| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
| |
This fixes a security bug, various other bugs, and supports SSH
connection sharing between multiple instances of PuTTY and its tools.
MFH: 2015Q1
Security: 92fc2e2b-c383-11e4-8ef7-080027ef73ec
Security: CVE-2015-2157
Notes:
svn path=/head/; revision=380554
|
|
|
|
| |
Notes:
svn path=/head/; revision=380553
|
|
|
|
|
|
|
| |
PR: 197465
Notes:
svn path=/head/; revision=380546
|
|
|
|
|
|
|
| |
PR: 197465, 197466, 197467
Notes:
svn path=/head/; revision=380545
|
|
|
|
|
|
|
| |
Changes: https://github.com/capistrano/sshkit/blob/master/CHANGELOG.md
Notes:
svn path=/head/; revision=380529
|
|
|
|
|
|
|
|
|
|
| |
- Include upstream accepted Clang 3.6.0 fixes by Dimitry Andric <dim@FreeBSD.org>
PR: 198113
Submitted by: Stefan Grundmann <sg2342@googlemail.com>
Notes:
svn path=/head/; revision=380487
|
|
|
|
|
|
|
|
| |
Submitted by: Carlos Jacobo Puga Medina
Obtained from: http://googlechromereleases.blogspot.nl/
Notes:
svn path=/head/; revision=380453
|
|
|
|
| |
Notes:
svn path=/head/; revision=380451
|
|
|
|
|
|
|
|
| |
PR: 198018
Submitted by: Craig Leres <leres@ee.lbl.gov>
Notes:
svn path=/head/; revision=380437
|
|
|
|
|
|
|
|
|
| |
- Fix USE_LDCONFIG [2].
Spotted by: sunpoet [1] and bdrewery [2]
Notes:
svn path=/head/; revision=380434
|
|
|
|
|
|
|
|
| |
PR: 198269
Submitted by: Bernard Spil <spil.oss at gmail.com>
Notes:
svn path=/head/; revision=380424
|
|
|
|
|
|
|
| |
Approved by: portmgr blanket
Notes:
svn path=/head/; revision=380417
|
|
|
|
|
|
|
|
|
|
|
| |
went into the main loop, no esp could be sent.
PR: 197835 (based on)
Submitted by: markiyan.kushnir@gmail.com
Fix confirmed: xmj
Notes:
svn path=/head/; revision=380395
|
|
|
|
|
|
|
| |
Changes: https://github.com/capistrano/sshkit/blob/master/CHANGELOG.md
Notes:
svn path=/head/; revision=380362
|
|
|
|
|
|
|
|
|
|
|
|
| |
functions to macros, so the constraints requirements are satisfied at
compile time. It is almost exactly the same as the patch for
libtomcrypt itself, in PR 198017.
Approved by: maintainer (vanilla)
PR: 198190
Notes:
svn path=/head/; revision=380341
|
|
|
|
| |
Notes:
svn path=/head/; revision=380310
|
|
|
|
| |
Notes:
svn path=/head/; revision=380309
|
|
|
|
| |
Notes:
svn path=/head/; revision=380272
|
|
|
|
|
|
|
|
|
| |
- Add LICENSE
Changes: https://github.com/codahale/bcrypt-ruby/blob/master/CHANGELOG
Notes:
svn path=/head/; revision=380271
|
|
|
|
|
|
|
|
|
|
|
|
| |
The scrypt key derivation function is designed to be far more secure against
hardware brute-force attacks than alternative functions such as PBKDF2 or
bcrypt.
WWW: https://github.com/pbhogan/scrypt
RG: https://rubygems.org/gems/scrypt
Notes:
svn path=/head/; revision=380268
|
|
|
|
| |
Notes:
svn path=/head/; revision=380266
|
|
|
|
|
|
|
|
| |
PR: 198115
Submitted by: rsimmons0@gmail.com
Notes:
svn path=/head/; revision=380252
|
|
|
|
|
|
|
|
| |
PR: 197470
Submitted by: maintainer (Sergei Vyshenski)
Notes:
svn path=/head/; revision=380233
|
|
|
|
|
|
|
|
| |
PR: 197471
Submitted by: maintainer (Sergei Vyshenski)
Notes:
svn path=/head/; revision=380232
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
With the previous change, libgpg-error does not pass configure target
on FreeBSD 11 due tradcpp failing "sanity checks". This is a regression
since this port builds fine on FreeBSD 10. However, 2037 ports get
skipped (this port is *way* too important) as a result, so revert the
gcc-5 fix until a solution can be found.
PR: 197562
Notes:
svn path=/head/; revision=380217
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This port relies on CPP behavior that changes on GCC 5. To ensure
libgpg-error keeps building on the newest GCC, add a build dependency
on tradcpp and use it instead.
PR: 197562
Submitted by: marino
Approved by: maintainer (novel)
Notes:
svn path=/head/; revision=380211
|
|
|
|
|
|
|
|
|
| |
- Fix shebangs
MFH: 2015Q1
Notes:
svn path=/head/; revision=380198
|
|
|
|
|
|
|
|
|
| |
- Fix version requirement of BUILD_DEPENDS
- Sort PLIST
- Bump PORTREVISION for dependency change
Notes:
svn path=/head/; revision=380193
|
|
|
|
|
|
|
|
|
| |
- Sort PLIST
Changes: http://search.cpan.org/dist/Filter-Crypto/Changes
Notes:
svn path=/head/; revision=380188
|
|
|
|
| |
Notes:
svn path=/head/; revision=380180
|
|
|
|
|
|
|
| |
Reviewed by: zi
Notes:
svn path=/head/; revision=380172
|
|
|
|
|
|
|
|
|
|
|
| |
Changes:
http://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
PR: 198109
Submitted by: Carlos Jacobo Puga Medina <cpm@fbsd.es> (maintainer)
Notes:
svn path=/head/; revision=380161
|
|
|
|
| |
Notes:
svn path=/head/; revision=380145
|
|
|
|
|
|
|
|
| |
- Fix whitespace
- Drop @dirrm* from plist
Notes:
svn path=/head/; revision=380079
|
|
|
|
|
|
|
| |
Approved by: portmgr blanket
Notes:
svn path=/head/; revision=380075
|
|
|
|
|
|
|
| |
https://bugzilla.mozilla.org/show_bug.cgi?id=1137604
Notes:
svn path=/head/; revision=380068
|
|
|
|
| |
Notes:
svn path=/head/; revision=380065
|
|
|
|
|
|
|
| |
Approved by: zi (mentor)
Notes:
svn path=/head/; revision=380052
|
|
|
|
|
|
|
|
|
|
| |
The modules in this distribution implement the Salted Challenge Response
Authentication Mechanism (SCRAM) from RFC 5802.
WWW: http://search.cpan.org/dist/Authen-SCRAM/
Notes:
svn path=/head/; revision=380031
|
|
|
|
|
|
|
|
|
|
| |
PBKDF2::Tiny provides an RFC 2898 compliant PBKDF2 implementation using
HMAC-SHA1 or HMAC-SHA2 in under 100 lines of code.
WWW: http://search.cpan.org/dist/PBKDF2-Tiny/
Notes:
svn path=/head/; revision=380030
|
|
|
|
|
|
|
|
|
|
|
| |
Authen::SASL::SASLprep implements the SASLprep specification, which describes
how to prepare Unicode strings representing user names and passwords for
comparison. SASLprep is a profile of the stringprep algorithm.
WWW: http://search.cpan.org/dist/Authen-SASL-SASLprep/
Notes:
svn path=/head/; revision=380029
|
|
|
|
|
|
|
|
|
| |
sufficient.
Thanks to az for showing me the light here.
Notes:
svn path=/head/; revision=380025
|
|
|
|
| |
Notes:
svn path=/head/; revision=379983
|
|
|
|
| |
Notes:
svn path=/head/; revision=379982
|
|
|
|
| |
Notes:
svn path=/head/; revision=379981
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This is a bugfix release. The krb5-1.11 release series has reached
the end of its maintenance period, and krb5-1.11.6 is the last planned
release in the krb5-1.11 series. For new deployments, installers
should prefer the krb5-1.13 release series or later.
This commit deprecates this port.
* Work around a gcc optimizer bug that could cause DB2 KDC database
operations to spin in an infinite loop
* Fix a backward compatibility problem with the LDAP KDB schema that
could prevent krb5-1.11 and later from decoding entries created by
krb5-1.6.
* Handle certain invalid RFC 1964 GSS tokens correctly to avoid
invalid memory reference vulnerabilities. [CVE-2014-4341
CVE-2014-4342]
* Fix memory management vulnerabilities in GSSAPI SPNEGO.
[CVE-2014-4343 CVE-2014-4344]
* Fix buffer overflow vulnerability in LDAP KDB back end.
[CVE-2014-4345]
* Fix multiple vulnerabilities in the LDAP KDC back end.
[CVE-2014-5354 CVE-2014-5353]
* Fix multiple kadmind vulnerabilities, some of which are based in the
gssrpc library. [CVE-2014-5352 CVE-2014-9421 CVE-2014-9422
CVE-2014-9423]
Security: dbf9e66c-bd50-11e4-a7ba-206a8a720317
CVE-2014-4341, CVE-2014-4342, CVE-2014-4343, CVE-2014-4344
CVE-2014-4345, CVE-2014-5354, CVE-2014-5353, CVE-2014-5352
CVE-2014-9421, CVE-2014-9422, CVE-2014-9423
Notes:
svn path=/head/; revision=379969
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Handle certain invalid RFC 1964 GSS tokens correctly to avoid
invalid memory reference vulnerabilities. [CVE-2014-4341
CVE-2014-4342]
* Fix memory management vulnerabilities in GSSAPI SPNEGO.
[CVE-2014-4343 CVE-2014-4344]
* Fix buffer overflow vulnerability in LDAP KDB back end.
[CVE-2014-4345]
* Fix multiple vulnerabilities in the LDAP KDC back end.
[CVE-2014-5354 CVE-2014-5353]
* Fix multiple kadmind vulnerabilities, some of which are based in the
gssrpc library. [CVE-2014-5352 CVE-2014-9421 CVE-2014-9422
CVE-2014-9423]
Security: CVE-2014-4341, CVE-2014-4342, CVE-2014-4343, CVE-2014-4344
CVE-2014-4345, CVE-2014-5354, CVE-2014-5353, CVE-2014-5352
CVE-2014-9421, CVE-2014-9422, CVE-2014-9423
Notes:
svn path=/head/; revision=379968
|
|
|
|
| |
Notes:
svn path=/head/; revision=379948
|
|
|
|
| |
Notes:
svn path=/head/; revision=379946
|
|
|
|
| |
Notes:
svn path=/head/; revision=379897
|