- 06 Sep, 2017 1 commit
-
-
Mathieu Arnold authored
Fix not starting after crash. When nrpe quits ungracefully, for example, if the box was rebooted, it often does not start because the pid file is still there, and the pid in it exists and the pid in it is in use by some other process. The dubious code is in src/nrpe.c in write_pid_file() around line 1756 that could be axed. But I think the easiest way to fix this is with the attached patch. precmd is run just before starting the daemon and after checking that it is not already running. With this, it starts just fine, and still refuses to start if it is really already running, but starts fine if the pid file contains a pid that exists but is not nrpe. PR: 221740 Submitted by: mat Approved by: maintainer timeout, ports-secteam blanket Sponsored by: Absolight
-
- 05 Sep, 2017 1 commit
-
-
Jan Beich authored
graphics/colmap: try#2 to unbreak on non-x86 ../ext/VLFeat/libvlfeat.a(host.c.o): In function `_vl_x86cpu_info_init': host.c:(.text+0x1c): undefined reference to `_vl_cpuid' host.c:(.text+0x40): undefined reference to `_vl_cpuid' collect2: error: ld returned 1 exit status Reported by: pkg-fallout (aarch64, armv6) Approved by: ports-secteam blanket
-
- 03 Sep, 2017 2 commits
-
-
Marc Fonvieille authored
Update to r50775 from the FreeBSD docset (a.k.a. 10.4-R version) Approved by: portmgr (blanket), doceng (implicit)
-
TAKATSU Tomonari authored
Approved by: ports-secteam (delphij)
-
- 02 Sep, 2017 2 commits
-
-
Adam Weinberger authored
Disable the pkg-deinstall script. spamd's pkg-install adds spamd stuff to /etc/services, and pkg-deinstall removed it. The problem is that pkg doesn't run DEINSTALL before INSTALL when upgrading/reinstalling. As a result, when spamd is restarted, /etc/services winds up lacking the spamd entries, causing spamd to fail to start. The ideal solution is pkg running those targets in the predicted order, or pkg gaining a @services keyword. In the meantime, this commit just disables the pkg-deinstall. If you are uninstalling spamd you can remove those /etc/services entries by hand. PR: 212335 Approved by: maintainer timeout (~ 1 yr) Approved by: ports-secteam (delphij)
-
Rodrigo Osorio authored
Update port to 0.5.12 Fix CVE-2017-8920: XSS in 'R' parameter Security: CVE-2017-8920 Approved by: ports-secteam (feld)
-
- 01 Sep, 2017 1 commit
-
-
Antoine Brodin authored
-
- 31 Aug, 2017 2 commits
-
-
Mark Felder authored
Add base/port options for libpcap PR: 221923 Approved by: ehaupt (maintainer) Correctly define the _DESC values Reported by: ehaupt,mat Fix OPTIONS_SINGLE logic. The two options (LIBPCAP_BASE and LIBPCAP_PORTS) need to be mutually exclusive. If LIBPCAP_BASE is selected, make sure the binary is linked against the libpcap from base, even if net/libpcap is present. Bump PORTREVISION to make sure the OPTIONS change is tracked. Reported by: jbeich Approved by: ports-secteam (with hat)
-
Torsten Zuehlsdorff authored
mail/phpmailer: Update from 5.2.23 to 5.2.24 Changelog: - SECURITY Fix: XSS vulnerability in one of the code examples, CVE-2017-11503. The code_generator.phps example did not filter user input prior to output. This file is distributed with a .phps extension, so it it not normally executable unless it is explicitly renamed, so it is safe by default. There was also an undisclosed potential XSS vulnerability in the default exception handler (unused by default). Patches for both issues kindly provided by Patrick Monnerat of the Fedora Project. - Handle bare codes (an RFC contravention) in SMTP server responses - Make message timestamps more dynamic - calculate the date separately for each message - Include timestamps in HTML-format debug output - Improve Turkish, Norwegian, Serbian, Brazilian Portuguese & simplified Chinese translations - Correction of Serbian ISO language code from sr to rs - Fix matching of multiple entries in Host to match IPv6 literals without breaking port selection (see #1094, caused by a3b4f6b) - Better capture and reporting of SMTP connection errors Reported by: Ken J. <tweakerz@shaw.ca> Approved by: ports-secteam (delphij)
-
- 30 Aug, 2017 6 commits
-
-
TAKATSU Tomonari authored
- Update to 3.5.9 PR: 221165 Submitted by: Koichiro IWAO <meta+ports_AT_vmeta_DOT_jp> Approved by: ports-secteam (delphij)
-
Mahdi Mokhtari authored
databases/mysql56-{server client}: Update to latest 5.6.37 This release contains features: * The mysql client now supports a --binary-as-hex option for binary data (Bug #25340722, Bug #84391) * mysqlaccess now looks for its configuration file only in the SYSCONFDIR directory and /etc. (Bug #25043674) And bugfixes: * mysqld: failed to start the server if the --datadir option was specified with a relative path name. (Bug #25364806) * InnoDB: The server allocated memory unnecessarily for an operation that rebuilt the table. (Bug #25573565, Bug #85043) * mysqldump: could write database names in USE statements incorrectly. (Bug #25998635) Reviewed by: mat (mentor) Approved by: mat (mentor) Sponsored by: Netzkommune GmbH Differential Revision: https://reviews.freebsd.org/D11638 Approved by: ports-secteam (feld)
-
Carlos J. Puga Medina authored
www/chromium: update to 60.0.3112.101 - Update LICENSE - Drop USE_GNOME=gtk20 dependency because chromium uses gtk3 - Use freetype2 bundled to avoid more issues related to the freetype library - Fix typo in the comment of pre-configure section - Update comment in SNDIO section Changelog: https://chromium.googlesource.com/chromium/src/+log/59.0.3071.115..60.0.3112.101?pretty=fuller&n=10000 Security: https://vuxml.freebsd.org/freebsd/7d138476-7710-11e7-88a1-e8e0b747a45a.html Approved by: ports-secteam (delphij)
-
Mathieu Arnold authored
Add jail support to check_procs, restore check_http's -C option to its former glory. Sponsored by: Absolight
-
Mark Felder authored
Remove DJANGO19 option: upstream support for 1.9.x has ended - Update WWW Reference: https://www.djangoproject.com/download/#supported-versions Update to 1.11.4 to match www/py-django111 - While I'm here, change indent PR: 221746 Submitted by: dvl Approved by: ports-secteam (with hat)
-
Kurt Jaeger authored
security/softether: Add conflict with softether-devel PR: 219136 Submitted by: Franco Fichtner <franco@opnsense.org> Approved by: net@arrishq.net (maintainer) Approved by: portmgr (blanket approval)
-
- 29 Aug, 2017 2 commits
-
-
Mark Felder authored
- Update to 1.1.16 PR: 221205 Submitted by: freebsd-ports@dan.me.uk(maintainer) net-mgmt/cacti: Update to 1.1.17 - Regenerate patches Changes: https://www.cacti.net/release_notes.php?version=1.1.17 PR: 221499 Submitted by: Daniel Austin <freebsd-ports@dan.me.uk> (maintainer) net-mgmt/cacti: Update to 1.1.18 Changes: https://www.cacti.net/release_notes.php?version=1.1.18 PR: 221669 Submitted by: Daniel Austin <freebsd-ports@dan.me.uk> (maintainer) net-mgmt/cacti: Update to 1.1.19 Changes: https://www.cacti.net/release_notes.php?version=1.1.19 PR: 221693 Submitted by: Submitted by: Daniel Austin <freebsd-ports@dan.me.uk> (maintainer) Approved by: ports-secteam (with hat)
-
Mathieu Arnold authored
Update BIND9 ports to 9.{9.11,10.6,11.2}. Fixes related to LMDB usage: https://kb.isc.org/article/AA-01497/0/Operational-Notification%3A-LMDB-integration-problems-with-BIND-9.11.0-and-9.11.1.html Sponsored by: Absolight
-
- 27 Aug, 2017 5 commits
-
-
Thomas Zander authored
Update to upstream version 0.20.10 (bugfix release) Approved by: ports-secteam (delphij)
-
Guido Falsi authored
Make the provided rc script more robust. Also add an asterisk_stopsleep knob (disabled by default) to allow users to work around a possible race condition when asterisk is sent a stop command just after launching, but before it's startup is actually completed. PR: 221271 Submitted by: O. Hartmann <ohartmann@walstatt.org> Approved by: ports-secteam (delphij)
-
Guido Falsi authored
- Update finance/gnucash to 2.6.17 - Update finance/gnucash-docs to 2.6.17 - Fully convert to option/target helpers and USES localbase Apply patch submitted upstream to better emulate the USG UNIX daylight global variable as implemented in glibc. Obtained from: https://github.com/Gnucash/gnucash/pull/116 Approved by: ports-secteam (delphij)
-
Palle Girgensohn authored
The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.4, 9.5.8, 9.4.13, 9.3.18, and 9.2.22. This release fixes three security issues. It also patches over 50 other bugs reported over the last three months. Users who are affected by the below security issues should update as soon as possible. Users affected by CVE-2017-7547 (https://access.redhat.com/security/cve/CVE-2017-7547) will need to perform additional steps after upgrading to resolve the issue. Other users should plan to update at the next convenient downtime. URL: https://www.postgresql.org/about/news/1772/ Security: CVE-2017-7546, CVE-2017-7547, CVE-2017-7548 FTP sites are shut down. WWW: https://www.postgresql.org/message-id/09fd5ea6-7e09-3101-07ba-2c1d9f2d0aec%40joeconway.com Approved by: ports-secteam
-
Tobias Kortkamp authored
www/kanboard: Update to 1.0.46 Changes: https://github.com/kanboard/kanboard/blob/master/ChangeLog PR: 221826 Submitted by: Bart Wrobel <bsd@if0.eu> (maintainer) Security: CVE-2017-12850 Security: CVE-2017-12851 Approved by: ports-secteam (delphij)
-
- 26 Aug, 2017 6 commits
-
-
Carlos J. Puga Medina authored
- Update to 1.2.0 - Remove patch that was upstreamed - Switch from devel/llvm39 to devel/llvm40 when building on 10.3 - Update WWW in pkg-descr Changes: https://mailman.powerdns.com/pipermail/dnsdist/2017-August/000358.html Security: CVE-2016-7069 Security: CVE-2017-7557 Approved by: ports-secteam (delphij)
-
Carlos J. Puga Medina authored
- Update to 1.0.0 - Cosmetic fix - Update WWW in pkg-descr Changes from 0.10.2 to 0.11.0: http://lists.gnu.org/archive/html/pspp-announce/2017-08/msg00000.html Changes from 0.11.0 to 1.0.0: http://lists.gnu.org/archive/html/pspp-announce/2017-08/msg00002.html Security: CVE-2017-10791 Security: CVE-2017-10792 Security: CVE-2017-12958 Security: CVE-2017-12959 Security: CVE-2017-12960 Security: CVE-2017-12961 Approved by: ports-secteam (delphij)
-
Jan Beich authored
www/firefox: update to 55.0.3 Changes: https://www.mozilla.org/firefox/55.0.3/releasenotes/ Approved by: ports-secteam (delphij)
-
Sunpoet Po-Chuan Hsieh authored
Update to 1.5.1 Changes: https://github.com/DNS-OARC/dnscap/releases Approved by: ports-secteam (delphij)
-
Ben Woods authored
- Includes fix for security vulnerability CVE-2017-12791 - Use @sample for the master and minion config files. PR: 220869 PR: 217780 Approved by: ports-secteam (delphij) Security: CVE-2017-12791 Security: https://vuxml.freebsd.org/freebsd/3531141d-a708-477c-954a-2a0549e49ca9.html
-
Xin LI authored
Update to latest version 1.9.7 Security: http://subversion.apache.org/security/CVE-2017-9800-advisory.txt Approved by: ports-secteam
-
- 24 Aug, 2017 3 commits
-
-
Steve Wills authored
-
Xin LI authored
Security update to 2017-02-19e. Approved by: ports-secteam
-
Steve Wills authored
graphics/poppler: update to 0.57.0 PR: 220608 Reported by: Andrew Marks <amracks@gmail.com> Approved by: gnome@ (kwm) Security: eca2d861-76f4-42ed-89d2-23a2cb396c87 Approved by: ports-secteam (implicit)
-
- 22 Aug, 2017 2 commits
-
-
Joseph Mingrone authored
sysutils/zap: Update to version 0.7.1. Upstream changes: https://github.com/Jehops/zap/releases/tag/0.7.1 Reported by: Michael Wayne <wayne47@gmail.com> Approved by: ports-secteam
-
Steve Wills authored
mail/squirrelmail: Update to 20170705 While here, give maintainership to submitter PR: 219801 Submitted by: Zsolt Udvari <uzsolt@uzsolt.hu> Security: e1de77e8-c45e-48d7-8866-5a6f943046de Approved by: ports-secteam (implicit)
-
- 21 Aug, 2017 4 commits
-
-
John Baldwin authored
Don't leak lock from os_kmem_alloc(). The current port patches for os_kmem_alloc() add VM object locking. However, the lock is not unlocked in the success case because the unlock code is inside of an if body instead of after the if statement. Approved by: ports-secteam (feld)
-
Jan Beich authored
print/harfbuzz: update to 1.4.8 Changes: https://github.com/behdad/harfbuzz/releases/tag/1.4.8 ABI: https://abi-laboratory.pro/tracker/timeline/harfbuzz/ Approved by: ports-secteam (feld)
-
Kubilay Kocak authored
net/czmq: Squash -Werror flag zmq_utils.h functionality was moved to zmq.h since 4.2.0, with a deprecation warning added. ports r448376 updated libzm4 to 4.2.2, which caused a build error in net/cmzq due to the -Werror flag (set by default): /usr/local/include/zmq_utils.h:41:32: error: unknown warning group '-Werror', ignored [-Werror,-Wunknown-warning-option] #pragma GCC diagnostic ignored "-Werror" ^ /usr/local/include/zmq_utils.h:44:9: warning: Warning: zmq_utils.h is deprecated. All its functionality is provided by zmq.h. [-W#pragma-messages] #pragma message("Warning: zmq_utils.h is deprecated. All its functionality is provided by zmq.h.") ^ Squash the -Werror flag (as done in net/libzmq4) accordingly. While I'm here: - Modernize test target - Group build related entries (MAKE_ENV/CPPFLAGS) PR: 221688 Reported by: olgeni, Jan Bramkamp <crest_maintainer rlwinm de> Approved by: ports-secteam (blanket)
-
Emanuel Haupt authored
Fix geoip support by providing LIBPATH. PR: 221682 Submitted by: tmasu@st.rim.or.jp Approved by: ports-secteam (blanket)
-
- 20 Aug, 2017 2 commits
-
-
Koop Mast authored
Fix CVE-2017-2885 Obtained from: libsoup upstream Security: 8e7bbddd-8338-11e7-867f-b499baebfeaf Approved by: ports-secteam@ (delphij@)
-
Kubilay Kocak authored
devel/py-extras: Fix Python 3.x packaging Python 3.x changes the location of the compiled python objects - pyc and pyo. The pkg-plist supplied with devel/py-extras doe not account for this, so packaging with Python 3 fails. This change replaces pkg-plist with autoplist to correct the issue [1] While I'm here: - Add TEST_DEPENDS and test target - Mark architecture independence - Add LICENSE_FILE PR: 219278 Submitted by: Johannes Jost Meixner [1] Approved by: portmgr (blanket) Approved by: ports-secteam (blanket)
-
- 19 Aug, 2017 1 commit
-
-
Jochen Neumeister authored
- devel/babeltrace: Update from 1.5.2 to 1.5.3 - Changelog: http://git.efficios.com/?p=babeltrace.git;a=shortlog;h=refs/tags/v1.5.3 PR: 221369 Submitted by: luca.pizzamiglio@gmail.com (maintainer) Approved by: miwi (mentor) Differential Revision: https://reviews.freebsd.org/D12051 Approved by: ports-secteam (feld)
-