Commit Graph

20872 Commits

Author SHA1 Message Date
Matthias Andree
68b40e0f60 Add an experimental patch for bug #195004.
Needs to be enabled through a port option.

PR: 195004
2015-03-30 18:37:23 +00:00
Brendan Fabeny
5f2711b5ce update to 0.2.6.6 [1]; add another hint to the pkg-message [2]; use @sample [3];
add CPE information [4]; update the rc-script [5]

PR:		198710 [1], 199003 [1], 195828 [2], 198164 [3], 197493 [4], 197998 [5]
2015-03-30 11:58:44 +00:00
Alexey Dokuchaev
f403896561 Replace methods and types that were marked deprecated by OpenSSL 0.9.7
and will be removed in OpenSSL 1.1.0.

PR:		198348, 198352
Submitted by:	Bernard Spil
2015-03-30 03:04:24 +00:00
Steve Wills
fed7471248 Update ruby-gems to 2.4.5
Note this is a big upgrade and the way gemspecs are generated changed. As a
result, all patched gemspecs had to have new patches.
2015-03-30 02:47:07 +00:00
Baptiste Daroussin
6abe93e3cc Convert to USES=autoreconf 2015-03-29 15:54:17 +00:00
Roman Bogorodskiy
623b4f4cf7 Add CPE information.
PR:		198833
Submitted by:	shun <shun.fbsd.pr@dropcut.net>
2015-03-29 08:46:13 +00:00
Kurt Jaeger
49224a9b1e security/maia: 1.0.3 -> 1.0.4
TODO: find a suitable changelog

PR:		198042
Submitted by:	ek@purplehat.org (maintainer)
2015-03-29 08:41:53 +00:00
Bryan Drewery
6014ebaef2 Make the VersionAddendum fix use the proper default.
Once I ran into the X509 issue previously I failed to retest that the patch
worked.

PR:		193127
2015-03-29 04:17:53 +00:00
Sunpoet Po-Chuan Hsieh
348fb1f7e1 - Add LICENSE
Approved by:	portmgr (blanket)
2015-03-28 18:44:47 +00:00
Max Brazhnikov
c524bbba47 Document libzip vulnerability CVE-2015-2331 2015-03-28 16:50:00 +00:00
Baptiste Daroussin
08dfce002e Convert USES=autoreconf
Strip binaries
2015-03-28 15:54:47 +00:00
Sunpoet Po-Chuan Hsieh
fb231e1650 - Add CPE information
PR:		198985
Submitted by:	Carlos Jacobo Puga Medina <cpm@fbsd.es> (maintainer)
2015-03-28 12:42:08 +00:00
Sunpoet Po-Chuan Hsieh
da78bca655 - Update to 0.24
- While I'm here, sort PLIST

Changes:	http://search.cpan.org/dist/Dancer2-Plugin-Auth-Extensible-Provider-Usergroup/Changes
PR:		198827
Submitted by:	Henk van Oers <hvo.pm@xs4all.nl> (maintainer)
2015-03-28 12:17:48 +00:00
Johan van Selst
282721b31c CyaSSL has been renamed WolfSSL upstream
Rename port and update to 3.4.0
http://www.yassl.com/yaSSL/Products-wolfssl.html
2015-03-28 09:15:24 +00:00
Antoine Brodin
99e5a36cae - Hook py-requests-kerberos to the build
- Fix LICENSE
2015-03-27 20:37:42 +00:00
Dan Langille
cc6e678bbb Based on email feedback[1]:
* Remove indefinite article from COMMENT
* Add LICENSE / LICENSE_FILE
* Add missing RUN_DEPENDS on security/py-kerberos
* Match upstream minimum version requirements

[1] -  http://docs.freebsd.org/cgi/mid.cgi?5514CA41.1050404

Approved by: mat (mentor)
2015-03-27 14:47:08 +00:00
Antoine Brodin
3248b91347 Adjust to run better with new versions of openpyxl 2015-03-27 12:26:22 +00:00
Alex Kozlov
9a319c5bd6 - Update to 2015.67 2015-03-27 10:43:50 +00:00
Antoine Brodin
0f1d466e2c Update to 2.1.0.10 2015-03-27 09:42:22 +00:00
Koop Mast
09e627a363 Update the Gnome stack to the latest in the 3.14 series.
Thanks to Gustau Pérez <gustau.perez@gmail.com> for helping to keep thes
   ports updated.

Obtained from:	GNOME dev repo
2015-03-27 09:24:39 +00:00
Li-Wen Hsu
88fda303b9 Document django vulnerability CVE-2015-2316 and CVE-2015-2317 2015-03-27 05:33:34 +00:00
Dan Langille
85e64b3137 Add py-requests-kerberos
An authentication handler for using Kerberos with Python Requests.

Approved by: mat (mentor)
2015-03-26 23:13:13 +00:00
John Marino
057f32cfd2 security/openssl: Remove patch hunk for configuring pthreads
The patching of Configure file for pthreads is unnecessary -- the effect
of -lpthread -D_REENTRANT is the same as -pthread -D_REENTRANT, so just
remove it to make things even more simpler.
2015-03-26 08:38:24 +00:00
Matthias Andree
b559f5897c Add a X509ALTUSERNAME port option to enable the --x509-username-field
run-time option.

Bump PORTREVISION.

PR:		198896
Submitted by:	bastian+freebsd.org@waldi.eu.org
2015-03-25 20:06:20 +00:00
Johannes Jost Meixner
96a2337984 security/linux-*-libtasn1: Add CPE information
- Add CPE information.

PR:		198834
PR:		198835
Differential Revision:	https://reviews.freebsd.org/D2135
DiffRev:	placeholder
Submitted by:	shun.fbsd.pr@dropcut.net
Approved by:	swills (mentor)
2015-03-25 18:52:05 +00:00
Ryan Steinmetz
3b38875bc7 - Update to 5.14 2015-03-25 16:07:20 +00:00
Dan Langille
75914998eb Revert my previous commit. 2015-03-25 13:13:57 +00:00
Dan Langille
684ab97412 Convert non-ASCII quotes to ASCII characters
Approved by: mat (mentor)
2015-03-25 13:03:32 +00:00
John Marino
c55ac89dcd security category: Remove $PTHREAD_LIBS
approved by:	PTHREAD blanket
2015-03-25 08:30:27 +00:00
Jason Helfman
f6fa2f3023 - fixing package name
$ make -C /usr/ports/devel/mingw64-binutils/ -V PKGNAME
x86_64-pc-mingw32-binutils-2.23.2_1
2015-03-24 23:19:59 +00:00
Ryan Steinmetz
d8a73366f4 - Fix vuxml build: bad package names in f6a014cd-d268-11e4-8339-001e679db764
- Fix blockquote style to match rest
2015-03-24 22:15:48 +00:00
Brooks Davis
547621e3e4 The ancient version of binutils in the cross-binutils port suffers for
several vulnerabilities.

This also effects devel/mingw64-binutils.

PR:		198816
Reported by:	Sevan Janiyan <venture37@geeklan.co.uk>
2015-03-24 21:32:04 +00:00
Vanilla I. Shu
5bac1bc6b5 Document nodejs (libuv) CVE-2015-0278.
PR:		198861
Submitted by:	venture37@geeklan.co.uk
2015-03-24 16:11:41 +00:00
Dmitry Marakasov
2e08887eed - Drop @dirrm* from plist 2015-03-24 13:30:58 +00:00
Johannes Jost Meixner
7ca48a06ad security/linux-c6-openssl: update to 1.0.1e_4
- update to 1.0.1e_4

Approved by:	swills (mentor)
Differential Revision:	https://reviews.freebsd.org/D2125
Security:	9d15355b-ce7c-11e4-9db0-d050992ecde8
Security:	CVE-2015-0286
Security:	CVE-2015-0287
Security:	CVE-2015-0289
Security:	CVE-2015-0292
Security:	CVE-2015-0293
MFH:		2015Q1
2015-03-24 12:57:23 +00:00
Johannes Jost Meixner
e706f86581 Document vulnerable linux-c6-openssl versions in vuxml entry from 2015-03-19
Approved by:    swills (mentor)
2015-03-24 12:17:14 +00:00
Max Brazhnikov
1132222977 security/pinentry:
- Update to 0.9.1
- Remove no longer needed patch
2015-03-24 09:48:40 +00:00
Li-Wen Hsu
62b0b60c59 Document Jenkins Security Advisory 2015-03-23 2015-03-24 06:22:27 +00:00
Mark Felder
002a77a68f Restore lost changes to patch-src-parser-attack_scanner.l
PR:		197854
2015-03-24 02:23:30 +00:00
Mark Felder
e5ca81a883 Enable matching of syslog entries with <facility.level>
PR:		197854
2015-03-24 02:11:26 +00:00
Jung-uk Kim
90c78cb9e2 Fix build without SSLv2 and/or SSLv3 support.
PR:		198401
2015-03-24 00:28:49 +00:00
Jung-uk Kim
d36275224f Fix build without SSLv2 support. 2015-03-24 00:24:07 +00:00
Jung-uk Kim
abd4f24481 Fix build without SSLv2 support. 2015-03-23 23:52:26 +00:00
Cy Schubert
24695efe14 Fix build with libressl.
PR:		198749, 198750
2015-03-23 19:04:23 +00:00
Sunpoet Po-Chuan Hsieh
08a84b86f2 - Update to 0.7
- While I'm here, reorder knobs

Changes:	http://search.cpan.org/dist/Crypt-Sodium/Changes
PR:		198825
Submitted by:	Thomas von Dein <freebsd@daemon.de> (maintainer)
2015-03-23 14:28:17 +00:00
Mikhail Teterin
af331e2341 Unbreak arirang -- it needs to use the newer Ruby API, which, at the
time the last release was made, was still known as RUBY_19.

While here, fix an ancient bug reported by clang.
2015-03-23 13:52:35 +00:00
Renato Botelho
19476b3164 Update to 1.8.13 2015-03-23 11:39:48 +00:00
Bryan Drewery
258fa75735 Stop forcing the port version string into the server banner.
The port now uses VersionAddendum in the sshd_config to allow overriding
this value. Using "none" allows disabling the default of the port
version string. The default is kept to show the port version string to
remain close to the base version.

Support for the client VersionAddendum may be added soon as well to better
match base and not give surprises when switching from base to the port.

PR:		193127
Requested by:	many, including myself when this was broken years ago.
2015-03-23 04:23:08 +00:00
Emanuel Haupt
450cc4619f Fix build with LibreSSL
PR:		198754
Submitted by:	spil.oss@gmail.com
2015-03-22 20:52:24 +00:00
Vsevolod Stakhov
bbb87bd1e2 - Update to 2.0
- Remove obsoleted patch (included to the upstream)
- Honor openssl CFLAGS and LDFLAGS to use the proper version
2015-03-22 16:32:26 +00:00