| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Changes: https://github.com/tailscale/tailscale/releases/tag/v1.18.1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Despite what Solar Designer had said earlier, community enhancements
were not offered as separate patch, so the top comment about JUMBO
option still stands.
Because supported SIMD features are detected during configure, force
SSE2 for x86 packages as reasonable default which most modern CPUs
should support these days. Ideally we should probably do several build
rounds and produce binaries targeting different SIMD features (e.g.
like Arch Linux is doing this), but that's the task for another day.
Actualize the lists of binaries and symlinks (some programs had become
standalone, others had been converted to scripts offered as extras).
Drop BROKEN_mips64: it was added in r425682 five years ago for a
different version, since then similar breakage for aarch64 had been
fixed, and looking at the configure script, mips64 should be supported
(even if it's really not, that particular error message is no longer
accurate per grepping the sources).
Adjust LICENSE (GPLv2 or later) and fix the build with OpenCL support.
PR: 247229, 254922
|
|
|
|
|
|
|
|
|
| |
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").
Approved by: portmgr (blanket)
|
| |
|
|
|
|
| |
MFH: 2021Q4
|
|
|
|
|
|
|
|
| |
Some of the reported java/bouncycastle15 security issues affect the
legacy port of java/bouncycastle as well. Update vuxml.xml accordingly.
Sponsored by: Modirum MDPay
Sponsored by: Klara, Inc.
|
| |
|
| |
|
|
|
|
|
|
| |
6916ea94-4628-11ec-bbe2-0800270512f4
This vulnerability also affects ruby ports.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
abandonware
security/afl - Migrate to security/afl++
security/amap - Abandoned upstream, last release 10+ years ago
security/amavis-stats - Upstream is dead and last release was back in 2005
security/arirang - Abandoned (website also refers to Ruby 1.9) and a 9+ year old webserver security scanner isn't useful today
security/axTLS - Very outdated and abandoned, current version in tree was released in 2013 and last by upstream in 2019
security/base - Broken with PHP 7+, forked here https://github.com/NathanGibbs3/BASE/
security/bruteforceblocker - Abandonware, please consider using security/sshguard
security/cfs - Deprecated upstream, reference: https://www.bayofrum.net/cgi-bin/fossil/cfs/index
security/cisco-torch - Unfetchable, dead upstream
security/cp2fwb - Used with deprecated software Firewall Builder
security/dcetest - Targets deprecated protocol by Microsoft in favour of .NET
security/doscan - Abandonware, last release in 2014. Please consider using security/masscan or sysutils/pnscan
security/find-zlib - Deprecated, no longer relevant
security/govpn - Deprecated upstream, reference: http://www.govpn.info/
security/gputty - Unfetchable, dead upstream
security/gwee - Last release 15+ years ago, abandonware and dead upstream
security/hackbot - Abandonware, last release in 2003. Please consider using security/nmap or security/rustscan
security/hashcat-legacy - Unsupported upstream, please consider using security/hashcat
security/hlfl - Abandonware, last release in 2003
security/ike - Abandonware, last release in 2013 and IKEv1 is considered to be insecure
security/integrit - Abandonware, last release in 2003
security/ipfilter2dshield - Abandonware, no word of it on upstream web site
security/ipfw2dshield - Abandonware, no word of it on upstream web site
security/isakmpd - 15+ years old and broken on multiple versions
security/kripp - Abandonware, upstream returns 404 and last release was back in 2007
security/l0phtcrack - Obsolete, Microsoft LANMAN and NT password hashes are deprecated
security/l5 - Abandonware, broken on amd64 for 10+ years
security/gringotts - Abandonware, upstream dead and last release in 2009
security/libgringotts - Abandonware, upstream dead and last release in 2008
security/libprelude - Very outdated, current version in tree was released back in 2015 and upstream is still active
security/libpreludedb - Very outdated, current version in tree was released back in 2015 and upstream is still active
security/libpwstor - Abandonware, last release in 2008
security/manipulate_data - Abandonware, unsupported upstream
security/matrixssl - Abandonware, dead upstream
security/monkeysphere - Abandonware, dead upstream
security/mussh - Abandonware, last release in 2011 please consider using security/teleport
security/outguess - Abandonware, dead upstream and last release in 2001
security/pbnj - Abandonware, last release in 2006 and reported broken upstream in 2017 upstream
security/phpsecinfo - Abandonware, last release in 2006
security/pktsuckers - Abandonware, last release from somewhere around 1999
security/ppars - Abandonware, no word of it on upstream web site
security/pscan - Abandonware, last release in 2000
security/pxytest - Abandonware, last release around 2003, dead upsteam and unfetchable
security/radamsa - Abandonware, last release in 2017 and marked as BROKEN in late 2020
security/razorback-* - Abandonware, last release in 2012 and listed as alpha quality by upstream
security/retranslator - Deprecated upstream (EOL)
security/scanssh - Abandonware, last release in 2005. Please consider using security/nmap or security/rustscan
security/shimmer - Abandonware, last release in 2008
security/shttpscanner - Abandonware, last release in 2006
security/sha - Obsolete, we have tools in base
security/slurpie - Abandonware, last release around 2000 and dead upstream
security/slush - Obsolete, listed as alpha quality, last release around 2000 and dead upstream
security/smtpscan - Abandonware, last release in 2003 and dead upstream. Please consider using nmap
security/spybye - Abandonware, last release in 2008 and no upstream development
security/sslsniffer - Abandonware, last release in 2001. Please consider using security/sslsplit or security/sslproxy
security/sslwrap - Abandonware, marked BROKEN on 12+ in 2019
security/strobe - Abandonware, last release around 2000 and dead upstream. Please consider using security/nmap or security/rustscan
security/stud - Abandonware, marked BROKEN on 12+ in 2019
security/symbion-sslproxy - Abandonware, last release in 2009 and inactive upstream
security/tlswrap - Abandonware, last release in 2007 and dead upstream
security/trinokiller - Abandonware, dead upstream
security/tripwire-131 - Deprecated, please consider using security/tripwire instead
security/unicornscan - Very outdated and abandoned, current version in tree was released in 2004 and last release by upstream in Aug 2013. Please consider using security/nmap or security/rustscan
security/vinetto - Obsolete, targets deprecated Windows operating systems such as XP and 2003 Server
security/vnccrack - Very outdated and abandoned, last release in 2008. Upstream is at 2.1 while version in ports is 1.0.0
security/webscarab - Deprecated by upstream in 2014
security/zebedee - Abandonware, last release in 2005 and runtime issues reported upstream
Approved by: tberner (mentor), lbartoletti (mentor),
portmgr (rene, tcberner), cy (port maintainer),
egypcio (port maintainer), bofh (port maintainer),
port maintainer(s) timeout (2+ weeks)
Differential Revision: https://reviews.freebsd.org/D32880
|
|
|
|
| |
Reported by: portscout
|
|
|
|
|
|
|
|
|
| |
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").
Approved by: portmgr (blanket)
|
|
|
|
|
|
|
|
|
|
| |
Upstream:
* https://github.com/openssl/openssl/pull/17082
* https://github.com/openssl/openssl/pull/17085
PR: 259937
Submitted by: allanjude
Differential Revision: https://reviews.freebsd.org/D33061
|
|
|
|
|
|
| |
Changes: https://github.com/breard-r/acmed/blob/v0.18.0/CHANGELOG.md
PR: 259999 (Lucky 9s)
|
|
|
|
|
|
|
| |
PR: 259994
Reported by: Sascha Biberhofer <ports at skyforge dot at>
Security: 27aa2253-4c72-11ec-b6b9-e86a64caca56
Security: CVE-2021-41281
|
|
|
|
| |
Bump revision on consumers
|
|
|
|
|
|
|
|
|
| |
Customized VPN split-tunnel. vpnc-script replacement for easy and
secure split-tunnel VPN setup.
PR: 259831
Approved by: philip (mentor)
Differential Revision: https://reviews.freebsd.org/D33074
|
|
|
|
| |
PR: 259547
|
|
|
|
| |
Reported by: portscout!
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
PR259775 reports that (auto)configuration behaves weirdly.
This is caused by a mismatch between an enum in the code
and a table that expects to match the enum values. When
BUILD_WITH_TPM2D is off (the default; I have not looked if
it can even be turned on in ports) one table entry is
Patch also submitted upstream.
PR: 259775
Reported by: O. Hartmann
MFH: 2021Q3
|
|
|
|
| |
Changes: https://github.com/IdentityPython/pysaml2/releases
|
|
|
|
| |
Changes: https://github.com/ronf/asyncssh/blob/master/docs/changes.rst
|
|
|
|
|
|
| |
- Strip shared library
Changes: https://github.com/wolfSSL/wolfssh/releases
|
|
|
|
|
|
|
|
|
|
| |
Upstream:
* https://github.com/openssl/openssl/pull/17082
* https://github.com/openssl/openssl/pull/17084
PR: 259937
Submitted by: allanjude
Differential Revision: https://reviews.freebsd.org/D33062
|
|
|
|
| |
Reported by: portscout
|
|
|
|
| |
d97161a97818bef47e66ab362f444cd1201c87fd
|
|
|
|
|
| |
PR: 259891
Reported by: shaun <freebsd@shaunc.com>
|
|
|
|
| |
Changes: https://github.com/tailscale/tailscale/releases/tag/v1.18.0
|
|
|
|
| |
PR: 259534
|
|
|
|
|
|
| |
Changelog: https://github.com/smallstep/certificates/releases/tag/v0.18.0
PR: 259919
|
|
|
|
|
|
| |
Changelog: https://github.com/smallstep/cli/releases/tag/v0.18.0
PR: 259918
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
re: https://github.com/snort3/snort3/releases/tag/3.1.17.0
Approved by: maintainer (via private email)
|
|
|
|
| |
ChangeLog: https://github.com/gopasspw/gopass/blob/master/CHANGELOG.md
|
|
|
|
|
|
|
|
|
|
|
|
| |
While I'm here,
* Switch to DISTVERSION
* Pet portclippy
* Re-format Makefile with portfmt
Changes: https://github.com/rapid7/metasploit-framework/commits/6.1.12
PR: 259550
Approved by: maintainer
|
|
|
|
| |
Obtained from: https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
|
| |
|
| |
|
|
|
|
|
| |
for security/openvpn-devel:
Approved by: Gert Doering (maintainer)
|
| |
|
|
|
|
|
| |
PR: 259259
Differential Revision: https://reviews.freebsd.org/D32613
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Fix issue that Mcrypt.so is linked with libltdl.so if the port is
build under the environment where devel/libltdl is installed
* Add TIMESTAMP to distinfo
* Switch to DISTVERSION
* Regenerate pkg-plist with `make makeplist`
* Pet portlint and portclippy
PR: 259210
MFH: 2021Q4
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Flashproxy
Snowflake is a system to defeat internet censorship. People who are censored
can use Snowflake to access the internet. Their connection goes through
Snowflake proxies, which are run by volunteers. For more detailed information
about how Snowflake works see our documentation wiki.
WWW: https://snowflake.torproject.org/
Sponsored by: TorBSD Diversity Project (TDP)
Sponsored by: The Tor Project
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Saturday, 13 November 2021
KDE today announces the release of KDE Frameworks 5.88.0.
KDE Frameworks are 83 addon libraries to Qt which provide a wide variety
of commonly needed functionality in mature, peer reviewed and well
tested libraries with friendly licensing terms. For an introduction see
the KDE Frameworks release announcement.
This release is part of a series of planned monthly releases making
improvements available to developers in a quick and predictable manner.
Full changelog:
https://kde.org/announcements/frameworks/5/5.88.0/
Exp-run by: antoine
PR: 259817
|
| |
|
| |
|