9551 Commits

Author SHA1 Message Date
bcallah
e75a04b64e +cgo 2013-08-08 09:59:46 +00:00
bcallah
9b95865a02 Import net/cgo, a terminal-based gopher client.
Tweaks from gsoares@ and jca@
ok gsoares@
2013-08-08 09:59:01 +00:00
brad
edfe35be6c Update to ircd-hybrid 8.1.6.
ok sthen@
2013-08-07 23:41:07 +00:00
naddy
2394f51acd move http://github.com and http://bitbucket.org to https
suggested by bentley@
2013-08-07 21:57:40 +00:00
naddy
c2832a1290 move http://code.google.com, *.googlecode.com, and sites.google.com to https
suggested by bentley@
2013-08-07 21:31:12 +00:00
naddy
b43ec6dca7 remove workarounds for gcc 2.95 2013-08-07 19:16:48 +00:00
naddy
792c32ed74 remove some gcc2 workarounds 2013-08-07 16:49:36 +00:00
naddy
c7e055641a kill direct and indirect references to GCC2_ARCHS 2013-08-07 15:37:07 +00:00
sthen
10a472aa72 SECURITY update to PuTTY 0.63 - ok brad@
- Vulnerability: non-coprime values in DSA signatures can cause buffer
overflow in modular inverse
- Vulnerability: buffer underrun in modmul can corrupt the heap
- Vulnerability: negative string length in public-key signatures can
cause integer overflow and overwrite all of memory
- Private keys left in memory after being used by PuTTY tools

N.B. some of these vulnerabilities where an SSH-2 server can make PuTTY
overrun or underrun buffers can be triggered *before* host key verification
so there is a risk from a spoofed server. For more info see the 0.63
section of http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/
2013-08-07 11:47:51 +00:00
bcallah
c8d6d2deec Update texapp to 0.6.0. New features include search functionality, the
ability to write messages in an external editor, and regular bugfixes.
The default texapprc has been tweaked to more closely follow the style of
alpha (the web-based app written by the founders of app.net).
2013-08-07 03:35:53 +00:00
sthen
5ca215842a SECURITY update to BIND 9.9.3p2. CVE-2013-4854: A specially crafted
query that includes malformed rdata can cause named to terminate with an
assertion failure while rejecting the malformed query. Authoritative and
recursive servers are equally vulnerable. Intentional exploitation of
this condition can cause a denial of service in all nameservers running
affected versions of BIND 9. Access Control Lists do not provide any
protection from malicious clients.
2013-08-06 20:09:00 +00:00
landry
68c3487a9f +py-msgpack 2013-08-06 19:54:52 +00:00
landry
fe1f9f43e0 Import py-msgpack 0.3.0, required by upcoming salt port.
MessagePack is a fast, compact binary serialization format, suitable for
similar data to JSON. This package provides CPython bindings for reading
and writing MessagePack data.

ok rpointel@
2013-08-06 19:54:20 +00:00
jasper
bc009f0b34 update to gupnp-0.20.4 2013-08-06 18:10:27 +00:00
jasper
be0f8028b6 update to gssdp-0.14.4 2013-08-06 18:09:41 +00:00
kili
7c5ed985b4 Broken with ghc-7.6. 2013-07-19 07:03:42 +00:00
kili
79e29cad95 Update to HTTP-4000.2.8 2013-07-18 21:49:32 +00:00
benoit
3329109d09 Update py-dnspython to 1.11.0.
ok wcmaier@ (maintainer)
2013-07-18 15:13:02 +00:00
bluhm
83ddffafd0 - update p5-Net-IMP to 0.621
- test depends on net/p5-Net-PcapWriter
2013-07-18 14:19:07 +00:00
lteo
3f7c3d1bee Fix two bugs in the IPFW DAQ module that prevented Snort from running
properly in inline mode:

1. A bug in ipfw_daq_inject() ignores the buf and len arguments that are
   passed to it.  This prevents Snort inline mode from dropping/rejecting
   packets that match "drop" or "reject" rules.

2. Remove DAQ_CAPA_UNPRIV_START from the list of capabilities so that
   Snort can run as an unprivileged user when using the IPFW DAQ module.

Tested by myself and Adam Jeanguenat.  Received guidance from sthen@.
Both fixes have been sent upstream.
2013-07-17 18:18:05 +00:00
jasper
f28e52db4b Security fix for CVE-2013-2130,
ZNC Multiple NULL Pointer Dereference Vulnerabilities

ok brad@ (MAINTAINER)
2013-07-17 07:19:38 +00:00
bentley
0d107ee995 Update jung@'s contact info in all ports. Drop spe and ddclient per request.
ok jung@
2013-07-17 03:27:01 +00:00
william
ecfafa71cf SECURITY update to 1.4.24
- BUG/MAJOR: backend: consistent hash can loop forever in certain circumstances
- BUG/MEDIUM: checks: disable TCP quickack when pure TCP checks are used
- MEDIUM: protocol: implement a "drain" function in protocol layers
- BUG/CRITICAL: fix a possible crash when using negative header occurrences

Resolves CVE-2013-2175

ok gonzalo
2013-07-17 02:52:53 +00:00
jasper
d3c8df5a14 Security fix for CVE-2013-2174,
libcURL "curl_easy_unescape()" Buffer Overflow Vulnerability

ok naddy@ (MAINTAINER)
2013-07-16 19:25:38 +00:00
ajacoutot
7e320ace86 Update to ocsync-0.80.0. 2013-07-16 10:18:04 +00:00
sthen
994f059b04 fix rc.d stop/restart (broken pexp), reported by jasper@
add sigaction diff from upstream
2013-07-15 21:35:46 +00:00
jasper
17fe163fd3 Apply a patch from upstream to fix a warning on startup:
fcntl(8, F_SETFL): Operation not permitted
2013-07-15 19:12:07 +00:00
jasper
5179817bc8 Allow to built with Ant 1.9. 2013-07-15 06:59:35 +00:00
bluhm
2dc6c9a654 update p5-Net-Inspect to 0.300 2013-07-14 23:31:07 +00:00
miod
ef50f7eb2f Fix build on m68k. No revision bump 'coz it had been broken for quite a long
time.
ok naddy@
2013-07-14 20:20:25 +00:00
jasper
4aa9016cb9 add HOMEPAGE 2013-07-14 16:37:01 +00:00
sthen
169bce7323 remove CONFIGURE_ENV no longer needed, net/libbind now installs to a subdir
to avoid it being accidentally picked up.  ok ajacoutot@ jca@
2013-07-13 11:54:36 +00:00
sthen
dfc8e91d92 handle new libbind location; ok ajacoutot@ jca@ 2013-07-13 11:53:57 +00:00
sthen
4fb208db6c install libbind in a subdirectory to avoid autoconf accidentally picking it
up in other ports; this is a special case library only used for some software
which depends on bind resolver internals.  ok ajacoutot@ jca@
2013-07-13 11:53:22 +00:00
naddy
b789d68c62 update to 2.80 for miscellaneous small improvements
https://trac.transmissionbt.com/wiki/Changes#version-2.80
2013-07-12 17:03:59 +00:00
sthen
108babf4f1 icinga 1.9.3, fixes a regression in 1.9.2 with postgresql 2013-07-12 16:07:08 +00:00
sthen
1373aaebd1 +lldpd 2013-07-12 10:27:08 +00:00
sthen
f7ae29a7f8 import ports/net/lldpd, an alternative to ladvd. ok jasper@
LLDP (Link Layer Discovery Protocol) is an industry standard protocol
designed to supplant proprietary Link-Layer protocols such as
Extreme's EDP (Extreme Discovery Protocol) and CDP (Cisco Discovery
Protocol). The goal of LLDP is to provide an inter-vendor compatible
mechanism to deliver Link-Layer notifications to adjacent network
devices.

lldpd implements both reception and sending. It also implements an
SNMP subagent for net-snmp to get local and remote LLDP
information. The LLDP MIB is partially implemented but the most useful
tables are here. lldpd also partially implements LLDP-MED.

lldpd supports bridge, vlan and bonding. bonding need to be done on
real physical devices, not on bridges, vlans, etc. However, vlans can
be mapped on the bonding device. You can bridge vlan but not add vlans
on bridges. More complex setups may give false results.
2013-07-12 10:26:44 +00:00
lteo
1deb2a50d4 Update to Snort 2.9.5, from maintainer Markus Lude.
Tested by Markus on sparc64; tested by me on amd64, i386, and macppc.
2013-07-10 02:10:22 +00:00
jasper
303d273d30 fix BUILD_DEPENDS 2013-07-09 13:43:06 +00:00
bentley
e6fd09c576 Update to libquvi-scripts-0.4.16. 2013-07-08 22:12:23 +00:00
espie
9f9c7056b2 fix for gcc2 (one bad decl, so worth it) 2013-07-08 13:04:37 +00:00
naddy
b6f0a66381 recognize 5.4 2013-07-07 21:33:16 +00:00
bcallah
df63e998b0 Minor update of net/texapp to 0.5.3 2013-07-06 00:42:06 +00:00
espie
98698c3894 fix shared library maze on vax. 2013-07-05 12:10:24 +00:00
bluhm
98d35f9694 update p5-Net-IMP to 0.620 2013-07-05 11:06:50 +00:00
jasper
2e80eecc12 use ${VARBASE} instead of hardcoding /var 2013-07-05 07:44:59 +00:00
bluhm
c95757c761 update p5-IO-Socket-INET6 to 2.71 2013-07-05 01:33:13 +00:00
landry
7c716265c8 Fix on hppa by using the same tweaks as sparc64/mips64el. 2013-07-04 14:49:26 +00:00
benoit
cadee4fccd Update p5-Net-Whois-RIPE to 2.004001. 2013-07-04 07:58:52 +00:00