+1
|
* Revert r559936, there are still a lot of reverse dependenciesAntoine Brodin2021-01-021-1/+3
|
* security/py-cryptography: remove support for expired Python 2.7Rene Ladan2021-01-021-3/+1
|
* security/xray-core: update 1.1.5 -> 1.2.0Kurt Jaeger2021-01-022-10/+10
| | | | | | PR: 252340 Submitted by: Neel Chauhan <neel@neelc.org> (maintainer) Relnotes: https://github.com/XTLS/Xray-core/releases/tag/v1.2.0
* security/helib: Update 1.3.0 -> 1.3.1Yuri Victorovich2021-01-023-5/+6
| | | | Reported by: portscout
* Mark ports that are BROKEN due to sbrk on aarch64, also BROKEN on riscv64Mark Linimon2021-01-021-1/+2
| | | | | | | | where appropriate. While here, pet portlint (Makevar order; whitespace). Approved by: portmgr (tier-2 blanket)
* security/pgpgpg: fix MASTER_SITES, unbreak, submitter becomes maintainerKurt Jaeger2021-01-023-6/+8
| | | | | PR: 252076 Submitted by: Chris Hutchinson <portmaster@bsdforge.com>
* security/libprelude[db]: remove optional binding for expired Python 2.7Rene Ladan2021-01-024-17/+2
| | | | | | PR: 249763 PR: 249764 Submitted by: swills
* security/vuxml: Add entry for gitea < 1.13.1Adam Weinberger2021-01-021-0/+29
| | | | | PR: 252310 Submitted by: maintainer
* security/py-openssl: update 19.0.0 -> 19.1.0Kurt Jaeger2021-01-012-16/+9
| | | | | | | PR: 245930 Submitted by: daniel.engberg.lists@pyret.net Approved by: sbz (maintainer) Relnotes: https://github.com/pyca/pyopenssl/blob/master/CHANGELOG.rst
* Re-apply part of r559792 (INDEX and bulk -a OK)Antoine Brodin2021-01-0110-182/+0
| | | | With hat: portmgr
* Revert r559792 to unbreak INDEX and bulk -aAntoine Brodin2021-01-0120-0/+365
| | | | | | It seems a lot of reverse dependencies were missed With hat: portmgr
* Update to 1.7.5.Matthias Fechner2021-01-012-4/+4
| | | | | Changelog: https://github.com/doorkeeper-gem/doorkeeper-openid_connect/blob/master/CHANGELOG.md
* security/libgpg-error: update to 1.41Roman Bogorodskiy2021-01-013-5/+5
|
* Document inspircd vulnerabilitiyJoseph Mingrone2021-01-011-0/+28
| | | | | PR: 252291 Reported by: Sadie Powell <sadie@witchery.services>
* security/gpgme-cpp: Fix constnessJason E. Hale2021-01-012-1/+30
| | | | | | | | | | | | | | | | | | | | | | | The 1.15.0 release of gpgme-cpp adds a `Signature::operator<` which is missing a const. In 6a6d2a27648, Signature got an operator< . This is used in *security/libkleo*, for instance, to sort the signatures for display. The build failure looks like this (trimmed for brevity, on 13-): === /usr/include/c++/v1/algorithm:715:71: error: invalid operands to binary expression ('const GpgME::UserID::Signature' and 'const GpgME::UserID::Signature') bool operator()(const _T1& __x, const _T1& __y) const {return __x < __y;} /wrkdirs/usr/ports/security/libkleo/work/libkleo-20.12.0/src/models/ useridlistmodel.cpp:203:14: note: in instantiation of function template specialization 'std::__1::sort<GpgME::UserID::Signature>' requested here std::sort(sigs.begin(), sigs.end()); === PR: 252283 Submitted by: adridg
* Remove most expired ports that depend on Python 2.7:Rene Ladan2021-01-0120-365/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Exceptions are: - mail/mailman, our listservers still use it - www/chromium, solely because of popular demand, upstream is (slowly) working on porting it to Python 3 - ports that have actual patches for Python 3 against them (Cinnamon and a few unrelated other ports) - llvm70 and qt5-webengine because they seem to have a lot of dependencies which need further analysis - sysutils/uefi-edk2-bhyve because bhyve seems to use them - python2 and python27 themselves I'm sure there will be complaints, but the nice thing about a version control system is that we can revert and adjust things. 2020-12-31 audio/ardour: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 audio/mixxx21: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 audio/xmms2: Uses Python 2.7 which is EOLed upstream 2020-12-31 chinese/sunpinyin: Uses Python 2.7 which is EOLed upstream 2020-12-31 databases/arangodb32: Uses Python 2.7 which is EOLed upstream 2020-12-31 databases/arangodb33: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/bzr: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/chromium-gn: Uses deprecated version of python, use devel/gn instead 2020-12-31 devel/electron4: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/electron5: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/electron6: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/electron7: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/gnatpython: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/godot2: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 devel/godot2-tools: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 devel/libhid: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/libosmocore: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/llvm60: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/mongo-cxx-driver: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-06-30 devel/p5-Log-Any-Adapter-Callback: Use devel/p5-Log-Any (Log::Any::Adapter::Capture) instead 2020-12-31 devel/py-backports.functools_lru_cache: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/py-backports.os: Python 2 is EOL upstream 2020-12-31 devel/py-backports.shutil_get_terminal_size: Python 2 is EOL upstream 2020-12-31 devel/py-backports_abc: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/py-cheetah: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/py-dis3: Python 2 only, backport of Python 3 2020-12-31 devel/py-enum34: Will be removed along with python27 2020-12-31 devel/py-functools32: Python 2 only, backport of Python 3 2020-12-31 devel/py-futures: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/py-more-itertools5: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/py-pathlib: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/py-selectors2: Python 2 is EOL upstream 2020-12-31 devel/py-should_dsl: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/py-singledispatch: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/py-subprocess32: Python 2 only, following EOL of lang/python27 2020-12-31 devel/py-total-ordering: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/py-typing: Python 2 only, backport of Python 3 2020-12-31 devel/py-weakrefmethod: Python 2 only, backport of Python 3 2020-12-31 devel/rbtools: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/subversion-lts: Uses Python 2.7 which is EOLed upstream 2020-12-31 devel/viewvc: Uses Python 2.7 which is EOLed upstream 2020-12-31 dns/py-dns: Uses Python 2.7 which is EOLed upstream 2020-12-31 editors/atom: Uses Python 2.7 which is EOLed upstream 2020-12-31 emulators/fceux: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 emulators/gem5: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 emulators/nonpareil: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 games/0ad: Uses deprecated version of python 2020-12-31 games/dangerdeep: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 games/freera: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 games/glob2: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 games/marsnomercy: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 games/netpanzer: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 games/pingus: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 games/renpy: Uses deprecated version of python 2020-12-31 graphics/goxel: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 graphics/py-pillow6: Uses Python 2.7 which is EOLed upstream 2020-12-31 graphics/sk1libs: Uses Python 2.7 which is EOLed upstream 2020-12-31 graphics/uniconvertor: Uses deprecated version of python 2020-12-31 lang/julia10: Uses Python 2.7 which is EOLed upstream 2020-12-31 lang/pypy: Uses Python 2.7 which is EOLed upstream 2020-12-31 lang/pypy3: Uses Python 2.7 which is EOLed upstream 2020-12-31 lang/spidermonkey185: Uses Python 2.7 which is EOLed upstream 2020-12-31 lang/spidermonkey24: Uses Python 2.7 which is EOLed upstream 2020-12-31 lang/spidermonkey52: Uses Python 2.7 which is EOLed upstream 2020-12-31 lang/spidermonkey60: Requires python2 to build 2020-12-31 lang/tolua++: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 mail/getmail: Uses deprecated version of python 2020-12-31 math/gringo: Uses Python 2.7 which is EOLed upstream 2020-12-31 multimedia/ffmpeg2theora: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 multimedia/mimms: Uses Python 2.7 which is EOLed upstream 2020-12-31 net/py-ipaddress: Uses Python 2.7 which is EOLed upstream 2020-12-31 net-p2p/linuxdcpp: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 security/broccoli: Depends lang/python27 which is EOLed upstream 2020-12-31 security/orthrus: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 security/py-backports.ssl_match_hostname: Uses Python 2.7 which is EOLed upstream 2020-12-31 security/sandsifter: Uses deprecated version of python, see https://github.com/rigred/sandsifter/issues/10 2020-12-31 sysutils/cinnamon-control-center: Uses Python 2.7 which is EOLed upstream 2020-12-31 sysutils/ori: Uses Python 2.7 version of scons, and Python 2.7 which is EOLed upstream 2020-12-31 sysutils/osquery: Uses Python 2.7 which is EOLed upstream 2020-12-31 sysutils/py-shutilwhich: Python 2 only, backport of Python 3 2020-12-31 sysutils/uefi-edk2-bhyve-csm: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/cliqz: Uses deprecated version of python 2020-12-31 www/iridium: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/moinmoin: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/node10: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/node12: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-OhlohWidgetsMacro: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-TracGoogleAnalytics: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-accountmanager: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-advancedticketworkflow: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-autocomplete: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-ccselector: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-customfieldadmin: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-datefield: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-defaultcc: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-devel: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-discussion: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-downloads: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-email2trac: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-email2trac-postfix: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-estimator: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-fivestarvote: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-fullblog: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-fullblognotification: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-graphviz: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-iniadmin: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-keywords: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-keywordsecretticket: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-ldap: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-ldapauthstore: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-math: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-mercurial: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-navadd: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-permredirect: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-privatetickets: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-pydotorgtheme: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-scrumburndown: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-spam-filter: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-subtickets: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-tags: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-themeengine: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-ticketimport: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-tickettemplate: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-timingandestimation: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-tocmacro: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-tweakui: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-vote: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-wikigoodies: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-wikinotification: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-wikitemplates: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-wikitopdf: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-wysiwyg: Uses Python 2.7 which is EOLed upstream 2020-12-31 www/trac-xmlrpc: Uses Python 2.7 which is EOLed upstream
* New port: security/ssb: SSH Server BruteforcerKurt Jaeger2021-01-014-0/+57
| | | | | | | | | Secure Shell Bruteforcer - A faster and simpler way to bruteforce SSH server. WWW: https://github.com/kitabisa/ssb PR: 252222 Submitted by: Neel Chauhan <neel@neelc.org>
* New port: security/xray-core: network penetration toolsKurt Jaeger2021-01-014-0/+127
| | | | | | | | | | Xray, Penetrates Everything. Also the best v2ray-core, with XTLS support. Fully compatible configuration. WWW: https://github.com/XTLS/Xray-core PR: 252226 Submitted by: Neel Chauhan <neel@neelc.org>
* Update to 1.18.0Michael Reifenberger2021-01-012-340/+343
|
* Remove PHP 7.2 which expired today, use PHP 7.4 instead.Rene Ladan2020-12-317-75/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 2020-12-31 ./net/php72-soap: Security Support ends on 30 Nov 2020 2020-12-31 ./net/php72-sockets: Security Support ends on 30 Nov 2020 2020-12-31 ./net/php72-xmlrpc: Security Support ends on 30 Nov 2020 2020-12-31 ./net/php72-ldap: Security Support ends on 30 Nov 2020 2020-12-31 ./textproc/php72-xmlwriter: Security Support ends on 30 Nov 2020 2020-12-31 ./textproc/php72-pspell: Security Support ends on 30 Nov 2020 2020-12-31 ./textproc/php72-enchant: Security Support ends on 30 Nov 2020 2020-12-31 ./textproc/php72-wddx: Security Support ends on 30 Nov 2020 2020-12-31 ./textproc/php72-xsl: Security Support ends on 30 Nov 2020 2020-12-31 ./textproc/php72-dom: Security Support ends on 30 Nov 2020 2020-12-31 ./textproc/php72-ctype: Security Support ends on 30 Nov 2020 2020-12-31 ./textproc/php72-xml: Security Support ends on 30 Nov 2020 2020-12-31 ./textproc/php72-simplexml: Security Support ends on 30 Nov 2020 2020-12-31 ./textproc/php72-xmlreader: Security Support ends on 30 Nov 2020 2020-12-31 ./graphics/php72-gd: Security Support ends on 30 Nov 2020 2020-12-31 ./graphics/php72-exif: Security Support ends on 30 Nov 2020 2020-12-31 ./mail/php72-imap: Security Support ends on 30 Nov 2020 2020-12-31 ./www/php72-opcache: Security Support ends on 30 Nov 2020 2020-12-31 ./www/mod_php72: Security Support ends on 30 Nov 2020 2020-12-31 ./www/php72-session: Security Support ends on 30 Nov 2020 2020-12-31 ./www/php72-tidy: Security Support ends on 30 Nov 2020 2020-12-31 ./security/php72-filter: Security Support ends on 30 Nov 2020 2020-12-31 ./security/php72-sodium: Security Support ends on 30 Nov 2020 2020-12-31 ./security/php72-hash: Security Support ends on 30 Nov 2020 2020-12-31 ./security/php72-openssl: Security Support ends on 30 Nov 2020 2020-12-31 ./devel/php72-shmop: Security Support ends on 30 Nov 2020 2020-12-31 ./devel/php72-tokenizer: Security Support ends on 30 Nov 2020 2020-12-31 ./devel/php72-sysvshm: Security Support ends on 30 Nov 2020 2020-12-31 ./devel/php72-gettext: Security Support ends on 30 Nov 2020 2020-12-31 ./devel/php72-readline: Security Support ends on 30 Nov 2020 2020-12-31 ./devel/php72-pcntl: Security Support ends on 30 Nov 2020 2020-12-31 ./devel/php72-json: Security Support ends on 30 Nov 2020 2020-12-31 ./devel/php72-sysvmsg: Security Support ends on 30 Nov 2020 2020-12-31 ./devel/php72-sysvsem: Security Support ends on 30 Nov 2020 2020-12-31 ./devel/php72-intl: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-pdo_sqlite: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-pdo_mysql: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-pgsql: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-pdo_pgsql: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-odbc: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-pdo_odbc: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-mysqli: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-interbase: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-pdo_firebird: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-pdo: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-dba: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-pdo_dblib: Security Support ends on 30 Nov 2020 2020-12-31 ./databases/php72-sqlite3: Security Support ends on 30 Nov 2020 2020-12-31 ./ftp/php72-curl: Security Support ends on 30 Nov 2020 2020-12-31 ./ftp/php72-ftp: Security Support ends on 30 Nov 2020 2020-12-31 ./misc/php72-calendar: Security Support ends on 30 Nov 2020 2020-12-31 ./math/php72-bcmath: Security Support ends on 30 Nov 2020 2020-12-31 ./math/php72-gmp: Security Support ends on 30 Nov 2020 2020-12-31 ./archivers/php72-zip: Security Support ends on 30 Nov 2020 2020-12-31 ./archivers/php72-phar: Security Support ends on 30 Nov 2020 2020-12-31 ./archivers/php72-zlib: Security Support ends on 30 Nov 2020 2020-12-31 ./archivers/php72-bz2: Security Support ends on 30 Nov 2020 2020-12-31 ./net-mgmt/php72-snmp: Security Support ends on 30 Nov 2020 ./lang/php72-extensions 2020-12-31 ./lang/php72: Security Support ends on 30 Nov 2020 2020-12-31 ./converters/php72-mbstring: Security Support ends on 30 Nov 2020 2020-12-31 ./converters/php72-recode: Security Support ends on 30 Nov 2020 2020-12-31 ./converters/php72-iconv: Security Support ends on 30 Nov 2020 2020-12-31 ./sysutils/php72-posix: Security Support ends on 30 Nov 2020 2020-12-31 ./sysutils/php72-fileinfo: Security Support ends on 30 Nov 2020
* Bump PORTREVISION on *-sbcl ports after lang/sbcl upgrade.Kirill Ponomarev2020-12-311-1/+1
|
* security/py-gtts-token: Deprecate portKai Knoblich2020-12-312-4/+7
| | | | | | | | | | * Since changes were made to Google's TTS API in November 2020 this port is no longer useful [1]. [1] https://github.com/Boudewijn26/gTTS-token/blob/master/README.md * The audio/py-gtts port has been adapted accordingly to the new API changes and has been updated in r559351 .
* security/step-certificates: Update to 0.15.6Guangyuan Yang2020-12-312-64/+70
| | | | | | PR: 252004 Submitted by: Markus Wipp <mw@wipp.bayern> Approved by: lwhsu
* security/softether: enable on powerpc64Piotr Kubaj2020-12-311-2/+1
| | | | Builds fine.
* Update to 20201228Antoine Brodin2020-12-312-4/+4
|
* Add SIM_SIMULATOR and USIM_SIMULATOR options.Cy Schubert2020-12-301-1/+10
| | | | | | | | SIM_SIMULATOR and USIM_SIMULATOR options enable features that are used for testing EAP-AKA and EAP-SIM authentication. PR: 252276 Submitted by: Terry Burton <tez _ terryburton.co.uk>
* Fix LLVM11 build.Cy Schubert2020-12-301-0/+10
| | | | | According to https://reviews.llvm.org/D75758, some software may require a pragma.
* Correct typo in the deprecation commentMatthew Seaman2020-12-301-1/+1
| | | | Submitted by: John W. O'Brien
* security/sslproxy: Update version 0.7.0=>0.8.2Muhammad Moinur Rahman2020-12-305-54/+43
| | | | Relnotes: https://github.com/sonertari/SSLproxy/blob/master/NEWS.md
* security/strongswan: Update to version 5.9.1Joseph Mingrone2020-12-302-4/+4
| | | | | | | | Changelog: https://wiki.strongswan.org/versions/79 PR: 252202 Submitted by: Jose Luis Duran <jlduran@gmail.com> Approved by: strongswan@nanoteq.com (maintainer)
* security/p5-PGP-Sign: Update version 1.03=>1.04Muhammad Moinur Rahman2020-12-302-4/+4
| | | | Relnotes: https://metacpan.org/changes/distribution/PGP-Sign
* security/step-cli: Update to 0.15.3Guangyuan Yang2020-12-302-54/+90
| | | | | | PR: 252006 Submitted by: Markus Wipp <mw@wipp.bayern> Approved by: mikael
* Drop python 2.7 support from a few portsAntoine Brodin2020-12-291-1/+1
|
* Remove expired ports:Rene Ladan2020-12-294-35/+0
| | | | | | | | | | | | | | | | | | 2020-12-12 textproc/py-hypua2jamo: Uses deprecated version of python 2020-12-12 devel/py-delfick_error: Uses deprecated version of python 2020-12-12 devel/py-fusefs: Uses deprecated version of python 2020-08-15 devel/py-noseofyeti: Uses deprecated version of python 2020-12-29 databases/py-bsddb: Uses deprecated version of python 2020-12-29 www/py-webhelpers: Uses deprecated version of python 2020-12-29 security/py-pyptlib: Uses deprecated version of python 2020-12-29 japanese/py-zinnia: Uses deprecated version of python 2020-12-29 math/slepc: Broken, uses deprecated version of python 2020-12-29 www/py-pastescript: Uses deprecated version of python 2020-12-29 databases/ldb14: Uses deprecated version of python 2020-12-29 math/py-slepc4py: Depends on broken and expiring math/slepc 2020-12-29 multimedia/py-kaa-base: Uses deprecated version of python 2020-12-29 devel/py-ydbf: Uses deprecated version of python 2020-12-29 devel/py-SymbolType: Uses deprecated version of python
* Ignore with PHP 8.0Antoine Brodin2020-12-292-0/+2
| | | | Reported by: pkg-fallout
* Drop python 2.7 support from a few portsAntoine Brodin2020-12-29126-126/+126
| | | | With hat: portmgr
* security/fizz: Update 2020.12.21.00 -> 2020.12.28.00Yuri Victorovich2020-12-292-4/+4
|
* security/wolfssl: Updates to v4.6.0Santhosh Raju2020-12-293-13/+21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Changes since v4.5.0: wolfSSL Release 4.6.0 (December 22, 2020) Release 4.6.0 of wolfSSL embedded TLS has bug fixes and new features including: New Feature Additions New Build Options * wolfSSL now enables linux kernel module support. Big news for Linux kernel module developers with crypto requirements! wolfCrypt and wolfSSL are now loadable as modules in the Linux kernel, providing the entire libwolfssl API natively to other kernel modules. For the first time on Linux, the entire TLS protocol stack can be loaded as a module, allowing fully kernel-resident TLS/DTLS endpoints with in-kernel handshaking. (--enable-linuxkm, --enable-linuxkm-defaults, --with-linux-source) (https://www.wolfssl.com/loading-wolfssl-into-the-linux-kernel/) * Build tests and updated instructions for use with Apple’s A12Z chipset (https://www.wolfssl.com/preliminary-cryptographic-benchmarks-on-new-apple-a12z-bionic-platform/) * Expansion of wolfSSL SP math implementation and addition of --enable-sp-math-all build option * Apache httpd w/TLS 1.3 support added * Sniffer support for TLS 1.3 and AES CCM * Support small memory footprint build with only TLS 1.3 and PSK without code for (EC)DHE and certificates New Hardware Acceleration * Added support for NXP DCP (i.MX RT1060/1062) crypto co-processor * Add Silicon Labs hardware acceleration using SL SE Manager New Algorithms * RC2 ECB/CBC added for use with PKCS#12 bundles * XChaCha and the XChaCha20-Poly1305 AEAD algorithm support added Misc * Added support for 802.11Q VLAN frames to sniffer * Added OCSP function wolfSSL_get_ocsp_producedDate * Added API to set CPU ID flags cpuid_select_flags, cpuid_set_flag, cpuid_clear_flag * New DTLS/TLS non-blocking Secure Renegotiation example added to server.c and client.c Fixes Math Library * Fix mp_to_unsigned_bin_len out of bounds read with buffers longer than maximum MP * Fix for fp_read_radix_16 out of bounds read * Fix to add wrapper for new timing resistant wc_ecc_mulmod_ex2 function version in HW ECC acceleration * Handle an edge case with RSA-PSS encoding message to hash Compatibility Layer Fixes * Fix for setting serial number wolfSSL_X509_set_serialNumber * Fix for setting ASN1 time not before / not after with WOLFSSL_X509 * Fix for order of components in issuer name when using X509_sign * Fix for compatibility layer API DH_compute_key * EVP fix incorrect block size for GCM and buffer up AAD for encryption/decryption * EVP fix for AES-XTS key length return value and fix for string compare calls * Fix for mutex freeing during RNG failure case with EVP_KEY creation * Non blocking use with compatibility layer BIOs in TLS connections Build Configuration * Fix for custom build with WOLFSSL_USER_MALLOC defined * ED448 compiler warning on Intel 32bit systems * CURVE448_SMALL build fix for 32bit systems with Curve448 * Fix to build SP math with IAR * CMake fix to only set ranlib arguments for Mac, and for stray typo of , -> ; * Build with --enable-wpas=small fix * Fix for building fips ready using openssl extra * Fixes for building with Microchip (min/max and undef SHA_BLOCK_SIZE) * FIx for NO_FILESYSTEM build on Windows * Fixed SHA256 support for IMX-RT1060 * Fix for ECC key gen with NO_TFM_64BIT Sniffer * Fixes for sniffer when using static ECC keys. Adds back TLS v1.2 static ECC key fallback detection and fixes new ECC RNG requirement for timing resistance * Fix for sniffer with SNI enabled to properly handle WOLFSSL_SUCCESS error code in ProcessClientHello * Fix for sniffer using HAVE_MAX_FRAGMENT in "certificate" type message * Fix build error with unused "ret" when building with WOLFSSL_SNIFFER_WATCH. * Fix to not treat cert/key not found as error in myWatchCb and WOLFSSL_SNIFFER_WATCH. * Sniffer fixes for handling TCP out-of-range sequence number * Fixes SSLv3 use of ECDH in sniffer PKCS * PKCS#11 fix to generate ECC key for decrypt/sign or derive * Fix for resetting internal variables when parsing a malformed PKCS#7 bundle with PKCS7_VerifySignedData() * Verify the extracted public key in wc_PKCS7_InitWithCert * Fix for internal buffer size when using decompression with PKCS#7 Misc * Pin the C# verify callback function to keep from garbage collection * DH fixes for when public key is owned and free’d after a handshake * Fix for TLS 1.3 early data packets * Fix for STM32 issue with some Cube HAL versions and STM32 example timeout * Fix mmCAU and LTC hardware mutex locking to prevent double lock * Fix potential race condition with CRL monitor * Fix for possible malformed encrypted key with 3DES causing negative length * AES-CTR performance fixed with AES-NI Improvements/Optimizations SP and Math * mp_radix_size adjustment for leading 0 * Resolve implicit cast warnings with SP build * Change mp_sqr to return an error if the result won't fit into the fixed length dp * ARM64 assembly with clang improvements, clang doesn't always handle use of x29 (FP or Frame Pointer) in inline assembly code correctly - reworked sp_2048_sqr_8 to not use x29 * SP mod exp changed to support exponents of different lengths * TFM div: fix initial value of size in q so clamping doesn't OOB read * Numerous stack depth improvements with --enable-smallstack * Improve cache resistance with Base64 operations TLS 1.3 * TLS 1.3 wolfSSL_peek want read return addition * TLS 1.3: Fix P-521 algorithm matching PKCS * Improvements and refactoring to PKCS#11 key look up * PKCS #11 changes for signing and loading RSA public key from private * check PKCS#7 SignedData private key is valid before using it * check PKCS#7 VerifySignedData content length against total bundle size to avoid large malloc Compatibility Layer * EVP add block size for more ciphers in wolfSSL_EVP_CIPHER_block_size() * Return long names instead of short names in wolfSSL_OBJ_obj2txt() * Add additional OpenSSL compatibility functions to update the version of Apache httpd supported * add "CCM8" variants to cipher_names "CCM-8" ciphers, for OpenSSL compat Builds * Cortex-M SP ASM support for IAR 6.70 * STM Cube pack support (IDE/STM32Cube) * Build option --enable-aesgcm=4bit added for AES-GCM GMULT using 4 bit table * Xilinx IDE updates to allow XTIME override for Xilinx, spelling fixes in Xilinx README.md, and add Xilinx SDK printf support * Added ED448 to the "all" options and ED448 check key null argument sanity check * Added ARC4, 3DES, nullcipher, BLAKE2, BLAKE2s, XChaCha, MD2, and MD4 to the “all” options * Added an --enable-all-crypto option, to enable only the wolfCrypt features of --enable-all, combinable with --enable-cryptonly * Added the ability to selectively remove features from --enable-all and --enable-all-crypto using specific --disable- options * Use Intel intrinsics with Windows for RDSEED and RDRAND (thanks to dr-m from MariaDB) * Add option to build with WOLFSSL_NO_CLIENT_AUTH * Updated build requirements for wolfSSH use to be less restrictive * lighttpd support update for v1.4.56 * Added batch file to copy files to ESP-IDF folders and resolved warnings when using v4.0 ESP-IDF * Added --enable-stacksize=verbose, showing at a glance the stack high water mark for each subtest in testwolfcrypt ECC * Performance increase for ECC verify only, using non constant time SP modinv * During ECC verify add validation of r and s before any use * Always use safe add and dbl with ECC * Timing resistant scalar multiplication updated with use of Joye double-add ladder * Update mp_jacobi function to reduce stack and increase performance for base ECC build * Reduce heap memory use with wc_EccPrivateKeyDecode, Improvement to ECC wc_ecc_sig_to_rs and wc_ecc_rs_raw_to_sig to reduce memory use (avoid the mp_int) * Improve StoreECC_DSA_Sig bounds checking OCSP * OCSP improvement to handle extensions in singleResponse * support for OCSP request/response for multiple certificates * OCSP Must Staple option added to require OCSP stapling response * Add support for id-pkix-ocsp-nocheck extension Misc * Additional code coverage added for ECC and RSA, PKCS#7, 3DES, EVP and Blake2b operations * DTLS MTU: check MTU on write * Refactor hash sig selection and add the macros WOLFSSL_STRONGEST_HASH_SIG (picks the strongest hash) and WOLFSSL_ECDSA_MATCH_HASH (will pick the hash to match the ECC curve) * Strict certificate version allowed from client, TLS 1.2 / 1.3 can not accept client certificates lower than version 3 * wolfSSL_get_ciphers_compat(), skip the fake indicator ciphers like the renegotiation indication and the quantum-safe hybrid * When parsing session ticket, check TLS version to see whether they are version compatible * Additional sanity check for invalid ASN1 padding on integer type * Adding in ChaCha20 streaming feature with Mac and Intel assembly build * Sniffer build with --enable-oldtls option on
* Document CVE-2020-0543 for Intel CPUs.Thomas Zander2020-12-281-0/+26
| | | | | PR: 247197 Submitted by: spam123@bitbert.com
* Finally bow to the inevitable and deprecate apg -- it has seen noMatthew Seaman2020-12-281-5/+5
| | | | | | | | | | | | development for years, and the distfiles are no-longer available except for a private copy in my account on freefall. Expiry date set to 3 months from now. Also, since it has bit-rotted so much that its cracklib integration doesn't work correctly, delete the CRACKLIB option. PR: 250868 Submitted by: Geoff Moraes
* security/lynis: Update to 3.0.2Lars Engels2020-12-282-4/+4
|
* security/*gpgme*: Update to 1.15.0Jason E. Hale2020-12-285-7/+11
|
* DeprecateAntoine Brodin2020-12-281-0/+3
|
* Deprecate rekall portsAntoine Brodin2020-12-283-0/+9
|
* Update to 6.0.23Antoine Brodin2020-12-282-6/+17
|
* Update to 2.0.24Antoine Brodin2020-12-282-4/+4
|
* Update to 4.0.3Antoine Brodin2020-12-282-4/+4
|
* Update to 4.1.1Antoine Brodin2020-12-282-5/+5
|
* Update to 3.1.3Antoine Brodin2020-12-282-4/+4
|
* Update to 3.0.1Antoine Brodin2020-12-282-4/+4
|
* Update to 2.3.17Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.4Antoine Brodin2020-12-282-4/+4
|
* Update to 0.2.29Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.3Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.25Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.4Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.4Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.5Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.88Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.7Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.2Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.6Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.6Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.25Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.5Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.14Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.7Antoine Brodin2020-12-282-4/+4
|
* Update to 0.1.14Antoine Brodin2020-12-282-4/+4
|
* security/nss: update to 3.60.1Jan Beich2020-12-272-1/+154
| | | | | | | | - Temporarily patch-update due to missing distfile Changes: https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.60.1_release_notes Changes: https://hg.mozilla.org/projects/nss/shortlog/NSS_3_60_1_RTM ABI: https://abi-laboratory.pro/tracker/timeline/nss/
* security/teleport: update to 4.3.9Steve Wills2020-12-272-4/+4
|
* Try to fix pkg builder.Michael Reifenberger2020-12-274-3/+61
| | | | | | Add sample environment config file. PR: 252129 # Used different approach.
* security/create-cert: Update to 2.8.Craig Leres2020-12-272-4/+4
| | | | | | | | - Add overrides for size of the key (-b bits), the certificate duration (-d days), and the digest (-D digest). - Fix a bug that ignored config file certificate duration and always used 3650 days.
* Update to 20201219Antoine Brodin2020-12-262-4/+6
|
* Update to 20201106Antoine Brodin2020-12-262-6/+6
|
* security/tor: Allow _tor group to read tor files and directories under /varYuri Victorovich2020-12-252-3/+4
| | | | | PR: 252127 Requested by: Dries Michiels <driesm.michiels@gmail.com>
* Mark BROKENAntoine Brodin2020-12-251-0/+2
| | | | Reported by: pkg-fallout
* Mark BROKEN everywhereAntoine Brodin2020-12-251-1/+1
| | | | Reported by: pkg-fallout
* Update dependenciesSunpoet Po-Chuan Hsieh2020-12-242-8/+11
| | | | - Bump PORTREVISION for package change
* Relax hardcoded paths to fix build with Python 3.8.7Kai Knoblich2020-12-2411-11/+11
| | | | | | | | | | | | | | | | | | | | | Since r558913 Python 3.8 incorporates BPO-42604 [1] which changed the shared libs naming scheme. This means "EXT_SUFFIX" is now derived from SOABI and yields with Python 3.8 to ".cpython-38.so" instead of ".so". The affected ports strip the libaries in the "post-install" target via hardcoded path(s) and the build fails at the end because the new extension is not expected at this place. Remedy the issue by adding wildcards to these paths. This should also prepare the ports for future Python releases, which will use the new shared libs naming scheme. [1] https://bugs.python.org/issue42604 PR: 252057 Reported by: John Kennedy Reviewed by: fluffy, koobs Approved by: koobs (python)
* security/pygpgme: switch to PYTHON_EXT_SUFFIXDima Panov2020-12-242-2/+2
|
* security/libpwquality: switch to PYTHON_EXT_SUFFIXDima Panov2020-12-241-1/+1
|
* Explicitely deprecate more python 2.7 portsAntoine Brodin2020-12-241-0/+3
|
* Document new asterisk vulnerabilities.Guido Falsi2020-12-231-0/+39
|
* Simplify MASTER_SITESMateusz Piotrowski2020-12-231-1/+1
| | | | Approved by: portmgr blanket
* security/fizz: Update 2020.12.14.00 -> 2020.12.21.00Yuri Victorovich2020-12-232-4/+4
|
* security/gcr: add DOCS optionTobias C. Berner2020-12-232-87/+92
| | | | | PR: 236250 Submitted by: rozhuk.im@gmail.com
* security/zeek: enable on powerpc64 headPiotr Kubaj2020-12-231-1/+2
|
* Document vulns for powerdns and postsrsdJuraj Lutter2020-12-221-0/+61
| | | | | | Reviewed by: osa (mentor) Approved by: osa (mentor) Differential Revision: https://reviews.freebsd.org/D27706
* security/gnupg: Update to 2.2.26Adam Weinberger2020-12-223-5/+4
| | | | | | | | | | | | | | | | | | | | Note that this release removes bin/symcryptrun which had essentially no expected current use-case. * gpg: New AKL method "ntds". * gpg: Fix --trusted-key with fingerprint arg. * scd: Fix writing of ECC keys to an OpenPGP card. [#5163] * scd: Make an USB error fix specific to SPR532 readers. [#5167] * dirmngr: With new LDAP keyservers store the new attributes. Never store the useless pgpSignerID. Fix a long standing bug storing some keys on an ldap server. * dirmngr: Support the new Active Direcory LDAP schema for keyservers. * dirmngr: Allow LDAP OpenPGP searches via fingerprint. * dirmngr: Do not block other threads during keyserver LDAP calls. * Support global configuration files. [#4788] * Fix the iconv fallback handling to UTF-8. [#5038] Release-info: https://dev.gnupg.org/T5153
* Add web-vault and startscript.Michael Reifenberger2020-12-224-5/+187
|
* security/sudo: Fix versionRenato Botelho2020-12-221-1/+1
| | | | | | | Use PORTVERSION here to end up with 1.9.4p2, which is considered newer than previous one (1.9.4_1) Reported by: ohauer <ohauer@gmx.de>