117 Commits

Author SHA1 Message Date
sthen
c15b136e13 sync WANTLIB (and in one case, add gettext to LIB_DEPENDS) in dependent ports
now that internationalised domain name support has been removed from net/curl
2016-11-04 11:35:18 +00:00
sthen
15683ebe8b move clamav to using pcre2 2016-11-03 21:10:57 +00:00
ajacoutot
2364f58320 Prevent picking up pcre2 (for now).
ok sthen@ (maintainer)
2016-11-01 12:01:10 +00:00
sthen
e6cd1eae4f disable JIT which requires a W|X mapping 2016-05-22 21:03:33 +00:00
sthen
42ba100272 update to clamav-0.99.2
still using the bundled llvm, the one in devel/llvm is too new
2016-05-04 07:12:55 +00:00
sthen
fd870f2264 Clean up some bits missed in yesterday's systrace removal. 2016-04-26 10:56:59 +00:00
naddy
c253f424ca garbage collect CONFIGURE_SHARED 2016-03-11 19:59:11 +00:00
sthen
3084ac5727 update to clamav-0.99.1 2016-03-03 02:09:09 +00:00
tobiasu
1531435f78 add sparc to the --disable-llvm group 2016-02-20 15:23:43 +00:00
sthen
4a61bb7b1e uncomment the "User _clamav" line in sample config.
clamd won't run without editing this file anyway, but in case somebody
doesn't notice this line while reviewing the file, use a better default.
2016-02-09 02:31:23 +00:00
jasper
9e2f89b552 - use ${MACHINE_ARCH} instead of ${ARCH} for consistency across the tree
- unbreak build on mips64 by adding it to the list of arches where llvm is disabled

ok sthen@ (MAINTAINER)
2016-01-25 20:20:53 +00:00
sthen
44ed2020ab update to clamav-0.99 2015-12-01 23:25:09 +00:00
sthen
3b17209faa Remove clamav run deps on lha, arc and unzip. I don't see anywhere where they
can possibly be used (there is an internal lib for unzip) and in the event
I missed a call to use them, users can make their own decision if they
want to have unmaintained decompression tools on their system.
2015-11-20 16:50:06 +00:00
sthen
981d86d970 sync WANTLIB (curl+nghttp2) 2015-10-30 12:59:16 +00:00
sthen
836f85356a Disable LLVM in clamd on sparc64, the bundled one requires additional
patching to work there, and ports/devel/llvm is unsuitable (halfway between
versions and files moved). Reported/tested by Markus Lude, thank you -
some other arch may also need this.
2015-05-05 15:03:21 +00:00
sthen
f373199b36 Update to ClamAV 0.98.7, including several crash/infinite loop fixes (CVEs)
and various improvements.

http://lists.clamav.net/pipermail/clamav-announce/2015/000011.html
2015-04-29 21:27:39 +00:00
sthen
e9ea937b3e SECURITY update to clamav 0.98.6, tested by myself and ajacoutot on various
arches, ok ajacoutot

http://blog.clamav.net/2015/01/clamav-0986-has-been-released.html
2015-01-28 15:13:51 +00:00
sthen
9661f0eb5d ensure -current version > -stable version 2014-11-19 11:40:53 +00:00
sthen
167593e9ae SECURITY update to clamav 0.98.5 (crash fixes for various maliciously crafted
files, improved detection of malicious PE files, new file formats)
2014-11-19 00:18:01 +00:00
ajacoutot
4098a830f9 Cope with recent sendmail subpackaging.
Fix ports that were not able to find the milter includes (since it's not
under /usr/includes anymore).
2014-09-17 09:13:12 +00:00
jca
7bb00aaf69 Cope with sendmail (and libmilter) moving to ports.
Input from sthen@, ok ajacoutot@ sthen@
2014-09-17 07:52:42 +00:00
sthen
b1b06532b4 call cl_initialize_crypto() from cl_init(), to unbreak HAVP following update
to clamav 0.98.4

https://bugzilla.clamav.net/show_bug.cgi?id=11037
2014-06-26 15:36:11 +00:00
sthen
b5aa8b37a3 update to clamav 0.98.4, fixes infinite loop in clamdscan when clamd
is not running (the fix for buffer underruns with multipart MIME was
already patched locally)
2014-06-17 09:12:45 +00:00
sthen
4b661d1892 update comment; second part committed upstream 2014-05-12 18:04:30 +00:00
sthen
56b9a0d550 crash fix in mime boundary processing 2014-05-12 17:26:01 +00:00
sthen
396ffc610d update to clamav 0.98.3 (there appears to have been no 0.98.2) - license is
updated to GPLv2 + openssl exemptions.

notably: "Change to circumvent possible denial of service when processing
icons within specially crafted PE files. Icon limits are now in place with
corresponding clamd and clamscan configuration parameters."

also:
- support for common raw disk image formats
- experimental support of OpenIOC files in the signature database location
  ("No OpenIOC files will be delivered through freshclam")
- IPv6 now supported on all network sockets
- use OpenSSL file hash functions
- improved detection of malware scripts within image files
- pattern matcher improvements
- opt-in collection of statistics (--enable-stats / StatsEnabled) - NOT default
- various other fixes and improvements

libclamav major bump.
2014-05-08 08:18:51 +00:00
jasper
2198b4cff5 - update to clamav-0.98.1
ok sthen@ (MAINTAINER)
2014-01-15 13:06:47 +00:00
sthen
c193492c7c ClamAV 0.98 moved from libtommath to tomfastmath; however word-length detection
is broken on !amd64 64-bit arch which invalidates assumptions in the code.
Workaround by taking a diff from clamav upstream. This fixes a problem reported
by Markus Lude where freshclam signature checks fail - researched by him and
port diff from him (I just added a bit of commentary to the patch file).
2013-10-22 08:56:34 +00:00
sthen
84de7e7adb - fix gnuism in unit_tests/Makefile
- allow running tests twice (don't fail if can't create symlink to python)

no pkg change
2013-09-29 22:38:29 +00:00
sthen
ad82cdda3c update to clamav 0.98:
- signature improvements, performance improvements, support for new file
types including ISO9660, Flash, self-extracting 7z files

- more configurable limits

- callbacks added to API

while there, drop run dependency on zoo; clamav actually switched from zoo
to unzoo (which we don't have in ports) in 0.60(!) so this was doing nothing.
2013-09-20 15:22:58 +00:00
sthen
eba9963a9a don't USE_GROFF, and bump. 2013-05-08 20:25:17 +00:00
sthen
cc1714daad SECURITY update to ClamAV 0.97.8
"ClamAV 0.97.8 addresses several reported potential security bugs.
Thanks to Felix Groebert of the Google Security Team for finding and
reporting these issues."

- fixes in PE and autoit decoding
- off by one malloc in SIS format handler
- minor changes to freshclam
- add error checking in md5 (memcpy etc.)
2013-04-23 20:34:16 +00:00
ajacoutot
58f1a6f9f6 USE_LIBTOOL=Yes is the default now. 2013-03-21 08:45:11 +00:00
sthen
a79d743a9d SECURITY update to ClamAV 0.97.7
"addresses several reported potential security bugs." (full details not
available yet, but there are some added checks for pointer out of bounds
in WWPack decompression).
2013-03-15 15:10:06 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
sthen
1aa55f717f update to clamav 0.97.6, minor bug fixes and detection improvements 2012-09-17 21:13:44 +00:00
espie
6fdca43594 fix non-sensible libtool parameters, allows us to drop some very weird
libtool code.
2012-08-04 14:24:23 +00:00
giovanni
e6cdd4e74c Use devel/llvm instead of the bundled one on $LLVM_ARCHS
help & ok sthen@ (Maintainer)
2012-07-08 21:24:58 +00:00
sthen
cc7f90c406 SECURITY update to clamav 0.97.5
ClamAV 0.97.5 addresses possible evasion cases in some archive formats
(CVE-2012-1457, CVE-2012-1458, CVE-2012-1459).  It also addresses stability
issues in portions of the bytecode engine.  This release is recommended for all
users.
2012-06-16 10:34:54 +00:00
sthen
418282d256 update to ClamAV 0.97.4, minor bugfixes and detection improvements
- merge PFRAG.shared into PLIST, this is SHARED_ONLY
2012-03-15 22:04:44 +00:00
ajacoutot
b941f6d166 /usr/local -> ${TRUEPREFIX} 2012-01-21 23:13:59 +00:00
sthen
a58fb78b01 Add an rc.d script for clamav-milter, from Benny 2012-01-21 23:02:57 +00:00
sthen
91faa22c52 Where a program with an rc script _requires_ a certain command line
parameter to daemonize, move the parameter from daemon to daemon_flags,
so that the user cannot inadvertently prevent it from daemonizing by
adjusting the flags.

Discussed with ajacoutot and schwarze, this method was suggested
by schwarze@ as a simpler alternative to my diff. ok aja@
2011-12-17 22:01:12 +00:00
jasper
db3e86623f - add missing build dependency
- zap trailing whitespace

ok sthen@ (MAINTAINER)
2011-12-07 09:29:02 +00:00
sthen
1e6bea521f update to clamav 0.97.3.
in typical clamav tradition, release notes say "ClamAV 0.97.3 is a
minor bugfix release and is recommended for all users", secunia says:

   A vulnerability has been reported in ClamAV, which can be exploited by
   malicious people to cause a DoS (Denial of Service) and potentially
   compromise a vulnerable system.
   The vulnerability is caused due to errors related to the handling of
   recursion levels within the "cli_bcapi_extract_new()"
   (libclamav/bytecode_api.c) and "cli_bytecode_runhook()"
   (libclamav/bytecode.c) functions, which can be exploited to e.g. cause
   a crash via specially crafted files.
2011-10-18 18:48:39 +00:00
sthen
02d1ade3c5 update to clamav 0.97.2; fixes problems with the bytecode engine, Safebrowsing
detection, hash matcher, and other minor issues. ok giovanni@ pea@
2011-07-26 14:23:45 +00:00
sthen
5be2d3139d bugfix update to clamav 0.97.1 2011-06-10 22:20:20 +00:00
kili
27f99a5541 --disable-silent-rules is now added to CONFIGURE_ARGS per default,
if CONFIGURE_STYLE = gnu.
2011-06-02 17:09:31 +00:00
ajacoutot
2d702b0153 Sanitize some @unexec/@extraunexec calls to rm: move them up in the
PLIST and delete everything under the @sample'd directory instead of the
directory itself to prevent a warning from pkg_delete(1) trying to
remove a non existing directory and to help preventing left-over files
and directories.
2011-05-11 08:24:40 +00:00
sthen
a701885c9b update to 0.97 2011-03-02 14:36:49 +00:00