49 Commits

Author SHA1 Message Date
tb
44c311b5ba Revert previous. No longer needed. 2020-01-24 04:53:37 +00:00
tb
bd5f6ac0ee Fix wget with TLSv1.3.
from beck
2020-01-23 00:32:39 +00:00
sthen
08f147ba5f update to wget-1.10.2, from maintainer Nam Nguyen 2019-04-04 10:36:45 +00:00
jca
95fbe58bb5 Fix tests: skip fuzzing tests, no need for a python3 symlink
I still get seemingly random failures when building unit-test.c but
that's still better than what we have now.

ok sthen@, Nam Nguyen (maintainer)
2019-02-22 11:18:48 +00:00
sthen
7e93f0142d update to wget-1.20.1, from Nam Nguyen (taking maintainer).
earlier version ok abieber@
2019-02-21 22:32:31 +00:00
gsoares
abdd7f3b5f Security update for wget, addressing CVE-2018-0494 - cookie injection.
New tests fails as pointed out by bket@ on ports@, but since it includes
important fix so sthen suggested we should go ahead and commit right way, i'm going
to look at it and report upstream afterwards.
OK sthen@
2018-05-07 10:37:59 +00:00
sthen
be815987c9 update to wget-1.19.4, from Björn Ketelaars.
various fixes and extra support, a particularly notable change:

"Switch off compression by default

Gzip compression has a number of bugs which need to be ironed out before
we can support it by default. Some of these stem from a misunderstanding
of the HTTP spec, but a lot of them are also due to many web servers not
being compliant with RFC 7231.

With this commit, I am marking GZip compression support as experimental
in GNU Wget pending further investigation and the addition of tests."
2018-02-05 09:55:57 +00:00
rsadowski
188afbe0d0 Update wget to 1.19.2.
This release includes fixes for CVE-2017-13089 and CVE-2017-13090.

Notable port change:

- Remove devel/gettext as MODULE

Input and ok sthen@
2017-10-31 18:00:32 +00:00
danj
e74e56b1a6 Update to wget-1.19.1
ok/tweaks jca@
2017-02-22 02:49:25 +00:00
danj
7733d962e6 update to wget-1.18
This solves CVE-2016-4971.
This introduces a backward-incompatibility for HTTP->FTP redirects and
any script that relies on the old behaviour must use --trust-server-names.

ok shadchin@ sthen@
2016-06-19 20:42:57 +00:00
danj
18d0ff4e54 update to wget-1.17.1
Please note that the passive to active fallback was removed.
To force active ftp, use --no-passive-ftp.

ok jung@ sthen@ (who noticed that a patch needed to be regen, thx!) jca@
2016-03-27 03:26:11 +00:00
dcoppa
886e80a5c3 Update to wget-1.16.3
feedback and ok jca@
2015-03-19 20:53:43 +00:00
jca
039704d101 Add notes for next release.
uuid and RAND_egd patches committed; the python3 hack will likely stay.
2015-01-04 22:01:22 +00:00
jca
3feb45c008 Update to wget-1.16.1
- remove patches for regress tests and the TLSv1.0 only issue, merged
  upstream
- libuuid use can now be prevented with CONFIGURE_ARGS
- add a CONFIGURE_ENV hack to avoid depending on python3 at build time
  (spotted by dcoppa@)

The Web ARChive code doesn't use uuid functions from libc (yet).

ok dcoppa@
2014-12-10 20:23:28 +00:00
jca
c7a100fc59 Fix an OpenSSL regression in wget-1.16: by default TLSv1.0 *only* is
used, instead of TLSv1+.  Similar fix for the "pfs" setting.
Report and tests by Mikolaj Kucharski, ok sthen@
2014-11-20 10:38:51 +00:00
naddy
271fb3894d update to 1.16 and add dependencies to run all regression tests
hints from ajacoutot@; ok giovanni@, sthen@
2014-11-05 22:11:40 +00:00
jasper
10434cd3c6 Security fix for CVE-2014-4877, Arbitrary Symlink Access 2014-10-27 15:28:39 +00:00
sthen
8ec46f009c handle RAND_egd removal 2014-04-19 12:14:15 +00:00
dcoppa
9038c95aca Update to wget-1.15
Suggestions and "looks fine" jca@
2014-01-29 06:08:42 +00:00
naddy
54315b49c6 remove gcc2 workarounds 2013-08-09 14:40:44 +00:00
dcoppa
673ad7c716 Update to wget-1.14
OK gsoares@
2012-10-20 18:49:48 +00:00
dcoppa
b6701574c1 Fix cvs tags too 2011-10-12 10:18:33 +00:00
dcoppa
80daaa02ce Update to wget-1.13.4.
Tested on i386, amd64 and sparc64.

Note: untested on gcc2 architectures, but it's broken anyway since
gperf fails to build there due to an internal compiler error (as
found by sebastia@ on his vax).

OK sthen@
2011-10-12 10:14:30 +00:00
jasper
b736114294 SECURITY FIX for CVE-2010-2252
By default, on server redirects, use the original URL to get the
local file name.

ok naddy@
additional testing by kevlo@, thanks.
2010-09-13 16:48:11 +00:00
jasper
97ea2c3464 Fix linking order so this works on static arches too.
hint from naddy@, thanks
2010-09-13 11:32:39 +00:00
jasper
b2343b8c5f - fix build with gcc2 2010-09-07 20:54:48 +00:00
benoit
afea3a4b20 - update wget to 1.12
- regen plist
- update patch

ok ajacoutot@
2009-10-15 08:27:04 +00:00
jasper
fcda4f9086 SECURITY FIX for wget
SA36540: SSL Certificate NULL Character Processing Vulnerability

Patch from upstream

ok ajacoutot@
2009-09-16 17:34:41 +00:00
sthen
1048c7b1c1 maintenance update to 1.1.4, a couple of fixes. while there,
adjust to use ${SUBST_CMD}.

ok okan@
2008-10-09 18:50:44 +00:00
bernd
b3d6ed8c86 update to wget-1.10.2
This fixes a NTLM username buffer overflow vulnerability.

ok aanriot@
2005-10-14 22:24:36 +00:00
aanriot
44e028d857 - update to 1.10.
- we don't need debian patch anymore.
- brad gives me maintainership.

inputs and ok brad@
2005-07-25 07:12:58 +00:00
brad
966be80fe8 upgrade to wget 1.8.2
--
From: David Gwynne <loki at niteshade dot net> with a number of changes from me
2003-05-14 15:03:51 +00:00
brad
b88b3952c4 use passive mode FTP by default. 2003-02-06 22:03:21 +00:00
brad
a69012ebd6 Fix directory traversal bug in FTP mode with wget which can potentially
allow files to be written outside the download directory.

http://marc.theaimsgroup.com/?l=bugtraq&m=87602746719482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1344
2002-12-10 18:37:24 +00:00
brad
adf8863b15 sync with update-patches 2002-12-10 18:22:06 +00:00
miod
a108cdca77 - apply libtool patches to please static arches
- fix the gettext() function detection in libintl so that it builds on
  static arches
ok brad@
2002-04-06 22:14:17 +00:00
brad
01b01df1fe upgrade to wget 1.7 2001-10-02 03:15:03 +00:00
brad
c93bc8e4ec upgrade to wget 1.6 2001-01-11 14:45:34 +00:00
brad
0cd32d6ff0 - add KAME 06/24 IPv6 patch
- use better filenames for patches
- remove hard coded /etc in INSTALL/DEINSTALL scripts and use variable
substitution to fill it in.
2000-08-15 05:47:12 +00:00
brad
8e0ae650c6 - move config file from lib/wget to share/examples/wget
- ${FOO} -> FOO in INSTALL/DEINSTALL
2000-08-04 17:39:36 +00:00
espie
d523daae96 Drudge, drudge, drudge: fix texinfo xrefs.
Come on guys, there are some easy commits there...
2000-04-06 23:05:16 +00:00
brad
7aa99fdf05 - remove pre-configure target
- convert patch-aa to a unified diff
- remove workaround for texinfo install-info bug
- move removal of wget.info* into wget's Makefile just before it gets
re-generated
- ${SH} -> sh
1999-12-14 03:59:09 +00:00
marc
49383b9b53 o hide some pre- and post- install commands
o add an INSTALL script to install /etc/wgetrc if necessary
o remove wgetrc install code from Makefile and packing list
o call install script from Makefile
o patch wget doc Makefile so it does NOT install into /etc automagically
o add DEINSTALL script to remind user to get rid of /etc/wgetrc
THIS PORT IS NOW FROZEN FOR 2.5
1999-04-10 02:50:54 +00:00
brad
a9e4b5d3b9 add patch to not split info page 1999-03-29 21:03:00 +00:00
fgsch
77a11d3b0d Update to 1.5.3. Change master site directory. 1999-02-24 04:29:05 +00:00
martin
0c2868bcfb Fixes string indexing error when parsing html/urls.
Author has been notified.
1998-08-04 00:38:52 +00:00
angelos
fa972b4f60 Update to 1.5.2 1998-06-27 23:03:39 +00:00
angelos
55236eb0fc Make it compile under 2.3 1998-04-28 00:51:51 +00:00
angelos
2a9c07fa23 Add wget 1.4.5 port. 1997-12-06 20:44:45 +00:00