Commit Graph

434657 Commits

Author SHA1 Message Date
Jan Beich
37b4ca273c multimedia/libvpx: backport vpx_image fix (direct commit)
Reported by:	Debian
Obtained from:	upstream (libvpx 1.7.0)
Approved by:	ports-secteam blanket
2018-03-08 18:34:26 +00:00
Jan Beich
27a9c500e0 MFH: r463646 r463677 r463844
emulators/citra: update to s20180307

Changes:	7c1a2235...3cda637c
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-03-08 00:24:35 +00:00
Jan Beich
17e1f13c63 MFH: r463843
emulators/rpcs3: update to 0.0.5.38

Changes:	91d051115...7233640cf
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-03-08 00:22:21 +00:00
Jan Beich
5da5d5ef1e multimedia/libvpx: backport VP9 fix (direct commit)
Obtained from:	upstream (libvpx 1.7.0, via Firefox 59)
Approved by:	ports-secteam blanket
2018-03-08 00:20:21 +00:00
Tobias Kortkamp
14ba0b7874 MFH: r463720
sysutils/testdisk: Fix build with PROGREISERFS=on

Fix LIB_DEPENDS: libreiserfs-0.3.so does not exist

PR:		195339
Submitted by:	crest@sahiro.org
Approved by:	flz (maintainer)

Approved by:	ports-secteam blanket
2018-03-06 12:33:51 +00:00
Jan Beich
08f1e41014 MFH: r463679
emulators/rpcs3: update to 0.0.5.36

Changes:	ec0cd9f00...91d051115
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-03-06 01:02:52 +00:00
Jan Beich
dbf01cdec3 MFH: r463465 r463677
emulators/citra: update to s20180302

Changes:	ac626eda...7c1a2235
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-03-06 01:02:04 +00:00
Jan Beich
5cf854db5f MFH: r463613 r463676
www/waterfox: update to 56.0.4.36

- Apply some FF59 fixes

Changes:	e03e284b08...79492ecca4
Approved by:	ports-secteam blanket
2018-03-06 01:01:05 +00:00
Renato Botelho
2479db01ab MFH: r463323
- Update security/strongswan to 5.6.2 [1]
- Enable CURL option by default [2]

PR:		226043 [1], 220488 [2]
Submitted by:	strongswan@Nanoteq.com (maintainer) [1]
		karl@denninger.net [2]
Approved by:	maintainer [2]
Security:	CVE-2018-6459
Sponsored by:	Rubicon Communications, LLC (Netgate)
Approved by:	ports-secteam (riggs)
2018-03-05 11:39:16 +00:00
Jan Beich
64f490cc89 MFH: r463637
www/waterfox: drop bindgen workaround

Approved by:	ports-secteam blanket
2018-03-05 10:32:32 +00:00
Torsten Zuehlsdorff
8f118e0159 MFH: r463395
lang/php72: Update from 7.2.2 to 7.2.3

Changelog: http://www.php.net/ChangeLog-7.php#7.2.3

Approved by: ports-secteam (riggs)
2018-03-04 12:50:51 +00:00
Jason E. Hale
1e5f4f5c22 MFH: r463547
- Fix build with aarch64, armv6, armv7
- Fix QT4 option on all platforms (needs USES=gmake, and fix for moc location)
- Remove some substitutions that didn't do anything
- Don't try to create directories already in mtree

Approved by:	ports-secteam (blanket)
2018-03-04 03:21:12 +00:00
Jason E. Hale
fae07e6fdb MFH: r463363
Add several security fixes addressing:
- CVE-2017-6892
- CVE-2017-8361
- CVE-2017-8362
- CVE-2017-8363
- CVE-2017-8365
- CVE-2017-12562
- CVE-2017-14634

Note:
- Fix for CVE-2017-8365 is included in files/patch-CVE-2017-8361

While here:
- Fix LICENSE and add LICENSE_FILE

PR:		226271
Submitted by:	jhale
Reviewed by:	koobs, eadler, jbeich
Approved by:	ports-secteam (eadler)
Obtained from:	upstream (https://github.com/erikd/libsndfile)
Security:	004debf9-1d16-11e8-b6aa-4ccc6adda413
Security:	2b386075-1d9c-11e8-b6aa-4ccc6adda413
Differential Revision:	https://reviews.freebsd.org/D14552

Approved by:	ports-secteam (riggs)
2018-03-04 02:34:49 +00:00
Bryan Drewery
a2b0ee437b MFH: r463542
Add missing requirement on LOGIN for rc script.

PR:		225857
Submitted by:	will@worrbase.com
Differential Revision:	https://reviews.freebsd.org/D14575

Approved by:	portmgr (implicit)
2018-03-03 23:34:04 +00:00
Jan Beich
30d30caa10 MFH: r463540
security/clamfs: unbreak with boost 1.65

PR:		220725
Submitted by:	Walter Schwarzenfeld <w.schwarzenfeld@utanet.at>
Approved by:	maintainer timeout (7 months)
Approved by:	ports-secteam blanket
2018-03-03 23:13:26 +00:00
Jan Beich
eda02ba62f MFH: r463537
games/spring: unbreak with boost 1.65

PR:		220762
Submitted by:	Walter Schwarzenfeld <w.schwarzenfeld@utanet.at>
Approved by:	maintainer timeout (3 months)
Approved by:	ports-secteam blanket
2018-03-03 22:42:24 +00:00
Cy Schubert
e9cff82c39 MFH: r463211
Flag FORBIDDEN instead of IGNORE due to possbile security issues.

Reported by:	mat
Approved by:	portmgr (riggs)
2018-03-03 20:06:50 +00:00
Cy Schubert
a55f251efb MFH: r463183
It appears as if the development branch of ntp is dead as no new
development tarballs have been relesed for ~ 17 months now. This is a
security concern.

Approved by:	portmgr (riggs)
2018-03-03 20:05:52 +00:00
Jan Beich
8d38ac1f25 MFH: r462941
gecko: convert to CONFIGURE_OUTSOURCE

client.mk is on its way out upstream, switching to it was a mistake.

$ MACH=1 gmake -f client.mk build
client.mk:40: /.mozconfig-client-mk: No such file or directory
gmake: *** No rule to make target '/.mozconfig-client-mk'.  Stop.

Approved by:	ports-secteam (riggs)
2018-03-03 20:04:09 +00:00
Thomas Zander
cc589ff95c MFH: r463487
Fix build on 11 and later with c++ compilers by default in c++11 mode

PR:		226213
Submitted by:	portmaster@bsdforge.com (maintainer)

Approved by:	ports-secteam (build fix blanket)
2018-03-03 15:39:06 +00:00
Jan Beich
077fdfe44a MFH: r463456
emulators/rpcs3: update to 0.0.5.34

Changes:	8d7620d95...ec0cd9f00
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-03-03 00:55:57 +00:00
Jan Beich
782fdc820b MFH: r463455
www/waterfox: apply some FF59 fixes

Approved by:	ports-secteam blanket
2018-03-03 00:55:06 +00:00
Larry Rosenman
492246435e MFH: r463407
security/clamav: upgrade to 0.99.4
Release notes: http://blog.clamav.net/2018/03/clamav-0994-has-been-released.html

Submitted by:	mmokhi
Security:	CVE-2012-6706
Security:	CVE-2017-6419
Security:	CVE-2017-11423
Security:	CVE-2018-1000085
Security:	CVE-2018-0202
Differential Revision:	https://reviews.freebsd.org/D14562

Approved by:	ports-secteam (zi)
2018-03-02 23:31:38 +00:00
Craig Leres
8c0351ee72 MFH: r461322
Update to 1.28 which fixes a buffer overflow (that will be)
documented in CVE-2017-17663.

Reviewed by:	matthew	(mentor)
Approved by:	matthew	(mentor)
Security:	f5524753-67b1-4c88-8114-29c2d258b383
Differential Revision:	https://reviews.freebsd.org/D14218

Approved by:	ports-secteam (feld)
2018-03-02 21:39:40 +00:00
Palle Girgensohn
401b2f1466 MFH: r458860 r463146
Update to version 1.6.3

Shibboleth SP software vulnerable to forged user attribute data
====================================================================
The Service Provider software relies on a generic XML parser to process
SAML responses and there are limitations in older versions of the parser
that make it impossible to fully disable Document Type Definition (DTD)
processing.

Through addition/manipulation of a DTD, it's possible to make changes
to an XML document that do not break a digital signature but are
mishandled by the SP and its libraries. These manipulations can alter
the user data passed through to applications behind the SP and result
in impersonation attacks and exposure of protected information.

While the use of XML Encryption can serve as a mitigation for this bug,
it may still be possible to construct attacks in such cases, and the SP
does not provide a means to enforce its use.

An updated version of XMLTooling-C (V1.6.3) is available that works
around this specific bug.

While newer versions of the parser are configured by the SP into
disallowing the use of a DTD via an environment variable, this feature
is not present in the parser used on some supported platforms (notably
Red Hat and CentOS 7), so an additional fix is being provided now that
an actual DTD exploit has been identified.

Security:	CVE-2018-0486

Shibboleth SP software vulnerable to additional data forgery flaws

The XML processing performed by the Service Provider software has been
found to be vulnerable to new flaws similar in nature to the one
addressed in an advisory last month.

Security:	22438240-1bd0-11e8-a2ec-6cc21735f730
URL:		https://shibboleth.net/community/advisories/secadv_20180227.txt

Approved by:	ports-secteam
2018-03-02 14:34:52 +00:00
Craig Leres
78e4ece060 MFH: r461924 r462351 r462460
Use USE_GITHUB instead of hand crafting urls.

Sponsored by:	Absolight

Add a NETMAP option to build and install the bro netmap plugin.

PR: 224918
Reported by: Shane Peters
Reviewed by: matthew (mentor)
Approved by: matthew (mentor)
Differential Revision: https://reviews.freebsd.org/D14378

Update to 2.5.3 which fixes an integer overflow:

    http://blog.bro.org/2018/02/bro-253-released-security-update.html

Note that a CVE has not been assigned yet.

Reviewed by:	matthew (mentor)
Approved by:	matthew (mentor)
Differential Revision:	https://reviews.freebsd.org/D14444

Approved by:	ports-secteam (swills)
2018-03-02 00:38:45 +00:00
Palle Girgensohn
3b76b8eb62 MFH: r463327
2018-03-01 Security Update Release

The PostgreSQL Global Development Group has released an update to all supported
versions of the PostgreSQL database system, including 10.3, 9.6.8, 9.5.12,
9.4.17, and 9.3.22.

The purpose of this release is to address CVE-2018-1058, which describes how a
user can create like-named objects in different schemas that can change the
behavior of other users' queries and cause unexpected or malicious behavior,
also known as a "trojan-horse" attack. Most of this release centers around added
documentation that describes the issue and how to take steps to mitigate the
impact on PostgreSQL databases.

We strongly encourage all of our users to please visit
https://wiki.postgresql.org/wiki/A_Guide_to_CVE-2018-1058:_Protect_Your_Search_Path
for a detailed explanation of CVE-2018-1058 and how to protect your PostgreSQL
installations.

After evaluating the documentation for CVE-2018-1058, a database administrator
may need to take follow up steps on their PostgreSQL installations to ensure
they are protected from exploitation.

Security:	CVE-2018-1058

Approved by:	portmgr
2018-03-01 16:01:45 +00:00
Larry Rosenman
d0e523d688 MFH: r463271
Update dovecot to 2.2.34, and bump pigeonhole.

 * CVE-2017-15130: TLS SNI config lookups may lead to excessive
   memory usage, causing imap-login/pop3-login VSZ limit to be reached
   and the process restarted. This happens only if Dovecot config has
   local_name { } or local { } configuration blocks and attacker uses
   randomly generated SNI servernames.
 * CVE-2017-14461: Parsing invalid email addresses may cause a crash or
   leak memory contents to attacker. For example, these memory contents
   might contain parts of an email from another user if the same imap
   process is reused for multiple users. First discovered by Aleksandar
   Nikolic of Cisco Talos. Independently also discovered by "flxflndy"
   via HackerOne.
 * CVE-2017-15132: Aborted SASL authentication leaks memory in login
   process.
 * Linux: Core dumping is no longer enabled by default via
   PR_SET_DUMPABLE, because this may allow attackers to bypass
   chroot/group restrictions. Found by cPanel Security Team. Nowadays
   core dumps can be safely enabled by using "sysctl -w
   fs.suid_dumpable=2". If the old behaviour is wanted, it can still be
   enabled by setting:
   import_environment=$import_environment PR_SET_DUMPABLE=1
 * doveconf output now includes the hostname.

 + mail_attachment_detection_options setting controls when
   $HasAttachment and $HasNoAttachment keywords are set for mails.
 + imap: Support fetching body snippets using FETCH (SNIPPET) or
   (SNIPPET (LAZY=FUZZY))
 + fs-compress: Automatically detect whether input is compressed or not.
   Prefix the compression algorithm with "maybe-" to enable the
   detection, for example: "compress:maybe-gz:6:..."
 + Added settings to change dovecot.index* files' optimization behavior.
   See https://wiki2.dovecot.org/IndexFiles#Settings
 + Auth cache can now utilize auth workers to do password hash
   verification by setting auth_cache_verify_password_with_worker=yes.
 + Added charset_alias plugin. See
   https://wiki2.dovecot.org/Plugins/CharsetAlias
 + imap_logout_format and pop3_logout_format settings now support all of
   the generic variables (e.g. %{rip}, %{session}, etc.)
 + Added auth_policy_check_before_auth, auth_policy_check_after_auth
   and auth_policy_report_after_auth settings.
 - v2.2.33: doveadm-server: Various fixes related to log handling.
 - v2.2.33: doveadm failed when trying to access UNIX socket that didn't
   require authentication.
 - v2.2.33: doveadm log reopen stopped working
 - v2.2.30+: IMAP stopped advertising SPECIAL-USE capability
 - v2.2.30+: IMAP stopped sending untagged OK/NO storage notifications
 - replication: dsync sends unnecessary replication notification for
   changes it does internally. NOTE: Folder creates, renames, deletes
   and subscribes still trigger unnecessary replication notifications,
   but these should be rather rare.
 - mail_always/never_cache_fields setting changes weren't applied for
   existing dovecot.index.cache files.
 - Fix compiling and other problems with OpenSSL v1.1
 - auth policy: With master user logins, lookup using login username.
 - FTS reindexed all mails unnecessarily after loss of
   dovecot.index.cache file
 - mdbox rebuild repeatedly fails with "missing map extension"
 - SSL connections may have been hanging with imapc or doveadm client.
 - cassandra: Using protocol v3 (Cassandra v2.1) caused memory leaks and
   also timestamps weren't set to queries.
 - fs-crypt silently ignored public/private keys specified in
   configuration (mail_crypt_global_public/private_key) and just
   emitted plaintext output.
 - lock_method=dotlock caused crashes
 - imapc: Reconnection may cause crashes and other errors

Security:	CVE-2017-14461
Security:	CVE-2017-15130
Security:	CVE-2017-15132

Approved by:	ports-secteam (delphij), adamw
2018-03-01 14:24:34 +00:00
Ben Woods
dbae1eda39 MFH: r463298
math/ogdf: unbreak build with Clang 6 (C++14 by default)

The bundled version of CoinMP required the same patches as those applied
to the port math/coinmp, so the patches were copied from there.

Submitted by:	jbeich (via commit r458136)
Reported by:	antoine (via bug 224669)

Approved by:	ports-secteam blanket
2018-03-01 12:13:05 +00:00
Jan Beich
0e1219b8fa MFH: r463268
emulators/rpcs3: update to 0.0.5.24

Changes:	b61a69c87...8d7620d95
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-02-28 22:25:01 +00:00
Jan Beich
9b8a3f4411 MFH: r463267
emulators/citra: update to s20180228

Changes:	e51a642a...ac626eda
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-02-28 22:23:15 +00:00
Xin LI
27153140c0 MFH: r460670, r463181
Fix RIPENCC TRIMBLE driver compile error.

Security update 4.2.8p10 --> 4.2.8p11.

Approved by:	ports-secteam
2018-02-28 06:55:22 +00:00
Jan Beich
87c357fc7f MFH: r463051
multimedia/ffmpeg: update to 3.4.2

Changes:	https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/n3.4.2:/Changelog
ABI:		https://abi-laboratory.pro/tracker/timeline/ffmpeg/
Approved by:	ports-secteam (riggs)
2018-02-28 00:47:03 +00:00
Jochen Neumeister
b223fc680f MFH: r462992
www/drupal7: Update to 7.57

Changelog: https://www.drupal.org/SA-CORE-2018-001

CVE-2017-6926
CVE-2017-6927
CVE-2017-6928
CVE-2017-6929
CVE-2017-6930
CVE-2017-6931
CVE-2017-6932

Security:	57580fcc-1a61-11e8-97e0-00e04c1ea73d

Approved by:	ports-secteam (riggs)
2018-02-27 21:13:29 +00:00
Jan Beich
15fcd96801 MFH: r463103
games/openbor: update to 4615

Changes:	d73408f...11cd2c0
Approved by:	ports-secteam (feld, implicit for snapshots)
2018-02-27 00:27:30 +00:00
Jan Beich
bf0b73583e MFH: r463099
emulators/rpcs3: update to 0.0.5.4

Changes:	ede76033a...b61a69c87
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-02-26 23:18:50 +00:00
Jan Beich
518a09f5d5 MFH: r463037
www/waterfox: apply FF57 widget/ fixes

Approved by:	ports-secteam blanket
2018-02-26 18:57:17 +00:00
Palle Girgensohn
de00c35609 MFH: r458764 r460386 r461251 r461263
Convert to USES=autoreconf.

Fix ICU depend for postgresql10-server.

PR:		225049
Submitted by:	mat
Approved by:	maintainer timeout
Sponsored by:	Absolight

Update to latest versions of PostgreSQL

2018-02-08 Security Update Release
==================================

The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21.
This release fixes two security issues. This release also fixes issues with
VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as
well as fixes for using parallel queries and logical replication.

All users using the affected versions of PostgreSQL should update as soon as
possible. Please see the notes on "Updating" below for any post-update steps
that may be required.

Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a
minor update.

Security Issues
---------------

Two security vulnerabilities have been fixed by this release:

* CVE-2018-1052: Fix the processing of partition keys containing multiple
expressions
* CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are
non-world-readable

Local fixes to the FreeBSD ports
--------------------------------

Inform users about data checksums [1].
Make sure /usr/bin/su is used regardless of PATH settings [2].
Enable DTRACE by default [3].

PR:		214671 [1], 223157 [2], 215028 [3]
Security:	c602c791-0cf4-11e8-a2ec-6cc21735f730

Remove DTRACE from OPTIONS_DEFAULT, causes segmentation fault during build

Approved by:	portmgr
2018-02-26 10:00:34 +00:00
Steve Wills
719d7eaafb MFH: r460675
Unbreak the build against Clang 6.0.0 and respect CXXFLAGS.

PR:	225555

Approved by:	ports-secteam (implicit)
2018-02-26 05:19:32 +00:00
Thomas Zander
8556357bc3 MFH: r462969
Update to upstream version 0.20.18

Details from changelog, FreeBSD relevant bits:
- input
  - curl: allow authentication methods other than "Basic"
- decoder
  - flac: improve seeking precision
- fix gapless CUE song transitions

Approved by:	ports-secteam (riggs)
2018-02-25 17:44:18 +00:00
Danilo G. Baio
779f9c3577 MFH: r462146 r462744
Use BROKEN_SSL

Approved by:	portmgr (blanket)

www/squid: Fixes security vulnerabilities

Add patches to fix CVE's:
  CVE-2018-1000024
  CVE-2018-1000027

PR:		226139
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Approved by:	timp87@gmail.com (maintainer)
Security:	d5b6d151-1887-11e8-94f7-9c5c8e75236a

Approved by:	ports-secteam (riggs)
2018-02-25 13:18:31 +00:00
Ben Woods
dc69365f2f MFH: r462766
sysutils/py-salt: Update to 2017.7.3

This is a bug fix release for the 2017.7.x branch. Changes this release:
  https://docs.saltstack.com/en/latest/topics/releases/2017.7.3.html

PR:		225983
Submitted by:	ohauer
Approved by:	Christer Edwards (maintainer)

Approved by:	ports-secteam (riggs)
2018-02-25 08:53:21 +00:00
Bryan Drewery
d1909d181a MFH: r462894
WITH_CCACHE_BUILD: Fix some ports not using proper CCACHE_DIR.

Some ports will truncate CCACHE_DIR from the env and due to HOME=${WRKDIR}
will incorrectly use ${WRKDIR}/.ccache.  Symlink to the proper place.

Approved by:	portmgr (implicit)
2018-02-25 03:32:41 +00:00
Bernard Spil
6024b8e462 MFH: r462802
databases/mariadb100-server: Fix build with OQGRAPH disabled

 - The cmake knob works OK

Approved by:	ports-secteam (fixit blanket)
2018-02-24 13:13:50 +00:00
Thomas Zander
05cd7b2d04 MFH: r462776
Fix ssh injection vulnerability from CVE-2017-12836

Details:
- Adopt patch from debian, documented in
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871810#10

PR:		226088
Submitted by:	fk@fabiankeil.de
Security:	CVE-2017-12836

Approved by:	ports-secteam (riggs)
2018-02-24 08:57:20 +00:00
Jan Beich
baf1d74ea7 MFH: r462758
emulators/citra: update to s20180222

Changes:	20f6cb1a...e51a642a
Approved by:	ports-secteam (swills, implicit for snapshots)
2018-02-24 00:53:37 +00:00
Jan Beich
14dbcf93bc MFH: r462757
emulators/rpcs3: update to 0.0.4.382

Changes:	cf1c45dfe...ede76033a
Approved by:	ports-secteam (junovitch, implicit for snapshots)
2018-02-24 00:52:21 +00:00
Jan Beich
536d760d7a MFH: r462756
www/waterfox: apply some FF59 fixes

Approved by:	ports-secteam blanket
2018-02-24 00:51:34 +00:00
Danilo G. Baio
15c26371df MFH: r462698
www/squid-devel: Update to 4.0.23, Fixes security vulnerabilities

- Add a patch from upstream that fixes a problem when building on i386 arch

  Kid.cc:93:42: error: format specifies type 'long' but the argument has type
  'time_t' (aka 'int') [-Werror,-Wformat]
                 theName.termedBuf(), pid, Config.hopelessKidRevivalDelay);
                                         ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  1 error generated.

- Remove CXXFLAGS with clang, not necessary anymore

PR:		225447
Submitted by:	timp87@gmail.com (maintainer)
Security:	d5b6d151-1887-11e8-94f7-9c5c8e75236a

Approved by:	ports-secteam (swills)
2018-02-23 19:51:27 +00:00
Steve Wills
201a337f34 MFH: r459217 r459219 r459385
Update to 5.2.6.

Update to 5.2.6.

Fix emulators/virtualbox-ose-additions build with Clang 6.0.

Approved by:	ports-secteam (implicit)
2018-02-23 19:48:33 +00:00