| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
| |
games/manaplus: update to 1.7.9.16
- Lift BROKEN on powerpc64 per upstream fix (untested)
Changes: https://manaplus.org/changelog#new_release_17916
PR: 221748 222544
Submitted by: Thibault Payet <monwarez@mailoo.org> (maintainer)
Approved by: ports-secteam (zi)
|
|
|
|
|
|
|
|
| |
games/openra: update GeoLite2 to September snapshot
fetch: https://geolite.maxmind.com/download/geoip/database/GeoLite2-Country.mmdb.gz: size mismatch: expected 1454069, actual 1564896
Approved by: ports-secteam blanket
|
|
|
|
|
|
|
|
|
|
|
| |
audio/festival: unbreak on most non-x86 archs
gmake[1]: Entering directory '/wrkdirs/usr/ports/audio/festival/work/speech_tools'
Check system type
../config/config:197: ../config/systems/mips_unknown.mak: No such file or directory
gmake[1]: *** No rule to make target '../config/systems/mips_unknown.mak'. Stop.
Approved by: ports-secteam blanket
|
|
|
|
|
|
|
|
|
|
| |
audio/liba52: build PIC objects on all architectures
PR: 215974
Reported by: mmel
Inspired by: ArchLinux, Gentoo, Debian
Reviewed by: tijl (implicit)
Approved by: ports-secteam blanket
|
|
|
|
|
|
|
|
|
| |
- Update to 4.8.2
- Changelog: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
Approved by: mentors (implicit)
Approved by: portmgr (swills)
|
|
|
|
|
|
|
|
| |
www/firefox-esr: update to 52.4.0
Changes: https://www.mozilla.org/firefox/52.4.0/releasenotes/
Security: 1098a15b-b0f6-42b7-b5c7-8a8646e8be07
Approved by: portmgr (swills)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
irc/weechat: Update to 1.9
- Bugfix update to 1.9
irc/weechat: Security update to 1.9.1
- Fixes crash in logger
Security: b63421b6-a1e0-11e7-ac58-b499baebfeaf
Approved by: ports-secteam (swills)
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Add a patch for CVE-2017-14107.
This is a minor security vulnerability that can lead to a denial of service
issue in libzip when a specially crafted archive is used.
PR: 222638
Security: b2952517-07e5-4d19-8850-21c5b7e0623f
Security: CVE-2017-14107
Approved by: ports-secteam (blanket approval)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
ImageMagick7 to 7.0.7-2.
Disable FPX (FlashPix) support by default. This image format is really
rare these days coupled with that there are known CVE's in libfpx and
it doesn't seem to be maintained these days. It doesn't make sense to
keep it enabled by default anymore. [1]
Bump vapoursynth for sharedi library bumps in IM7.
PR: 222309 [1]
Submitted by: Anton Yuzhaninov <citrin+pr@citrin.ru> [1]
Update ImageMagick7 to 7.0.7-4.
PR: 222622
Security: 16fb4f83-a2ab-11e7-9c14-009c02a2ab30
Approved by: ports-secteam@ (implicit)
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Update to 0.13.6
Changes: https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md
Security: 2bffdf2f-9d45-11e7-a25c-471bafc3262f
Update to 0.13.7
Changes: https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md
Approved by: ports-secteam (swills)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Update to 2.4.1
- Update WWW
Changes: https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-4-2-released/
Security: 95b01379-9d52-11e7-a25c-471bafc3262f
Update to 2.3.5
- Update WWW
Changes: https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
PR: 222457
Exp-run by: antoine
Security: 95b01379-9d52-11e7-a25c-471bafc3262f
Approved by: ports-secteam (swills)
|
|
|
|
|
|
|
|
|
|
|
| |
Update to 2.2.8
- Update WWW
Changes: https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
Security: 95b01379-9d52-11e7-a25c-471bafc3262f
Approved by: ports-secteam (swills)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
www/firefox: unbreak on powerpc64, sparc64
In file included from toolkit/crashreporter/google-breakpad/src/third_party/curl/curl.h:44:0,
from toolkit/components/telemetry/pingsender/pingsender_unix_common.cpp:13,
from objdir/toolkit/components/telemetry/pingsender/Unified_cpp_pingsender0.cpp:11:
toolkit/crashreporter/google-breakpad/src/third_party/curl/curlrules.h:144:41: error: size of array '__curl_rule_01__' is negative
[CurlchkszEQ(long, CURL_SIZEOF_LONG)];
^
Reported by: jhibbits
Approved by: ports-secteam blanket
|
|
|
|
|
|
|
|
|
|
| |
Update to 5.26.1
Changes: https://metacpan.org/changes/release/SHAY/perl-5.26.1
Security: d9e82328-a129-11e7-987e-4f174049b30a
MFH: 2017Q3
Approved by: ports-secteam (zi)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Update to 5.4.
Aaron Sachau sent email about bug he found. The "qjail console jailname"
command that has a jail with a fib assigned to it was not working correctly.
This error was introduced by changes done to correct coding syntax problems
that the hs-shellcheck package found and corrected and then published in
qjail-5.2. Reverted back to how qjail-5.1 did it. Aaron Sachau tested the
patch. Fixed now.
PR: 221839
Submitted by: maintainer (Joe Barbish)
Approved by: ports-secteam (delphij)
|
|
|
|
|
|
|
|
|
| |
- Update net/asterisk11 to 11.25.3
- Update net/asterisk13 to 13.17.2
Security: c2ea3b31-9d75-11e7-bb13-001999f8d30b
Approved by: ports-secteam (delphij)
|
|
|
|
|
|
| |
devel/github-backup-utils: Add SHEBANGFIX to pass testport
Approved by: ports-secteam (with hat)
|
|
|
|
|
|
|
|
| |
print/hplip: Fix gui crash due to incorrect reference to /etc/hplip.conf
Reported by: Keith <fischerking1905@yahoo.co.jp>
Approved by: ports-secteam blanket
|
|
|
|
|
|
|
| |
xen: apply XSA-{231-234}
Sponsored by: Citrix Systems R&D
Approved by: ports-secteam (delphij)
|
|
|
|
|
|
|
|
|
| |
- Add upstream commit for CVE-2017-9798
- Bump PORTREVISION
Security: 76b085e2-9d33-11e7-9260-000c292ee6b8
Approved by: ports-secteam (with hat)
|
|
|
|
|
|
|
|
| |
- Add backport of patch for CVE-2017-9798
- Bump PORTREVISION
Approved by: ports-secteam (with hat)
Security: 76b085e2-9d33-11e7-9260-000c292ee6b8
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
audio/openal-soft: update to 1.18.1
- Add EXAMPLES and OSS options
- Add a patch to fix the Jack backend for Jack 1
Changes: http://kcat.strangesoft.net/openal.html#release
ABI: https://abi-laboratory.pro/tracker/timeline/openal/
PR: 220931 222437
Submitted by: Yuri Victorovich <yuri@rawbw.com>
Submitted by: kdrakehp@zoho.com
Approved by: ports-secteam (delphij)
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Update net/asterisk13 to 13.17.0
- Remove patches accepted upstream
- Update net/asterisk11 to 11.25.2
- Update net/asterisk13 to 13.17.1
Security: ec1df2a1-8ee6-11e7-8be8-001999f8d30b,
c599f95c-8ee5-11e7-8be8-001999f8d30b
Approved by: ports-secteam (feld)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
sysutils/py-supervisor: Update to 3.3.3
Update to 3.3.3, which fixes a security vulnerability (CVE-2017-11610).
While I'm here, level up port compliance, limiting changes to
a minimum.
Still TODO:
- Regenerate/verify patches
- Clarify/Add LICENSE ('BSD-derived')
- Fix/verify use of @[un]exec in pkg-plist
Changelog:
http://supervisord.org/changes.html
PR: 221539
Submitted by: Dani <i.dani outlook com>
Approved by: portmgr (maintainer timeout, 1 month)
Security: c9460380-81e3-11e7-93af-005056925db4
Approved by: ports-secteam (with hat)
|
|
|
|
|
|
|
|
|
|
|
|
| |
multimedia/ffmpeg: update to 3.3.4
Changes: https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/n3.3.4:/Changelog
ABI: https://abi-laboratory.pro/tracker/timeline/ffmpeg/
Security: CVE-2017-14054 CVE-2017-14055 CVE-2017-14056 CVE-2017-14057
Security: CVE-2017-14058 CVE-2017-14059 CVE-2017-14169 CVE-2017-14170
Security: CVE-2017-14171 CVE-2017-14222 CVE-2017-14223 CVE-2017-14225
Approved by: ports-secteam (with hat)
|
|
|
|
|
|
|
|
| |
Update PHP 7.1 from 7.1.8 to 7.1.9
Changelog: http://www.php.net/ChangeLog-7.php#7.1.9
Approved by: ports-secteam (with hat)
|
|
|
|
|
|
|
|
| |
Update PHP 7 from 7.0.22 to 7.0.23
Changelog: http://www.php.net/ChangeLog-7.php#7.0.23
Approved by: ports-secteam (with hat)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
security/libgcrypt: update to 1.8.1
- Update libgcrypt to 1.8.1
- Bump library version in pkg-plist
Noteworthy changes in version 1.8.1
* Bug fixes:
- Mitigate a local side-channel attack on Curve25519 dubbed "May
the Fourth be With You". [CVE-2017-0379] [also in 1.7.9]
- Add more extra bytes to the pool after reading a seed file.
- Add the OID SHA384WithECDSA from RFC-7427 to SHA-384.
- Fix build problems with the Jitter RNG
- Fix assembler code build problems on Rasbian (ARMv8/AArch32-CE).
Changes: https://abi-laboratory.pro/tracker/changelog/libgcrypt/1.8.1/log.html
Binary compatibility report: https://abi-laboratory.pro/tracker/compat_report/libgcrypt/1.8.0/1.8.1/31172/abi_compat_report.html
Security: https://vuxml.freebsd.org/freebsd/22f28bb3-8d98-11e7-8c37-e8e0b747a45a.html
Approved by: ports-secteam (with hat)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Update to 1.0.1
Changes from 1.0.0 to 1.0.1:
http://lists.gnu.org/archive/html/pspp-announce/2017-08/msg00003.html
Security: CVE-2017-12958
Security: CVE-2017-12959
Security: CVE-2017-12960
Security: CVE-2017-12961
Approved by: ports-secteam (with hat)
|
|
|
|
|
|
|
|
|
| |
cad/stepcode: Fix portlint issues
PR: 221835
Submitted by: Fernando Apesteguia <fernando.apesteguia@gmail.com> (maintainer)
Approved by: ports-secteam (with hat)
|
|
|
|
|
|
|
|
|
|
|
| |
Update to 8.7.6
Changes: https://typo3.org/download/release-notes/whats-new/
https://typo3.org/news/article/typo3-876-released/
PR: 222286
Submitted by: Helmut Ritter <freebsd-ports@charlieroot.de> (maintainer)
Approved by: ports-secteam (zi)
|
|
|
|
|
|
|
|
|
| |
security/nss: update to 3.32.1
Changes: https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.32.1_release_notes
Changes: https://hg.mozilla.org/projects/nss/shortlog/NSS_3_32_1_RTM
ABI: https://abi-laboratory.pro/tracker/timeline/nss/
Approved by: ports-secteam (zi)
|
|
|
|
|
|
| |
Catch up with www/linux-flashplayer.
Approved by: ports-secteam (zi)
|
|
|
|
|
|
|
|
| |
Update to 27.0.0.130.
https://helpx.adobe.com/security/products/flash-player/apsb17-28.html
Approved by: ports-secteam (zi)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Introduce versions of the Mozilla Public License (MPL)
MPL10 - https://opensource.org/licenses/MPL-1.0
MPL11 - https://opensource.org/licenses/MPL-1.1
MPL20 - https://opensource.org/licenses/MPL-2.0
More info about the Mozilla Public License:
https://www.mozilla.org/en-US/MPL/
Reviewed by: amdmi3, mat
Approved by: portmgr (mat)
Differential Revision: https://reviews.freebsd.org/D11696
This should fix MP* licenses on the quarterly branch requiring
acceptance even with BATCH.
Approved by: portmgr (implicit)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
www/firefox: unbreak on powerpc64, sparc64
In file included from objdir/dist/include/mozilla/dom/EventTarget.h:12:0,
from dom/base/nsPIDOMWindow.h:15,
from objdir/dist/include/mozilla/DOMEventTargetHelper.h:13,
from dom/presentation/PresentationAvailability.h:10,
from dom/presentation/AvailabilityCollection.cpp:10,
from objdir/dom/presentation/Unified_cpp_dom_presentation0.cpp:2:
dom/base/nsWrapperCache.h:48:1: error: static assertion failed: Only support 32-bit and 64-bit
static_assert(sizeof(void*) == 4, "Only support 32-bit and 64-bit");
^
Reported by: Martin Husemann (via upstream bug)
Approved by: ports-secteam blanket
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fix not starting after crash.
When nrpe quits ungracefully, for example, if the box was rebooted, it
often does not start because the pid file is still there, and the pid in
it exists and the pid in it is in use by some other process.
The dubious code is in src/nrpe.c in write_pid_file() around line 1756
that could be axed.
But I think the easiest way to fix this is with the attached patch.
precmd is run just before starting the daemon and after checking that it
is not already running.
With this, it starts just fine, and still refuses to start if it is
really already running, but starts fine if the pid file contains a pid
that exists but is not nrpe.
PR: 221740
Submitted by: mat
Approved by: maintainer timeout, ports-secteam blanket
Sponsored by: Absolight
|
|
|
|
|
|
|
|
|
|
|
|
| |
graphics/colmap: try#2 to unbreak on non-x86
../ext/VLFeat/libvlfeat.a(host.c.o): In function `_vl_x86cpu_info_init':
host.c:(.text+0x1c): undefined reference to `_vl_cpuid'
host.c:(.text+0x40): undefined reference to `_vl_cpuid'
collect2: error: ld returned 1 exit status
Reported by: pkg-fallout (aarch64, armv6)
Approved by: ports-secteam blanket
|
|
|
|
|
|
| |
Update to r50775 from the FreeBSD docset (a.k.a. 10.4-R version)
Approved by: portmgr (blanket), doceng (implicit)
|
|
|
|
| |
Approved by: ports-secteam (delphij)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Disable the pkg-deinstall script.
spamd's pkg-install adds spamd stuff to /etc/services, and pkg-deinstall
removed it. The problem is that pkg doesn't run DEINSTALL before INSTALL
when upgrading/reinstalling. As a result, when spamd is restarted,
/etc/services winds up lacking the spamd entries, causing spamd to fail
to start.
The ideal solution is pkg running those targets in the predicted order,
or pkg gaining a @services keyword. In the meantime, this commit just
disables the pkg-deinstall. If you are uninstalling spamd you can remove
those /etc/services entries by hand.
PR: 212335
Approved by: maintainer timeout (~ 1 yr)
Approved by: ports-secteam (delphij)
|
|
|
|
|
|
|
|
|
| |
Update port to 0.5.12
Fix CVE-2017-8920: XSS in 'R' parameter
Security: CVE-2017-8920
Approved by: ports-secteam (feld)
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Add base/port options for libpcap
PR: 221923
Approved by: ehaupt (maintainer)
Correctly define the _DESC values
Reported by: ehaupt,mat
Fix OPTIONS_SINGLE logic. The two options (LIBPCAP_BASE and LIBPCAP_PORTS) need
to be mutually exclusive.
If LIBPCAP_BASE is selected, make sure the binary is linked against the libpcap
from base, even if net/libpcap is present.
Bump PORTREVISION to make sure the OPTIONS change is tracked.
Reported by: jbeich
Approved by: ports-secteam (with hat)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
mail/phpmailer: Update from 5.2.23 to 5.2.24
Changelog:
- SECURITY Fix: XSS vulnerability in one of the code examples, CVE-2017-11503.
The code_generator.phps example did not filter user input prior to output.
This file is distributed with a .phps extension, so it it not normally
executable unless it is explicitly renamed, so it is safe by default. There
was also an undisclosed potential XSS vulnerability in the default exception
handler (unused by default). Patches for both issues kindly provided by
Patrick Monnerat of the Fedora Project.
- Handle bare codes (an RFC contravention) in SMTP server responses
- Make message timestamps more dynamic - calculate the date separately
for each message
- Include timestamps in HTML-format debug output
- Improve Turkish, Norwegian, Serbian, Brazilian Portuguese &
simplified Chinese translations
- Correction of Serbian ISO language code from sr to rs
- Fix matching of multiple entries in Host to match IPv6 literals
without breaking port selection (see #1094, caused by a3b4f6b)
- Better capture and reporting of SMTP connection errors
Reported by: Ken J. <tweakerz@shaw.ca>
Approved by: ports-secteam (delphij)
|
|
|
|
|
|
|
|
|
| |
- Update to 3.5.9
PR: 221165
Submitted by: Koichiro IWAO <meta+ports_AT_vmeta_DOT_jp>
Approved by: ports-secteam (delphij)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
databases/mysql56-{server client}: Update to latest 5.6.37
This release contains
features:
* The mysql client now supports a --binary-as-hex option for
binary data (Bug #25340722, Bug #84391)
* mysqlaccess now looks for its configuration file only in the
SYSCONFDIR directory and /etc. (Bug #25043674)
And bugfixes:
* mysqld: failed to start the server if the --datadir option was specified
with a relative path name. (Bug #25364806)
* InnoDB: The server allocated memory unnecessarily for an operation that
rebuilt the table. (Bug #25573565, Bug #85043)
* mysqldump: could write database names in USE statements
incorrectly. (Bug #25998635)
Reviewed by: mat (mentor)
Approved by: mat (mentor)
Sponsored by: Netzkommune GmbH
Differential Revision: https://reviews.freebsd.org/D11638
Approved by: ports-secteam (feld)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
www/chromium: update to 60.0.3112.101
- Update LICENSE
- Drop USE_GNOME=gtk20 dependency because chromium uses gtk3
- Use freetype2 bundled to avoid more issues related to the freetype library
- Fix typo in the comment of pre-configure section
- Update comment in SNDIO section
Changelog: https://chromium.googlesource.com/chromium/src/+log/59.0.3071.115..60.0.3112.101?pretty=fuller&n=10000
Security: https://vuxml.freebsd.org/freebsd/7d138476-7710-11e7-88a1-e8e0b747a45a.html
Approved by: ports-secteam (delphij)
|
|
|
|
|
|
|
| |
Add jail support to check_procs, restore check_http's -C option to its former
glory.
Sponsored by: Absolight
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Remove DJANGO19 option: upstream support for 1.9.x has ended
- Update WWW
Reference: https://www.djangoproject.com/download/#supported-versions
Update to 1.11.4 to match www/py-django111
- While I'm here, change indent
PR: 221746
Submitted by: dvl
Approved by: ports-secteam (with hat)
|