Commit Graph

29103 Commits

Author SHA1 Message Date
Muhammad Moinur Rahman
64a1d25a87 security/snort3: Update version 3.0.0-a4.243=>3.0.0-250
- Take MAINTAINERSHIP
2019-02-21 00:07:29 +00:00
Sunpoet Po-Chuan Hsieh
95a84dacaf Update to 3.7.3
Changes:	https://www.pycryptodome.org/en/latest/src/changelog.html
		https://github.com/Legrandin/pycryptodome/blob/master/Changelog.rst
PR:		235893
Submitted by:	John W. O'Brien <john@saltant.com> (maintainer)
2019-02-20 20:48:07 +00:00
Tobias C. Berner
6eba9b32de Update KDE's Plasma 5 Desktop to 5.15.1
Announcement:
	https://www.kde.org/announcements/plasma-5.15.1.php
2019-02-20 19:19:28 +00:00
Antoine Brodin
63be7bf69d New port: security/py-taxii2-client
This port provides a minimal client implementation for the TAXII 2.0 server.
It supports the following TAXII 2.0 API services:
- Server Discovery
- Get API Root Information
- Get Status
- Get Collections
- Get a Collection
- Get Objects
- Add Objects
- Get an Object
- Get Object Manifests

WWW: https://github.com/oasis-open/cti-taxii-client
2019-02-20 12:22:42 +00:00
Bernard Spil
0bbc7db61e security/vuxml: Document announced OpenSSL vulnerability
- To be updated with more specifics on 2019-02-26
2019-02-20 10:13:39 +00:00
Dmitry Marakasov
dc30461671 - Add LICENSE
Approved by:	portmgr blanket
2019-02-20 09:00:47 +00:00
Tobias Kortkamp
bba85be18d security/testssl.sh: Update to 3.0rc4
Changes:	https://github.com/drwetter/testssl.sh/releases/tag/3.0rc4
MFH:		2019Q1 (bug fixes)
2019-02-20 07:43:31 +00:00
Dmitry Marakasov
081a7e2feb - Add LICENSE
- Add NO_ARCH

Approved by:	portmgr blanket
2019-02-18 09:00:48 +00:00
Mark Linimon
e08c1e8206 This port doesn't build for submitter with threaded make (on powerpc64).
Add MAKE_JOBS_UNSAFE=yes to fix build.

While here, pet portlint.

PR:		235528
Submitted by:	Piotr Kubaj
Approved by:	portmgr (tier-2 blanket)
2019-02-18 01:33:57 +00:00
Sunpoet Po-Chuan Hsieh
afa6b40da0 Update to 2.0.0
Changes:	https://github.com/bensie/sshkey/commits/master
2019-02-17 19:40:36 +00:00
Sunpoet Po-Chuan Hsieh
adf009f078 Add rubygem-sshkey1 1.9.0 (copied from rubygem-sshkey)
- Add PORTSCOUT
2019-02-17 19:38:39 +00:00
Bernard Spil
fe559881f6 security/openssl: Fix build with lld on i386
PR:		231459
Submitted by:	Nathan <ndowens@yahoo.com>
Reported by:	emaste
2019-02-17 19:09:55 +00:00
Bernard Spil
6777873085 security/nextcloud-twofactor_totp: Update to 2.1.1 2019-02-17 17:55:11 +00:00
Bernard Spil
ab910a6030 security/nextcloud-twofactor_u2f: Update to 2.1.1 2019-02-17 17:54:34 +00:00
Joseph Mingrone
c601f5b37d Remove security/tmux-cssh: upstream has disappeared 2019-02-17 01:40:57 +00:00
Sunpoet Po-Chuan Hsieh
cb71165099 Update MASTER_SITES
Approved by:	portmgr (blanket)
2019-02-16 22:55:56 +00:00
Sunpoet Po-Chuan Hsieh
50c8b72901 Update MASTER_SITES and WWW
Approved by:	portmgr (blanket)
2019-02-16 22:55:51 +00:00
Sunpoet Po-Chuan Hsieh
1ae397dd4d Add NO_ARCH
Approved by:	portmgr (blanket)
2019-02-16 22:55:46 +00:00
Sunpoet Po-Chuan Hsieh
aead2708a8 Update MASTER_SITES and WWW
Approved by:	portmgr (blanket)
2019-02-16 22:55:41 +00:00
Sunpoet Po-Chuan Hsieh
b38da17d4a Update MASTER_SITES
Approved by:	portmgr (blanket)
2019-02-16 22:55:36 +00:00
Sunpoet Po-Chuan Hsieh
e991415c8c Update to 0.5.0
Changes:	https://github.com/Yubico/python-fido2/releases
2019-02-16 22:55:16 +00:00
Rene Ladan
dcc3c125c3 Remove expired ports:
2019-02-15 dns/p5-pgeodns: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 ftp/proftpd-mod_geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/go-geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/py-GeoIP: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/pecl-geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/pen: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/subnetcalc: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/p5-Geo-IP: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 net/rubygem-geoip: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 security/sguil: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 devel/go-sql-driver: Go source should not be packaged
2019-02-15 devel/geoip-java: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-15 dns/go-geodns: Uses legacy GeoIP 1 format which no longer works; switch to GeoIP 2 where possible
2019-02-16 17:15:35 +00:00
Sunpoet Po-Chuan Hsieh
ac0adf9171 Update WWW
Approved by:	portmgr (blanket)
2019-02-15 23:51:20 +00:00
Sunpoet Po-Chuan Hsieh
6b084de7cb Update WWW
http://rhash.anz.ru/ redirects to https://www.anz.ru/404

Approved by:	portmgr (blanket)
2019-02-15 23:51:14 +00:00
Craig Leres
67c92a9e7c Undeprecate the BARNYARD option now that the dependent ports
(security/barnyard and security/bro) have been undeprecated.

PR:		235724
Approved by:	zi (maintainer), matthew (mentor, implicit)
2019-02-15 23:22:05 +00:00
Roman Bogorodskiy
4e9f1ff700 Document mail/msmtp certificate verification issue 2019-02-15 15:06:16 +00:00
Vinícius Zavam
46de3de993 security/obfs4proxy-tor: update 0.0.7_1 to 0.0.9
Approved by:	rene (mentor)
Differential Revision:	https://reviews.freebsd.org/D19021
2019-02-15 13:17:59 +00:00
Cy Schubert
2b1fd74587 Provide a script from which to start krb5kdc through /etc/rc.d/kdc.
Simply add kdc_enable="YES" and kdc_program="/usr/local/sbin/kdc"
to /etc/rc.d. The script removes the Heimdal kdc --detach argument
prior to invoking krb5kdc.

The other approach that was considered was to replace getopt() in
kdc/main.c with getopt_long() however this approach was considered too
intrusive.
2019-02-15 04:37:25 +00:00
Craig Leres
5a9395f43f Undeprecate the BARNYARD option now that the dependent ports
(security/barnyard and security/bro) have been undeprecated.

PR:		235725
Reviewed by:	matthew (mentor)
Approved by:	Zane C. Bowers-Hadley (maintainer), matthew (mentor)
Differential Revision:	https://reviews.freebsd.org/D19198
2019-02-15 03:09:33 +00:00
Muhammad Moinur Rahman
d0589a1497 security/barnyard2: Undeprecate BRO option
PR:		235723
Submitted by:	leres
2019-02-14 11:50:56 +00:00
Christoph Moench-Tegeder
6d911b32c3 fix firefox-esr PORTEPOCH in latest entry
Submitted by:	jbeich
2019-02-13 11:27:36 +00:00
Christoph Moench-Tegeder
a9a514d175 add more mozilla products to latest entry
https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/
(same CVEs as mfsa2019-04, so not creating another entry)
2019-02-13 11:09:39 +00:00
Christoph Moench-Tegeder
9f5811e94c document firefox vulnerabilities
https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/
2019-02-13 09:57:34 +00:00
Adam Weinberger
eda30d66ba Update gnupg to 2.2.13
* gpg: Implement key lookup via keygrip (using the & prefix).

  * gpg: Allow generating Ed25519 key from existing key.

  * gpg: Emit an ERROR status line if no key was found with -k.

  * gpg: Stop early when trying to create a primary Elgamal key.  [#4329]

  * gpgsm: Print the card's key algorithms along with their keygrips
    in interactive key generation.

  * agent: Clear bogus pinentry cache in the error case.  [#4348]

  * scd: Support "acknowledge button" feature.

  * scd: Fix for USB INTERRUPT transfer.  [#4308]

  * wks: Do no use compression for the the encrypted challenge and
    response.

  Release-info: https://dev.gnupg.org/T4290
2019-02-13 02:37:12 +00:00
Tobias C. Berner
bff057c2fc Update KDE Plasma to 5.15
Announcement:
    https://www.kde.org/announcements/plasma-5.15.0.php

Changelog:
    https://www.kde.org/announcements/plasma-5.14.5-5.15.0-changelog.php
2019-02-12 21:40:13 +00:00
Kurt Jaeger
e3dd66ae13 security/bruteforceblocker: re-add LICENSE=NONE
PR:		234137
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
2019-02-12 18:26:19 +00:00
Tobias C. Berner
4b87a977f6 Update KDE Frameworks to 5.55.0
Release Announcement:
  https://www.kde.org/announcements/kde-frameworks-5.55.0.php

PR:		235620
Exp-run by:	antoine
2019-02-12 17:48:25 +00:00
Jung-uk Kim
a87aa55340 Document the latest Flash Player vulnerability.
https://helpx.adobe.com/security/products/flash-player/apsb19-06.html
2019-02-12 15:39:33 +00:00
Kurt Jaeger
1f10ca44d7 security/bruteforceblocker: update patterns
- Update patterns to make them match with log messages from recent
  version of OpenSSH
- Remove LICENSE=NONE

PR:		234137
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Approved by:	danger (maintainer timeout)
2019-02-12 04:24:46 +00:00
Tilman Keskinoz
3e65269356 Update to 1.5.4
gscriptor was ported to Gtk3
2019-02-11 20:32:05 +00:00
Steve Wills
001939be42 security/sha1collisiondetection: update to 1.0.3
PR:		235444
Submitted by:	jharris@widomaker.com (maintainer)
2019-02-11 19:38:47 +00:00
Sunpoet Po-Chuan Hsieh
49ae18b48c Fix r492723 for the name of NVD report 2019-02-11 19:11:34 +00:00
Sunpoet Po-Chuan Hsieh
c2c6e8918a Remove unnecessary PORTREVISION=0
Adding extra PORTREVISION=0 is useful to keep slave ports from unintended or
unnecessary PORTREVISION bump when the master port is changed. But it is not for
this case.

PR:		235637
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
2019-02-11 19:00:28 +00:00
Sunpoet Po-Chuan Hsieh
0d04a75804 Update to 0.97
- Do not silence installation message
- Sort PLIST

Changes:	https://github.com/rhash/RHash/commits/master/bindings/perl
2019-02-11 19:00:09 +00:00
Sunpoet Po-Chuan Hsieh
0596fd7d67 Update openjpeg status
There were 5 vulnerabilities in openjpeg and 4 of them are fixed.
The current status  is described in [1] as follows:
- CVE-2017-17479 and CVE-2017-17480 were fixed in r477112.
- CVE-2018-5785 was fixed in r480624.
- CVE-2018-6616 was fixed in r489415.
- CVE-2018-5727 is not fixed yet.

Though I keep committing fixes and updating the status, it does not show in the
"pkg audit" result. Users have to follow the link but apparently few people
would do that. Therefore, I got mails asking if the CVEs are fixed, etc.

I don't know if there's a better way to handle this condition (partly fixed over
several months). Instead of removing fixed CVEs from vuln.xml, I decided to add
a new entry (5efd7a93-2dfb-11e9-9549-e980e869c2e9) which is split from the old
entry (11dc3890-0e64-11e8-99b0-d017c2987f9a). It should be clearer for users if
they only read the "pkg audit" result.

[1] https://www.vuxml.org/freebsd/11dc3890-0e64-11e8-99b0-d017c2987f9a.html
2019-02-11 18:59:48 +00:00
Dmitry Marakasov
358ea8c3df - Add LICENSE
- Add NO_ARCH
- Add missing USES=ssl

Approved by:	portmgr blanket
2019-02-11 09:00:47 +00:00
Mark Felder
22f5d013e2 Document FreeBSD-SA-19:02.fd 2019-02-11 00:11:41 +00:00
Mark Felder
bac129a2b4 Document FreeBSD-SA-19:01.syscall 2019-02-11 00:10:58 +00:00
Sunpoet Po-Chuan Hsieh
8d9b1a8a65 Update to 0.31.0
Changes:	https://github.com/certbot/certbot/blob/master/CHANGELOG.md
2019-02-10 19:45:12 +00:00
Tobias C. Berner
0297705281 Document kf5-kauth vulnerability. 2019-02-10 18:02:37 +00:00