Commit Graph

396665 Commits

Author SHA1 Message Date
Bernard Spil
dbe3dbb507 security/openssl-devel: Fix build in 2016Q3 branch
Approved by:	fixit blanket
Approved by:	ports-secteam (delphij)
Security:	43eaa656-80bc-11e6-bf52-b499baebfeaf
Security:	91a337d8-83ed-11e6-bf52-b499baebfeaf
2016-10-01 17:37:07 +00:00
Jan Beich
0bfba8b5e3 MFH: r422992
devel/rlvm: fix font handling

Even CLANNAD (Steam HD edition) didn't work[1], so...
- Force at least one supported font to be installed
- Chase paths for MONA after rename in r397892
- Don't look under PREFIX, other packages are under LOCALBASE

[1] rlvm doesn't use fontconfig, so it happily crashed without leaving
    any error on terminal to assist troubleshooting if one of the listed
    fonts couldn't be found.

Approved by:	ports-secteam "runtime" blanket
2016-09-30 15:48:15 +00:00
Jan Beich
dcb2ad6183 MFH: r422823
devel/onscripter: update to 20160925

Approved by:	ports-secteam (feld)
2016-09-29 20:50:01 +00:00
Jason Helfman
1d8da76ce1 MFH: r422944
- update to 4.8.0
  - Fix: Autostart - Pads did not hide on startup when set in the
         preferences due to the tray icon not being recognized properly
         (#1560019)
- adjust dependencies
- fix spelling on header

With hat: ports-secteam
Approved by: ports-secteam
2016-09-29 20:25:37 +00:00
David Naylor
dedf766eb6 MFH: r422903
x11/kde4-workspace: fix OpenGL test for nvidia-driver.

Restore patch introduced in r408463 and accidentially removed in r417328.

Approved by:	ports-secteam (feld)
2016-09-29 19:53:06 +00:00
Bernard Spil
4b2f787641 MFH: r416626 r419542 r420102 r422829
security/libressl: Update to version 2.3.6

Security:	CVE-2016-2178
Sponsored by:	BSDCan DevSummit

security/libressl: Update to 2.3.7

  - Bugfix update [1]

Release notes:
  - http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.3.7-relnotes.txt

security/libressl: Update to 2.4.2

  - Update to latest stable version 2.4.2
  - Add UPDATING entry
  - Remove OPENSSL_VERSION_NUMBER patch
  - Change post-install targets to post-stage where possible
  - Bump libcrypto version in version.mk

PR:		211701

security/libressl: Update to 2.4.3

  - Update to 2.4.3
  - Only affected by CVE-2016-6304 (high)

Security:	CVE-2016-6304
Security: 	43eaa656-80bc-11e6-bf52-b499baebfeaf

Approved by:	ports-secteam (feld)
2016-09-29 11:52:35 +00:00
Wen Heping
f20fb39cdd MFH: r422839
- Update django18 and django19 to 1.8.15 and 1.9.10
  (security update)

Approved by:	ports-secteam@(delphij@)
2016-09-29 07:25:39 +00:00
Jan Beich
9bafc3b8c9 MFH: r422266 r422678
devel/onscripter: update to 20160922

Approved by:	ports-secteam (feld)
2016-09-28 23:05:22 +00:00
Mark Felder
b7f5cfe3d2 MFH: r422245
Update to 5.6.33 release.

Approved by:	ports-secteam (with hat)
2016-09-28 19:44:12 +00:00
Bernard Spil
f23c961fc5 MFH: r422776
security/openssl: Update to 1.0.2j

  - Update to 1.0.2j
  - Fixes Missing CRL sanity check (CVE-2016-7052)

Security:	337d8-83ed-11e6-bf52-b499baebfeaf

Approved by:	ports-secteam (feld)
2016-09-28 19:41:18 +00:00
Mathieu Arnold
d9bb90bf79 MFH: r422868
Update to latest commit.

Security:	CVE-2016-2776
Sponsored by:	Absolight
2016-09-28 13:02:27 +00:00
Mathieu Arnold
26b7599b7e MFH: r422816
Update BIND9 to latest versions, 9.9.9-P3, 9.10.4-P3, 9.11.0rc3

Security:	CVE-2016-2776
Sponsored by:	Absolight
2016-09-27 16:29:58 +00:00
Bernard Spil
20c721dbf3 MFH: r422777
security/openssl-devel: Update to 1.1.0b

  - Update to 1.1.0b
  - Fixes CRITICAL Use After Free for large message sizes (CVE-2016-6309)
  - Make zlib and ssl3 options work
  - Remove jpake header (jpake removed completely)

Security:	91a337d8-83ed-11e6-bf52-b499baebfeaf

Approved by:	ports-secteam (Xin Li)
2016-09-26 18:08:44 +00:00
Ruslan Makhmatkhanov
0128d35508 MFH: r422684
multimedia/cheese: fix packaging

- fix packaging when MANPAGES option is off

PR:		202342
Reported by:	sub.mesa@gmail.com
Obtained from:	gnome development repo
With hat:   gnome

Approved by:    ports-secteam (feld)
2016-09-23 18:22:51 +00:00
Thomas Zander
49dd96a97c MFH: r422685
Make build more robust: add mirror to MASTER_SITES; add TIMESTAMP

PR:		212878
Submitted by:	samflanker@gmail.com (maintainer)

Approved by:	ports-secteam (build fix blanket)
2016-09-23 17:06:54 +00:00
Mathieu Arnold
923683f108 MFH: r422680
Put back the mail-header patch.

Pointy hat:	tz
Sponsored by:	Absolight
2016-09-23 14:50:09 +00:00
Torsten Zuehlsdorff
b6930d2192 MFH: r422652
lang/php56: Update from 5.6.25 to 5.6.26

Security:    CVE-2016-7416
Security:    CVE-2016-7412
Security:    CVE-2016-7414
Security:    CVE-2016-7417
Security:    CVE-2016-7411
Security:    CVE-2016-7413
Security:    CVE-2016-7418

Approved by: swills (mentor)

Approved by: ports-secteam (mat)
2016-09-23 13:47:59 +00:00
Bernard Spil
1cfcb859a2 MFH: r422668
security/openssl: Update to 1.0.2i

  - Update to 1.0.2i
  - Move from PORTREVISION to PORTVERSION updates
  - Remove patches that are included upstream

Reviewed by:	mat, delphij
Sponsored by:	EuroBSDcon 2016 DevSummit
Differential Revision:	D8006

Approved by:	ports-secteam (delphij)
2016-09-23 13:00:07 +00:00
Torsten Zuehlsdorff
000b52cdd4 MFH: r422609
lang/php70: Update from 7.0.10 to 7.0.11

Security:    CVE-2016-7416
Security:    CVE-2016-7412
Security:    CVE-2016-7414
Security:    CVE-2016-7417
Security:    CVE-2016-7413
Security:    CVE-2016-7418

Approved by: pi (mentor)
Approved by: ports-secteam (feld)
2016-09-22 13:04:43 +00:00
Antoine Brodin
d3dd920944 MFH: r422588
- Make usable as a regular user [1]
- Remove dependency on the python2 symlink

Reported by:	pkg-fallout [1]
2016-09-22 05:41:23 +00:00
Steve Wills
35d8886aa2 MFH: r422585
misc/py-progressbar: bump PORTREVISION for rerolled distfile
2016-09-21 21:37:40 +00:00
Steve Wills
59a2c30315 MFH: r422578
MFH for rerolled distfile

misc/py-progressbar: fix MASTER_SITES
2016-09-21 20:59:25 +00:00
Mark Felder
560bb75380 MFH: r422579
irc/irssi: Update to 0.8.20

- Add gettext-runtime to USES per poudriere's warning

https://irssi.org/security/irssi_sa_2016.txt

PR:		212888
Security:	CVE-2016-7044
Security:	CVE-2016-7045

Approved by:	ports-secteam (with hat)
2016-09-21 20:56:35 +00:00
Mark Felder
c47ed6ab84 MFH: r422575
ftp/curl: Update to 7.50.3

- Update installed docs

PR:		212677
Security:	CVE-2016-7167

Approved by:	ports-secteam (with hat)
2016-09-21 19:54:05 +00:00
Jan Beich
5649c58c25 MFH: r422207 r422321
www/firefox: update to 49.0 (rc4)

Changes:	https://hg.mozilla.org/releases/mozilla-release/pushloghtml?startdate=2016-09-08&enddate=2016-09-17
Approved by:	ports-secteam (feld)
2016-09-21 16:20:03 +00:00
Kurt Jaeger
89413938bd net-mgmt/zabbix3-server: unbreak build
MFH: r422524

PR:		209893
Submitted by:	antoine
Approved by:	ports-secteam (feld)
2016-09-21 15:52:17 +00:00
Mark Felder
396d97c026 MFH: r422451
lang/phantomjs: Remove hack for FreeBSD 9 and use compiler:c++11-lang

Approved by:	ports-secteam (with hat)
2016-09-19 17:23:59 +00:00
Kurt Jaeger
cf352c4423 net-mgmt/zabbix3-server: merge several changes to quarterly
MFH: r422063 r422263 r422386

- Simplify FreeBSD 9 SSL check, ignore LibreSSL

- update to 3.0.4 and add many fixes

PR:		209893
Security:	https://support.zabbix.com/browse/ZBX-11023
Changes:	http://www.zabbix.com/rn3.0.4.php
Submitted by:	Pakhom Golynga <pg@pakhom.spb.ru> (maintainer), chris@chrullrich.net
Approved by:	ports-secteam (feld)
2016-09-19 15:27:31 +00:00
Thomas Zander
6fa5cde896 MFH: r422257
Update to upstream version 5.7.15; fixes zero-day remote vuln CVE-2016-6662

PR:		212690
Submitted by:	mokhi64@gmail.com (maintainer)
Security:	CVE 2016-6662

Approved by:	ports-secteam (feld)
2016-09-19 12:28:53 +00:00
Torsten Zuehlsdorff
0e7944be9e MFH: r422132
www/wordpress: Update from 4.6 to 4.6.1

Changes: https://codex.wordpress.org/Version_4.6.1

PR:           212627
Submitted by: Jochen Neumeister <joneum@bsdproject.de> (maintainer)
Approved by:  swills (mentor)
Approved by:  ports-secteam (feld)
2016-09-19 08:45:14 +00:00
Thomas Zander
c0204d84d6 MFH: r422374 (only the MASTER_SITES fix from r422374)
Detailed log:
- Changed MASTER_SITES, to avoid fetching rolling releases

PR:		211110
Submitted by:	cs@innolan.dk (new maintainer)
Approved by:	ports-secteam (build fix blanket)
2016-09-18 11:54:57 +00:00
Bernard Spil
edae294ff5 MFH: r418977
databases/mariadb101-server: Fix lz4 linking fix

  - Remove some testing leftover
  - Fix patch error

Approved by:	ports-secteam
2016-09-18 10:39:38 +00:00
Mark Felder
02883f8dce MFH: r422327
lang/phantomjs: Fix build on 9.3 and 11.0

- Take maintainership (maintainer timeouts previously)
- Remove no-op patch
- Remove work related to GCC build profiles as we enforce clang
- Add patch to fix building with clang in 11.0
- Add hack to enforce CC and CXX for 9.3

Partway through the build the compiler was switching from clang++ to c++
which is GCC in base system. This was causing build failures.

Approved by:	ports-secteam (with hat)
2016-09-17 14:39:38 +00:00
Gordon Tetlow
f216e0c4a0 MFH: r421754
Update devel/p4d to 2016.1/1437038 for micropatching.

Approved by:	mat (implicit, mentor)
Approved by:	ports-secteam (feld)
2016-09-17 01:06:11 +00:00
Matthias Andree
6ddee9b011 MFH: r418578 r418755 r418756 r418815 r418816 r418844 r418901 r419254 r421716 r421726 r421812 r421966
Since e2fsprogs 1.42.x and in fact anything before 1.43.3_3 in terms of
FreeBSD's ports head/ trunk, and its full patch-lib_ext2fs_unix__io.c in
particular, is deemed unsafe and can cause data corruption on FreeBSD 11
and newer (10.3 and older are deemed safe):

Update to new upstream release 1.43.3, with a few additional fixes to
the bounce-buffer I/O needed on FreeBSD 11 and newer where malloc() does
not normally return page-aligned memory.

Make set of self-tests configurable. Add Perl and GNU dd to build
dependency list when needed so tests can pass in a poudriere build.

Assorted other tweaks.

Upstream's change log (please read all the way to and including 1.43):
  http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.43.3

While here, refresh patches, and time-limit programs in self-test suite
to 60 s CPU time each, to avoid runaway processes from stalling the
self-tests for too long.

Ignore SIGINFO during self-tests: In the FreeBSD-specific patch, when
the environment variable e2fsprogs_inhibit_SIGINFO exists (whatever its
content, even if empty), do NOT install the SIGINFO handler.  Leverage
this when running the self-tests.  This is to avoid false negatives
during the self-tests due to interspersed SIGINFO output redirected from
stderr to the log files.

Insist (by setting BROKEN conditionally) on anything that is FreeBSD 11
or newer, or non-i386/non-amd64, that the user runs at least the small
self-tests.

Revise option descriptions a bit.

Approved by:	ports-secteam (feld)
2016-09-16 19:50:51 +00:00
Steve Wills
50dad405b7 MFH: r420677
- Update to MediaWiki 1.27.1, 1.26.4, 1.23.15
  (security update)

Approved by:	ports-secteam@
2016-09-16 18:23:05 +00:00
Tobias C. Berner
e8ce45821b MFH: r421847
Update math/facile MASTER_SITES.

Reviewed by:	rakuco
Approved by:	rakuco (mentor)
Differential Revision:	https://reviews.freebsd.org/D7731

Approved by:	ports-secteam (feld), rakuco (mentor)
2016-09-16 06:50:44 +00:00
Bernard Spil
0b82ae102e MFH: r418997
databases/mariadb101-client: Update to 10.1.16

  - -client was missig from the -server commit
  - post-install target to post-stage
  - Delete private headers
  - Add service_encryption.h patch
  - Fix scipts/CMakeLists.txt patch

PR:             211328

Approved by:	ports-secteam (feld)
2016-09-15 19:47:38 +00:00
Antoine Brodin
3fa876d447 MFH: r422178
Do not include bsd.port.pre.mk twice
2016-09-15 05:12:40 +00:00
Carlos J. Puga Medina
cf2cd5b53f MFH: r422089
- Update MASTER_SITES
- Add LICENSE

PR:		212598
Submitted by:	bob@eager.cx (maintainer)
Reviewed by:	amdmi3 (mentor)
Approved by:	amdmi3 (mentor)

Approved by:	ports-secteam (feld)
2016-09-14 18:37:22 +00:00
Antoine Brodin
d9a94a1019 MFH: r422144
- Unbreak by using CHEESESHOP, distfile differs from 1 line in SOURCES.txt
- Remove dependency on the python2 metaport
2016-09-14 17:31:34 +00:00
Bernard Spil
07920ff770 MFH: r422122
www/h2o: Update to 2.0.4 (Fixes vulnerability)

  - Update to version 2.0.4

PR:		211892
Submitted by:	Dave Cottlehuber <dch@skunkwerks.at> (maintainer)
Reviewed by:	brnrd
Security:	08664d42-7989-11e6-b7a8-74d02b9a84d5

Approved by:	ports-secteam (feld)
2016-09-14 14:54:41 +00:00
Bernard Spil
50b02d594d MFH: r421188
databases/mariadb101-server: Update to 10.1.17

  - Update to 10.1.17
  - Remove no-op cmake flag for -client

Approved by:	ports-secteam (feld)
Security:	856b88bf-7984-11e6-81e7-d050996490d0
2016-09-14 14:52:50 +00:00
Bernard Spil
e65f0818e1 MFH: r421088
databases/mariadb100-server: Update to 10.0.27

  - Update to 10.0.27
  - Move from USE_OPENSSL to USES= ssl

Approved by:	ports-secteam (feld)
Security:	856b88bf-7984-11e6-81e7-d050996490d0
2016-09-14 14:29:15 +00:00
Bernard Spil
0a40a0bc73 MFH: r420094
databases/mariadb55-server: Update to 5.5.51

  - Update to latest version 5.5.51
  - Move from USE_OPENSSL to USES= ssl

Approved by:	ports-secteam (feld)
Security:	856b88bf-7984-11e6-81e7-d050996490d0
2016-09-14 14:27:46 +00:00
Dmitry Marakasov
59a5011bdd MFH: r422060
- Update to 1.96
- Add LICENSE
- Add NO_ARCH

PR:		212526
Submitted by:	jimmy@mammothcheese.ca (maintainer)
Approved by:	ports-secteam (feld)
2016-09-13 19:11:39 +00:00
Dimitry Andric
46a4e1eb5f MFH: r421625
Fix build of lang/gcc49 with libc++ 3.9.0

While testing the clang390-import branch, I ran into the following
errors building lang/gcc49:

In file included from /wrkdirs/usr/ports/lang/gcc49/work/gcc-4.9.4/gcc/c/c-objc-common.c:33:
In file included from /usr/include/c++/v1/new:70:
/usr/include/c++/v1/exception:267:5: error: no member named 'fancy_abort' in namespace 'std::__1'; did you mean simply 'fancy_abort'?
    _VSTD::abort();
    ^~~~~~~
/usr/include/c++/v1/__config:451:15: note: expanded from macro '_VSTD'
#define _VSTD std::_LIBCPP_NAMESPACE
              ^
/wrkdirs/usr/ports/lang/gcc49/work/gcc-4.9.4/gcc/system.h:685:13: note: 'fancy_abort' declared here
extern void fancy_abort (const char *, int, const char *) ATTRIBUTE_NORETURN;
            ^
1 error generated.

What is happening here, is that the source file includes gcc/system.h,
which defines abort to fancy_abort, and then the source file includes
<new>, which attempts to call _VSTD::abort() (the _VSTD is a libc++
alias for std::).  The macro definition then causes the above breakage.

Newer gcc ports, such as gcc5 and gcc6 don't show this issue, because
upstream gcc first added an include of <algorithm> (which indirectly
includes <new>) in r217348 [1], and later even add a direct include of
<new> in r232736 [2].

Fix it for this version, by adding the direct include of <new> to
gcc/system.h.  This makes the 'second' includes of <new> in some .c
files superfluous, but at least they won't result in errors.

[1] https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=217348
[2] https://gcc.gnu.org/viewcvs/gcc?view=revision&revision=232736

Approved by:	portmgr (feld)
PR:		212465
2016-09-13 18:41:08 +00:00
Dimitry Andric
9b40b6af90 MFH: r421953
Fix build of audio/clementine-player with clang 3.9.0

Clang 3.9.0 has a new warning about undefined template variables, which
is triggered by including cryptopp headers in the spotify blob
downloader:

In file included from /wrkdirs/usr/ports/audio/clementine-player/work/Clementine-1.3.1/src/internet/spotify/spotifyblobdownloader.cpp:43:
/usr/local/include/cryptopp/pkcspad.h:74:53: error: instantiation of variable 'CryptoPP::PKCS_DigestDecoration<CryptoPP::SHA512>::decoration' required here, but no definition is available [-Werror,-Wundefined-var-template]
                                return HashIdentifier(PKCS_DigestDecoration<H>::decoration, PKCS_DigestDecoration<H>::length);
                                                                                ^

This warning could be silenced by hacking on cryptopp, but just suppress
it for now.

Approved by:	portmgr (feld)
PR:		212343
2016-09-13 18:37:43 +00:00
Olli Hauer
33b0d66d1e - fix 2013Q3 build
some previous bulk commits are missing, fix the manually

PR:		212657
Reported by:	fredrik.eriksson_at_loopia.se
Approved by:	portmgr (implicit)
2016-09-13 16:35:29 +00:00
Jan Beich
5ed2e8a176 MFH: r421490
www/firefox-esr: update 45.4esr

Changes:	https://www.mozilla.org/firefox/45.4.0/releasenotes/
Security:	2c57c47e-8bb3-4694-83c8-9fc3abad3964
Approved by:	ports-secteam (feld)
2016-09-13 15:23:02 +00:00