| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
| |
Security: 0132ca5b-5d11-11ec-8be6-d4c9ef517024
MFH: 2021Q4
(cherry picked from commit 2b095f9a257a5916bf2e55094ad43e4e8f632c80)
|
|
|
|
|
|
|
|
|
|
|
|
| |
While here pet portfmt.
Changes: https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
PR: 260250
Approved by: 0mp (mentor)
MFH: 2021Q4
Differential Revision: https://reviews.freebsd.org/D33335
(cherry picked from commit 3571a07d68b7dbce0e19619e135fb76766c7af12)
|
|
|
|
| |
(cherry picked from commit 42d73509241dbede9fb29d56683188fa4a1b2872)
|
|
|
|
|
|
| |
While here, shorten LZO_DESC to fit 80x24 dialogs.
(cherry picked from commit bedfd042b988444cb311f477d5cf1e4457ead29f)
|
|
|
|
|
|
|
|
|
|
|
| |
...now that mbedTLS metadata was fixed to show the actual situation
for mbedTLS 2.x.y, that it's either Apache License 2.0, or
GNU General Public License 2.0 or any later version.
While here, also mark the main port with mbedTLS option enabled to
record it's going to lose the mbedTLS option end of March 2022.
(cherry picked from commit d02b0675d0630a9ac66617becd9f9cfbbca9c524)
|
|
|
|
|
|
|
|
|
|
| |
"Unless specifically indicated otherwise in a file, Mbed TLS files are provided
under the Apache License 2.0, or the GNU General Public License v2.0 or later
(SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later)."
Approved by: portmgr@ (blanket metadata change approval)
(cherry picked from commit cd08d6c7ed39147df7ed9beef9536c9c5151ac01)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
After reviewing licenses again,
- mark mbedTLS broken for now, since it uses the Apache License 2.0,
which is incompatible with the GPLv2 (OpenVPN does not employ the
"or any later version" escape hatch). This will be handed to the
OpenVPN-devel mailing list for review.
- block out the combination of LZO with LibreSSL, since OpenVPN
only has a linking exception for OpenSSL itself. Remedy is
to either forgo LibreSSL, or to disable the LZO option, which
requires proper configuration on either end. The maintainer's
recommendation is to compile with OpenSSL instead.
Bump PORTREVISION in spite of unchanged contents to flush out old
packages.
MFH: 2021Q4
(cherry picked from commit 5cc978dcfe58a52b9a163e080d855b022ac22545)
|
|
|
|
|
|
|
| |
All supported versions of FreeBSD provide pcap support. Disable the
PCAP option by default.
(cherry picked from commit cb950ffff2e18ff8148ae10ac010b000b926739c)
|
|
|
|
|
|
|
| |
PCAP option conflicts with pcap in 14-CURRENT base. Mark the option
BROKEN.
(cherry picked from commit b1dcaf64da857d32153590fed40804f460da9bb9)
|
|
|
|
|
|
|
|
| |
Changes: https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/vy9284s8APM
Changes: https://hg.mozilla.org/projects/nss/shortlog/NSS_3_73_RTM
Reported by: Repology
(cherry picked from commit 41fa14b53804ce4c79b5a88d902031fe0803aadf)
|
|
|
|
|
|
|
|
|
|
| |
Ensure payload is serialized consistently (canonical).
PR: 260112
Approved by: philip (mentor)
Differential Revision: https://reviews.freebsd.org/D33201
(cherry picked from commit 552c9a7e733839fac305715b7dbde0b33f53933f)
|
|
|
|
|
|
| |
Changes: https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.72_release_notes
Changes: https://hg.mozilla.org/projects/nss/shortlog/NSS_3_72_RTM
(cherry picked from commit c8c0edf0cae2490970ea899e49223c3ae01fac5a)
|
|
|
|
|
|
|
|
|
| |
PR: 260017
Reported by: Michael Osipov
Discussed with: hrs
MFH: 2021Q4
(cherry picked from commit 17b54ce763286be358fae69961f5fb1a670c614c)
|
|
|
|
|
|
|
|
| |
To make it possible to easily import py-pyjwt v2.x move the current port
to a versioned directory. Bump consumers after rename of the dependency.
PR: 254038
(cherry picked from commit e6ec12f6646f71fe84268d21f3a6901191ebf60e)
|
|
|
|
| |
(cherry picked from commit 988c8752f06ed079d9f8a2c2671eae8fea9e389f)
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Fix issue that Mcrypt.so is linked with libltdl.so if the port is
build under the environment where devel/libltdl is installed
* Add TIMESTAMP to distinfo
* Switch to DISTVERSION
* Regenerate pkg-plist with `make makeplist`
* Pet portlint and portclippy
PR: 259210
MFH: 2021Q4
(cherry picked from commit e6a10825e4a359c04e254766107ac4769ea60bd1)
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fix plist error when user sets CLAMAVUSER to non-default value.
This is direct commit to 2021Q4 branch as the commit that causes plist
error is also direct one.
PR: 259663
Reported by: ml at netfence dot it
Fixes: 2da7ca992591 (security/clamav: Update to new bugfix release 0.103.4)
Approved by: fluffy (ports-secteam)
|
|
|
|
|
|
|
|
|
| |
* Pet portclippy
* Re-format Makefile with portfmt
PR: 241745
MFH: 2021Q4
(cherry picked from commit c99114e14f7c799db21764b80ef612e9763e0a61)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This is direct commit to 2021Q4 branch. The reason that it is not MFH
is as following.
* On September upstream changed their release and support policy as
following.
- They release Regular Feature Release (= x.y.0 release) more
frequently. And x.y.z releases are supported until 4 months after
the release of x.(y+1).0.
- To compensate for the short lifetime of Regular Feature Releases,
Long Term Support (LTS) Feature Release is introduced. A new LTS
Feature Release will be identified approximately every two years
and be supported for at least three years from the initial
publication date of that LTS feature version.
* Version 0.103.3 was identified as first LTS Feature Release.
* After 2021Q4 branch was created, on main brach security/clamav was
updated to 0.104.0 and security/clamav-lts was added.
* Version 0.104.0 is first Regular Feature Release that new upstream
policy is applied. There are large chages between 0.103.3 and
0.104.0 as upstream refactored their code base.
* On November 3rd new bugfix releases 0.104.1 and 0.103.4 were
released. On main branch I already updated both security/clamav
and security/clamav-lts to their latest releases.
* As is exlained above lifetime of 0.104.x isn't so long and there is
large difference between 0.103.x and 0.104.x. Furthermore there
isn't security/clamav-lts in 2021Q4 branch that can be selected as
alternative for those who look for longer lifetime.
* So merging 0.104.x to 2021Q4 isn't appropriate in this case and I
select to update security/clamav to 0.103.3.
ReleaseNotes: https://blog.clamav.net/2021/11/clamav-01034-and-01041-patch-releases.html
PR: 259641
Approved by: fluffy (ports-secteam@)
|
|
|
|
|
|
|
|
|
| |
(two commits squashed for clarity)
PR: 259384
(cherry picked from commit bb6ec079c50dc6f45700dd5897b35f66a19ee51c)
(cherry picked from commit 89d9e9320aff2d4c61be4c7dfa1b6829717bd034)
|
|
|
|
|
|
|
|
| |
adds openvpn-examples(5) manual page
Changelog:
https://github.com/OpenVPN/openvpn/blob/release/2.5/Changes.rst#overview-of-changes-in-254
(cherry picked from commit cf4dd6bbfe80d93a23f2f7d140ed5dd764d13e96)
|
|
|
|
|
|
|
|
|
| |
* Update CONFLICTS
* Update pkg-message
PR: 259000
MFH: 2021Q4
(cherry picked from commit 7e96b5f51e6be90611ac7828980e61f31998e07b)
|
|
|
|
|
| |
Changelog: https://gitweb.torproject.org/tor.git/plain/ChangeLog?h=tor-0.4.6.8
(cherry picked from commit 0c3ad9597bc1a27a3e712b4efeb1aa5dc1af772f)
|
|
|
|
|
|
|
| |
Changelog: https://gitweb.torproject.org/tor.git/plain/ChangeLog?h=tor-0.4.7.2-alpha
PR: 259531
(cherry picked from commit a58a309a102b6d2994437149e4c198bae330c5e1)
|
|
|
|
|
|
|
|
|
|
| |
Patch the configure script so it evaluates a variable that uses
PYTHON_PREFIX (since automake 1.16.4) before PYTHON_PREFIX is unset.
PR: 258898
Approved by: maintainer timeout (2 weeks)
(cherry picked from commit b07a361a29711f26c51b24b433662baa37648194)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Switch to DISTVERSION
* Pet portclippy
* Reformat Makefile with portfmt
PR: 259297
Approved by: maintainer
Obtained from: https://github.com/fail2ban/fail2ban/commit/410a6ce5c80dd981c22752da034f2529b5eee844
MFH: 2021Q4
Security: CVE-2021-32749
Security: https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm
Differential Revision: https://reviews.freebsd.org/D32576
(cherry picked from commit 644e5b65b9503bed420885c9fefc8b3941dd009d)
|
|
|
|
|
|
|
|
|
| |
This reverts commit f4511dc4a7c439b30c898b75246d314a574f01cb.
Add MOVED entries.
These ports are not required anymore as gitlab 14.4.0 has upgrade
now to rails 6.1.4.1.
(cherry picked from commit 4a7e890e91522896eb83f1c2f278ce0414175333)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Security & Bugfix Update to 5.9.4:
- Changelog: https://github.com/strongswan/strongswan/releases/tag/5.9.4
- While here change repos to https
- Fix CVE-2021-41990: https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41990).html
- Fix CVE-2021-41991: https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html
PR: 259267
Approved by: strongswan@Nanoteq.com (maintainer)
MFH: 2021Q4
(cherry picked from commit eead2ddf757a4e9f50eedd1680f3b62e6a16aaef)
|
|
|
|
| |
Obtained from: OpenSSH-portable git
|
|
|
|
|
|
|
|
|
|
|
|
| |
Merged upstream as https://github.com/pyca/cryptography/pull/6360
and backported to this version.
While here, remove remaining FreeBSD 11 cruft
Approved by: fluffy (mentor), koobs (implicit: MAINTAINER_POLICY)
Differential Revision: https://reviews.freebsd.org/D32281
(cherry picked from commit 5b57210d0d0a7d74c9f8b4895907b34f2f34473d)
|
|
|
|
|
|
|
| |
The upgrade of rails to 6.1.4 broke www/gitlab-ce.
PR: 258855
(cherry picked from commit f4511dc4a7c439b30c898b75246d314a574f01cb)
|
|
|
|
|
|
|
|
|
|
|
| |
This bug causes a stack overflow (and crash due to failed stack check)
when certain IPv6 addresses are whitelisted on i386.
PR: 258179
Reported by: John Marshall <john@jmarshall.id.au>
MFH: 2021Q4
(cherry picked from commit c3381bf4d961159f4903f573c7f01fae85ad5a18)
|
|
|
|
|
|
|
| |
* Fixes issues with LetsEncrypt DST Root X3 expiry
MFH: 2021Q4
(cherry picked from commit 13cf9e281a81d2592549630020c2a3e984a77137)
|
|
|
|
|
| |
Changes: https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.71_release_notes
Changes: https://hg.mozilla.org/projects/nss/shortlog/NSS_3_71_RTM
|
|
|
|
| |
Reported by: portscout
|
|
|
|
|
|
|
|
| |
In addition to fetching from GitHub the order of definitions in the
port Makefile has been normalized, @sample tags are now used in the
pkg-plist file, and the BSD3CLAUSE style LICENSE file is included in
the generated package.
Approved by: ecrist@secure-computing.net (maintainer)
|
|
|
|
| |
Differential Revision: https://reviews.freebsd.org/D32258
|
|
|
|
|
|
|
|
|
|
|
| |
- Update to g20210510
- Update license information
- Split long lines
- Add HONEYTRAP_LOGDIR
PR: 258245
Reported by: Borja Marcos
Approved by: maintainer timeout
|
| |
|
|
|
|
| |
PR: 258826
|
|
|
|
| |
- support OTP24
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Search criteria used:
- 11.4
- OSREL*
- OSVER*
- *_FreeBSD_11
Input from:
- adridg: devel/qca-legacy
- jbeich: _WITH_DPRINTF, _WITH_GETLINE, GNU bfd workarounds
- sunpoet: security/p5-*OpenSSL*
Reviewed by: doceng, kde, multimedia, perl, python, ruby, rust
Differential Revision: https://reviews.freebsd.org/D32008
Test Plan: make index
|
|
|
|
| |
Obtained from: https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
devel/erlang-exmpp: last upstream patches over 10 years ago
sysutils/showbeastie: Broken on FreeBSD 12 and above since 2018
2021-09-30 www/squid3: Unsupported by upstream
2021-09-30 sysutils/cfengine310: OpenSSL 1.1.X is not supported.
2021-09-30 security/py-paramiko1: Out of date version. No consumer now. Use security/py-paramiko
2021-09-30 sysutils/cfengine-masterfiles310: cfengine310 will retire at FreeBSD 11 EOL
2021-09-30 security/openca-tools-forked: Use modern port security/libscep instead
2021-09-30 multimedia/sms1xxx-kmod: Supports DVB API v3 only. Use multimedia/webcamd instead
2021-09-30 sysutils/cfengine311: OpenSSL 1.1.X is not supported.
2021-09-30 sysutils/cfengine-masterfiles311: cfengine311 will retire at FreeBSD 11 EOL
2021-09-30 mail/postfix35: It is only here until FreeBSD 11 is EoL (Postfix >= 3.6 requires OpenSSL >= 1.1.x)
|
| |
|
|
|
|
|
|
|
| |
This should also fix vuxml build.
PR: 258802
Sponsored by: The FreeBSD Foundation
|
|
|
|
| |
Approved by: portmgr (blanket)
|
|
|
|
| |
Approved by: portmgr (blanket)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Major changes between sudo 1.9.8p2 and 1.9.8p1:
* Fixed a potential out-of-bounds read with "sudo -i" when the
target user's shell is bash. This is a regression introduced
in sudo 1.9.8. Bug #998.
* sudo_logsrvd now only sends a log ID for first command of a session.
There is no need to send the log ID for each sub-command.
* Fixed a few minor memory leaks in intercept mode.
* Fixed a problem with sudo_logsrvd in relay mode if "store_first"
was enabled when handling sub-commands. A new zero-length journal
file was created for each sub-command instead of simply using
the existing journal file.
PR: 258666
Submitted by: cy
Reported by: cy
Approved by: garga (maintainer)
MFH: 2021Q3
|
| |
|