notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

FInally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combinatio for a given watch list. This is what FreshPorts will look for.

Port details
clamav Open-source (GPL) anti-virus engine (Regular Feature Release)
1.3.0_1,1 security on this many watch lists=331 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 1.2.2,1Version of this port present on the latest quarterly branch.
Maintainer: yasu@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2003-01-20 03:42:13
Last Update: 2024-02-19 11:59:23
Commit Hash: 7f5a7b0
People watching this port, also watch:: gmake, unzip, libiconv, arc
License: GPLv2
WWW:
https://www.clamav.net/
Description:
ClamAV is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security. It provides many utilities for users, including a flexible and scalable multi-threaded daemon, a command-line scanner and an advanced tool for automatic database updates. This is Regular (non-LTS) Feature Release of ClamAV.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (183 items)
Collapse this list.
  1. @ldconfig
  2. /usr/local/share/licenses/clamav-1.3.0_1,1/catalog.mk
  3. /usr/local/share/licenses/clamav-1.3.0_1,1/LICENSE
  4. /usr/local/share/licenses/clamav-1.3.0_1,1/GPLv2
  5. bin/clamav-config
  6. bin/clambc
  7. bin/clamconf
  8. bin/clamdscan
  9. bin/clamdtop
  10. bin/clamscan
  11. bin/clamsubmit
  12. bin/freshclam
  13. bin/sigtool
  14. include/clamav-config.h
  15. include/clamav-types.h
  16. include/clamav-version.h
  17. include/clamav.h
  18. include/libfreshclam.h
  19. lib/libclamav.so
  20. lib/libclamav.so.12
  21. lib/libclamav.so.12.0.2
  22. lib/libclamav_rust.a
  23. lib/libclamunrar.so
  24. lib/libclamunrar.so.12
  25. lib/libclamunrar.so.12.0.2
  26. lib/libclamunrar_iface.so
  27. lib/libclamunrar_iface.so.12
  28. lib/libclamunrar_iface.so.12.0.2
  29. lib/libfreshclam.so
  30. lib/libfreshclam.so.3
  31. lib/libfreshclam.so.3.0.1
  32. libdata/pkgconfig/libclamav.pc
  33. share/man/man1/clambc.1.gz
  34. share/man/man1/clamconf.1.gz
  35. share/man/man1/clamdscan.1.gz
  36. share/man/man1/clamdtop.1.gz
  37. share/man/man1/clamscan.1.gz
  38. share/man/man1/clamsubmit.1.gz
  39. share/man/man1/freshclam.1.gz
  40. share/man/man1/sigtool.1.gz
  41. share/man/man5/clamav-milter.conf.5.gz
  42. share/man/man5/clamd.conf.5.gz
  43. share/man/man5/freshclam.conf.5.gz
  44. share/man/man8/clamav-milter.8.gz
  45. share/man/man8/clamd.8.gz
  46. share/doc/clamav/html/404.html
  47. share/doc/clamav/html/FontAwesome/css/font-awesome.css
  48. share/doc/clamav/html/FontAwesome/fonts/FontAwesome.ttf
  49. share/doc/clamav/html/FontAwesome/fonts/fontawesome-webfont.eot
  50. share/doc/clamav/html/FontAwesome/fonts/fontawesome-webfont.svg
  51. share/doc/clamav/html/FontAwesome/fonts/fontawesome-webfont.ttf
  52. share/doc/clamav/html/FontAwesome/fonts/fontawesome-webfont.woff
  53. share/doc/clamav/html/FontAwesome/fonts/fontawesome-webfont.woff2
  54. share/doc/clamav/html/Introduction.html
  55. share/doc/clamav/html/ace.js
  56. share/doc/clamav/html/appendix/Appendix.html
  57. share/doc/clamav/html/appendix/Authenticode.html
  58. share/doc/clamav/html/appendix/CvdPrivateMirror.html
  59. share/doc/clamav/html/appendix/FileTypes.html
  60. share/doc/clamav/html/appendix/FunctionalityLevels.html
  61. share/doc/clamav/html/appendix/Terminology.html
  62. share/doc/clamav/html/ayu-highlight.css
  63. share/doc/clamav/html/book.js
  64. share/doc/clamav/html/clipboard.min.js
  65. share/doc/clamav/html/community_resources/CommunityResources.html
  66. share/doc/clamav/html/community_resources/CompileClamAV_AmazonLinux2.txt
  67. share/doc/clamav/html/css/chrome.css
  68. share/doc/clamav/html/css/general.css
  69. share/doc/clamav/html/css/print.css
  70. share/doc/clamav/html/css/variables.css
  71. share/doc/clamav/html/editor.js
  72. share/doc/clamav/html/elasticlunr.min.js
  73. share/doc/clamav/html/faq/faq-cvd.html
  74. share/doc/clamav/html/faq/faq-eol.html
  75. share/doc/clamav/html/faq/faq-freshclam.html
  76. share/doc/clamav/html/faq/faq-ignore.html
  77. share/doc/clamav/html/faq/faq-malware-fp-reports.html
  78. share/doc/clamav/html/faq/faq-misc.html
  79. share/doc/clamav/html/faq/faq-ml.html
  80. share/doc/clamav/html/faq/faq-pua.html
  81. share/doc/clamav/html/faq/faq-rust.html
  82. share/doc/clamav/html/faq/faq-safebrowsing.html
  83. share/doc/clamav/html/faq/faq-scan-alerts.html
  84. share/doc/clamav/html/faq/faq-troubleshoot.html
  85. share/doc/clamav/html/faq/faq-uninstall.html
  86. share/doc/clamav/html/faq/faq-upgrade.html
  87. share/doc/clamav/html/faq/faq-whichversion.html
  88. share/doc/clamav/html/faq/faq-win32.html
  89. share/doc/clamav/html/faq/faq.html
  90. share/doc/clamav/html/favicon.png
  91. share/doc/clamav/html/fonts/OPEN-SANS-LICENSE.txt
  92. share/doc/clamav/html/fonts/SOURCE-CODE-PRO-LICENSE.txt
  93. share/doc/clamav/html/fonts/fonts.css
  94. share/doc/clamav/html/fonts/open-sans-v17-all-charsets-300.woff2
  95. share/doc/clamav/html/fonts/open-sans-v17-all-charsets-300italic.woff2
  96. share/doc/clamav/html/fonts/open-sans-v17-all-charsets-600.woff2
  97. share/doc/clamav/html/fonts/open-sans-v17-all-charsets-600italic.woff2
  98. share/doc/clamav/html/fonts/open-sans-v17-all-charsets-700.woff2
  99. share/doc/clamav/html/fonts/open-sans-v17-all-charsets-700italic.woff2
  100. share/doc/clamav/html/fonts/open-sans-v17-all-charsets-800.woff2
  101. share/doc/clamav/html/fonts/open-sans-v17-all-charsets-800italic.woff2
  102. share/doc/clamav/html/fonts/open-sans-v17-all-charsets-italic.woff2
  103. share/doc/clamav/html/fonts/open-sans-v17-all-charsets-regular.woff2
  104. share/doc/clamav/html/fonts/source-code-pro-v11-all-charsets-500.woff2
  105. share/doc/clamav/html/googled62299e9391332c4.html
  106. share/doc/clamav/html/highlight.css
  107. share/doc/clamav/html/highlight.js
  108. share/doc/clamav/html/images/change-fork-name.png
  109. share/doc/clamav/html/images/cisco.png
  110. share/doc/clamav/html/images/clone-your-fork.png
  111. share/doc/clamav/html/images/create-a-fork.png
  112. share/doc/clamav/html/images/demon.png
  113. share/doc/clamav/html/images/flamegraph.svg
  114. share/doc/clamav/html/images/fork-is-behind.png
  115. share/doc/clamav/html/images/logo.png
  116. share/doc/clamav/html/images/new-git-workflow.png
  117. share/doc/clamav/html/images/old-git-workflow.png
  118. share/doc/clamav/html/index.html
  119. share/doc/clamav/html/manual/Development.html
  120. share/doc/clamav/html/manual/Development/Contribute.html
  121. share/doc/clamav/html/manual/Development/build-installer-packages.html
  122. share/doc/clamav/html/manual/Development/clamav-git-work-flow.html
  123. share/doc/clamav/html/manual/Development/code-coverage.html
  124. share/doc/clamav/html/manual/Development/development-builds.html
  125. share/doc/clamav/html/manual/Development/fuzzing-sanitizers.html
  126. share/doc/clamav/html/manual/Development/github-pr-basics.html
  127. share/doc/clamav/html/manual/Development/libclamav.html
  128. share/doc/clamav/html/manual/Development/performance-profiling.html
  129. share/doc/clamav/html/manual/Development/personal-forks.html
  130. share/doc/clamav/html/manual/Development/testing-pull-requests.html
  131. share/doc/clamav/html/manual/Development/tips-and-tricks.html
  132. share/doc/clamav/html/manual/Installing.html
  133. share/doc/clamav/html/manual/Installing/Add-clamav-user.html
  134. share/doc/clamav/html/manual/Installing/Community-projects.html
  135. share/doc/clamav/html/manual/Installing/Docker.html
  136. share/doc/clamav/html/manual/Installing/Installing-from-source-Unix-old.html
  137. share/doc/clamav/html/manual/Installing/Installing-from-source-Unix.html
  138. share/doc/clamav/html/manual/Installing/Installing-from-source-Windows.html
  139. share/doc/clamav/html/manual/Installing/Packages.html
  140. share/doc/clamav/html/manual/OnAccess.html
  141. share/doc/clamav/html/manual/Signatures.html
  142. share/doc/clamav/html/manual/Signatures/AllowLists.html
  143. share/doc/clamav/html/manual/Signatures/AuthenticodeRules.html
  144. share/doc/clamav/html/manual/Signatures/BodySignatureFormat.html
  145. share/doc/clamav/html/manual/Signatures/BytecodeSignatures.html
  146. share/doc/clamav/html/manual/Signatures/ContainerMetadata.html
  147. share/doc/clamav/html/manual/Signatures/DatabaseInfo.html
  148. share/doc/clamav/html/manual/Signatures/DynamicConfig.html
  149. share/doc/clamav/html/manual/Signatures/EncryptedArchives.html
  150. share/doc/clamav/html/manual/Signatures/ExtendedSignatures.html
  151. share/doc/clamav/html/manual/Signatures/FileTypeMagic.html
  152. share/doc/clamav/html/manual/Signatures/HashSignatures.html
  153. share/doc/clamav/html/manual/Signatures/LogicalSignatures.html
  154. share/doc/clamav/html/manual/Signatures/PhishSigs.html
  155. share/doc/clamav/html/manual/Signatures/SignatureNames.html
  156. share/doc/clamav/html/manual/Signatures/YaraRules.html
  157. share/doc/clamav/html/manual/Usage.html
  158. share/doc/clamav/html/manual/Usage/Configuration.html
  159. share/doc/clamav/html/manual/Usage/ReportABug.html
  160. share/doc/clamav/html/manual/Usage/Scanning.html
  161. share/doc/clamav/html/manual/Usage/Services.html
  162. share/doc/clamav/html/manual/Usage/SignatureManagement.html
  163. share/doc/clamav/html/mark.min.js
  164. share/doc/clamav/html/mode-rust.js
  165. share/doc/clamav/html/print.html
  166. share/doc/clamav/html/searcher.js
  167. share/doc/clamav/html/searchindex.js
  168. share/doc/clamav/html/searchindex.json
  169. share/doc/clamav/html/sitemap.xml
  170. share/doc/clamav/html/theme-dawn.js
  171. share/doc/clamav/html/theme-tomorrow_night.js
  172. share/doc/clamav/html/tomorrow-night.css
  173. sbin/clamav-milter
  174. sbin/clamd
  175. @sample etc/clamd.conf.sample
  176. @sample etc/clamav-milter.conf.sample
  177. @sample etc/freshclam.conf.sample
  178. @dir(clamav,clamav,0755) /var/db/clamav
  179. @dir(clamav,clamav,0755) /var/log/clamav
  180. @dir(clamav,clamav,0755) /var/run/clamav
  181. @owner
  182. @group
  183. @mode
Collapse this list.
Dependency lines:
  • clamav>0:security/clamav
Conflicts:
CONFLICTS_INSTALL:
  • clamav-lts
Conflicts Matches:
There are no Conflicts Matches for this port. This is usually an error.
To install the port:
cd /usr/ports/security/clamav/ && make install clean
To add the package, run one of these commands:
  • pkg install security/clamav
  • pkg install clamav
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: clamav
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1707348219 SHA256 (clamav-1.3.0.tar.gz) = 0a86a6496320d91576037b33101119af6fd8d5b91060cd316a3a9c229e9604aa SIZE (clamav-1.3.0.tar.gz) = 54538457

Packages (timestamps in pop-ups are UTC):
clamav
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest1.3.0_1,11.3.0_1,10.103.0,11.3.0_1,11.3.0_1,1-0.103.0,1-
FreeBSD:13:quarterly1.2.2,11.2.2,1-1.2.2,11.2.2,1-1.2.1_1,11.2.2,1
FreeBSD:14:latest1.3.0_1,11.3.0_1,1-1.3.0_1,11.3.0_1,1--1.1.0_1,1
FreeBSD:14:quarterly1.2.2,11.2.2,1-1.2.2,11.2.2,1-1.2.1_1,11.2.2,1
FreeBSD:15:latest1.3.0_1,11.3.0_1,1n/a1.3.0,1n/a-1.2.1_2,1-
FreeBSD:15:quarterly--n/a-n/a---
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. rust>=1.56.0 : lang/rust
  2. cmake : devel/cmake-core
  3. ninja : devel/ninja
  4. pkgconf>=1.3.0_1 : devel/pkgconf
Runtime dependencies:
  1. arc : archivers/arc
  2. arj : archivers/arj
  3. unzoo : archivers/unzoo
Library dependencies:
  1. libcurl.so : ftp/curl
  2. libjson-c.so : devel/json-c
  3. libmspack.so : archivers/libmspack
  4. libpcre2-8.so : devel/pcre2
  5. libxml2.so : textproc/libxml2
This port is required by:
for Build
  1. mail/mimedefang
  2. mail/p5-Clamd
  3. mail/simscan
  4. security/clamassassin
  5. security/clamav-unofficial-sigs
  6. security/p5-File-Scan-ClamAV

Deleted ports which required this port:

Expand this list of 2 deleted ports
  1. mail/p5-Mail-ClamAV*
  2. mail/qsheff*
  3. Collapse this list of deleted ports.
for Libraries
  1. www/c-icap-modules

Deleted ports which required this port:

Expand this list of 8 deleted ports
  1. security/clamcour*
  2. security/klamav*
  3. security/py-clamav*
  4. security/razorback-clamavNugget*
  5. security/scannedonly*
  6. www/gurlchecker*
  7. www/havp*
  8. www/mod_clamav*
  9. Collapse this list of deleted ports.
for Run
  1. mail/claws-mail-clamd
  2. mail/dspam
  3. mail/mailscanner
  4. mail/mimedefang
  5. mail/p5-Clamd
  6. mail/py-fuglu
  7. net-mgmt/nagios-check_clamav
Expand this list (23 items / 16 hidden - sorry, this count includes any deleted ports)
  1. Collapse this list).
  2. security/clamassassin
  3. security/clamav-unofficial-sigs
  4. security/clamfs
  5. security/clamsmtp
  6. security/clamtk
  7. security/maia
  8. security/p5-File-Scan-ClamAV
  9. security/proftpd-mod_clamav
  10. www/e2guardian
  11. Collapse this list.

Deleted ports which required this port:

Expand this list of 7 deleted ports
  1. mail/clamfilter*
  2. mail/dspam-devel*
  3. mail/p5-Mail-ClamAV*
  4. mail/qscan*
  5. mail/qsheff*
  6. security/scamp*
  7. security/scannedonly*
  8. Collapse this list of deleted ports.
* - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

Configuration Options:
===> The following configuration options are available for clamav-1.3.0_1,1: ARC=on: Enable arch archives support ARJ=on: Enable arj archives support DOCS=on: Build and/or install documentation EXPERIMENTAL=off: Build experimental code LHA=off: Enable lha archives support MILTER=on: Compile the milter interface STDERR=off: Print logs to stderr instead of stdout TESTS=off: Build with test enabled (`make test` requires it) UNRAR=on: RAR decompression support UNZOO=on: Enable zoo archives support ===> Use 'make config' to modify these settings
Options name:
security_clamav
USES:
cmake cpe gnome iconv ncurses pkgconfig ssl
FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (1 items)
Collapse this list.
  1. https://www.clamav.net/downloads/production/
Collapse this list.
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2022-12-15
    Affects: users of security/clamav
    Author: yasu@FreeBSD.org
    Reason: 
      Many users report that after updating ClamAV to 1.0.0 clamd and
      freshclam fails to start with integrity check error of
      databases. According to the result of investigation it happens with
      following conditions.
    
      1. ClamAV is built on non-cleanroom environment (that is, neither
         FreeBSD official ClamAV package is used nor the package is built
         by user with poudriere).
      2. math/tomsfastmath is installed in the system that ClamAV is
         built.
    
      So if the errror happens on you system, uninstall TomsFastMath first
      and then rebuild and reinstall ClamAV. The problem should disappear.
    
    
Expand this list (1 items)
  • 2021-10-07
    Affects: user of security/clamav
    Author: yasu@FreeBSD.org
    Reason: 
      Upstream changed end-of-life policy and introduced long time support
      (LTS) feature release.
    
      * LTS feature release will be identified approximately every two
        years and supported for at least three years from the initial
        publication date of that LTS feature version.
      * Regular (non-LTS) feature releases will be supported for at least
        four months from the initial publication date of the next feature
        release or until the feature release after that is published.
    
      According to it new port security/clamav-lts is added for users who
      want to use LTS version of ClamAV.
    
      Users wanting to switch to LTS version can replace security/clamav
      with security/clamav-lts with one of following commands.
    
      If you use pkg with binary packages:
        # pkg set -o security/clamav:security/clamav-lts
        # pkg upgrade
      If you use portmaster:
        # portmaster -o security/clamav-lts security/clamav
      If you use portupgrade:
        # portupgrade -o security/clamav-lts security/clamav
    
    
  • Collapse this list.

Number of commits found: 363 (showing only 100 on this page)

1 | 2 | 3 | 4  »  

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
1.3.0_1,1
19 Feb 2024 11:59:23
commit hash: 7f5a7b0e524c8d32727681a4324905e350dc433ccommit hash: 7f5a7b0e524c8d32727681a4324905e350dc433ccommit hash: 7f5a7b0e524c8d32727681a4324905e350dc433ccommit hash: 7f5a7b0e524c8d32727681a4324905e350dc433c files touched by this commit
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.76.0

PR:		276920
1.3.0,1
08 Feb 2024 05:18:25
commit hash: a23833411bf47a6f0c86382a5abb66cba6db349fcommit hash: a23833411bf47a6f0c86382a5abb66cba6db349fcommit hash: a23833411bf47a6f0c86382a5abb66cba6db349fcommit hash: a23833411bf47a6f0c86382a5abb66cba6db349f files touched by this commit
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 1.3.0

ReleaseNotes:	https://blog.clamav.net/2023/11/clamav-130-122-105-released.html
1.2.2,1
08 Feb 2024 05:18:23
commit hash: 3db73ea66a984542f3cfae6d347bc99cb9c49621commit hash: 3db73ea66a984542f3cfae6d347bc99cb9c49621commit hash: 3db73ea66a984542f3cfae6d347bc99cb9c49621commit hash: 3db73ea66a984542f3cfae6d347bc99cb9c49621 files touched by this commit
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 1.2.2

ReleaseNotes:	https://blog.clamav.net/2023/11/clamav-130-122-105-released.html
MFH:		2024Q1
Security:	68ae70c5-c5e5-11ee-9768-08002784c58d
1.2.1_2,1
09 Jan 2024 12:15:54
commit hash: 109c3d4629b84972e660b689d169ac0761c1a519commit hash: 109c3d4629b84972e660b689d169ac0761c1a519commit hash: 109c3d4629b84972e660b689d169ac0761c1a519commit hash: 109c3d4629b84972e660b689d169ac0761c1a519 files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.75.0

PR:		276033
1.2.1_1,1
08 Dec 2023 15:04:09
commit hash: b2afd89fb26437c5d9810b131370525352e63f71commit hash: b2afd89fb26437c5d9810b131370525352e63f71commit hash: b2afd89fb26437c5d9810b131370525352e63f71commit hash: b2afd89fb26437c5d9810b131370525352e63f71 files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.74.1

PR:		275243
1.2.1,1
26 Oct 2023 04:45:24
commit hash: a72877e6536bc0b0c1d33becebadf701b8c7a9a9commit hash: a72877e6536bc0b0c1d33becebadf701b8c7a9a9commit hash: a72877e6536bc0b0c1d33becebadf701b8c7a9a9commit hash: a72877e6536bc0b0c1d33becebadf701b8c7a9a9 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 1.2.1

ReleaseNotes:	https://blog.clamav.net/2023/10/clamav-121-113-104-010311-patch.html
1.2.0_2,1
24 Oct 2023 10:22:32
commit hash: dd10dc88a7cf54f9aa164bf40cc5e481021401d6commit hash: dd10dc88a7cf54f9aa164bf40cc5e481021401d6commit hash: dd10dc88a7cf54f9aa164bf40cc5e481021401d6commit hash: dd10dc88a7cf54f9aa164bf40cc5e481021401d6 files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.73.0

PR:		274499
1.2.0_1,1
08 Oct 2023 15:29:00
commit hash: 0881e594ac8e167686c389f9f7db7c98126718b7commit hash: 0881e594ac8e167686c389f9f7db7c98126718b7commit hash: 0881e594ac8e167686c389f9f7db7c98126718b7commit hash: 0881e594ac8e167686c389f9f7db7c98126718b7 files touched by this commit This port version is marked as vulnerable.
Dimitry Andric (dim) search for other commits by this committer
security/clamav: fix build with lld 17

Building security/clamav with lld 17 results in the following link
errors:

  ld: error: version script assignment of 'CLAMAV_PRIVATE' to symbol
'cli_cvdunpack' failed: symbol not defined
  ld: error: version script assignment of 'CLAMAV_PRIVATE' to symbol
'cli_dbgmsg_internal' failed: symbol not defined
  ld: error: version script assignment of 'CLAMAV_PRIVATE' to symbol
'init_domainlist' failed: symbol not defined
  ld: error: version script assignment of 'CLAMAV_PRIVATE' to symbol
'init_whitelist' failed: symbol not defined
  ld: error: version script assignment of 'CLAMAV_PRIVATE' to symbol
'cli_parse_add' failed: symbol not defined
  ld: error: version script assignment of 'CLAMAV_PRIVATE' to symbol
'cli_bytecode_context_clear' failed: symbol not defined
  cc: error: linker command failed with exit code 1 (use -v to see invocation)

Most of the mentioned symbols no longer exist anywhere in clamav's
source code, except 'cli_cvdunpack', but it is a static function so it
is not visible to external consumers. Remove all the undefined symbols
from the linker version script to fix the build.

PR:		274332
Approved by:	yasu (maintainer)
MFH:		2023Q4
1.2.0_1,1
12 Sep 2023 11:54:14
commit hash: 0146693b1a61ab6410b0009c11b7a69406c0aa27commit hash: 0146693b1a61ab6410b0009c11b7a69406c0aa27commit hash: 0146693b1a61ab6410b0009c11b7a69406c0aa27commit hash: 0146693b1a61ab6410b0009c11b7a69406c0aa27 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/{clamav,clamav-lts}: Fix build with non-default openssl setting

Add arguments to CMAKE_ARGS that specify paths related to openssl so
header files and libraies of selected openssl stack are used instead
of the ones of base system.

PR:		273659
Reported by:	doctor@doctor.nl2k.ab.ca, Andrey Pevnev
MFH:		2023Q3
1.2.0_1,1
08 Sep 2023 09:06:24
commit hash: aba8da2be191461126505c67726fa87345ae63f8commit hash: aba8da2be191461126505c67726fa87345ae63f8commit hash: aba8da2be191461126505c67726fa87345ae63f8commit hash: aba8da2be191461126505c67726fa87345ae63f8 files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.72.0

PR:		273331
1.2.0,1
29 Aug 2023 03:09:11
commit hash: 671977fc2a5a11a64b52cb0d4b4960d056059720commit hash: 671977fc2a5a11a64b52cb0d4b4960d056059720commit hash: 671977fc2a5a11a64b52cb0d4b4960d056059720commit hash: 671977fc2a5a11a64b52cb0d4b4960d056059720 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 1.2.0

ReleaseNotes:	https://blog.clamav.net/2023/08/clamav-120-feature-version-and-111-102.html
1.1.2,1
29 Aug 2023 03:08:29
commit hash: 77c32356b90231175a43b1bd7c91c219515437b4commit hash: 77c32356b90231175a43b1bd7c91c219515437b4commit hash: 77c32356b90231175a43b1bd7c91c219515437b4commit hash: 77c32356b90231175a43b1bd7c91c219515437b4 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 1.1.2

Update to this version is intended to be merged and fix vulnerability
in quarterly branch.

ReleaseNotes:	https://blog.clamav.net/2023/08/clamav-120-feature-version-and-111-102.html
MFH:		2023Q3
Security:	6d928319-4612-11ee-b224-080027f5fec9
1.1.1,1
17 Aug 2023 03:33:56
commit hash: a98bb82ea8484d091c07516cf51c624f7025319acommit hash: a98bb82ea8484d091c07516cf51c624f7025319acommit hash: a98bb82ea8484d091c07516cf51c624f7025319acommit hash: a98bb82ea8484d091c07516cf51c624f7025319a files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 1.1.1

ReleaseNotes:	https://blog.clamav.net/2023/07/2023-08-16-releases.html
MFH:		2023Q3
Security:	51a59f36-3c58-11ee-b32e-080027f5fec9
1.1.0_2,1
17 Jul 2023 15:58:38
commit hash: cdf28617b49d6e4a3b049746d3754fbc36ef7892commit hash: cdf28617b49d6e4a3b049746d3754fbc36ef7892commit hash: cdf28617b49d6e4a3b049746d3754fbc36ef7892commit hash: cdf28617b49d6e4a3b049746d3754fbc36ef7892 files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.71.0

PR:		272449
1.1.0_1,1
09 Jun 2023 11:38:16
commit hash: e1d1045bc7a57cb26a07750a25c7b8bdd94b7175commit hash: e1d1045bc7a57cb26a07750a25c7b8bdd94b7175commit hash: e1d1045bc7a57cb26a07750a25c7b8bdd94b7175commit hash: e1d1045bc7a57cb26a07750a25c7b8bdd94b7175 files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.70.0

PR:		271797
1.1.0,1
08 May 2023 06:28:43
commit hash: a16dd94b55f5d5fa374b139dc64f3fa362c4f3decommit hash: a16dd94b55f5d5fa374b139dc64f3fa362c4f3decommit hash: a16dd94b55f5d5fa374b139dc64f3fa362c4f3decommit hash: a16dd94b55f5d5fa374b139dc64f3fa362c4f3de files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 1.1.0

ReleaseNotes:	https://blog.clamav.net/2023/05/clamav-110-released.html
1.0.1_2,1
23 Apr 2023 13:14:05
commit hash: 3db55c4e97489e0f34fd7d35be6be0a4d0599061commit hash: 3db55c4e97489e0f34fd7d35be6be0a4d0599061commit hash: 3db55c4e97489e0f34fd7d35be6be0a4d0599061commit hash: 3db55c4e97489e0f34fd7d35be6be0a4d0599061 files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.69.0

PR:		270953
1.0.1_1,1
16 Mar 2023 11:11:52
commit hash: ebf29acc6ce4942cbc6ee75d81b6b97391e4371fcommit hash: ebf29acc6ce4942cbc6ee75d81b6b97391e4371fcommit hash: ebf29acc6ce4942cbc6ee75d81b6b97391e4371fcommit hash: ebf29acc6ce4942cbc6ee75d81b6b97391e4371f files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.68.0

PR:		270080
1.0.1,1
16 Feb 2023 04:09:39
commit hash: 88d33b9be95f90b9e266766fabda51e2e20457d9commit hash: 88d33b9be95f90b9e266766fabda51e2e20457d9commit hash: 88d33b9be95f90b9e266766fabda51e2e20457d9commit hash: 88d33b9be95f90b9e266766fabda51e2e20457d9 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 1.0.1

ReleaseNotes:	https://blog.clamav.net/2023/02/clamav-01038-01052-and-101-patch.html
MFH:		2023Q1
Security:	fd792048-ad91-11ed-a879-080027f5fec9
1.0.0_3,1
13 Feb 2023 14:52:59
commit hash: 109e35fd592baffe0d7ece384d16e243468dcc42commit hash: 109e35fd592baffe0d7ece384d16e243468dcc42commit hash: 109e35fd592baffe0d7ece384d16e243468dcc42commit hash: 109e35fd592baffe0d7ece384d16e243468dcc42 files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.67.1

PR:		269336
1.0.0_2,1
07 Jan 2023 19:24:18
commit hash: 12f1c627d4a26e8098339900303640f7520b6673commit hash: 12f1c627d4a26e8098339900303640f7520b6673commit hash: 12f1c627d4a26e8098339900303640f7520b6673commit hash: 12f1c627d4a26e8098339900303640f7520b6673 files touched by this commit This port version is marked as vulnerable.
Daniel Engberg (diizzy) search for other commits by this committer
*/*: Bump rust (cargo) ports to reflect on WITH_LTO

Bump ports in tree so they get rebuilt with new default settings
for cargo ports
1.0.0_1,1
20 Dec 2022 17:37:15
commit hash: ba14e01a5249ee9d2f51183587dde36067be000fcommit hash: ba14e01a5249ee9d2f51183587dde36067be000fcommit hash: ba14e01a5249ee9d2f51183587dde36067be000fcommit hash: ba14e01a5249ee9d2f51183587dde36067be000f files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.66.0

PR:		268415
1.0.0,1
29 Nov 2022 04:51:14
commit hash: f7bcd43826f0aca95ecacda1bfad3c7f21621e74commit hash: f7bcd43826f0aca95ecacda1bfad3c7f21621e74commit hash: f7bcd43826f0aca95ecacda1bfad3c7f21621e74commit hash: f7bcd43826f0aca95ecacda1bfad3c7f21621e74 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 1.0.0

* Switch to use bundled TomsFastMath library. Upstream made
  incompatible change to bundled copy and this makes it impossible to
  use external one. They also dropped option to use it.
* Bump PORTREVISION of consumers as shlib version is changed.
* Note that though this is new LTS feature release security/clamav-lts
  stays in 0.103.x until either next regular feature release (probably
  1.1.0) is released or 0.103.x reaches its EoL.

ReleaseNotes:	https://blog.clamav.net/2022/11/clamav-100-lts-released.html
0.105.1_5,1
17 Nov 2022 07:06:14
commit hash: 9bf6a9996323c016eb295bd6190b0e47ad76fdf4commit hash: 9bf6a9996323c016eb295bd6190b0e47ad76fdf4commit hash: 9bf6a9996323c016eb295bd6190b0e47ad76fdf4commit hash: 9bf6a9996323c016eb295bd6190b0e47ad76fdf4 files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.65.0

PR:		267622
0.105.1_4,1
16 Nov 2022 02:39:56
commit hash: 30502135f297ff727b4992afbb76f0ca675c53eccommit hash: 30502135f297ff727b4992afbb76f0ca675c53eccommit hash: 30502135f297ff727b4992afbb76f0ca675c53eccommit hash: 30502135f297ff727b4992afbb76f0ca675c53ec files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update source archive to new one again

Upstream released new source archive of 0.105.1 again to fix the
problem introduced by previous update of source archive.

Reference:	https://blog.clamav.net/2022/11/second-clamav-100-release-candidate-and.html
MFH:		2022Q4
0.105.1_3,1
01 Nov 2022 02:29:12
commit hash: 2db375ffbc2fe8ad146e0d9f49a501031b8f256dcommit hash: 2db375ffbc2fe8ad146e0d9f49a501031b8f256dcommit hash: 2db375ffbc2fe8ad146e0d9f49a501031b8f256dcommit hash: 2db375ffbc2fe8ad146e0d9f49a501031b8f256d files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update source archive to new one

Upstream released new source archive of 0.105.1 to address critical
bugs in bundled libraries.

Reference:	https://lists.clamav.net/pipermail/clamav-announce/2022/000067.html
MFH:		2022Q4
0.105.1_2,1
30 Oct 2022 12:07:09
commit hash: afe651cf62deb08500a44cde90296a818effe5aecommit hash: afe651cf62deb08500a44cde90296a818effe5aecommit hash: afe651cf62deb08500a44cde90296a818effe5aecommit hash: afe651cf62deb08500a44cde90296a818effe5ae files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.64.0

PR:		267173
07 Sep 2022 21:58:51
commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4 files touched by this commit
Stefan Eßer (se) search for other commits by this committer
Remove WWW entries moved into port Makefiles

Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.

This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.

Approved by:		portmgr (tcberner)
0.105.1_1,1
07 Sep 2022 21:10:59
commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52 files touched by this commit This port version is marked as vulnerable.
Stefan Eßer (se) search for other commits by this committer
Add WWW entries to port Makefiles

It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.

Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.

There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.105.1_1,1
25 Aug 2022 14:49:50
commit hash: b9b250f91299716bc4a7a6b7b8db2284c57f16cacommit hash: b9b250f91299716bc4a7a6b7b8db2284c57f16cacommit hash: b9b250f91299716bc4a7a6b7b8db2284c57f16cacommit hash: b9b250f91299716bc4a7a6b7b8db2284c57f16ca files touched by this commit This port version is marked as vulnerable.
Baptiste Daroussin (bapt) search for other commits by this committer
rust: bring back update to 1.63

Revert back the revert of the update of rust and related commits

This revert was drive by beside validation by portmgr via exp-run
and not respectful of the etiquette we have between committers

This reverts commit 8ecb1f8141144c1603eb4026122d2e60eeaccd64.
This reverts commit 04d257baa182926cff158f32cf459e560426add0.
This reverts commit 2757c63bd0e6d01f9f0657fe03bb3a7b49adcae2.
This reverts commit 75f4713de5e3fbd1c6a0cb572e08121814a4072e.
This reverts commit e88e592111c86fdd1c0ac8717dbef9342e15e27c.
This reverts commit 783c056d7d681d66e2c5c59251c275d65274028e.

With hat:	portmgr
0.105.1,1
25 Aug 2022 10:49:39
commit hash: 783c056d7d681d66e2c5c59251c275d65274028ecommit hash: 783c056d7d681d66e2c5c59251c275d65274028ecommit hash: 783c056d7d681d66e2c5c59251c275d65274028ecommit hash: 783c056d7d681d66e2c5c59251c275d65274028e files touched by this commit This port version is marked as vulnerable.
Piotr Kubaj (pkubaj) search for other commits by this committer
Revert "lang/rust: Bump revisions after 1.63.0"

This reverts commit c7912d97754bb7aa9a18eb33df53f91cba4cd82d.

PR:	265915
0.105.1_1,1
25 Aug 2022 08:51:32
commit hash: c7912d97754bb7aa9a18eb33df53f91cba4cd82dcommit hash: c7912d97754bb7aa9a18eb33df53f91cba4cd82dcommit hash: c7912d97754bb7aa9a18eb33df53f91cba4cd82dcommit hash: c7912d97754bb7aa9a18eb33df53f91cba4cd82d files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.63.0
0.105.1,1
27 Jul 2022 05:48:01
commit hash: 9f9f9aac0221c36dbb854fdd9b57e4f200512a09commit hash: 9f9f9aac0221c36dbb854fdd9b57e4f200512a09commit hash: 9f9f9aac0221c36dbb854fdd9b57e4f200512a09commit hash: 9f9f9aac0221c36dbb854fdd9b57e4f200512a09 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 0.105.1

ReleaseNotes:	https://blog.clamav.net/2022/07/clamav-01037-01041-and-01051-patch.html
0.105.0_2,1
02 Jul 2022 13:47:05
commit hash: a50372b91f2b327f3bc400d088e21f4b18c2a112commit hash: a50372b91f2b327f3bc400d088e21f4b18c2a112commit hash: a50372b91f2b327f3bc400d088e21f4b18c2a112commit hash: a50372b91f2b327f3bc400d088e21f4b18c2a112 files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.62.0
0.105.0_1,1
24 Jun 2022 00:23:14
commit hash: b9e905d14763bd35357d6bb4a42c72d067a32c20commit hash: b9e905d14763bd35357d6bb4a42c72d067a32c20commit hash: b9e905d14763bd35357d6bb4a42c72d067a32c20commit hash: b9e905d14763bd35357d6bb4a42c72d067a32c20 files touched by this commit This port version is marked as vulnerable.
Piotr Kubaj (pkubaj) search for other commits by this committer
security/clamav: fix build on big-endian architectures

Backport
https://github.com/image-rs/image/commit/ed8337afc795571795482882236acf14196e10db
to fix build.

Approved by:	Tier 2 blanket
0.105.0_1,1
31 May 2022 13:06:17
commit hash: e9a35a1c5016dde2e50c722753b048dfeb7093becommit hash: e9a35a1c5016dde2e50c722753b048dfeb7093becommit hash: e9a35a1c5016dde2e50c722753b048dfeb7093becommit hash: e9a35a1c5016dde2e50c722753b048dfeb7093be files touched by this commit This port version is marked as vulnerable.
Mikael Urankar (mikael) search for other commits by this committer
lang/rust: Bump revisions after 1.61.0
0.105.0,1
24 May 2022 20:45:27
commit hash: 634c8611ff100cdbcdb09f8ffa49fe3bb43f1098commit hash: 634c8611ff100cdbcdb09f8ffa49fe3bb43f1098commit hash: 634c8611ff100cdbcdb09f8ffa49fe3bb43f1098commit hash: 634c8611ff100cdbcdb09f8ffa49fe3bb43f1098 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
Author: Dan Langille
security/clamav: Fix plist

PR:		264101
Fixes:		c8e4b9ea29d3 (security/clamav: Update to 0.105.0)
0.105.0,1
23 May 2022 10:55:29
commit hash: c8e4b9ea29d391babf87f658aa37408fdf750648commit hash: c8e4b9ea29d391babf87f658aa37408fdf750648commit hash: c8e4b9ea29d391babf87f658aa37408fdf750648commit hash: c8e4b9ea29d391babf87f658aa37408fdf750648 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 0.105.0

ReleaseNotes:	https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html
0.104.3,1
19 May 2022 18:29:24
commit hash: fb54a631b35ecda00d46925beefd66c2d019dca2commit hash: fb54a631b35ecda00d46925beefd66c2d019dca2commit hash: fb54a631b35ecda00d46925beefd66c2d019dca2commit hash: fb54a631b35ecda00d46925beefd66c2d019dca2 files touched by this commit This port version is marked as vulnerable.
Florian Smeets (flo) search for other commits by this committer
security/clamav: Update to 0.104.3

PR:		263944
Approved by:	portmgr (blanket, security fixes apply according to bapt)
Security:	b2407db1-d79f-11ec-a15f-589cfc0f81b0
0.104.2_2,1
16 May 2022 06:49:43
commit hash: 2d34c2bfeaa82867acfa7d73bec9644b2acecbb1commit hash: 2d34c2bfeaa82867acfa7d73bec9644b2acecbb1commit hash: 2d34c2bfeaa82867acfa7d73bec9644b2acecbb1commit hash: 2d34c2bfeaa82867acfa7d73bec9644b2acecbb1 files touched by this commit This port version is marked as vulnerable.
Loïc Bartoletti (lbartoletti) search for other commits by this committer
devel/cmake: Update to 3.23.0

Update to 3.23.0.
Fix pkg-plist: using the default share/man location

Release Notes:
  https://cmake.org/cmake/help/v3.23/release/3.23.html

PR:		262886
Exp-run by:	antoine
0.104.2_2,1
10 Apr 2022 19:11:41
commit hash: d63665f7cd9c99880704a3c5bc221829cb009744commit hash: d63665f7cd9c99880704a3c5bc221829cb009744commit hash: d63665f7cd9c99880704a3c5bc221829cb009744commit hash: d63665f7cd9c99880704a3c5bc221829cb009744 files touched by this commit This port version is marked as vulnerable.
Charlie Li (vishwin) search for other commits by this committer
textproc/libxml2: bump all LIB_DEPENDS consumers

This is a separate commit to facilitate easier cherry-picking for
quarterly.

PR: 262853, 262940, 262877, 263126
Approved by: fluffy (mentor)
0.104.2_1,1
26 Mar 2022 08:27:27
commit hash: 247c7db7513f1264922428278678da641c5a3f52commit hash: 247c7db7513f1264922428278678da641c5a3f52commit hash: 247c7db7513f1264922428278678da641c5a3f52commit hash: 247c7db7513f1264922428278678da641c5a3f52 files touched by this commit This port version is marked as vulnerable.
Matthias Fechner (mfechner) search for other commits by this committer
textproc/libxml2: bump all dependencies

This should make sure that all dependent ports will pick
up the new version commited with a13ec21cd733f67a9fc0dc00ab45268bdc236246
0.104.2,1
13 Jan 2022 03:32:30
commit hash: 583ec468df570f73280415a1968bf3b11ff4d1f1commit hash: 583ec468df570f73280415a1968bf3b11ff4d1f1commit hash: 583ec468df570f73280415a1968bf3b11ff4d1f1commit hash: 583ec468df570f73280415a1968bf3b11ff4d1f1 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 0.104.2

ReleaseNotes:	https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html
MFH:		2022Q1
Security:	CVE-2022-20698
0.104.1,1
14 Dec 2021 01:21:45
commit hash: e9d6c3d3d059e4e44b2613f054f288efbf32cc26commit hash: e9d6c3d3d059e4e44b2613f054f288efbf32cc26commit hash: e9d6c3d3d059e4e44b2613f054f288efbf32cc26commit hash: e9d6c3d3d059e4e44b2613f054f288efbf32cc26 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
Author: Oclair
security/clamav: Make the value of user/group overridable with make.conf

PR:		259987
0.104.1,1
23 Nov 2021 22:11:40
commit hash: 5933ac0b099d61d98eb531d373cf57a8927bc7afcommit hash: 5933ac0b099d61d98eb531d373cf57a8927bc7afcommit hash: 5933ac0b099d61d98eb531d373cf57a8927bc7afcommit hash: 5933ac0b099d61d98eb531d373cf57a8927bc7af files touched by this commit This port version is marked as vulnerable.
Stefan Eßer (se) search for other commits by this committer
*/*: Remove redundant '-[0-9]*' from CONFLICTS_INSTALL

The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").

Approved by: portmgr (blanket)
0.104.1,1
19 Nov 2021 14:59:10
commit hash: e449f292ca3053f0bf4d7efbcfec4846ef1d2c27commit hash: e449f292ca3053f0bf4d7efbcfec4846ef1d2c27commit hash: e449f292ca3053f0bf4d7efbcfec4846ef1d2c27commit hash: e449f292ca3053f0bf4d7efbcfec4846ef1d2c27 files touched by this commit This port version is marked as vulnerable.
Rodrigo Osorio (rodrigo) search for other commits by this committer
security/clamav: Revert changes introduced in
d97161a97818bef47e66ab362f444cd1201c87fd
0.104.1,1
19 Nov 2021 14:51:11
commit hash: d97161a97818bef47e66ab362f444cd1201c87fdcommit hash: d97161a97818bef47e66ab362f444cd1201c87fdcommit hash: d97161a97818bef47e66ab362f444cd1201c87fdcommit hash: d97161a97818bef47e66ab362f444cd1201c87fd files touched by this commit This port version is marked as vulnerable.
Rodrigo Osorio (rodrigo) search for other commits by this committer
net-mgmt/smokeping: Fix patches filepath

PR:             259891
Reported by:    shaun <freebsd@shaunc.com>
0.104.1,1
03 Nov 2021 21:18:10
commit hash: 36f9d031ea648d74b10f26c8d8e46a42e98feb51commit hash: 36f9d031ea648d74b10f26c8d8e46a42e98feb51commit hash: 36f9d031ea648d74b10f26c8d8e46a42e98feb51commit hash: 36f9d031ea648d74b10f26c8d8e46a42e98feb51 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to new bugfix release 0.104.1

Update COMMENT and pkg-descr

ReleaseNotes:	https://blog.clamav.net/2021/11/clamav-01034-and-01041-patch-releases.html
0.104.0,1
29 Oct 2021 22:52:24
commit hash: 11ce5b3d719c4e44114f0557144a3a773cabfcfdcommit hash: 11ce5b3d719c4e44114f0557144a3a773cabfcfdcommit hash: 11ce5b3d719c4e44114f0557144a3a773cabfcfdcommit hash: 11ce5b3d719c4e44114f0557144a3a773cabfcfd files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav: Update to 0.104.0

* Upstream changed build tool from GNU Autotools to CMake
* Set TEST_TARGET
* Add pre-test-TESTS-off target to display message that TESTS option
  needs to be enabled to execute `make test`
* Switch to use pkg-messge instead of pkg-deinstall to display message
  for those who removes ClamAV permanently from you system
* Stop checking in rc scripts if /var/run/clamav exists
* Pet portclippy
* Reformat Makefile with portfmt

Release Notes:	https://blog.clamav.net/2021/09/clamav-01040-released.html
PR:		258565
Differential Revision:	https://reviews.freebsd.org/D32354
0.103.3,1
07 Oct 2021 08:52:06
commit hash: e761728685b12571bdf0a8a20d4506c8c58f934ccommit hash: e761728685b12571bdf0a8a20d4506c8c58f934ccommit hash: e761728685b12571bdf0a8a20d4506c8c58f934ccommit hash: e761728685b12571bdf0a8a20d4506c8c58f934c files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
security/clamav-lts: Add new port

* Add Long Term Support release of ClamAV
* Add CONFLICTS_INSTALL to security/clamav
* Add entry to UPDATING that explains
  - Upstream changed their end-of-life policy and LTS release is
    introduced
  - How to switch from regular release (security/clamav) to LTS
    release (security/clamav-lts)

Note about setting PORTEPOCH

In general new port should not set PORTEPOCH. But in this case it
should be set with following reason.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
0.103.3,1
28 Sep 2021 05:13:33
commit hash: 10c30f1825b82a7e2e27e2d9e176fe8f325ffce3commit hash: 10c30f1825b82a7e2e27e2d9e176fe8f325ffce3commit hash: 10c30f1825b82a7e2e27e2d9e176fe8f325ffce3commit hash: 10c30f1825b82a7e2e27e2d9e176fe8f325ffce3 files touched by this commit This port version is marked as vulnerable.
Yasuhiro Kimura (yasu) search for other commits by this committer
*/*: Update MAINTAINER address of my ports to that of FreeBSD.org

Approved by:	meta (mentor)
Differential Revision:	https://reviews.freebsd.org/D32170
0.103.3,1
22 Jun 2021 23:49:42
commit hash: ec74b5a77976adb9ea8a91e0cad6942ab99fb749commit hash: ec74b5a77976adb9ea8a91e0cad6942ab99fb749commit hash: ec74b5a77976adb9ea8a91e0cad6942ab99fb749commit hash: ec74b5a77976adb9ea8a91e0cad6942ab99fb749 files touched by this commit This port version is marked as vulnerable.
Guangyuan Yang (ygy) search for other commits by this committer
Author: Yasuhiro Kimura
security/clamav: Update to 0.103.3

Changes:	https://blog.clamav.net/2021/06/clamav-01033-patch-release.html

PR:		256751
Approved by:	lwhsu (mentor, implicit)
0.103.2,1
08 Apr 2021 04:37:17
commit hash: e01c3f0b80b378d8e5e2c9ec9c544c291c300556commit hash: e01c3f0b80b378d8e5e2c9ec9c544c291c300556commit hash: e01c3f0b80b378d8e5e2c9ec9c544c291c300556commit hash: e01c3f0b80b378d8e5e2c9ec9c544c291c300556 files touched by this commit This port version is marked as vulnerable.
Neel Chauhan (nc) search for other commits by this committer
security/clamav: Update to 0.103.2

Changes:
https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html

PR:		254862
Submitted by:	Yasuhiro Kimura <yasu AT utahime DOT org> (maintainer)
0.103.1,1
07 Apr 2021 08:09:01
commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c files touched by this commit This port version is marked as vulnerable.
Mathieu Arnold (mat) search for other commits by this committer
One more small cleanup, forgotten yesterday.
Reported by:	lwhsu
0.103.1,1
06 Apr 2021 14:31:13
commit hash: 135fdeebb99c3569e42d8162b265e15d29bd937dcommit hash: 135fdeebb99c3569e42d8162b265e15d29bd937dcommit hash: 135fdeebb99c3569e42d8162b265e15d29bd937dcommit hash: 135fdeebb99c3569e42d8162b265e15d29bd937d files touched by this commit This port version is marked as vulnerable.
Mathieu Arnold (mat) search for other commits by this committer
all: Remove all other $FreeBSD keywords.
0.103.1,1
06 Apr 2021 14:31:07
commit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344eb files touched by this commit This port version is marked as vulnerable.
Mathieu Arnold (mat) search for other commits by this committer
Remove # $FreeBSD$ from Makefiles.
0.103.1,1
07 Feb 2021 16:33:53
Revision:564627Original commit files touched by this commit This port version is marked as vulnerable.
jhale search for other commits by this committer
security/clamav: Update to 0.103.1

PR:		253242
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
Relnotes:	https://blog.clamav.net/2021/02/clamav-01031-patch-release.html
0.103.0,1
15 Sep 2020 11:14:50
Revision:548726Original commit files touched by this commit This port version is marked as vulnerable.
vanilla search for other commits by this committer
Update to 0.103.0.

PR:		249318
Submitted by:	maintainer
0.102.4,1
20 Aug 2020 09:54:34
Revision:545517Original commit files touched by this commit This port version is marked as vulnerable.
lwhsu search for other commits by this committer
security/clamav: Fix build after r541115

Fix build when base system is built with WITHOUT_SENDMAIL=yes

PR:		247792
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
0.102.4,1
17 Jul 2020 05:38:20
Revision:542405Original commit files touched by this commit This port version is marked as vulnerable.
pi search for other commits by this committer
security/clamav: update 0.102.3 -> 0.102.4

PR:		248028
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
MFH:		2020Q3
Relnotes:	https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html
Security:	CVE-2020-3350, CVE-2020-3327, CVE-2020-3481
0.102.3_1,1
03 Jul 2020 14:54:10
Revision:541115Original commit files touched by this commit This port version is marked as vulnerable.
lwhsu search for other commits by this committer
Fix build with non-default LOCALBASE, PREFIX

PR:		246059
Submitted by:	John Hein <jcfyecrayz@liamekaens.com>
Approved by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
0.102.3_1,1
22 May 2020 19:20:42
Revision:536219Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Bump PORTREVISION for devel/json-c json-c
0.102.3,1
17 May 2020 20:42:11
Revision:535677Original commit files touched by this commit This port version is marked as vulnerable.
zi search for other commits by this committer
- Update to 0.102.3 to address CVEs (CVE-2020-3327, CVE-2020-3341)

PR:		246452
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Security:	91ce95d5-cd15-4105-b942-af5ccc7144c1
0.102.2,1
06 Feb 2020 20:59:17
Revision:525450Original commit files touched by this commit This port version is marked as vulnerable.
pi search for other commits by this committer
security/clamav: upgrade 0.102.1 -> 0.102.2

- Remove MSPACK option and always use archivers/libmspack in
  accordance with policy about bundled library described in 6.2 of
  Porter's Handbook.
- Remove obsolete and no-op options from CONFIGURE_ARGS.

PR:		243914
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
Relnotes:	https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html
Security:	CVE-2020-3123
0.102.1,1
25 Nov 2019 09:24:27
Revision:518387Original commit files touched by this commit This port version is marked as vulnerable.
joneum search for other commits by this committer
Update to 0.102.1

Changelog:
https://blog.clamav.net/2019/11/clamav-01021-and-01015-patches-have.html

PR:		242119
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
MFH:		2019Q4
Security:	6ade62d9-0f62-11ea-9673-4c72b94353b5
Sponsored by:	Netzkommune GmbH
0.102.0,1
12 Nov 2019 20:07:20
Revision:517347Original commit files touched by this commit This port version is marked as vulnerable.
pi search for other commits by this committer
security/clamav: upgrade 0.101.4 -> 0.102.0

- Enable MILTER option by default
- Disable MSPACK option by default
- Sort OPTIONS_DEFINE, OPTIONS_DEFAULT and *_DESC
- Remove security/clamav-milter, slave port that enables MILTER option
- Add entry for security/clamav-milter to MOVED

PR:		241860
Submitted by:	Yasuhiro Kimura <yasu@utahime.org> (maintainer)
0.101.4,1
23 Aug 2019 06:27:15
Revision:509631Original commit files touched by this commit This port version is marked as vulnerable.
pi search for other commits by this committer
security/clamav: upgrade 0.101.3 -> 0.101.4

PR:		239684
Approved by:	ports-secteam (joneum)
Relnotes:	https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html
Security:	CVE-2019-12900, CVE-2019-12625
MFH:		2019Q3
0.101.3,1
08 Aug 2019 09:30:04
Revision:508368Original commit files touched by this commit This port version is marked as vulnerable.
pi search for other commits by this committer
security/clamav: upgrade 0.101.2 -> 0.101.3, partial security fix

- please note another fix is coming soonish:
  https://www.openwall.com/lists/oss-security/2019/08/06/3
- see also
  https://bugzilla.clamav.net/show_bug.cgi?id=12356

PR:		239684
Approved by:	delphij (ports-secteam)
Relnotes:	https://blog.clamav.net/2019/08/clamav-01013-security-patch-release-and.html
MFH:		2019Q3
Security:	CVE-2019-13232
0.101.2,1
12 Jul 2019 02:25:07
Revision:506432Original commit files touched by this commit This port version is marked as vulnerable.
linimon search for other commits by this committer
Prepare for powerpc-on-clang by deleting hard-coded tests for libstdc++.so
as a stand-in for "are we running on gcc".

For people already testing powerpc on clang, it is possible that they
already have both compilers in base.  Thus, the assumption that "gcc is
in base" (e.g.  libstdc++.so exists) always means "force use of GCC" is
already broken.  It will be for everyone on -CURRENT once the switch is
made.

While here, standardize on compiler:c++11-lang instead of -lib (they are
equivalent these days), pet portlint, and do some other cleanup.

Approved by:	portmgr (tier-2 blanket)
0.101.2,1
11 Apr 2019 00:56:12
Revision:498628Original commit files touched by this commit This port version is marked as vulnerable.
swills search for other commits by this committer
security/clamav: Update to 0.101.2

PR:		236818
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
0.101.1,1
01 Feb 2019 21:44:07
Revision:491883Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Update MASTER_SITES

Approved by:	portmgr (blanket)
0.101.1,1
15 Jan 2019 17:45:54
Revision:490393Original commit files touched by this commit This port version is marked as vulnerable.
swills search for other commits by this committer
security/clamav: Fix build when MSPACK options is off

PR:		234970
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
0.101.1,1
13 Jan 2019 19:32:17
Revision:490172Original commit files touched by this commit This port version is marked as vulnerable.
swills search for other commits by this committer
security/clamav: update to 0.101.1

PR:		234835
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
0.100.2,1
27 Dec 2018 13:17:40
Revision:488541Original commit files touched by this commit This port version is marked as vulnerable.
swills search for other commits by this committer
security/clamav: Fix build on base system without sendmail when MILTER option is
ON

PR:		234289
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
0.100.2,1
10 Dec 2018 10:18:30
Revision:487145Original commit files touched by this commit This port version is marked as vulnerable.
antoine search for other commits by this committer
Pass maintainership to Yasuhiro KIMURA

Approved by:	ler@ in r486630
0.100.2,1
09 Dec 2018 17:33:26
Revision:487064Original commit files touched by this commit This port version is marked as vulnerable.
antoine search for other commits by this committer
Downgrade to 0.100.2
Upstream plans to release version 0.101.1 which fixes header issues in January
2019

With hat:	portmgr
0.101.0_2
09 Dec 2018 13:22:22
Revision:487045Original commit files touched by this commit This port version is marked as vulnerable.
swills search for other commits by this committer
security/clamav: Install missing headers

PR:		233879
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
0.101.0_1
07 Dec 2018 17:31:07
Revision:486875Original commit files touched by this commit This port version is marked as vulnerable.
linimon search for other commits by this committer
Remove artifact from earlier version of patch.

Reported by:	jbeich
0.101.0_1
07 Dec 2018 15:34:52
Revision:486867Original commit files touched by this commit This port version is marked as vulnerable.
linimon search for other commits by this committer
Base GCC supports neither -Wno-logical-op-parentheses nor -Wno-dangling-else.
Remove them on GCC-based architectures to fix build.

PR:		233800
Submitted by:	Piotr Kubaj
Approved by:	maintainer
0.101.0_1
04 Dec 2018 19:11:16
Revision:486630Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: Give maintainership to Yasuhiro KIMURA <yasu@utahime.org>
0.101.0_1
04 Dec 2018 02:39:58
Revision:486579Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: build no longer produces libclammspack.a and
   libclammspack.pc with the MSPACK option unset.

PR:		233763
Reported by:	PopularMoment@protonmail.com
0.101.0
03 Dec 2018 23:42:21
Revision:486562Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: update to 0.101.0

PR:		2337761
Submitted by:	yasu@utahime.org
0.100.2_3
30 Nov 2018 13:12:02
Revision:486251Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: remove unneeded build_depends for pkgconfig.

Reported by:	sunpoet
0.100.2_3
30 Nov 2018 10:53:40
Revision:486246Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: really do the right thing with the MSPACK option.

previous patch added the configure argument to find archivers/libmspack
installed, but neglected to set USES+= pkgconfig to actually have the binary
use that version.  With it now properly finding libmspack.so, revert to
not trying to install libclammspack* if the MSPACK option is set.

PR:		233658
0.100.2_2
30 Nov 2018 10:12:44
Revision:486243Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: install libclammspack regardless of the MSPACK option.

PR:		233658
Reported by:	ohartmann@walstatt.org
0.100.2_1
30 Nov 2018 02:34:21
Revision:486224Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: fix test failures.

It adds a few more fixes and improvements.

- Solves the bug, by adding a MSPACK option (enabled by default) and a build
dependency on pkg-config.

- Makes massive use of options helpers and similar tools to improve Makefile's
readability. In the rewriting I have not maintained the dependency of option
LDAP on option MILTER and the two options are now indipendent: if this is bad,
it as to be fixed on my patch. I avoided to do it directly because I am unsure
it is needed.

- Uses now libpcre2 consistently (before the port could link to libpcre2 by
mistake).

- Removes useless arguments about zlib in CONFIGURE_ARGS.

- Reorders variables consistently with the standard order.

- Cleans header.

- Updates pkg-plist and sort if alphabetically.

- Bump PORTREVISION, needed because of some fixes.

PR:		228468
Submitted by:	phascolarctos@protonmail.ch
Reported by:	gondim@bsdinfo.com.br
0.100.2
04 Oct 2018 01:53:10
Revision:481197Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: update to 0.100.2.

* Update to 0.100.2
  - Reference:
https://blog.clamav.net/2018/10/clamav-01002-has-been-released.html
  - Security: CVE-2018-14680, CVE-2018-14681, CVE-2018-14682, CVE-2018-15378
* Add gnome to USES to fix developer mode warning.

PR:		231925
Submitted by:	yasu@utahime.org
Security:	CVE-2018-14680, CVE-2018-14681, CVE-2018-14682, CVE-2018-15378
0.100.1_1
05 Sep 2018 22:01:55
Revision:479045Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Update devel/json-c to 0.13.1

- Add my LOCAL to MASTER_SITES
- Bump PORTREVISION of dependent ports for shlib change

Changes:	https://github.com/json-c/json-c/blob/master/ChangeLog
PR:		231007
Exp-run by:	antoine
0.100.1
09 Jul 2018 19:18:57
Revision:474287Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: update to 0.100.1

PR:	229651
Submitted by:	yasu@utahime.org
MFH:	2018Q3
Security:	CVE-2017-16932
Security:	CVE-2018-0360
Security:	CVE-2018-0361
0.100.0_1
09 Jun 2018 09:34:27
Revision:472050Original commit files touched by this commit This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Add LICENSE_FILE
- Update WWW

Approved by:	portmgr blanket
0.100.0_1
13 Apr 2018 11:07:06
Revision:467233Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: fix packaging when JSON option is NOT set.

Reported by:	Serg Renkas <rsf@ntc-raduga.ru>
0.100.0_1
12 Apr 2018 16:01:16
Revision:467160Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: Unbreak package without unrar.

PR:		227420
Submitted by:	PopularMoment@protonmail.com
0.100.0
12 Apr 2018 11:52:55
Revision:467147Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: upgrade to 0.100.0
Release notes:
https://blog.clamav.net/2018/04/clamav-01000-has-been-released.html

PR:	227420
Submitted by:	nevecherya@gmail.com
0.99.4
02 Mar 2018 14:54:35
Revision:463407Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: upgrade to 0.99.4
Release notes: http://blog.clamav.net/2018/03/clamav-0994-has-been-released.html

Submitted by:	mmokhi
Security:	CVE-2012-6706
Security:	CVE-2017-6419
Security:	CVE-2017-11423
Security:	CVE-2018-1000085
Security:	CVE-2018-0202
Differential Revision:	https://reviews.freebsd.org/D14562
0.99.3
26 Jan 2018 00:16:16
Revision:459972Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: upgrade to 0.99.3.
* Update to 0.99.3.
* Fix following portlint warnings.
** Move position of USES in Makefile.
** Remove reference of undefined LLVM option.
** Regenerate files/patch-libclamav_regex_pcre.c by 'make makepatch
** add USES=ssl

PR:		225461
Submitted by:	yasu@utahime.org
0.99.2_9
15 Jan 2018 14:32:55
Revision:459048Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: remove LHA from default options.

r459039 made distribution of the lha binary not allowed.

PR:		225180
Submitted by:	antoine
0.99.2_8
03 Jan 2018 13:36:58
Revision:457965Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Update devel/json-c to 0.13

- Add TEST_TARGET
- While I'm here, fix shebang for net/opensips
- Bump PORTREVISION of dependent ports for shlib change

Changes:	https://github.com/json-c/json-c/blob/master/ChangeLog
PR:		224675
Exp-run by:	antoine
0.99.2_7
30 Dec 2017 22:25:18
Revision:457649Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: handle memfs/tmpfs /var/run.

PR:		224728
Submitted by:	O. Harmann <ohartmann@walstatt.org>
0.99.2_6
29 Nov 2017 02:56:27
Revision:455091Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: incorrect type size on amd64 in pcre2.

PR:		223945
Submitted by:	coyote@bks.tv
0.99.2_5
22 Sep 2017 16:17:16
Revision:450395Original commit files touched by this commit This port version is marked as vulnerable.
ler search for other commits by this committer
security/clamav: bump PORTREVISION, missed in previous commit

pointyhat to: ler (myself)

Number of commits found: 363 (showing only 100 on this page)

1 | 2 | 3 | 4  »