notbugIf you buy from Amazon USA, please support us by using this link.
Search FreshPorts using Google
not searching src

The FreshPorts Search


Include deleted ports Case sensitive search Sort by:
Include /src tree
Output format:
HTML
Plain Text
Maximum Effort Minimal output
Branch:

Notes

  • Case sensitivity is ignored for "sounds like" and output is ordered by the soundex.
  • When searching on 'Message ID', the type of match is ignored.
  • When searching on 'Commit Message' only 'containing' is used.
  • When searching by 'Under a pathname', your path must start with something like /ports/, /doc/, or /src/. All commits under that point will be returned. The selected match type is ignored and defaults to 'Starts with'.
  • Searching for 'sounds like' is only valid for Committer, Maintainer, Package Name, and Port Name.
Number of commits: 86
Sat, 13 Oct 2018
[ 14:59 eugen ] Original commit 
mpd5 5.8_9 net files touched by this commit Multi-link PPP daemon based on netgraph(4)
net/mpd5: start service earlier

mpd5 daemon can be used as replacement for stock ppp(8) daemon
to provide global connectivity (PPPoE, mobile networks etc.)

Follow ppp(8) behavior and run startup script early before
NETWORKING (and netwait), so other services that require
working networking to be operational before starting won't fail.

Bump PORTREVISION.
Thu, 4 Oct 2018
[ 05:49 eugen ] Original commit 
mpd5 5.8_8 net files touched by this commit Multi-link PPP daemon based on netgraph(4)
net/mpd5: import latest fix for "set iface mtu X override" from upstream
Wed, 3 Oct 2018
[ 10:08 eugen ] Original commit 
ipsec-tools 0.8.2_6 security files touched by this commit KAME racoon IKE daemon, ipsec-tools version
security/ipsec-tools: make binary package more useful

- enable options ADMINPORT and WCPSKEY by default;
- polish NATT_DESC a bit as we have releases past 11.0-STABLE;
- bump PORTREVISION.
Sat, 22 Sep 2018
[ 23:19 eugen ] Original commit 
mpd5 5.8_7 net files touched by this commit Multi-link PPP daemon based on netgraph(4)
net/mpd5: mark broken with openssl111 for a moment

mpd5 successfully compiles with openssl-devel or openssl111
but cannot be linked because it links with base system libfetch(3)
that currently links with /usr/lib/libssl.so.8 (openssl 1.0.2p-freebsd).

So, one should not attempt to build mpd5 with newer openssl version
until it's imported to base system so mpd5 won't link with two distinct
openssl versions.

PR:		231599
Fri, 17 Aug 2018
[ 19:45 eugen ] Original commit 
cpupdate g20180513_1 sysutils files touched by this commit CPU microcode update utility for x86
Minor update for sysutils/cpupdate:

- sync with Intel's microcode-20180807.tgz;
- sync with platomav/CPUMicrocodes MCE DB r79;
- follow audio/lame practice and add some comments to the "LICENSE" section
  of port's Makefile describing possible legal issues preventing microcode
  redistribution due to multiple user requests.

No package changes, so no PORTREVISION bump.

PR:		226620, 230181
Fri, 10 Aug 2018
[ 10:03 eugen ] Original commit 
ipsec-tools 0.8.2_5 security files touched by this commit KAME racoon IKE daemon, ipsec-tools version
security/ipsec-tools: add support for multiple if_ipsec(4) interfaces

- added patch introducing racoon compatibility with multiple
  if_ipsec(4) interfaces (*);
- MAINTAINER reset due to nearly 3 years maintainer inactivity;
- bump PORTREVISION.

Submitted by:	ae (*)
Approved by:	vanhu (implicitly)
Sat, 4 Aug 2018
[ 08:02 eugen ] Original commit 
mpd5 5.8_7 net files touched by this commit Multi-link PPP daemon based on netgraph(4)
net/mpd5: revert previous LCP MRU negotiation change
and add new way to deal with same problem
following upstream changes r22478, r2249:

- reverse r2246 as it used wrong way to deal with the problem;
- make it possible to override results of LCP negotiation
  and set interface MTU to specified value with a command:

set iface mtu NNN override

New option "override" is not documented yet.
This is dangerous option as it can violate RFC 1661
and should be used with caution and at your own risk.
It is useful when you deal with broken PPP peer
negotiating too low value while higher MTU is known to work.
Mon, 30 Jul 2018
[ 09:16 eugen ] Original commit 
cpupdate g20180513_1 sysutils files touched by this commit CPU microcode update utility for x86
Minor update for sysutils/cpupdate: sync with platomav/CPUMicrocodes
MCE DB r76.
Fri, 27 Jul 2018
[ 10:38 eugen ] Original commit 
mpd5 5.8_6 net files touched by this commit Multi-link PPP daemon based on netgraph(4)
net/mpd5: add a fix from upstream r2247

Prevent reporting wrong traffic accounting data in very rare case
of failure of netgraph statistical socket data flow.
Sun, 15 Jul 2018
[ 15:18 eugen ] Original commit 
bouncycastle15 1.60 java files touched by this commit Cleanroom build of Java Cryptography Extensions
MFH: r474695

bouncycastle15: update to version 1.60

This release deals with two CVEs: one affecting RSA key pair generation
where the certainty value is being tweaked in the light-weight API,
and the other on properly validating an XMSS/XMSS^MT private key on reload.

In terms of improvements, the BCJSSE now supports SNI,
CMS now supports SHA-3 signatures, the Unified Model is now fully supported
for Diffie-Hellman with ephemeral keys, and PGP EC operations can support
a wider range of curves. Issues have also been fixed in EST,
CRMF request generation, and low-level support has been added for EdDSA.

Further details on other additions and bug fixes can be found in the
release notes at:

https://www.bouncycastle.org/releasenotes.html

Security:	CVE-2018-1000180
Security:	CVE-2018-1000613

Approved by:	ports-secteam (miwi)
[ 15:13 eugen ] Original commit 
vuxml 1.1_3 security files touched by this commit Vulnerability and eXposure Markup Language DTD
Document several security defects in the Bouncy Castle Crypto APIs
before version 1.60

Obtained from:	https://www.bouncycastle.org/latest_releases.html
Security:	https://vuxml.FreeBSD.org/freebsd/fe93803c-883f-11e8-9f0c-001b216d295b
[ 15:00 eugen ] Original commit 
bouncycastle15 1.60 java files touched by this commit Cleanroom build of Java Cryptography Extensions
bouncycastle15: update to version 1.60

This release deals with two CVEs: one affecting RSA key pair generation
where the certainty value is being tweaked in the light-weight API,
and the other on properly validating an XMSS/XMSS^MT private key on reload.

In terms of improvements, the BCJSSE now supports SNI,
CMS now supports SHA-3 signatures, the Unified Model is now fully supported
for Diffie-Hellman with ephemeral keys, and PGP EC operations can support
a wider range of curves. Issues have also been fixed in EST,
CRMF request generation, and low-level support has been added for EdDSA.

Further details on other additions and bug fixes can be found in the
release notes at:

https://www.bouncycastle.org/releasenotes.html

Security:	CVE-2018-1000180
Security:	CVE-2018-1000613
MFH:		2018Q3
Wed, 11 Jul 2018
[ 14:20 eugen ] Original commit 
cpupdate g20180513_1 sysutils files touched by this commit CPU microcode update utility for x86
Minor update for sysutils/cpupdate:

- sync with Intel's microcode-20180703.tgz;
- sync with platomav/CPUMicrocodes MCE DB r74.1

No package changes, so no PORTREVISION bump.
Sat, 30 Jun 2018
[ 01:15 eugen ] Original commit 
bsnmp-regex 0.6_2 net-mgmt files touched by this commit bsnmpd module allowing creation of counters from log files
net-mgmt/bsnmp-regex: permit expires = 0

Fix bsnmp-regex-0.6 allowing to change "expires" option from the default
zero value to non-zero one not allowing to change it back to zero.

PR:		228765
Approved by:	koobs (maintainer timeout, 3 weeks)
[ 00:49 eugen ] Original commit 
slrn 1.0.3a_1 news files touched by this commit SLang-based newsreader
news/slrn: fix crash with SIGSERV in the iconv_convert_string()

Back out r349278 that added --with-non-gnu-iconv trying to solve
our early iconv() inconsistences that are not actual anymore
as it now now correctly returns non-zero count of convertable symbols.

This fixes unsigned underflow in the slrn code turning
negative value to large positive leading to incorrect memory accesses later.

PR:		228502
Approved by:	johans (maintainer timeout, 1 month)
Mon, 25 Jun 2018
[ 13:56 eugen ] Original commit 
cpupdate g20180513_1 sysutils files touched by this commit CPU microcode update utility for x86
Minor update for sysutils/cpupdate: sync with platomav/CPUMicrocodes MCE DB r72.

PR:		229334
Submitted by:	Piotr Kubaj <pkubaj@anongoth.pl>
Sun, 24 Jun 2018
[ 13:02 eugen ] Original commit 
mpd5 5.8_5 net files touched by this commit Multi-link PPP daemon based on netgraph(4)
net/mpd5: really add the patch file after r473194
[ 12:04 eugen ] Original commit 
mpd5 5.8_4 net files touched by this commit Multi-link PPP daemon based on netgraph(4)
Minor change for net/mpd5: improve LCP MRU negotiation.

Add a fix from upstream r2246:

	Fix bug #62: improve LCP MRU negotiation in some unusual cases
	sometimes happening while using Orange S.A. services.
	This allow us to setup PPPoE client connection interface using mtu=1492
	instead of 1456.

Reported by:	Xavier Lemaire
Tested by:	Xavier Lemaire
Mon, 4 Jun 2018
[ 18:54 eugen ] Original commit 
fusefs-webdavfs g20180413 sysutils files touched by this commit FUSE filesystem for WEBDAV shares
sysutils/fusefs-webdavfs: minor update

* dont just check for apache, check for mod_dav as well;
* catch up with latest commit to dependency https://github.com/bazil/fuse:
** Test coverage for Statfs (fs/serve_test.go).
Thu, 24 May 2018
[ 19:45 eugen ] Original commit 
pidgin-window_merge 0.3 net-im files touched by this commit One window interface for pidgin
Window Merge is a Pidgin plugin that merges a conversation window with the
Buddy List window. It can be used to achieve a rudimentary "single window mode"
for Pidgin. Both Window Merge and Pidgin itself should be kept updated for
the most stable experience.

WWW: https://github.com/dm0-/window_merge

PR:		227094
Submitted by:	Volodymyr Kostyrko <arcade@b1t.name>
Tue, 22 May 2018
[ 21:40 eugen ] Original commit 
cpupdate g20180513_1 sysutils files touched by this commit CPU microcode update utility for x86
Minor update for sysutils/cpupdate:

- sync with Intel's microcode-20180425.tgz;
- sync with platomav/CPUMicrocodes MCE DB r68.
Sun, 13 May 2018
[ 19:25 eugen ] Original commit 
cpupdate g20180513 sysutils files touched by this commit CPU microcode update utility for x86
Unbreak sysutils/cpupdate after r469809 by fixing distinfo.
[ 19:12 eugen ] Original commit 
cpupdate g20180513 sysutils files touched by this commit CPU microcode update utility for x86
Update sysutils/cpupdate to g20180513.


- sync with platomav/CPUMicrocodes MCE DB r67;
- new option -d to print microcode file statistics.

Reported by:	Stefan Blachmann <sblachmann@gmail.com> (author)
Mon, 30 Apr 2018
[ 13:01 eugen ] Original commit 
cpupdate g20180324_1 sysutils files touched by this commit CPU microcode update utility for x86
sysutils/cpupdate: more suspend/resume support

Startup script got support for extra command "resume"
that is supposed to be used for "service cpupdate resume" invocation
at resume sequence. For now, it is identical to "start".
[ 12:33 eugen ] Original commit 
cpupdate g20180324 sysutils files touched by this commit CPU microcode update utility for x86
Minor updates to sysutils/cpupdate:

- fix typo in cpupdate_ibrs_enable previously named cpupdate_irbs_enable;
- catch up with upstream README.md update that does not state anymore
  that it is work in progress but mention it is for Intel only still;
- catch up with platomav/CPUMicrocodes MCE DB r65 update for completeness
  despite it has only AMD updates comparing previous r64;
- update pkg-message with note that suspend/resume sequence
  clears microcode update;
- add new keyword "resume" to startup script to ease its invocation
  on resume by means of rcorder(8).

PR:		227866
Reported by:	Michael Danilov <mike.d.ft402@gmail.com>
Sun, 29 Apr 2018
[ 10:00 eugen ] Original commit 
ipsec-tools 0.8.2_4 security files touched by this commit KAME racoon IKE daemon, ipsec-tools version
Fix phase 1 initiation in the racoon daemon after base system change r285204

PR:		192774, 222065
Submitted by:	Andreas Longwitz <longwitz@incore.de>
Approved by:	VANHULLEBUS Yvan (maintainer, implicitly)
Wed, 18 Apr 2018
[ 10:52 eugen ] Original commit 
libdnet 1.12_1 net files touched by this commit Simple interface to low level networking routines
net/libdnet: unbreak compilation for non-default FreeBSD builds

libdnet fails to compile for non-default FreeBSD build with
pf/ipfilter excluded but ipfw included because its ipfw support
staled from ipfw1 times and does not apply to modern ipfw implementation.

PORTREVISION not changed because the change is effectively 'no-op'
for default build.

PR:		227490
Sun, 15 Apr 2018
[ 08:51 eugen ] Original commit 
ipsec-tools 0.8.2_3 security files touched by this commit KAME racoon IKE daemon, ipsec-tools version
MFH: r467313

security/ipsec-tools: fix CVE-2016-10396

The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable
computational-complexity attack when parsing and storing ISAKMP fragments.
The implementation permits a remote attacker to exhaust computational
resources on the remote endpoint by repeatedly sending ISAKMP fragment
packets in a particular order such that the worst-case computational
complexity is realized in the algorithm utilized to determine
if reassembly of the fragments can take place.

The fix obtained from NetBSD CVS head with a command:

cvs diff -D 2017-01-24 -D 2017-09-01 \
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 14 Apr 2018
[ 12:07 eugen ] Original commit 
ipsec-tools 0.8.2_3 security files touched by this commit KAME racoon IKE daemon, ipsec-tools version
security/ipsec-tools: fix CVE-2016-10396

The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable
computational-complexity attack when parsing and storing ISAKMP fragments.
The implementation permits a remote attacker to exhaust computational
resources on the remote endpoint by repeatedly sending ISAKMP fragment
packets in a particular order such that the worst-case computational
complexity is realized in the algorithm utilized to determine
if reassembly of the fragments can take place.

The fix obtained from NetBSD CVS head with a command:

cvs diff -D 2017-01-24 -D 2017-09-01 \
	src/racoon/handler.h \
	src/racoon/isakmp.c \
	src/racoon/isakmp_frag.c \
	src/racoon/isakmp_inf.c

While here, add LICENSE.

PR:		225066
Approved by:	VANHULLEBUS Yvan (maintainer timeout, 3 months)
Obtained from:	NetBSD
MFH:		2018Q1
Security:	CVE-2016-10396
[ 12:04 eugen ] Original commit 
vuxml 1.1_3 security files touched by this commit Vulnerability and eXposure Markup Language DTD
ipsec-tools: document remotely exploitable computational-complexity attack.

PR:		225066
Security:	CVE-2016-10396
Sat, 7 Apr 2018
[ 01:44 eugen ] Original commit 
cpupdate g20180323_1 sysutils files touched by this commit CPU microcode update utility for x86
Unbreak sysutils/cpupdate after r466680 that mistakenly committed Makefile
changes only.

Reported by:	StariKarp <starikarp@yandex.com>
Fri, 6 Apr 2018
[ 17:12 eugen ] Original commit 
cpupdate g20180323_1 sysutils files touched by this commit CPU microcode update utility for x86
Update sysutils/cpupdate:

- sync with platomav/CPUMicrocodes MCE DB r64;
- remove useless use of subshell;
- rcorder runs /etc/rc.d/sysctl before FILESYSTEMS to process /etc/sysctl.conf
  so let cpupdate's startup script automatically enable
  Indirect Branch Restricted Speculation after successful
  start of ${PRERIX}/sbin/cpupdate, if possible, unless this is disabled
  with new "cpupdate_irbs_enable" rc.conf variable;
- bump PORTREVISION.
Tue, 3 Apr 2018
[ 11:24 eugen ] Original commit 
cpupdate g20180323 sysutils files touched by this commit CPU microcode update utility for x86
Small update to sysutils/cpupdate:

- sync with platomav/CPUMicrocodes MCE DB r63;
- more pkg-descr polishing;
- no real package changes, no PORTREVISION bump.
[ 09:28 eugen ] Original commit 
telegram-purple 1.3.1_4 net-im files touched by this commit Libpurple plugin for Telegram messenger
net-im/telegram-purple: silence QA test by adding LIB_DEPENDS.
Wed, 28 Mar 2018
[ 11:37 eugen ] Original commit 
p5-RDR-Collector 1.0000 net-mgmt files touched by this commit Perl5 module to capture and process raw Cisco SCE RDRv1 packets
New port: net-mgmt/p5-RDR-Collector

This is the Perl5 module designed to capture and process raw RDRv1 packets
from a Cisco SCE series device. The port includes modules
RDR::Collector, RDR::Processor and several sample scripts.
Fri, 23 Mar 2018
[ 14:12 eugen ] Original commit 
cpupdate g20180323 sysutils files touched by this commit CPU microcode update utility for x86
sysutils/cpupdate: new convenience target "install-microcodes"

Some users may prefer copying the whole bunch of CPU microcodes
to their system instead of just needed one. Add new Makefile target
"install-microcodes" to ease such copying and mention it in the pkg-message.

This is still for convenience only and those blobs do not get into
the pkg-plist and the package and need to be manually removed
if not needed anymore.

PR:		226620
[ 12:19 eugen ] Original commit 
cpupdate g20180323 sysutils files touched by this commit CPU microcode update utility for x86
sysutils/cpupdate: update to g20180323

In new version:

- fix comment in the startup script on "cpupdate_flags" defaults for rc.conf;
- catch up with recent changes of platomav/CPUMicrocodes: updated to MCE DB r62.
- removed patch that was integrated (auto load cpuctl.ko, compiler warning);
- fixed crash when no supported CPU found (*);

Reported by:	Eitan Adler (*)
Tue, 20 Mar 2018
[ 14:56 eugen ] Original commit 
cpupdate g20180320 sysutils files touched by this commit CPU microcode update utility for x86
sysutils/cpupdate: update to g20180320

Additional port changes:

- move binary from /bin/ to /sbin/ as this is sysadmin's utility;
- supply startup script for boot time updates started as early as possible,
  before configuration of network interfaces;
- make code respect PREFIX;
- patch source to kldload("cpuctl") automatically, if needed;
- fix some compiler warning;
- update pkg-descr to mention that CPU microcode updates bringing
  new features like IBRS require recent FreeBSD version
  for sake of CPUCTL_EVAL_CPU_FEATURES support.
Sun, 18 Mar 2018
[ 10:33 eugen ] Original commit 
cpupdate g20180302 sysutils files touched by this commit CPU microcode update utility for x86
sysutils/cpupdate: gammar/empty space correction.
[ 10:27 eugen ] Original commit 
cpupdate g20180302 sysutils files touched by this commit CPU microcode update utility for x86
sysutils/cpupdate: - correct ONLY_FOR_ARCHS_REASON message;

- be more specific in the COMMENT and pkg-descr: mention x86-centricity;

- in addition to CPM option, add INTEL convinience option to ease
downloading and extraction of recently updated Intel's pack of microcode updates
https://downloadmirror.intel.com/27591/eng/:intel/microcode-20180312.tgz
allowed for end users but not for redistribution, so it does not get
installed nor added to pkg-plist.

Still no real changes of the package, so no PORTREVISION bump yet.
Wed, 14 Mar 2018
[ 16:25 eugen ] Original commit 
cpupdate g20180302 sysutils files touched by this commit CPU microcode update utility for x86
sysutils/cpupdate: catch up with recent changes of
http://github.com/platomav/CPUMicrocodes

Also, improve pkg-descr a bit.

No real package changes, so no change of PORTREVISION.
Sat, 10 Mar 2018
[ 10:14 eugen ] Original commit 
fusefs-webdavfs g20170810 sysutils files touched by this commit FUSE filesystem for WEBDAV shares
New port: sysutils/fusefs-webdavfs. It presents FUSE webdav filesystem.

This filesystem behaves like a real network filesystem - no unnecessary
copying of entire files. Currently, it claims read-write support for
Apache's mod_dav and PHP's SabreDav (used by e.g. NextCloud) only.
It forces read-only mode for other DAV servers.
Fri, 2 Mar 2018
[ 06:58 eugen ] Original commit 
cpupdate g20180302 sysutils files touched by this commit CPU microcode update utility for x86
sysutils/cpupdate: - polish COMMENT a bit;

- add an option (disabled by default) to download and extract
CPU microcode collection from https://github.com/platomav/CPUMicrocodes
while building the port. These files do not get installed nor put
into the package that has not changed, so no PORTREVISON bump.
[ 05:08 eugen ] Original commit 
cpupdate g20180302 sysutils files touched by this commit CPU microcode update utility for x86
New port: sysutils/cpupdate

This is new microcode updating utility.
At the moment, it is for Intel processors only
with AMD and VIA support pending.

For details, look at
https://forums.freebsd.org/threads/introducing-cpupdate-a-microcode-tool-for-freebsd.64588/
Sun, 11 Feb 2018
[ 05:40 eugen ] Original commit 
glusterfs 3.11.1_3 net files touched by this commit GlusterFS distributed file system
glusterfs should be mountable by means of /etc/fstab now
as we have /sbin/mount_fusefs in all supported FreeBSD versions,
for example:

gluster1:name /mnt/name fusefs
rw,late,backup-volfile-servers=gluster2:gluster3,mountprog=/usr/local/sbin/mount_glusterfs
0 0

Make it work by fixing shell script /usr/local/sbin/mount_glusterfs
to properly process multiple -o command line options.

PR:		224451
Submitted by:	Vladimir Kurtukov <vk@vk.pp.ru>
Reported by:	Vladimir Kurtukov <vk@vk.pp.ru>
Approved by:	craig001@lerwick.hopto.org (maintainer)
Mon, 5 Feb 2018
[ 21:06 eugen ] Original commit 
virtualbox-ose 5.2.6_3 emulators files touched by this commit General-purpose full virtualizer for x86 hardware
emulators/virtualbox-ose: remove extra dependency on cdrtools.

Dependency on cdrtools was introduced 6 years ago for sake of mkisofs:
https://svnweb.freebsd.org/ports/head/emulators/virtualbox-ose/Makefile?revision=274444&view=markup

In fact, VirtualBox build system does not use makeisofs
while building for FreeBSD because it does not even try to buid
VirtualBox Additions ISO image as its documentation says
in the Prerequisites section:

	mkisofs (required only for additions which aren't supported yet)
	=> /usr/ports/sysutils/cdrtools

	https://www.virtualbox.org/wiki/FreeBSD%20build%20instructions

And it never really used mkisofs.
Drop the dependency and bump PORTREVISION.

PR:		225376
Approved by:	vbox (maintainer timeout, 2 weeks)
Mon, 22 Jan 2018
[ 17:05 eugen ] Original commit 
zfsnap 1.11.1_1 sysutils files touched by this commit Simple sh script to make zfs rolling snaphosts with cron
sysutils/zfsnap: fix -s/-S mode.

Move creation of files from "do-patch" to "post-extract" target,
so that patches from files/ directory get applied.

While here, add LICENSE.

PR:		223951
Submitted by:	Anton Sayetsky <vsasjason@gmail.com> (based on)
Approved by:	yamagi@yamagi.org (maintainer timeout, 7 weeks)
Fri, 29 Dec 2017
[ 09:28 eugen ] Original commit 
vuxml 1.1_3 security files touched by this commit Vulnerability and eXposure Markup Language DTD
Fix cut-n-paste error in the previous addition for bouncycastle15
(6a131fbf-ec76-11e7-aa65-001b216d295b).
[ 09:23 eugen ] Original commit 
vuxml 1.1_3 security files touched by this commit Vulnerability and eXposure Markup Language DTD
Document security defect in the Bouncy Castle Crypto APIs: CVE-2017-13098
("ROBOT")

Obtained from:  https://www.bouncycastle.org/releasenotes.html
Security:      
https://vuxml.FreeBSD.org/freebsd/6a131fbf-ec76-11e7-aa65-001b216d295b
[ 09:21 eugen ] Original commit 
bouncycastle15 1.59 java files touched by this commit Cleanroom build of Java Cryptography Extensions
bouncycastle15: update to version 1.59

This release fixes CVE-2017-13098 ("ROBOT"), a Bleichenbacher oracle in TLS
when RSA key exchange is negotiated. This potentially affected BCJSSE servers
and any other TLS servers configured to use JCE for the underlying crypto -
note the two TLS implementations using the BC lightweight APIs
are not affected by this.

Some of additional fixes, features and functionality:

* GOST3410-94 private keys encoded using ASN.1 INTEGER are now accepted
  in private key info objects; GOST3412-2015 has been added
  to the JCE provider and the lightweight API.
* SCRYPT is now supported as a SecretKeyFactory in the provider and
  in the PKCS8 APIs.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Wed, 22 Nov 2017
[ 07:52 eugen ] Original commit 
p5-Pthread-GetThreadId 0.01 devel files touched by this commit Access to kernel level POSIX thread id
This is new port containing FreeBSD specific Perl5 module Pthread::GetThreadId.

It provides Perl code with access to non-portable pthread_getthreadid_np(3)
function. It may be useful for Perl code running as hook/callback functions
in embedded threaded Perl environment when code has no direct control on thread
creation.

For example, rlm_perl module of FreeRADIUS that may use multiple embedded Perl
instances, so that Perl native value of threads->tid is not unique.
Fri, 10 Nov 2017
[ 08:48 eugen ] Original commit 
uwsgi 2.0.15_2 www files touched by this commit Developer-friendly WSGI server which uses uwsgi protocol
www/uwsgi: enhance handling of plugins

Add new option group with PSGI embedded plugin option to start with.
Submitter agreed to take maintainership, so pass this unmaintained
port to him.

Default build not changed, so no PORTREVISION bump.

PR:		223588
Submitted by:	Eugene Zheganin (based on)
Number of commits: 86
Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
libgit2Oct 15
giteaOct 11
jenkinsOct 11
jenkins-ltsOct 11
toxOct 11
tincOct 09
tinc-develOct 09
gitlab-ceOct 05
clamavOct 03
py-django21Oct 03
firefoxOct 02
firefox-esrOct 02
libxulOct 02
linux-firefoxOct 02
linux-seamonkeyOct 02

11 vulnerabilities affecting 107 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2018-10-15 12:29:44


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 35625
Broken 62
Deprecated 512
Ignore 343
Forbidden 3
Restricted 162
No CDROM 74
Vulnerable 34
Expired 4
Set to expire 485
Interactive 0
new 24 hours 2
new 48 hours5
new 7 days21
new fortnight126
new month219

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2018 Dan Langille. All rights reserved.