| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
Submitted by: secteam (remko)
Security: http://www.vuxml.org/freebsd/673aec6f-1cae-11da-bc01-000e0c2e438a.html
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The 3.2.x series contains many enhanced features, most notably
built in SSL capabilities.
Changes for the port itself:
1. Add new MASTER_SITES.
2. Search for an apache binary, not a document directory.
3. The new version uses libtool, so add USE_LIBTOOL per portlint.
4. The new configure script is much more thorough, so use a more complete
set of options, and sort them in "./configure --help" order.
5. CXXFLAGS hackery no longer needed in FreeBSD 5.x, but
6. A patch to include headers for select() is needed in RELENG_4.
7. Install PORTDOCS, especially the very thorough html help files.
8. Add SIZE to distinfo.
9. Make deletion of directories with user-configurable stuff conditional.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
security problem that was present in the unpatched 3.1.5.
* Update the master sites list.
* Configure more precisely several important directories, partly to
compensate for some of the new defaults, and partly to avoid potential
future security problems regarding remote users being able to read
files specified as config files. This vulnerability was patched
already, and the fix is included in this version. However, a little
paranoia never hurt anyone.
* Remove the patches, as they have either been made obsolete by the new
version, or as in the pthreads issue, I'm doing them differently in
the Makefile.
* Make the patching in the Makefile smarter.
* Put my name in the pkg-descr.... overlooked previously.
* Adjust the pkg-plist, and sort it since the bloat is the same either way.
Thanks to Palle Girgensohn <girgen@partitur.se> for the suggestion in the PR
to place the conf file in its own directory.
PR: ports/26058
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
security vulnerability. Quoting from their e-mail announcement:
There is a security vulnerability in all versions of
htsearch between 3.1.0b2 and 3.1.5 . . . The hole can
allow a remote user to pick a file on your system for
the config file that the UID running the webserver
can read.
With a default ports install the httpd user should be nobody, which
makes the vulnerability small.
|
|
|
|
|
|
| |
cgi-bin.
Submitted by: Doug Barton <doug@gorean.org>
|
|
|
|
|
| |
Submitted by: Doug Barton <doug@gorean.org>
lots of others who missed PLIST stuff.
|
|
PR: ports/12488
Submitted by: Palle Girgensohn <girgen@partitur.se>
NOTE: This patch actually patches two files, which is normally frowned
upon. However, one of these files generates the other and really
isn't used by the port, just for people who would use the port
to make their own custom ht://dig. I don't think this is a problem.
|