Skip to content
Commits on Mar 29, 2014
  1. @larsengels

    MFH: r349499

    larsengels committed
    Security update to 1.11.1
    
    Approved by:	portmgr (bdrewery)
Commits on Mar 26, 2014
  1. MFH: r349239

    pawel committed
    - Fix build with clang
    - Add staging support
    
    Approved by:	portmgr
Commits on Mar 25, 2014
  1. @koobs

    MFH: r348754

    koobs committed
    net/libzmq2: Fix PKGNAME (PORTNAME: zmq -> libzmq2)
    
    Correctly set PORTNAME to "libzmq2" after moving it from devel/zmq to
    net/libzmq2, which was missed in r335619 [1].
    
    This fixes the PKGNAME for this port.
    
    [1] http://svnweb.freebsd.org/ports?view=revision&revision=335619
    
    Reported by:	Franco Fichtner (via twitter: @fitchitis)
    Approved by:	portmgr (mat)
Commits on Mar 19, 2014
  1. @swills

    MFH: r348485

    swills committed
    - Update to 0.6.2
    - Fixes build on 11-CURRENT
    
    PR:		ports/186611
    Submitted by:	rakuco
    Approved by:	maintainer timeout (nivit, >4 weeks)
    Approved by:	portmgr (bdrewery)
Commits on Mar 16, 2014
  1. MFH: r348303

    rene committed
    Update to 33.0.1750.152
    
    Security:	http://vuxml.org/freebsd/a70966a1-ac22-11e3-8d04-00262d5ed8ee.html
    
    Approved by:	portmgr (miwi)
Commits on Mar 12, 2014
  1. @mat813

    MFH: r347979

    mat813 committed
    Fix build when WITH=PERL.
    
    Sponsored by:	Absolight
  2. MFH: r347937

    rene committed
    - Update to 33.0.1750.149 [1]
    - Add a patch to fix build on FreeBSD < 10 [2]
    Obtained from:	http://crbug.com/347123 [2]
    Security:	http://vuxml.org/freebsd/24cefa4b-a940-11e3-91f2-00262d5ed8ee.html [1]
    
    Approved by:	portmgr (erwin)
Commits on Mar 11, 2014
  1. @fsmeets

    MFH: r347920

    fsmeets committed
    - Update to 11.8.1
    - set USE_GCC as asterisk uses gcc extensions
    
    (STAGE support will follow soon, just wanted to get the new version out now)
    
    Security:	03159886-a8a3-11e3-8f36-0025905a4771
    Approved by:	portmgr (erwin)
  2. @fsmeets

    MFH: r347917

    fsmeets committed
    - Update to 1.8.26.1
    - set USE_GCC as asterisk uses gcc extensions
    
    (STAGE support will follow soon, just wanted to get the new version out now)
    
    Security:	03159886-a8a3-11e3-8f36-0025905a4771
    Approved by:	portmgr (erwin)
  3. @fsmeets

    MFH: r347911

    fsmeets committed
    Document asterisk vulnerabilities
    
    Approved by:	portmgr (erwin)
  4. MFH: r347892

    rene committed
    Document new vulnerabilities in www/chromium < 33.0.1750.149
    
    Obtained from:	http://googlechromereleases.blogspot.nl/
    
    Approved by:	portmgr (erwin)
Commits on Mar 10, 2014
  1. @tota

    MFH: r338263

    tota committed
    - Upstream rerolled tarball
    
    PR:		ports/185192
    Submitted by:	marino@
    
    PR:		ports/187368
    Submitted by:	tota (myself)
    Approved by:	portmgr (antoine)
  2. @tota

    MFH: r341099

    tota committed
    - Upstream rerolled tarball
    
    Reported by:	pkg-fallout
    
    PR:		ports/187369
    Submitted by:	tota (myself)
    Approved by:	portmgr (antoine)
  3. @mat813

    MFH: r336813

    mat813 committed
    Reset maintainer for llwang@infor.org
    
    Reset maintainership for llwang@infor.org due to multiple timeouts and email
    address permanent failure. Return all ports to the free pool except
    py-numpy, which is taken under the wing of the python@ team.
    
    We thank you for your contribution to the FreeBSD project
    
    Approved by:	portmgr
  4. @mat813

    MFH: r343625

    mat813 committed
    Reset maintainership due to mail bouncing
    
    Reported by:	pkg-fallout
Commits on Mar 9, 2014
  1. @remkolodder

    MFH: r347684

    remkolodder committed
    Properly indent the last entry.
    
    Discussed with:	kwm
    
    Approved by:	portmgr(erwin)
  2. @rakuco

    MFH: r347674

    rakuco committed
    Make the port build with security/openssl installed after r347541.
    
    Add a patch sent upstream that makes sure the bundled curl's include paths
    are passed to the compiler before any other ones, since they could include
    the system's curl include directory.
    
    One way to trigger this was to build the port with security/openssl
    installed: CMake would detect OpenSSL's include path (${LOCALBASE}/include)
    and pass it to the compiler. If ftp/curl is also installed, the compiler
    would end up picking its headers instead of the ones in cmcurl's own
    directory.
    
    Reported by:	Terry Kennedy <terry@tmk.com>
    Approved by:	portmgr (miwi)
  3. @kwm81

    Add patches to fix security issue.

    kwm81 committed
    This is done via direct commit, because the freetype2 update to 2.5.3 isn't
    mergeable due to freetype header shuffle which happend in 2.5.1.
    
    Tweak the freetype2 version in the vuxml to point to the fix version.
    
    Approved by:	portmgr (antoine@, erwin@)
    Obtained from:	freetype2 upstream
    Security:	1a0de610-a761-11e3-95fe-bcaec565249c
  4. @kwm81

    MFH: r347557

    kwm81 committed
    Unbreak vuxml.
    
    Submitted by:	battlez
    Approved by:	portmgr (erwin@)
  5. @kwm81

    MFH: r347554

    kwm81 committed
    Document freetype2 vuln.
    
    Approved by:	portmgr (erwin@)
Commits on Mar 8, 2014
  1. @rakuco

    MFH: r347541

    rakuco committed
    Enable use of OpenSSL in the bundled copy of libcurl.
    
    The default is off, which makes calls such as FILE(DOWNLOAD ...) from HTTPS
    locations fail.
    
    PR:		ports/187374
    Approved by:	portmgr (miwi)
Commits on Mar 7, 2014
  1. MFH: r347418

    rene committed
    No need any longer to remove the Courgette tests from the unit tests.
    
    Approved by:	portmgr (tabthorpe)
  2. MFH: r347414

    rene committed
    Bump PORTREVISION to prevent checksum failures when downloading the
    non-rerolled distribution file.
    
    Use PORTVERSION instead of DISTVERSION while here.
    
    Approved by:	portmgr (tabthorpe)
  3. MFH: r347413

    rene committed
    Switch to using Google's tarball for both the browser and the test data.
    This removes one chain in the link of trust since the tarball is no longer
    modified and rerolled locally.
    
    This means the Courgette code is now included, but it is only compiled and
    used on Windows platforms to distribute binary updates.
    
    Legal documentation:
    http://law.justia.com/cases/federal/district-courts/massachusetts/madce/1:2009cv11813/125212/47/
    
    Discussed with: portmgr/core (tabthorpe), FreeBSD Foundation (gnn)
    
    Approved by:	portmgr (tabthorpe)
Commits on Mar 6, 2014
  1. @sunpoet

    MFH: r343496

    sunpoet committed
    - Fix plist
    - Allow packaging as a regular user
    
    Approved by:	portmgr (mat, via IRC)
  2. @sunpoet

    MFH: r338064

    sunpoet committed
    - Allow build with clang [1]
    - Remove explicit -lstdc++
    - Bump PORTREVISION for package change
    
    Submitted by:	vanilla [1]
    Approved by:	portmgr (mat, via IRC)
  3. @sunpoet

    MFH: r337639

    sunpoet committed
    - Use USE_GCC=any
    - Add missing USES=pkgconfig
    - Remove deprecated PTHREAD_*
    - Strip binary executable and shared library
    - Support STAGEDIR
    
    Approved by:	portmgr (mat, via IRC)
  4. MFH: r347098

    rene committed
    Forgot to commit a chunk for extra-patch-gcc in r347055
    
    Approved by:	portmgr (erwin, miwi)
  5. MFH: r347055

    rene committed
    Fix build on 8.4 (which uses GCC now because of c++11-lib)
    
    Instead of removing the -Wno-unknown-warning-option, split this out in a
    Clang specific version and a GCC specific version (yay).
    Submitted by:	George Mitchell via freebsd-ports
    
    Approved by:	portmgr (erwin, miwi)
  6. @bapt

    MFH: r347193

    bapt committed
    Reference xmms vulnerabilities: CVE-2007-0653 and CVE-2007-0654
  7. @bapt

    MFH: r347158

    bapt committed
    Add security advisory for nginx-1.5.10.
  8. MFH: r347154

    rene committed
    Document new vulnerabilities in www/chromium < 33.0.1750.146
    Obtained from:	http://googlechromereleases.blogspot.nl/
    
    MFH: r347080
    MFH: r347076
    security/gnutls for CVE-2014-0092 and CVE-2014-1959
    
    MFH: r346908
    Add an entry for the file DOS vulnerability, CVE-2014-1943
    
    Approved by: portmgr (bapt)
  9. MFH: r347165

    rene committed
    www/chromium: Update to 33.0.1750.146
    
    Security:	http://vuxml.org/freebsd/b4023753-a4ba-11e3-bec2-00262d5ed8ee.html
    
    Approved by:	portmgr (erwin)
Commits on Mar 5, 2014
  1. @mexicarne

    MFH: r342299

    mexicarne committed
    - Fix after stage support
    Approved by:    portmgr (miwi)
  2. @mexicarne

    MFH: r342293

    mexicarne committed
    - Fix typos
    Approved by:    portmgr (miwi)
Something went wrong with that request. Please try again.