aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* MFH: r5299932020Q1Bryan Drewery2020-03-312-1/+14
| | | | | | | | | | | | | | | | | - Fix runtime for gcc rpath. [1] This is a regression of something that was working in the past. Please keep the _GCC_RUNTIME handling even if removing USE_GCC as it may come back again in the future and be forgotten. - Fix build on 11.3 with ports ssl. [2] PR: 245048 [1] PR: 243315 [2] Submitted by: John Hein <jcfyecrayz at liamekaens.com> [2] Approved by: portmgr (implicit) Notes: svn path=/branches/2020Q1/; revision=529997
* MFH: r529134Bryan Drewery2020-03-312-6/+6
| | | | | | | | | | | | | - Unbreak by using new upstream The author restored the working version to github. The version in the README is wrong (1.10) but is correct in CHANGELOG (1.10.1). PR: 243852 Approved by: portmgr (implicit) Notes: svn path=/branches/2020Q1/; revision=529995
* MFH: r529125Bryan Drewery2020-03-312-6/+6
| | | | | | | | | | | - Unbreak - Bring in latest commit from github which adds 'Bootmethod` display and reorders the list slightly. Approved by: portmgr (implicit) Notes: svn path=/branches/2020Q1/; revision=529994
* MFH: r529930Jan Beich2020-03-312-5/+5
| | | | | | | | | | emulators/citra: update to s20200329 Changes: https://github.com/citra-emu/citra/compare/5dbf334ef...680ef64ac Approved by: ports-secteam (swills, implicit for snapshots) Notes: svn path=/branches/2020Q1/; revision=529935
* MFH: r529858 security/py-passlib: Update to 1.7.2Kubilay Kocak2020-03-302-6/+6
| | | | | | | | | | | | | | | - Update COMMENT to match setup.py:description Changelog: https://passlib.readthedocs.io/en/stable/history/1.7.html Requested by: bofh (via email) Approved by: ports-secteam (blanket: bugfix release) Notes: svn path=/branches/2020Q1/; revision=529859
* MFH: r526063 r527871Palle Girgensohn2020-03-2914-24/+42
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 12.2, 11.7, 10.12, 9.6.17, 9.5.21, and 9.4.26. This release fixes one security issue found in the PostgreSQL server and over 75 bugs reported over the last three months. Users should plan to update as soon as possible. PostgreSQL 9.4 Now EOL This is the last release for PostgreSQL 9.4, which will no longer receive security updates and bug fixes. PostgreSQL 9.4 introduced new features such as JSONB support, the `ALTER SYSTEM` command, the ability to stream logical changes to an output plugin, and more: https://www.postgresql.org/about/news/1557/ https://www.postgresql.org/docs/9.4/release-9-4.html While we are very proud of this release, these features are also found in newer versions of PostgreSQL. Many of these features have also received improvements, and, per our versioning policy, it is time to retire PostgreSQL 9.4. To receive continued support, we suggest that you make plans to upgrade to a newer, supported version of PostgreSQL. Please see the PostgreSQL versioning policy for more information. Security Issues * CVE-2020-1720: `ALTER ... DEPENDS ON EXTENSION` is missing authorization checks. Versions Affected: 9.6 - 12 The `ALTER ... DEPENDS ON EXTENSION` sub-commands do not perform authorization checks, which can allow an unprivileged user to drop any function, procedure, materialized view, index, or trigger under certain conditions. This attack is possible if an administrator has installed an extension and an unprivileged user can `CREATE`, or an extension owner either executes `DROP EXTENSION` predictably or can be convinced to execute `DROP EXTENSION`. Release notes: https://www.postgresql.org/docs/current/release.html databases/postgresql12-server: fix build on GCC architectures Use LLVM only if Clang is used. PR: 244225, 244985 Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=529830
* Revert r528941. Traefik 1.7.22+ needs Go 1.14 to build.Thomas Zander2020-03-292-6/+6
| | | | | | | Approved by: ports-secteam (riggs) Notes: svn path=/branches/2020Q1/; revision=529789
* MFH: r529287Jan Beich2020-03-282-5/+5
| | | | | | | | | | emulators/citra: update to s20200326 Changes: https://github.com/citra-emu/citra/compare/480d3aaf1...5dbf334ef Approved by: ports-secteam (swills, implicit for snapshots) Notes: svn path=/branches/2020Q1/; revision=529300
* MFH: r529245Wen Heping2020-03-276-12/+12
| | | | | | | | | | - Update mediawiki to 1.31.7, 1.33.3 and 1.34.1 (security releases) Approved by: ports-secteam@(joneum@) Notes: svn path=/branches/2020Q1/; revision=529297
* MFH: r529192Jochen Neumeister2020-03-262-4/+4
| | | | | | | | | | | | | | Update to 5.0.2 Changelog: https://www.phpmyadmin.net/news/2020/3/21/phpmyadmin-495-and-502-are-released/ Security: 97fcc60a-6ec0-11ea-a84a-4c72b94353b5 Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=529194
* MFH: r529191Jochen Neumeister2020-03-262-4/+4
| | | | | | | | | | | | | | Update to 4.9.5 Changelog: https://www.phpmyadmin.net/news/2020/3/21/phpmyadmin-495-and-502-are-released/ Security: 97fcc60a-6ec0-11ea-a84a-4c72b94353b5 Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=529193
* MFH: r529156Jan Beich2020-03-262-10/+5
| | | | | | | | | | emulators/citra: update to s20200325 Changes: https://github.com/citra-emu/citra/compare/37384174d...480d3aaf1 Approved by: ports-secteam (swills, implicit for snapshots) Notes: svn path=/branches/2020Q1/; revision=529160
* MFH: r529155Jan Beich2020-03-262-1/+29
| | | | | | | | | | | www/firefox: backport fix for a warning after r527804 JavaScript error: resource:///modules/BrowserGlue.jsm, line 2210: TypeError: Services.profiler is undefined Approved by: ports-secteam blanket Notes: svn path=/branches/2020Q1/; revision=529159
* MFH: r529117Li-Wen Hsu2020-03-252-4/+4
| | | | | | | | | | | | | - Update to 2.204.6 Approved by: swils (maintainer, implicitly) Security: 5bf6ed6d-9002-4f43-ad63-458f59e45384 Sponsored by: The FreeBSD Foundation Approved by: ports-secteam (miwi, implicitly) Notes: svn path=/branches/2020Q1/; revision=529119
* MFH: r529116Li-Wen Hsu2020-03-252-4/+4
| | | | | | | | | | | | - Update to 2.228 Security: 5bf6ed6d-9002-4f43-ad63-458f59e45384 Sponsored by: The FreeBSD Foundation Approved by: ports-secteam (miwi, implicitly) Notes: svn path=/branches/2020Q1/; revision=529118
* MFH: r529014Torsten Zuehlsdorff2020-03-254-4/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | lang/php74: Update from 7.4.3 to 7.4.4 Changelog: Core: Fixed bug #79329 (get_headers() silently truncates after a null byte) (CVE-2020-7066) Fixed bug #79244 (php crashes during parsing INI file). Fixed bug #63206 (restore_error_handler does not restore previous errors mask). COM: Fixed bug #66322 (COMPersistHelper::SaveToFile can save to wrong location). Fixed bug #79242 (COM error constants don't match com_exception codes on x86). Fixed bug #79247 (Garbage collecting variant objects segfaults). Fixed bug #79248 (Traversing empty VT_ARRAY throws com_exception). Fixed bug #79299 (com_print_typeinfo prints duplicate variables). Fixed bug #79332 (php_istreams are never freed). Fixed bug #79333 (com_print_typeinfo() leaks memory). CURL: Fixed bug #79019 (Copied cURL handles upload empty file). Fixed bug #79013 (Content-Length missing when posting a curlFile with curl). DOM: Fixed bug #77569: (Write Access Violation in DomImplementation). Fixed bug #79271 (DOMDocumentType::$childNodes is NULL). Enchant: Fixed bug #79311 (enchant_dict_suggest() fails on big endian architecture). EXIF: Fixed bug #79282 (Use-of-uninitialized-value in exif) (CVE-2020-7064). Fileinfo: Fixed bug #79283 (Segfault in libmagic patch contains a buffer overflow). FPM: Fixed bug #77653 (operator displayed instead of the real error message). Fixed bug #79014 (PHP-FPM & Primary script unknown). MBstring: Fixed bug #79371 (mb_strtolower (UTF-32LE): stack-buffer-overflow at php_unicode_tolower_full) (CVE-2020-7065). MySQLi: Fixed bug #64032 (mysqli reports different client_version). MySQLnd: Implemented FR #79275 (Support auth_plugin_caching_sha2_password on Windows). Opcache: Fixed bug #79252 (preloading causes php-fpm to segfault during exit). PCRE: Fixed bug #79188 (Memory corruption in preg_replace/preg_replace_callback and unicode). Fixed bug #79241 (Segmentation fault on preg_match()). Fixed bug #79257 (Duplicate named groups (?J) prefer last alternative even if not matched). PDO_ODBC: Fixed bug #79038 (PDOStatement::nextRowset() leaks column values). Reflection: Fixed bug #79062 (Property with heredoc default value returns false for getDocComment). SQLite3: Fixed bug #79294 (::columnType() may fail after SQLite3Stmt::reset()). Standard: Fixed bug #79254 (getenv() w/o arguments not showing changes). Fixed bug #79265 (Improper injection of Host header when using fopen for http requests). Zip: Fixed bug #79315 (ZipArchive::addFile doesn't honor start/length parameters). Changelog taken from: https://www.php.net/ChangeLog-7.php#7.4.4 Sponsored by: PHP Update Service Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=529093
* MFH: r529012Torsten Zuehlsdorff2020-03-252-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | lang/php73: Update from 7.3.15 to 7.3.16 Changelog: Core: Fixed bug #63206 (restore_error_handler does not restore previous errors mask). COM: Fixed bug #66322 (COMPersistHelper::SaveToFile can save to wrong location). Fixed bug #79242 (COM error constants don't match com_exception codes on x86). Fixed bug #79248 (Traversing empty VT_ARRAY throws com_exception). Fixed bug #79299 (com_print_typeinfo prints duplicate variables). Fixed bug #79332 (php_istreams are never freed). Fixed bug #79333 (com_print_typeinfo() leaks memory). DOM: Fixed bug #77569: (Write Access Violation in DomImplementation). Fixed bug #79271 (DOMDocumentType::$childNodes is NULL). Enchant: Fixed bug #79311 (enchant_dict_suggest() fails on big endian architecture). EXIF: Fixed bug #79282 (Use-of-uninitialized-value in exif). (CVE-2020-7064) MBstring: Fixed bug #79371 (mb_strtolower (UTF-32LE): stack-buffer-overflow at php_unicode_tolower_full). (CVE-2020-7065) MySQLi: Fixed bug #64032 (mysqli reports different client_version). PCRE: Fixed bug #79188 (Memory corruption in preg_replace/preg_replace_callback and unicode). PDO_ODBC: Fixed bug #79038 (PDOStatement::nextRowset() leaks column values). Reflection: Fixed bug #79062 (Property with heredoc default value returns false for getDocComment). SQLite3: Fixed bug #79294 (::columnType() may fail after SQLite3Stmt::reset()). Standard: Fixed bug #79329 (get_headers() silently truncates after a null byte). (CVE-2020-7066) Fixed bug #79254 (getenv() w/o arguments not showing changes). Fixed bug #79265 (Improper injection of Host header when using fopen for http requests). Changelog taken from: https://www.php.net/ChangeLog-7.php#7.3.16 Sponsored by: PHP Update Service Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=529091
* MFH: r529011Torsten Zuehlsdorff2020-03-252-4/+4
| | | | | | | | | | | | | | | | | | | | lang/php72: Update from 7.2.28 to 7.2.29 Changelog: Core: Fixed bug #79329 (get_headers() silently truncates after a null byte) (CVE-2020-7066) (cmb) EXIF: Fixed bug #79282 (Use-of-uninitialized-value in exif) (CVE-2020-7064) (Nikita) Changelog taken from: https://www.php.net/ChangeLog-7.php#7.2.29 Sponsored by: PHP Update Service Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=529090
* MFH: r529056Cy Schubert2020-03-242-9/+7
| | | | | | | | | | | | | | | | Unbreak by making fetchable again. This necessitates updating from 3.3.0 to 3.3.3 in order to make fetchable again. Assume maintainership. PR: 244998 Submitted by: cy Reported by: cy Approved by: maintainer (Adam McDougall <mcdouga9 at egr.msu.edu>) Approved by: portmgr (joneum) Notes: svn path=/branches/2020Q1/; revision=529062
* MFH: r523571 r525962 r528407 r529009Bernard Spil2020-03-244-768/+1273
| | | | | | | | | | | | | | | | | | | | www/nextcloud: Update to 18.0.0 www/nextcloud: Update to 18.0.1 www/nextcloud: Update to 18.0.2 www/nextcloud: Security update to 18.0.3 - Further vuln info not yet disclosed PR: 245016 Reported by: Marko Cupac <marko cupac mimar rs> Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=529041
* MFH: r529027Thomas Zander2020-03-242-4/+4
| | | | | | | | | | | | | Update to upstream release 0.21.21 Details: - Bug fixes, see https://raw.githubusercontent.com/MusicPlayerDaemon/MPD/v0.21.21/NEWS Approved by: ports-secteam(riggs) Notes: svn path=/branches/2020Q1/; revision=529028
* MFH: r528974Mark Felder2020-03-232-4/+4
| | | | | | | | | net-p2p/sonarr: Update to 2.0.0.5344 Approved by: portmgr (blanket) Notes: svn path=/branches/2020Q1/; revision=528975
* MFH: r528940Thomas Zander2020-03-222-6/+6
| | | | | | | | | | | | | Update to upstream release 1.7.22 Details: - Bug- and doc fixes, see https://github.com/containous/traefik/releases/tag/v1.7.22 Approved by: ports-secteam (riggs) Notes: svn path=/branches/2020Q1/; revision=528941
* MFH: r528170Antoine Brodin2020-03-221-0/+2
| | | | | | | | | | | | | Mark BROKEN: fails to build ../include/pbcopper/json/internal/json.hpp:1229:9: error: static_assert failed due to requirement 'sizeof(nlohmann::basic_json<std::map, std::vector, std::__1::basic_string<char>, bool, long, unsigned long, double, std::allocator, adl_serializer>) == 0' "could not find from_json() method in T's namespace" static_assert(sizeof(BasicJsonType) == 0, ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~ Reported by: pkg-fallout Notes: svn path=/branches/2020Q1/; revision=528906
* MFH: r524970 r528846Kai Knoblich2020-03-213-7/+17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | games/scummvm: Unbreak build with FLUIDSYNTH=on games/scummvm: Update to 2.1.1 Clean-up some stage QA warnings/issues while I'm here: * Fix pkg-plist issues if the MP3 option is set to off. * Add "iconv" to USES as scummvm is linked against libiconv.so. * Also add "--disable-ogg" to VORBIS_CONFIGURE_OFF if the VORBIS option is set to off. Otherwise scummvm is linked against "libogg.so" which is a dependency of the VORBIS option but "libogg.so" is already pulled in via the non-conditional "libtheoradec.so". Changelog: https://www.scummvm.org/news/20200131/ PR: 244272 Approved by: maintainer timeout (4+ weeks) Approved by: ports-secteam build/bugfix blanket Notes: svn path=/branches/2020Q1/; revision=528847
* MFH: r528732Adam Weinberger2020-03-191-1/+1
| | | | | | | | | gitea: Remove test that snuck in (no functional change) Approved by: portmgr (with hat) Notes: svn path=/branches/2020Q1/; revision=528733
* MFH: r528631 r528729Adam Weinberger2020-03-194-2698/+2714
| | | | | | | | | | | | | | | | | | | | | | | | www/gitea: Use OPTIONS_SUB gitea: Update to 1.11.3 This release fixes three bugs. Release notes: https://blog.gitea.io/2020/03/gitea-1.11.3-and-1.10.6-released/ Also fix LDFLAGS so that the version number (among other things) is built into the binary correctly, and make the regexp used in the Makefile work with bsdgrep (both thanks to adamw). Will MFH due to bsdgrep build failure and stopwatch panic fix. PR: 244898 Submitted by: maintainer Approved by: portmgr (with hat) Notes: svn path=/branches/2020Q1/; revision=528731
* MFH: r528658Yuri Victorovich2020-03-192-6/+6
| | | | | | | | | | | | | security/tor-devel: Update 0.4.3.2 -> 0.4.3.3 Bugfix release: https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.4.3.3-alpha Reported by: upstream notification Approved by: ports-secteam Notes: svn path=/branches/2020Q1/; revision=528697
* MFH: r528657Yuri Victorovich2020-03-192-4/+4
| | | | | | | | | | | | | security/tor: Update 0.4.2.6 -> 0.4.2.7 Bugfix release: https://gitweb.torproject.org/tor.git/tree/ChangeLog?h=tor-0.4.2.7 Reported by: upstream notification Approved by: ports-secteam Notes: svn path=/branches/2020Q1/; revision=528693
* MFH: r528676 r528679Jan Beich2020-03-192-5/+10
| | | | | | | | | | emulators/citra: update to s20200317 Changes: https://github.com/citra-emu/citra/compare/ad3c464e2...37384174d Approved by: ports-secteam (swills, implicit for snapshots) Notes: svn path=/branches/2020Q1/; revision=528680
* MFH: r528630 www/py-bleach: Update to 3.1.3Kubilay Kocak2020-03-182-5/+5
| | | | | | | | | | | | | Changelog: https://github.com/mozilla/bleach/blob/v3.1.3/CHANGES Security: 3d19c776-68e7-11ea-91db-0050562a4d7b Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=528634
* MFH: r528547Kyle Evans2020-03-185-1/+15
| | | | | | | | | | | | | | | | | | | | sysutils/u-boot-rpi{3,4}: Add patch to fix PSCI stub reservation For the traditional spin table setup, only the lowest page needs to be reserved. However, our PSCI stubs are slightly bigger and occupy a little over one page. These patches, already sent upstream, allow a variable number of initial pages to be reserved for the SMP stubs. We then set the values for these in our fragment to '2' to reserve the first and second page. Approved by: koobs (mentor) Approved by: manu (uboot, maintainer) Differential Revision: https://reviews.freebsd.org/D24085 Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=528622
* MFH: r528619 devel/py-virtualenvwrapper: Fix virtualenvwrapper_lazy.sh wrapperKubilay Kocak2020-03-182-4/+7
| | | | | | | | | | | | | | | | | | | | Fix the virtualenvwrapper_lazy.sh wrapper to invoke the Python versions-specific virtualenvwrapper.sh script that the port/package was built with, preventing the following error: ERROR: virtualenvwrapper_lazy.sh: Could not find virtualenvwrapper.sh While I'm here: - Update pkg-descr WWW: URL to match setup.py:homepage - Update COMMENT to match setup.py:summary Approved by: portmgr (blanket: ports (python) compliance, run-time bugfix) Approved by: ports-secteam (blanket: ports (python) compliance, run-time bugfix) Notes: svn path=/branches/2020Q1/; revision=528620
* MFH: r528508Craig Leres2020-03-182-5/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | security/bro: Update to 3.0.3 and address a number of potential denial of service issues: https://github.com/zeek/zeek/releases/tag/v3.0.2 https://github.com/zeek/zeek/releases/tag/v3.0.3 - Potential Denial of Service due to memory leak in DNS TSIG message parsing. - Potential Denial of Service due to memory leak (or assertion when compiling with assertions enabled) when receiving a second SSH KEX message after a first. - Potential Denial of Service due to buffer read overflow and/or memory leaks in Kerberos analyzer. The buffer read overflow could occur when the Kerberos message indicates it contains an IPv6 address, but does not send enough data to parse out a full IPv6 address. A memory leak could occur when processing KRB_KDC_REQ KRB_KDC_REP messages for message types that do not match a known/expected type. - Potential Denial of Service when sending many zero-length SSL/TLS certificate data. Such messages underwent the full Zeek file analysis treatment which is expensive (and meaninguless here) compared to how cheaply one can "create" or otherwise indicate many zero-length contained in an SSL message. - Potential Denial of Service due to buffer read overflow in SMB transaction data string handling. The length of strings being parsed from SMB messages was trusted to be whatever the message claimed instead of the actual length of data found in the message. - Potential Denial of Service due to null pointer dereference in FTP ADAT Base64 decoding. - Potential Denial of Service due buffer read overflow in FTP analyzer word/whitespace handling. This typically won't be a problem in most default deployments of Zeek since the FTP analyzer receives data from a ContentLine (NVT) support analyzer which first null-terminates the buffer used for further FTP parsing. Approved by: ler (mentor, implicit) Security: 4ae135f7-85cd-4c32-ad94-358271b31f7f Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=528617
* MFH: r528561Koichiro Iwao2020-03-172-4/+6
| | | | | | | | | | | | | | | | security/softether5: fix build on aarch64 Tested on Amazon EC2 A1 instances with FreeBSD/ARM 12 image[1]. Build on mips also should be fixed (not actually tested). [1] https://aws.amazon.com/marketplace/pp/B081NF7BY7 Sponsored by: HAW International Approved by: portmgr branket (fix build) Notes: svn path=/branches/2020Q1/; revision=528563
* MFH: r526348 sysutils/py-diffoscope: Update to 136Kubilay Kocak2020-03-142-5/+5
| | | | | | | | | | | | Merge ports r526348 (update to 136, bugfix release) which should have been merged with ports r528329 PR: 244750 Approved by: ports-secteam (blanket: bugfix release, fix quarterly regression) Notes: svn path=/branches/2020Q1/; revision=528398
* MFH: r528394Jan Beich2020-03-142-5/+5
| | | | | | | | | | emulators/citra: update to s20200312 Changes: https://github.com/citra-emu/citra/compare/2c0bd0f2a...ad3c464e2 Approved by: ports-secteam (swills, implicit for snapshots) Notes: svn path=/branches/2020Q1/; revision=528395
* MFH: r528327 sysutils/py-diffoscope: Restore portability of zipinfo callKubilay Kocak2020-03-132-0/+29
| | | | | | | | | | | | | | | | | /dev/stdin is a non-portable non-POSIX extension having different semantics on different operating systems. zininfo(1) exits with 9 when /dev/stdin is supplied on FreeBSD. In fact, unzip(1) explicitly documents that it does not support reading from stdin. [1] https://lists.reproducible-builds.org/pipermail/diffoscope/2020-March/002632.html PR: 244750 Submitted by: Michael Osipov <michael.osipov siemens com> Approved by: ports-secteam (blanket: runtime bugfix) Notes: svn path=/branches/2020Q1/; revision=528329
* MFH: r528231Christoph Moench-Tegeder2020-03-122-6/+5
| | | | | | | | | | | mail/thunderbird: update to 68.6.0 Releasenotes https://www.thunderbird.net/en-US/thunderbird/68.6.0/releasenotes/ Approved by: portmgr blanket "web browser alike" Notes: svn path=/branches/2020Q1/; revision=528313
* MFH: r528046Tobias C. Berner2020-03-122-6/+8
| | | | | | | | | | | | irc/bitlbee-discord: Update to 0.4.2-11 PR: 244392 Submitted by: Arthur Pirika <arfy32@gmail.com> (maintainer) Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=528311
* MFH: r528261Wen Heping2020-03-127-13/+13
| | | | | | | | | | - Update Django to 3.0.4, 2.2.11 and 1.11.29(security release) Security: CVE-2020-9402 Approved by: ports-secteam@(joneum@) Notes: svn path=/branches/2020Q1/; revision=528277
* MFH: r528272Jochen Neumeister2020-03-1216-6/+426
| | | | | | | | | | | | | | | | | | | | This fix a Problem, when MySQL build with libressl /var/ports/usr/ports/databases/mysql56-client/work/mysql-5.6.47/vio/viosslfactories.c:230:25: error: use of undeclared identifier 'SSL_OP_NO_TLSv1_3' SSL_OP_NO_TLSv1_3 | ^ /var/ports/usr/ports/databases/mysql56-client/work/mysql-5.6.47/vio/viosslfactories.c:275:12: warning: implicit declaration of function 'SSL_CTX_set_ciphersuites' is invalid in C99 [-Wimplicit-function-declaration] if (0 == SSL_CTX_set_ciphersuites(ssl_fd->ssl_context, "")) Special thanks for his help to: fluffy PR: 244320 Sponsored by: Netzkommune GmbH Approved by: ports-secteam (joneum) Notes: svn path=/branches/2020Q1/; revision=528273
* MFH: r528267Jung-uk Kim2020-03-123-5/+5
| | | | | | | | | Update to 32.0.0.344. Approved by: ports-secteam (blanket) Notes: svn path=/branches/2020Q1/; revision=528268
* MFH: r528258Kyle Evans2020-03-125-53/+41
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | emulators/virtualbox-ose: use contemporary GCC instead of old llvm The bug in PR 236616 resulted in virtualbox getting pinned to llvm7. This is less than ideal, and in-fact has been broken by improvements to machine/atomic.h on x86 that require a more modern compiler. Switch the build to USE_GCC= any. The patches that were previously applied if COMPILER_TYPE == clang are actually needed by newer GCCs as well, so make those standard patches instead, folding the Config.kmk patches together. We should put some effort into testing llvm10 and working out why llvm breaks it, but fixing the build is more important at the moment. Q/A: * portlint (pre-existing issues; none in current patch) * testport (-CURRENT, amd64) * run testing by madpilot@ PR: 244603 Approved by: koobs (mentor), bapt (mentor) Approved by: portmgr (blanket: build fix) Differential Revision: https://reviews.freebsd.org/D23967 Approved by: ports-secteam (blanket: build fix) Notes: svn path=/branches/2020Q1/; revision=528259
* MFH: r528243Thomas Zander2020-03-112-4/+4
| | | | | | | | | | | | | | | | Update to upstream version 44.0.0 Details: - Mostly bugfixes, see https://mkvtoolnix.download/doc/NEWS.md but also a helpful new feature: - MKVToolNix GUI: header editor: the attachments can now be reordered via drag & drop. Approved by: ports-secteam (riggs) Notes: svn path=/branches/2020Q1/; revision=528253
* MFH: r528139Jan Beich2020-03-092-5/+5
| | | | | | | | | | www/firefox: switch to rc3 Changes: https://hg.mozilla.org/releases/mozilla-release/rev/c6e493873ba5 Approved by: ports-secteam blanket Notes: svn path=/branches/2020Q1/; revision=528140
* MFH: r527914Jan Beich2020-03-095-29/+8
| | | | | | | | | | | | security/nss: update to 3.51 Changes: https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.51_release_notes Changes: https://hg.mozilla.org/projects/nss/shortlog/NSS_3_51_RTM ABI: https://abi-laboratory.pro/tracker/timeline/nss/ Approved by: ports-secteam blanket (required by Firefox 75) Notes: svn path=/branches/2020Q1/; revision=528115
* MFH: r524792Jan Beich2020-03-093-110/+20
| | | | | | | | | | | | | | devel/nspr: update to 4.25 - Only run tests enabled on upstream CI Changes: http://mozilla.6506.n7.nabble.com/ANNOUNCE-NSPR-4-25-Release-td383750.html ABI: https://abi-laboratory.pro/tracker/timeline/nspr/ Reported by: Repology Approved by: ports-secteam blanket Notes: svn path=/branches/2020Q1/; revision=528114
* MFH: r522737 r524737 r525719Jan Beich2020-03-092-4/+4
| | | | | | | | | | | devel/rust-cbindgen: update to 0.13.1 Changes: https://github.com/eqrion/cbindgen/compare/v0.12.1...v0.13.1 Reported by: GitHub (watch releases) Approved by: ports-secteam blanket Notes: svn path=/branches/2020Q1/; revision=528113
* MFH: r527890Jan Beich2020-03-072-0/+282
| | | | | | | | | | www/firefox: backport font selection regression fix Requested by: Andy New (on gecko@ list) Approved by: ports-secteam blanket Notes: svn path=/branches/2020Q1/; revision=527970