Commit Graph

464004 Commits

Author SHA1 Message Date
Tobias Kortkamp
29596c4f44 MFH: r495223
graphics/netpbm: Update to 10.85.04

Changes:	https://gitlab.com/tobiask/netpbm/raw/v10.85.04/doc/HISTORY

Approved by:	ports-secteam (miwi)
2019-03-10 15:31:42 +00:00
Dan Langille
ad432a37b4 MFH: r495081
Catch up with smartctl changes while retaining old behaviour.

PR:		236227
Approved by:	 Krzysztof <ports@bsdserwis.com> (maintainer)

Approved by:	ports-secteam (miwi)
2019-03-09 23:26:07 +00:00
Sunpoet Po-Chuan Hsieh
5a3191c02a MFH: r494442
Mark BROKEN on FreeBSD 12+ with base OpenSSL (1.1.1+)

Reported by:	pkg-fallout

Approved by:	ports-secteam (blanket)
2019-03-09 22:49:12 +00:00
Bernard Spil
e791148b46 MFH: r494031 r494996
security/openssl111: Update to 1.1.1b

security/openssl111: Security update for CVE-2019-1543

Security:	e56f2f7c-410e-11e9-b95c-b499baebfeaf

Approved by:	ports-secteam (joneum)
2019-03-09 20:37:00 +00:00
Bryan Drewery
3da9b482ac MFH: r495190
Respect UID_FILES.

Reported by:	dvl
Tested by:	dvl
Approved by:	portmgr (implicit)
2019-03-09 18:39:07 +00:00
Mark Felder
2f112604a0 MFH: r495184
net-mgmt/unifi-lts: Fix support for Mongo 3.6+

Ubiquiti still hasn't fixed UniFi-LTS after this was reported ages ago, so
I guess every OS will have to fix this manually.

Reported by:	many
2019-03-09 18:14:58 +00:00
Raphael Kubo da Costa
57ac59fed1 MFH: r495180
Add USES=shared-mime-info

Starting with version 18.12.0, Ark has included a custom kerfuffle.xml mime
type to support zstd-compressed files (the mimetype was only added to
shared-mime-info starting with version 1.11, which we don't ship yet). We need
to make sure update-mime-database is run, otherwise Ark will still fail to
recognize those archives.

Approved by:	ports-secteam (blanket approval)
2019-03-09 17:55:00 +00:00
Christoph Moench-Tegeder
390d1f2d51 MFH: r495140
mail/thunderbird: update to 60.5.3

https://www.thunderbird.net/en-US/thunderbird/60.5.3/releasenotes/

PR:		236406
Approved by:	jbeich@ (gecko, maintainer)

Approved by:	portmgr (blanket: web browser alike)
2019-03-09 12:40:49 +00:00
Jan Beich
ed4adbb00a MFH: r495087
emulators/citra: update to s20190308

Changes:	5954dc11b...acaca4188
Approved by:	ports-secteam (swills, implicit for snapshots)
2019-03-09 00:40:43 +00:00
Lars Engels
ee51e89c89 MFH: r494999
security/lynis: Update to 2.7.2

Approved by:	portmgr (miwi)
2019-03-08 18:41:10 +00:00
Jan Beich
6db6362941 MFH: r495015
devel/nspr: update to 4.21

Changes:	http://mozilla.6506.n7.nabble.com/ANNOUNCE-NSPR-4-21-Release-tp379453.html
ABI:		https://abi-laboratory.pro/tracker/timeline/nspr/
Approved by:	ports-secteam blanket (required by Firefox 67)
2019-03-08 04:18:43 +00:00
Kai Knoblich
49d8789e48 MFH: r494837
shells/rssh: Apply fixes for basename(3) handling and some security issues

basename(3) has been changed to be POSIX compliant in r308264. This implies
that it can possibly write to the passed string. shells/rssh passes a const
string, so it always crashes on invocation with FreeBSD 12 and later. The
new patches remedy this issue. [1] [2]

During further tests and research came to light that there were also
recently discovered security issues with the parsing of rsync/scp command
line arguments and insufficient sanitization of environment variables when
using rysnc.

The corresponding fixes have been incorporated to the new patches and the
already existing patch for the RSYNC option has been tightened for the
argument parsing. Please note that with this patch the scp option "-3" can
no longer be used. [3]

Furthermore, another patch was applied to make this port a bit more secure.
That patch handles a buffer allocation issue for an error message. [4]

PR:		235121
Submitted by:	topical@gmx.net (first version) [1], Jason Harris (maintainer) [2]
Approved by:	tcberner (mentor)
Obtained from:	Debian [3] [4]
Security:	d193aa9f-3f8c-11e9-9a24-6805ca0b38e8
Differential Revision:	https://reviews.freebsd.org/D19474

Approved by:	ports-secteam (riggs), mentors implicit
2019-03-07 14:59:36 +00:00
Cy Schubert
95208cea70 MFH: r494931
4.2.8p12 --> 4.2.8p13

Approved by:	portmgr (joneum@)
Security:	CVE-2019-8936
          	VuXML: c2576e14-36e2-11e9-9eda-206a8a720317
Obtained from:	nwtime.org
2019-03-07 13:39:36 +00:00
Jan Beich
0813bc13b9 MFH: r489694
devel/rust-cbindgen: update to 0.6.8

Changes:	https://github.com/eqrion/cbindgen/compare/v0.6.7...v0.6.8
Reported by:	portscout
Approved by:	ports-secteam blanket (required by Firefox 66)
2019-03-07 12:19:57 +00:00
Matthew Seaman
6f86c70b5a MFH: r494854
Security update to 4.2.16

ReleaseNotes:	https://docs.bestpractical.com/release-notes/rt/4.2.16

Security:	416ca0f4-3fe0-11e9-bbdd-6805ca0b3d42

Approved by:	ports-secteam (miwi, riggs)
2019-03-07 07:47:52 +00:00
Matthew Seaman
2e82ae1a2d MFH: r494855
Security update to 4.4.4

ReleaseNotes:	https://docs.bestpractical.com/release-notes/rt/4.4.4

Submitted by:	mikael.urankar@gmail.com (maintainer)
Security:	416ca0f4-3fe0-11e9-bbdd-6805ca0b3d42

Approved by:	ports-secteam (miwi)
2019-03-07 07:46:48 +00:00
Wen Heping
b244a313d5 MFH: r494753
- Update to 19.9.0(include security fix)

PR:		234088
Submitted by:	wenheping2000@hotmail.com(myself)
Approved by:	maintainer

Approved by:	ports-secteam@(miwi@)
2019-03-07 06:20:17 +00:00
Jan Beich
302254a6bf MFH: r494859
emulators/citra: update to s20190306

Changes:	b3261472f...5954dc11b
Approved by:	ports-secteam (swills, implicit for snapshots)
2019-03-07 00:49:51 +00:00
Guido Falsi
5fe7ebcc68 MFH: r494787
Import patch from upstream bug report for xfce4-weather-plugin to
adapt to new upstream weather service API interface.

Previous API version is deprecated and expired by upstream.

While here, remove unneeded USES=intlhack.

PR:		236166
Submitted by:	Olivier Duchateau <duchateau.olivier@gmail.com>
Obtained from:	https://bugzilla.xfce.org/show_bug.cgi?id=14972

Approved by:	ports-secteam (joneum)
2019-03-06 11:45:30 +00:00
Rene Ladan
c8d8e771bc MFH: r494786
sysutils/cluster-glue: unbreak and modernize port

- add USES=gnome
- sort Makefile
- disable HPI option because that port is currently broken

PR:		231097
Submitted by:	w.schwarzenfeld@utanet.at

Approved by:	port-secteam (joneum)
2019-03-06 11:27:39 +00:00
Cy Schubert
b35b15c3ad MFH: r494674
Also document usage in pkg-message for binary package users.

PR:		236230
Reported by:	mt@markoturk.info
Approved by:	portmgr (miwi@)
2019-03-06 06:17:31 +00:00
Niclas Zeising
1b826d55b2 MFH: r491056 r492863
drm-legacy-kmod: Update to latest snapshot

Update graphics/drm-legacy-kmod to the latest snapshot.  This includes the
fix for an off by one error, that was committed as FreeBSD base r343060

Approved by:	jmd (maintainer, implicit)
Sponsored by:	B3 Init

graphics/drm-legacy-kmod: Update snapshot

Update the graphics/drm-legacy-kmod drivers to the latest snapshot.  This
includes fixes to make the driver build on CURRENT after base r343567.

Reported by:	Steve Kargl
Approved by:	jmd (maintainer, implicit)

Approved by:	ports-secteam (implicit, drm kmods)
2019-03-05 22:00:40 +00:00
Niclas Zeising
a89f3a0db5 MFH: r489050 r491609 r492864 r492896 r494747
This merges all changes done to drm-current-kmod, drm-fbsd12.0-kmod and
drm-fbsd11.2-kmod, in order to avoid merge conflicts.

Update pkg-descr to match reality

Update pkg-descr in drm-kmod ports to match reality in terms of which Linux
kernel version they correspond to and which FreeBSD version they are
supporting.

Noticed by:	Graham Perrin

graphics/drm-current-kmod: Update messges

Update pkg-message and makefile COMMENT to remove references to
drm-devel-kmod and the mention that this is the development version.  It is
the version for FreeBSD CURRENT, so the ride might be a little bumpy, but
it's not the devlopment version.

No changes to package.

FreeBSDDesktop issue:	#129

Reported by:	grahamperrin
Sponsored by:	B3 Init (zeising)

update drm-current and drm-fbsd12.0 snapshots

Update drm-current-kmod and drm-fbsd12.0-kmod to the latest snapshots.
This mutes console chatter about unimplemented stuff, which sometimes is
confusing.

Approved by:	jmd (maintainer, implicit)

graphics/drm-fbsd{11.2,12.0}-kmod: Update pkg-message with new names

PR:		235726
Approved by:	graphics (jmd)
Differential Revision:	https://reviews.freebsd.org/D19189

Update drm kmods for current and FreeBSD 12.0

Update graphics/drm-current-kmod and graphics/drm-fbsd12.0-kmod to their
respective latest snapshots.

This fixes a bug where a non-recursive mutex was used recursively in certain
conditions.
See https://github.com/FreeBSDDesktop/kms-drm/issues/134 for further details

FreeBSDDesktop issue:	#134
Approved by:		jmd (maintainer, implicit)
Sponsored by:		B3 Init

Approved by:	ports-secteam (implicit, drm-kmod ports)
2019-03-05 21:57:10 +00:00
Mateusz Piotrowski
668a5920cb MFH: r489686 r494706
net-im/py-slixmpp: Add missing RUN_DEPENDS and fix some other issues

- Switch MASTER_SITES to CHEESESHOP as it ought to be the default for
  Python software.
- Adjust COMMENT to match the short description from setup.py.
- Add missing RUN_DEPENDS.
- Standardize test invocation.
- Update WWW to point to project's homepage instead of the Git repository.

Reported by:	koobs
Reviewed by:	koobs, krion
Approved by:	koobs, krion (mentor)
Differential Revision:	https://reviews.freebsd.org/D18684

net-im/py-slixmpp: Update to 1.4.2

This release contains a fix for CVE-2019-1000021.

Changelog:
https://lab.louiz.org/poezio/slixmpp/tags/slix-1.4.2

Reviewed by:	krion
Approved by:	krion (mentor)
Security:	526d9642-3ae7-11e9-a669-8c164582fbac
Security:	CVE-2019-1000021
Differential Revision:	https://reviews.freebsd.org/D19397

Approved by:	ports-secteam (joneum), krion (mentor, implicit)
2019-03-05 19:44:52 +00:00
Lars Engels
0c43948ad8 MFH: r494688
icingaweb2-module-director: Update to 1.6.2

Approved by:	ports-secteam (joneum)
2019-03-05 09:39:27 +00:00
Bradley T. Hughes
b075c5325a MFH: r490982 r491621 r492447 r493241 r494484
www/node: Update 11.6.0 -> 11.7.0

https://nodejs.org/en/blog/release/v11.7.0/

Sponsored by:	Miles AS

www/node: Update 11.7.0_1 -> 11.8.0

https://nodejs.org/en/blog/release/v11.8.0/

Sponsored by:	Miles AS

www/node: Update 11.8.0 -> 11.9.0

Update patches and pkg-plist for deps/openssl/**/* after upstream
pdated to OpenSSL 1.1.1a and refresh existing patches with
`make makepatch`.

https://nodejs.org/en/blog/release/v11.9.0/

Sponsored by:	Miles AS

www/node: Update 11.9.0 -> 11.10.0

https://nodejs.org/en/blog/release/v11.10.0/

Sponsored by:	Miles AS

www/node: Update 11.10.0 -> 11.10.1

This is a security release. All Node.js users should consult the security
release summary at
https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/
for details on patched vulnerabilities.

Security:	b71d7193-3c54-11e9-a3f9-00155d006b02
Sponsored by:	Miles AS

Approved by:	ports-secteam (miwi)
2019-03-05 05:08:25 +00:00
Koichiro Iwao
02a5248eaf MFH: r494671
mail/mairix: Fix build with non-default prefix

PR:		236172
Submitted by:	John Hein <jcfyecrayz@liamekaens.com>
Approved by:	jjuanino@gmail.com (maintainer)

Approved by:	portmgr (miwi)
2019-03-05 04:06:00 +00:00
Jan Beich
d9361750b4 MFH: r494660
emulators/citra: update to s20190304

Changes:	ad1cfc8d5...b3261472f
Approved by:	ports-secteam (swills, implicit for snapshots)
2019-03-05 00:41:29 +00:00
Bradley T. Hughes
6d5f57bd5c MFH: r494485
www/node10: Update 10.15.1 -> 10.15.2

This is a security release. All Node.js users should consult the security
release summary at
https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/
for details on patched vulnerabilities.

Security:	b71d7193-3c54-11e9-a3f9-00155d006b02
Sponsored by:	Miles AS

Approved by:	ports-secteam (miwi)
2019-03-04 20:08:31 +00:00
Bradley T. Hughes
4d05e2f639 MFH: r494486
www/node8: Update 8.15.0 -> 8.15.1

This is a security release. All Node.js users should consult the security
release summary at
https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/
for details on patched vulnerabilities.

Security:	b71d7193-3c54-11e9-a3f9-00155d006b02
Sponsored by:	Miles AS

Approved by:	ports-secteam (miwi)
2019-03-04 20:02:40 +00:00
Bradley T. Hughes
8844f40a2c MFH: r494487
www/node6: Update 6.16.0 -> 6.17.0

This is a security release. All Node.js users should consult the security
release summary at
https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/
for details on patched vulnerabilities.

Security:	b71d7193-3c54-11e9-a3f9-00155d006b02
Sponsored by:	Miles AS

Approved by:	ports-secteam (miwi)
2019-03-04 20:00:26 +00:00
Bernard Spil
fc665cdb98 databases/mariadb103-server: Fix patch failing in 2019Q1
Approved by:	portmgr (fixit blanket)
2019-03-04 10:14:06 +00:00
Jochen Neumeister
3219f642b7 in r494382, et to update GH_TAGNAME. This fixes it
- bump PORTREVISION

Approved by:	ports-secteam (joneum)
Security:	395ed9d5-3cca-11e9-9ba0-4c72b94353b5
Sponsored by:	Netzkommune GmbH
2019-03-04 10:10:47 +00:00
Jan Beich
d7013b46eb MFH: r494455
multimedia/libmpeg2: unbreak on armv7

ld: error: can't create dynamic relocation R_ARM_ABS32 against local symbol in readonly segment; recompile object files with -fPIC or pass '-Wl,-z,notext' to allow text relocations in the output
>>> defined in ./.libs/libmpeg2arch.a(motion_comp_arm_s.o)
>>> referenced by motion_comp_arm_s.o:(.text+0x104) in archive ./.libs/libmpeg2arch.a

Reported by:	pkg-fallout
Approved by:	ports-secteam blankte
2019-03-02 21:34:42 +00:00
Jochen Neumeister
35631b3c1d MFH: r494382
Update to 1.8.20

Changelog: https://blog.mybb.com/2019/02/27/mybb-1-8-20-released-security-maintenance-release/

Security:	395ed9d5-3cca-11e9-9ba0-4c72b94353b5
Sponsored by:	Netzkommune GmbH

Approved by:	ports-secteam (joneum)
2019-03-02 10:35:43 +00:00
Guido Falsi
c0431cd7f2 MFH: r493250 r494310
Update asterisk16 to 16.2.0

Update asterisk16 to 16.2.1

Security:	be0e3817-3bfe-11e9-9cd6-001999f8d30b
		CVE-2019-7251

Approved by:	ports-secteam (miwi)
2019-03-02 08:53:46 +00:00
Guido Falsi
183cb1f838 MFH: r494309
Update asterisk15 to 15.7.2

Security:	be0e3817-3bfe-11e9-9cd6-001999f8d30b
		CVE-2019-7251

Approved by:	ports-secteam (miwi)
2019-03-02 08:49:03 +00:00
Jan Beich
d7513275bc MFH: r494319
multimedia/aom: unbreak aarch64 runtime after r485107

$ aomdec
ld-elf.so.1: /usr/local/lib/libaom.so.0: Undefined symbol "aom_mse16x16_neon"

Pointy hat to:	jbeich (for trusting LLD)
Approved by:	ports-secteam blanket
2019-03-01 22:12:59 +00:00
Cy Schubert
c164a033ca MFH: r494185
Register failure to build on FreeBSD > 11.

Approved by:	portmgr (miwi@)
2019-03-01 20:11:47 +00:00
Tobias Kortkamp
001861a7c9 MFH: r494290
graphics/netpbm: Update to 10.85.03

- Fixes a bug where pstopnm ignores -textalphabits [1]

Changes:	https://gitlab.com/tobiask/netpbm/raw/v10.85.03/doc/HISTORY
PR:		236097 [1]
Reported by:	Shigeharu TAKENO <shige@iee.niit.ac.jp> [1]

Approved by:	ports-secteam (miwi)
2019-03-01 18:02:26 +00:00
Sunpoet Po-Chuan Hsieh
116b6e6b62 MFH: r494191
Update texi2dvi and texinfo.tex

- Update texi2dvi from 6.4 7906 to 6.5 dev
- Update texinfo.tex from 2018-09-21.20 to 2019-02-16.14
- Bump PORTREVISION for package change

Changes:	https://svn.savannah.gnu.org/viewvc/texinfo/trunk/util/texi2dvi
		https://svn.savannah.gnu.org/viewvc/texinfo/trunk/doc/texinfo.tex

Approved by:	ports-secteam (blanket)
2019-02-28 21:41:11 +00:00
Jan Beich
a3b9be173e MFH: r494177
www/firefox: update to 65.0.2

Changes:	https://www.mozilla.org/firefox/65.0.2/releasenotes/
Approved by:	ports-secteam blanket
2019-02-28 18:54:42 +00:00
Olli Hauer
79d4b74cd8 MFH: r494127
- update to 3.3.3

Changelog:
20181202
  Bugfix (introduced: postfix-2.11): with posttls-finger,
  connections to unix-domain servers always resulted in "Failed
  to establish session" even after a connection was established.
  Jaroslav Skarva.  File: posttls-finger/posttls-finger.c.

20181227 (a forgotten bugfix from 20180707)
  Bugfix (introduced: Postfix 3.0): with smtputf8_enable=yes,
  table lookups could casefold the search string when searching
  a lookup table that does not use fixed-string keys (regexp,
  pcre, tcp, etc.). Historically, Postfix would not case-fold
  the search string with such tables. File: util/dict_utf8.c.

20190217
  Cleanup: when the master daemon runs with PID=1 (init mode),
  reap orhpan processes from non-Postfix code running in the
  same container, instead of terminating with a panic. File:
  master/master_spawn.c.

Approved by:	portmgr (miwi)
2019-02-28 18:47:25 +00:00
Raphael Kubo da Costa
c983063ff3 MFH: r494079
Replace OpenSSL 1.1.0 with upstream ones

The patches from bug 228902 and added in r481850 are not entirely compatible
with older OpenSSL versions, to the point that the qca-ossl plugin refuses to
load at all on FreeBSD 11.2, for example (see bug 232784 and its duplicates).

Fix it by replacing our patches with backports from upstream the same way
OpenSUSE does it (the OpenSSL 1.1.0 upstream patch was authored by SUSE):

* Revert an upstream commit made only to the 2.1 branch disabling a few ciphers
  in the unit tests.
* Backport a change to the master branch that never made it to the 2.1 branch
  disabling the ciphers mentioned above as well as a few other ones, so that we
  can backport the actual change adding support for OpenSSL 1.1.0 more clealy.
* Backport the actual OpenSSL 1.1.0 support commit, with a few conflicts
  resolved due to the lack of a commit adding suport for AES GCM and AES CCM in
  the 2.1 branch. The patch was actually obtained from OpenSUSE's repositories,
  since they had to resolve the same conflict as well.

The port built fine on 11.2-i386, an old 12-CURRENT snapshot on amd64 as well
as 13-CURRENT on amd64, and all unit tests are passing except for some PGP ones
that are unrelated. With the patches we have in the tree, a lot of unit tests
failed on 11.2 due to the qca-ossl plugin failing to load.

PR:		228902
PR:		232784
Reviewed by:	tcberner
Differential Revision:	https://reviews.freebsd.org/D19347

Approved by:	ports-secteam (joneum)
2019-02-28 13:47:39 +00:00
Bernard Spil
1d12f0e120 MFH: r494033
security/openssl: Security update to 1.0.2r

Security:	7700061f-34f7-11e9-b95c-b499baebfeaf

Approved by:	ports-secteam (joneum)
2019-02-28 12:35:31 +00:00
Dimitry Andric
0d42e6b422 MFH: r493979
With libc++ 8.0, which is in the projects/clang800-import branch, and
which will soon be merged to head, compilation of devel/jsoncpp fails
due to a conflict between the new C++ <version> header, and a local file
"version" which is produced by jsoncpp during its configure phase.

This is due to the initial test runner being compiled with "-I.", even
though it does not need any file from the port's working directory root.
Therefore, it seems to be easiest to comment out the line from the
SConstruct script that adds the "-I." option.

Approved by:	portmgr (joneum)
PR:		236061
2019-02-27 21:50:17 +00:00
Kurt Jaeger
39bfc68008 MFH: r494026
www/elinks: Fix ssl initialization on newer openssl/libressl without EGD

PR:		234808
Submitted by:	Derek Schrock <dereks@lifeofadishwasher.com>
Approved by:	beat (maintainer timeout)
Obtained from:	https://repo.or.cz/elinks.git/blobdiff/6eba447e8ae12cacac3b479c7148d189bea3e8ea..f4a58ba3b574a478fd5954ba2c5b29e8b809ff9b:/src/network/ssl/ssl.c
Approved by:	ports-secteam (joneum)
2019-02-27 07:23:49 +00:00
Jan Beich
4d03354096 MFH: r493973
www/firefox: backport another Wayland+WebRender fix

Obtained from:	      upstream (Firefox 67)
Approved by:	ports-secteam blanket
2019-02-26 17:06:05 +00:00
Lars Engels
8e1ecf9645 MFH: r493968
net-mgmt/icinga2:

- Update to Bugfix release 2.10.3
- Make Icinga user, group and webgroup configurable in rc.conf [1]

Submitted by:	Alexey Kuznetsov <alexey@kouznetsov.com> (via mail)

Approved by:	ports-secteam (joneum)
2019-02-26 14:58:09 +00:00
Jan Beich
5c0d55122e MFH: r493926
mail/thunderbird: update to 60.5.2

Changes:	https://www.thunderbird.net/thunderbird/60.5.2/releasenotes/
Approved by:	ports-secteam blanket
2019-02-26 00:52:49 +00:00