aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
...
* MFH: r527804Jan Beich2020-03-075-37/+20
| | | | | | | | | | | | | www/firefox: update to 74.0 Changes: https://www.mozilla.org/firefox/74.0/releasenotes/ PR: 244310 Security: 9f900456-0bfa-4da4-ad59-14b2933259a2 Approved by: ports-secteam blanket Differential Revision: https://reviews.freebsd.org/D23646 Notes: svn path=/branches/2020Q1/; revision=527969
* MFH: r527848Jan Beich2020-03-072-5/+4
| | | | | | | | | | | www/firefox-esr: update to 68.6.0 Changes: https://www.mozilla.org/firefox/68.6.0/releasenotes/ Security: 9f900456-0bfa-4da4-ad59-14b2933259a2 Approved by: ports-secteam blanket Notes: svn path=/branches/2020Q1/; revision=527968
* MFH: r526626 r527958Adam Weinberger2020-03-074-2597/+2728
| | | | | | | | | | | | | | | | | | | | | | | www/gitea: Update to 1.10.4 Changes: https://github.com/go-gitea/gitea/releases/tag/v1.10.4 PR: 244246 Submitted by: stb@lassitu.de (maintainer) gitea: Update to 1.11.2, contains security fixes https://blog.gitea.io/2020/02/gitea-1.11.0-is-released https://blog.gitea.io/2020/02/gitea-1.11.1-is-released https://blog.gitea.io/2020/02/gitea-1.11.2-is-released PR: 244025 Submitted by: maintainer Security: yes (see links above) Approved by: portmgr (with hat) Notes: svn path=/branches/2020Q1/; revision=527962
* MFH: r527924Jochen Neumeister2020-03-071-1/+1
| | | | | | | | | | | hand over Maintainership to Chris (portmaster@BSDforge.com) Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527933
* MFH: r527889Jochen Neumeister2020-03-071-1/+1
| | | | | | | | | | | back to pool Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527931
* MFH: r527888Jochen Neumeister2020-03-0754-54/+54
| | | | | | | | | | | hand over Maintainership to miwi Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527930
* MFH: r527887Jochen Neumeister2020-03-0731-31/+31
| | | | | | | | | | | hand over Maintainership to miwi Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527927
* MFH: r527886Jochen Neumeister2020-03-0756-56/+56
| | | | | | | | | | | hand over Maintainership to miwi Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527926
* MFH: r527885Jochen Neumeister2020-03-07163-163/+163
| | | | | | | | | | | hand over Maintainership to miwi Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527925
* Revert r527893 and unbreak the quarterly branchAntoine Brodin2020-03-0757-580/+0
| | | | Notes: svn path=/branches/2020Q1/; revision=527921
* MFH: r527894Niclas Zeising2020-03-062-5/+5
| | | | | | | | | | | | graphics/drm-legacy-kmod: Update snapshot Update the graphics/drm-legacy-kmod port to the latest snapshot, fixing the build with llvm 10 Approved by: ports-secteam (implicit, drm-drivers blanket) Notes: svn path=/branches/2020Q1/; revision=527895
* MFH: r527066 r527082Matthias Fechner2020-03-0657-0/+580
| | | | | | | | | | | New port required for gitlab-ce 12.8. New ports required for gitlab-ce 12.8 upgrade. Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527893
* MFH: r527874Jan Beich2020-03-068-13/+20
| | | | | | | | | | | | multimedia/dav1d: update to 0.6.0 Changes: https://code.videolan.org/videolan/dav1d/tags/0.6.0 Changes: https://code.videolan.org/videolan/dav1d/blob/0.6.0/NEWS Changes: https://code.videolan.org/videolan/dav1d/compare/0.5.2...0.6.0 Approved by: ports-secteam blanket (required by Firefox 76) Notes: svn path=/branches/2020Q1/; revision=527879
* MFH: r527871Piotr Kubaj2020-03-061-2/+6
| | | | | | | | | | | | | | databases/postgresql12-server: fix build on GCC architectures Use LLVM only if Clang is used. PR: 244225 Approved by: pgsql (maintainer timeout) Approved by: portmgr (fix build blanket) Notes: svn path=/branches/2020Q1/; revision=527872
* MFH: r527810Kai Knoblich2020-03-053-7/+31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | textproc/py-textfsm: Update to 1.1.1 This update resolves a package installation conflict with textproc/py-texttable as both ports installs "texttable.py" into the same place. [1] Also while I'm here: * Switch to GitHub for a while as no sdist tarballs are available at PyPi. * Make the port concurrent safe because it installs scripts outside of the site-lib directory. * Remove the "testdata" directory to prevent possible package conflicts as it's only required for the test suite. * Add a "do-test" target to make future QA easier. Changelog: https://github.com/google/textfsm/releases/tag/v1.1.0 https://github.com/google/textfsm/releases/tag/v1.1.1 PR: 244257 Reported by: John Hein <jcfyecrayz@liamekaens.com> [1] Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527813
* MFH: r527808Antoine Brodin2020-03-051-1/+1
| | | | | | | Bump after FORBIDDEN Notes: svn path=/branches/2020Q1/; revision=527809
* MFH: r527758Cy Schubert2020-03-051-0/+2
| | | | | | | | | | | Flag ntp-devel FORBIDDEN due to http://support.ntp.org/bin/view/Main/SecurityNotice#\ March_2020_ntp_4_2_8p14_NTP_Rele Approved by: portmgr (joneum) Notes: svn path=/branches/2020Q1/; revision=527807
* MFH: r527800Cy Schubert2020-03-055-68/+8
| | | | | | | | | | | | | | | | | | | Update ntp-4.2.8p13 --> 4.2.8p14. The advisory can be found at: http://support.ntp.org/bin/view/Main/SecurityNotice#\ March_2020_ntp_4_2_8p14_NTP_Rele No CVEs have been documented yet. Security: http://support.ntp.org/bin/view/Main/NtpBug3610 http://support.ntp.org/bin/view/Main/NtpBug3596 http://support.ntp.org/bin/view/Main/NtpBug3592 Approved by: portmgr (joneum) Notes: svn path=/branches/2020Q1/; revision=527806
* MFH: r527732Koop Mast2020-03-043-12/+7
| | | | | | | | | | | | | Update librsvg2 to 2.40.21. * Add license while here Security: b66583ae-5aee-4cd5-bb31-b2d397f8b6b3 Approved by: ports-secteam@ (joneum@) Notes: svn path=/branches/2020Q1/; revision=527794
* MFH: r523512Tobias Kortkamp2020-03-042-3/+15
| | | | | | | | | | | | | | | | | | | | | | | | | lang/rust-nightly: Unbreak with lld on 12.1/13.0 i386 = note: ld: error: relocation R_386_PC32 cannot be used against symbol __rust_probestack; recompile with -fPIC >>> defined in /wrkdirs/usr/ports/lang/rust-nightly/work/rustc-nightly-src/build/i686-unknown-freebsd/stage1/lib/rustlib/i686-unknown-freebsd/lib/libcompiler_builtins-6570a75fe85f0e1a.rlib(compiler_builtins-6570a75fe85f0e1a.compiler_builtins.2i519eqi-cgu.15.rcgu.o) >>> referenced by std.4xivr03c-cgu.14 >>> std-9bd70afd58e204b7.std.4xivr03c-cgu.14.rcgu.o:(_$LT$alloc..boxed..Box$LT$F$GT$$u20$as$u20$core..ops..function..FnOnce$LT$A$GT$$GT$::call_once::h1c78ed6e734a2bfc (.llvm.10122419023709863394)) in archive /wrkdirs/usr/ports/lang/rust-nightly/work/rustc-nightly-src/build/i686-unknown-freebsd/stage1/lib/rustlib/i686-unknown-freebsd/lib/libstd-9bd70afd58e204b7.rlib ld: error: relocation R_386_PC32 cannot be used against symbol __rust_probestack; recompile with -fPIC >>> defined in /wrkdirs/usr/ports/lang/rust-nightly/work/rustc-nightly-src/build/i686-unknown-freebsd/stage1/lib/rustlib/i686-unknown-freebsd/lib/libcompiler_builtins-6570a75fe85f0e1a.rlib(compiler_builtins-6570a75fe85f0e1a.compiler_builtins.2i519eqi-cgu.15.rcgu.o) >>> referenced by std.4xivr03c-cgu.14 >>> std-9bd70afd58e204b7.std.4xivr03c-cgu.14.rcgu.o:(std::io::util::copy::h9115f048f2203467) in archive /wrkdirs/usr/ports/lang/rust-nightly/work/rustc-nightly-src/build/i686-unknown-freebsd/stage1/lib/rustlib/i686-unknown-freebsd/lib/libstd-9bd70afd58e204b7.rlib clang-cpp: error: linker command failed with exit code 1 (use -v to see invocation) error: aborting due to previous error http://beefy17.nyi.freebsd.org/data/head-i386-default/p523508_s356869/logs/rust-nightly-1.42.0.20200118.log http://beefy4.nyi.freebsd.org/data/121i386-quarterly/527662/logs/rust-nightly-1.42.0.20191222.log Approved by: ports-secteam blanket Notes: svn path=/branches/2020Q1/; revision=527791
* MFH: r527737 devel/py-futures: Update to 3.3.0Kubilay Kocak2020-03-042-4/+4
| | | | | | | | | | | | | Changelog: https://github.com/agronholm/pythonfutures/blob/3.3.0/CHANGES.rst Reported by: ngie Approved by: ports-secteam (blanket: bugfix release) Notes: svn path=/branches/2020Q1/; revision=527738
* MFH: r527660Jan Beich2020-03-032-5/+5
| | | | | | | | | | emulators/citra: update to s20200301 Changes: https://github.com/citra-emu/citra/compare/cd46e62ad...2c0bd0f2a Approved by: ports-secteam (swills, implicit for snapshots) Notes: svn path=/branches/2020Q1/; revision=527662
* MFH: r527618 r527619Mateusz Piotrowski2020-03-024-15/+6
| | | | | | | | | | | | | | | | - Update audio/timidity++ to 2.15.0. [1] - Mark audio/timidity++-tcltk as BROKEN due to build failures. PR: 244429 Submitted by: pi [1] Security: CVE-2017-11546 Security: CVE-2017-11547 Security: CVE-2017-11549 Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527632
* MFH: r527232Mateusz Piotrowski2020-03-021-3/+3
| | | | | | | | | | | | | | | | Add libarc to LIB_DEPENDS for audio/timidity++ Up until now, libarc was only being included in LIB_DEPENDS when the Makefile of audio/timidity++ was being used by one of its slave ports. audio/timidity++, however, may be also used as a standalone port in which case it needs libarc to be available. Reported by: hselasky Approved by: portmgr blanket (runtime fix) Notes: svn path=/branches/2020Q1/; revision=527620
* MFH: r527565Christoph Moench-Tegeder2020-03-013-21/+1660
| | | | | | | | | | | | | | | | | | switch kicad-doc from source to pre-built docs The build process is rather unstable on our asciidoc toolchain, but then the doc files are completely independent of OS and machine architecture, so there's nothing which stops us from just taking the ready-built files from upstream. At the same time this enables two additional documentation languages (polnish and chinese) - their build process was even more unstable than the rest in my environment. PR: 241183 Approved by: ports-secteam (joneum@) Notes: svn path=/branches/2020Q1/; revision=527566
* MFH: r527425Jan Beich2020-02-292-5/+5
| | | | | | | | | | emulators/citra: update to s20200229 Changes: https://github.com/citra-emu/citra/compare/f106e7613...cd46e62ad Approved by: ports-secteam (swills, implicit for snapshots) Notes: svn path=/branches/2020Q1/; revision=527427
* MFH: r527417Matthias Fechner2020-02-294-33/+82
| | | | | | | | | | | | textproc/apache-solr: security related update to 8.4.1 Switch java version to current LTS version. Security: e59cb761-5ad8-11ea-abb7-001b217b3468 Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527422
* MFH: r527391Jochen Neumeister2020-02-282-2/+19
| | | | | | | | | | | | | Fix build on non-x86 and nun-aarch6 PR: 244073 Submitted by: pkubaj Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527392
* MFH: r527102Niclas Zeising2020-02-262-1/+14
| | | | | | | | | | | | | | | | | | x11/xdm: Fix generation of etc/X11/xdm/Xresources By some stupidity of autotools, spacing for a sed regexp used to generate Xresources gets broken, and the sed command doen't match as it should. This results in an Xresources file with an extra '#endif /* XPM */', which breaks the file. Patch Makefile.in to fix the regexp and have Xresources generated properly. PR: 244404 Reported by: olgeni Approved by: ports-secteam (joenum) Notes: svn path=/branches/2020Q1/; revision=527210
* MFH: r527000Tijl Coosemans2020-02-252-4/+4
| | | | | | | | | | Update to 2.16.5. Security: https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-02 Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527071
* MFH: r527012Dima Panov2020-02-253-6/+9
| | | | | | | | | | | | | | mail/opensmtpd: update to 6.6.4p1 security releaase SECURITY RELEASE An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group. Approved by: ports-secteam (joneum) Security: CVE-2020-8793, CVE-2020-8794 Notes: svn path=/branches/2020Q1/; revision=527062
* MFH: r526973Dima Panov2020-02-258-60/+35
| | | | | | | | | | | | | | net/freeradius-client: unbreak fetch, update to 1.1.7 release Maintainer didn't unbreak the port over 3 months since it was marked unfetchable, version 1.1.7 was released 26.05.2017 Approved by: maintainer (timeout) Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=527061
* MFH: r526689Bernard Spil2020-02-222-4/+4
| | | | | | | | | | | irc/weechat: Security update to 2.7.1 Security: 8e3f1812-54d9-11ea-8d49-d4c9ef517024 Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=526780
* MFH: r526760Matthias Andree2020-02-222-7/+8
| | | | | | | | | | | | | | | | | | | | | | | | Update Postfix to 3.4.9 (bugfix-only release) While here, also strip libexec/postfix/postlogd. Announcement: http://www.postfix.org/announcements/postfix-3.4.9.html Fixed in all supported stable releases: Bug (introduced: Postfix 3.1): smtp_dns_resolver_options were broken while adding support for negative DNS response caching in postscreen. Postfix was inadvertently changed to call res_query() instead of res_search(). Reported by Jaroslav Skarvada. Bug (introduced: Postfix 2.5): Postfix ignored the CONNECT macro overrides from a Milter application. Postfix now evaluates the Milter macros for an SMTP CONNECT event after the Postfix-to-Milter connection is negotiated. Problem reported by David Bürgin. Bug (introduced: Postfix 3.0): sanitize (remote) server responses before storing them in the verify database, to avoid Postfix warnings about malformed UTF8. Found during code maintenance. PR: 243879 Submitted by: Juraj Lutter <juraj@lutter.sk> Approved by: maintainer timeout 15d (ohauer@) Differential Revision: https://reviews.freebsd.org/D23502 Approved by: ports-secteam (joneum@) Notes: svn path=/branches/2020Q1/; revision=526775
* MFH: r526761Thomas Zander2020-02-222-6/+6
| | | | | | | | | | | | | Update to upstream version 1.7.21 Details: - Bugfix release, see https://github.com/containous/traefik/releases/tag/v1.7.21 Approved by: ports-secteam (riggs) Notes: svn path=/branches/2020Q1/; revision=526762
* MFH: r526724Torsten Zuehlsdorff2020-02-212-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | lang/php74: Upgrade from 7.4.2 to 7.4.3 Changelog: Core: Fixed bug #79146 (cscript can fail to run on some systems). Fixed bug #79155 (Property nullability lost when using multiple property definition). Fixed bug #78323 (Code 0 is returned on invalid options). Fixed bug #78989 (Delayed variance check involving trait segfaults). Fixed bug #79174 (cookie values with spaces fail to round-trip). Fixed bug #76047 (Use-after-free when accessing already destructed backtrace arguments). COM: Fixed bug #79247 (Garbage collecting variant objects segfaults). CURL: Fixed bug #79078 (Hypothetical use-after-free in curl_multi_add_handle()). FFI: Fixed bug #79096 (FFI Struct Segfault). IMAP: Fixed bug #79112 (IMAP extension can't find OpenSSL libraries at configure time). Intl: Fixed bug #79212 (NumberFormatter::format() may detect wrong type). Libxml: Fixed bug #79191 (Error in SoapClient ctor disables DOMDocument::save()). MBString: Fixed bug #79149 (SEGV in mb_convert_encoding with non-string encodings). MySQLi: Fixed bug #78666 (Properties may emit a warning on var_dump()). MySQLnd: Fixed bug #79084 (mysqlnd may fetch wrong column indexes with MYSQLI_BOTH). Fixed bug #79011 (MySQL caching_sha2_password Access denied for password with more than 20 chars). Opcache: Fixed bug #79114 (Eval class during preload causes class to be only half available). Fixed bug #79128 (Preloading segfaults if preload_user is used). Fixed bug #79193 (Incorrect type inference for self::$field =& $field). OpenSSL: Fixed bug #79145 (openssl memory leak). Phar: Fixed bug #79082 (Files added to tar with Phar::buildFromIterator have all-access permissions). (CVE-2020-7063) Fixed bug #79171 (heap-buffer-overflow in phar_extract_file). (CVE-2020-7061) Fixed bug #76584 (PharFileInfo::decompress not working). Reflection: Fixed bug #79115 (ReflectionClass::isCloneable call reflected class __destruct). Session: Fixed bug #79221 (Null Pointer Dereference in PHP Session Upload Progress). (CVE-2020-7062) Standard: Fixed bug #78902 (Memory leak when using stream_filter_append). Fixed bug #78969 (PASSWORD_DEFAULT should match PASSWORD_BCRYPT instead of being null). Testing: Fixed bug #78090 (bug45161.phpt takes forever to finish). XSL: Fixed bug #70078 (XSL callbacks with nodes as parameter leak memory). Zip: Add ZipArchive::CM_LZMA2 and ZipArchive::CM_XZ constants (since libzip 1.6.0). Add ZipArchive::RDONLY (since libzip 1.0.0). Add ZipArchive::ER_* missing constants. Add ZipArchive::LIBZIP_VERSION constant. Fixed bug #73119 (Wrong return for ZipArchive::addEmptyDir Method). Changelog taken from: https://www.php.net/ChangeLog-7.php#7.4.3 Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=526729
* MFH: r526723Torsten Zuehlsdorff2020-02-212-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | lang/php73: Upgrade from 7.3.14 to 7.3.15 Changelog: Core: Fixed bug #71876 (Memory corruption htmlspecialchars(): charset `*' not supported). Fixed bug #79146 (cscript can fail to run on some systems). Fixed bug #78323 (Code 0 is returned on invalid options). Fixed bug #76047 (Use-after-free when accessing already destructed backtrace arguments). CURL: Fixed bug #79078 (Hypothetical use-after-free in curl_multi_add_handle()). Intl: Fixed bug #79212 (NumberFormatter::format() may detect wrong type). Libxml: Fixed bug #79191 (Error in SoapClient ctor disables DOMDocument::save()). MBString: Fixed bug #79154 (mb_convert_encoding() can modify $from_encoding). MySQLnd: Fixed bug #79084 (mysqlnd may fetch wrong column indexes with MYSQLI_BOTH). OpenSSL: Fixed bug #79145 (openssl memory leak). Phar: Fixed bug #79082 (Files added to tar with Phar::buildFromIterator have all-access permissions). (CVE-2020-7063) Fixed bug #79171 (heap-buffer-overflow in phar_extract_file). (CVE-2020-7061) Fixed bug #76584 (PharFileInfo::decompress not working). Reflection: Fixed bug #79115 (ReflectionClass::isCloneable call reflected class __destruct). Session: Fixed bug #79221 (Null Pointer Dereference in PHP Session Upload Progress). (CVE-2020-7062) SPL: Fixed bug #79151 (heap use after free caused by spl_dllist_it_helper_move_forward). Standard: Fixed bug #78902 (Memory leak when using stream_filter_append). Testing: Fixed bug #78090 (bug45161.phpt takes forever to finish). XSL: Fixed bug #70078 (XSL callbacks with nodes as parameter leak memory). Changelog taken from: https://www.php.net/ChangeLog-7.php#7.3.15 Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=526728
* MFH: r526722Torsten Zuehlsdorff2020-02-212-4/+4
| | | | | | | | | | | | | | | | | | | | lang/php72: Upgrade from 7.2.27 to 7.2.28 Changelog: DOM: Fixed bug #77569: (Write Access Violation in DomImplementation). Phar: Fixed bug #79082 (Files added to tar with Phar::buildFromIterator have all-access permissions). (CVE-2020-7063) Session: Fixed bug #79221 (Null Pointer Dereference in PHP Session Upload Progress). (CVE-2020-7062) Changelog taken from: https://www.php.net/ChangeLog-7.php#7.2.28 Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=526726
* MFH: r526720Niclas Zeising2020-02-212-5/+5
| | | | | | | | | | | | | | Graphics/drm-fbsd11.2-kmod: Update snapshot Update graphics/drm-fbsd11.2-kmod to the latest snapshot. Make unsynchronized DRM_IOCTL_I915_GEM_USERPTR work in mesa on 7th generation Haswell graphics. This is needed for vulkan. Add devctl (devd) notification for monitor hotplug. Approved by: portmgr (implicit, drm-drivers blanket) Notes: svn path=/branches/2020Q1/; revision=526721
* MFH: r526608Dimitry Andric2020-02-216-32/+50
| | | | | | | | | | | | | | | | | | | | | | | devel/valgrind(-devel): Fix compiler version detection hopefully forever Every time a compiler major version is bumped, we run into this exact same error: ===> Configuring for valgrind-3.10.1.20160113_7,1 ... checking for a supported version of gcc... no (10.0.0) configure: error: please use gcc >= 3.0 or clang >= 2.9 Attempt to fix this for all versions in the future. Other fix included: don't use undefined behavior to implement offsetof, just use the official builtin function instead. Approved by: portmgr (joneum) PR: 244234 Notes: svn path=/branches/2020Q1/; revision=526719
* MFH: r526717Niclas Zeising2020-02-212-5/+5
| | | | | | | | | | | | | graphics/drm-fbsd12.0-kmod: Update snapshot Update the graphics/drm-fbsd12.0-kmod snapshot Make unsynchronized DRM_IOCTL_I915_GEM_USERPTR work in mesa on 7th generation Haswell graphics. This is needed for vulkan. Approved by: portmgr (implicit, drm-drivers blanket) Notes: svn path=/branches/2020Q1/; revision=526718
* MFH: r526604Kyle Evans2020-02-211-1/+1
| | | | | | | | | | | | | | | | | | | | | www/p5-Gantry: correctly escape $ In make(1), "$$" is the escaped version of "$", rather than the expected "\$". this expression was getting passed through to ${REINPLACE_CMD} as "s,\NV{..." rathern than the expected "s,$ENV{..." -- bug #229925 makes \N an illegal expression, as ordinary characters will be disallowed from being escaped in preparation for future changes to grant some of these escape sequences GNU-extended behavior. PR: 240310 Approved by: koobs (mentor), bapt (mentor) Approved by: portmgr (maintainer timeout: 4 months, blanket: bugfix) Differential Revision: https://reviews.freebsd.org/D23701 Approved by: ports-secteam (blanket: bugfix) Notes: svn path=/branches/2020Q1/; revision=526605
* MFH: r526586Michael Gmelin2020-02-202-1/+28
| | | | | | | | | | | | | | | Fix accidental overwriting of properties on update See: https://github.com/iocage/iocage/issues/1130 https://github.com/iocage/iocage/commit/b47dc2c47ff125d644720b03f598a9caf4e08192 PR: 244252 Approved by: portmgr (runtime fix blanket) Notes: svn path=/branches/2020Q1/; revision=526588
* MFH: r526580Kyle Evans2020-02-201-1/+1
| | | | | | | | | | | | | | | | | | | | | | | x11-toolkits/p5-Alien-wxWidgets: remove extraneous escapes post-patch phase of this port uses sed to replace 'wx-config with '${WX_CONFIG:T}. Previously it escaped the ', but this is not necessary in this context. Remove the extraneous escape so that it doesn't get passed through to sed(1) as an escape of an ordinary character. This is important as the patch in bug #229925 will make such escapes an error to ease transition into a world where some escaped-ordinaries will be granted a special meaning. PR: 240450 Approved by: koobs (mentor), bapt (mentor) Approved by: portmgr (maintainer timeout: 4 months) Differential Revision: https://reviews.freebsd.org/D23702 Approved by: ports-secteam (implicit, future build fix) Notes: svn path=/branches/2020Q1/; revision=526585
* MFH: r526579Kyle Evans2020-02-202-1/+2
| | | | | | | | | | | | | | | | | x11-toolkits/p5-Alien-wxWidgets: add missing file to pkg-plist This appears to have been overlooked in a previous update, so note its presence in the pkg-plist. This fixes Q/A checks run by `poudriere testport`. Approved by: koobs (mentor), bapt (mentor) Differential Revision: D23702 (included, but not the primary change) Approved by: ports-secteam (implicit, packaging fix) Notes: svn path=/branches/2020Q1/; revision=526584
* MFH: r526577Kyle Evans2020-02-201-1/+1
| | | | | | | | | | | | | | | | | | | | | www/foswiki: remove redundant escape = does not need to be escaped in this context; bug #229925 will make this escape as well as the escape of most ordinary characters an error to reduce friction when some of these ordinary characters are later granted special GNU-extended behavior. No functional change, no need to bump PORTREVISION. PR: 240309 Approved by: koobs (mentor), bapt (mentor) Approved by: portmgr (maintainer timeout: 4 months) Differential Revision: https://reviews.freebsd.org/D23698 Approved by: ports-secteam (implicit, future build fix) Notes: svn path=/branches/2020Q1/; revision=526583
* MFH: r525282Kyle Evans2020-02-202-3/+2
| | | | | | | | | | | | | | | | | | | | | | | | qemu-user-static: revert SSP_CFLAGS workaround (ports r501032) This was later diagnosed to be a bug in libc, which has since been addressed in all supported releases and branches. PORTREVISION is bumped as SSP_CFLAGS will change the output, and for consumers of these two ports it is imperative that it be rebuilt against the updated libc to avoid high failure rates. In testing qemu-user-static-devel failed roughly 60% of the time, rendering it unusable as each fork/exec was yet one more chance to fail. The bug was fixed in the following patch levels (FreeBSD-EN-20:01.ssp): - 12.1-p2 - 12.0-p13 - 11.3-p6 PR: 243735 Approved by: koobs (ports) Approved by: ports-secteam (implicit, runtime fix) Notes: svn path=/branches/2020Q1/; revision=526582
* MFH: r525281Kyle Evans2020-02-201-2/+1
| | | | | | | | | | | | | | | | | | | | | glib20: revert SSP_CFLAGS workaround (ports r500819) This was later diagnosed to be a bug in libc, which has since been addressed in all supported releases and branches. PORTREVISION is bumped as SSP_CFLAGS will change the output. The bug was fixed in the following patch levels (FreeBSD-EN-20:01.ssp): - 12.1-p2 - 12.0-p13 - 11.3-p6 PR: 243735 Approved by: kwm (gnome, maintainer via IRC) Approved by: ports-secteam (miwi) Notes: svn path=/branches/2020Q1/; revision=526581
* MFH: r526535Matthias Andree2020-02-206-30/+47
| | | | | | | | | | | | | | | | | | | | | | | | | mail/fetchmail: mail/fetchmailconf: update to 6.4.2, make Python 3 compatible Fetchmail updated to new revision 6.4.2 - one bugfix - manual page updates - update of Chinese (simplified) translation - massive fetchmailconf overhaul + Python 3 compatible (requires py-future) + Supports IPv6 and SSL probing - remove two patches for fetchmail that are in the upstream release - add a smoke test to fetchmailconf's post-install, and a patch to support that running without X11 $DISPLAY. PR: 244130 Submitted by: mandree@ Reviewed by: Corey Halpin <chalpin@cs.wisc.edu> (maintainer) Approved by: Corey Halpin <chalpin@cs.wisc.edu> (maintainer) Approved by: ports-secteam@ (joneum@) Notes: svn path=/branches/2020Q1/; revision=526576
* MFH: r525497Cy Schubert2020-02-201-0/+1
| | | | | | | | | | | | | | | Fix CVE-2019-14868: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection. Submitted by: Siteshwar Vashisht <svashisht@redhat.com> Reported by: Marian Rehak Security: CVE-2019-14868 https://bugzilla.redhat.com/show_bug.cgi?id=1757324 https://access.redhat.com/security/cve/CVE-2019-14868 Approved by: portmgr (miwi) Notes: svn path=/branches/2020Q1/; revision=526540