summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2019-04-10Pullup ticket #5930 - requested by tacabsiegert3-8/+9
www/apache24: security fix Revisions pulled up: - www/apache24/Makefile 1.77 - www/apache24/PLIST 1.28 - www/apache24/distinfo 1.40 --- Module Name: pkgsrc Committed By: adam Date: Tue Apr 2 07:25:38 UTC 2019 Modified Files: pkgsrc/www/apache24: Makefile PLIST distinfo Log Message: apache24: updated to 2.4.39 Changes with Apache 2.4.39 *) mod_proxy/ssl: Cleanup per-request SSL configuration anytime a backend connection is recycled/reused to avoid a possible crash with some SSLProxy configurations in <Location> or <Proxy> context. *) mod_ssl: Correctly restore SSL verify state after TLSv1.3 PHA failure. *) mod_log_config: Support %{c}h for conn-hostname, %h for useragent_host *) mod_socache_redis: Support for Redis as socache storage provider. *) core: new configuration option 'MergeSlashes on|off' that controls handling of multiple, consecutive slash ('/') characters in the path component of the request URL. *) mod_http2: when SSL renegotiation is inhibited and a 403 ErrorDocument is in play, the proper HTTP/2 stream reset did not trigger with H2_ERR_HTTP_1_1_REQUIRED. *) mod_http2: new configuration directive: `H2Padding numbits` to control padding of HTTP/2 payload frames. 'numbits' is a number from 0-8, controlling the range of padding bytes added to a frame. The actual number added is chosen randomly per frame. This applies to HEADERS, DATA and PUSH_PROMISE frames equally. The default continues to be 0, e.g. no padding. *) mod_http2: ripping out all the h2_req_engine internal features now that mod_proxy_http2 has no more need for it. Optional functions are still declared but no longer implemented. While previous mod_proxy_http2 will work with this, it is recommeneded to run the matching versions of both modules. *) mod_proxy_http2: changed mod_proxy_http2 implementation and fixed several bugs which resolve bug 63170. The proxy module does now a single h2 request on the (reused) connection and returns. *) mod_http2/mod_proxy_http2: proxy_http2 checks correct master connection aborted status to trigger immediate shutdown of backend connections. This is now always signalled by mod_http2 when the the session is being released. proxy_http2 now only sends a PING frame to the backend when there is not already one in flight. *) mod_proxy_http2: fixed an issue where a proxy_http2 handler entered an infinite loop when encountering certain errors on the backend connection. *) mod_http2: Configuration directives H2Push and H2Upgrade can now be specified per Location/Directory, e.g. disabling PUSH for a specific set of resources. *) mod_http2: HEAD requests to some module such as mod_cgid caused the stream to terminate improperly and cause a HTTP/2 PROTOCOL_ERROR. *) http: Fix possible empty response with mod_ratelimit for HEAD requests. *) mod_cache_socache: Avoid reallocations and be safe with outgoing data lifetime. *) MPMs unix: bind the bucket number of each child to its slot number, for a more efficient per bucket maintenance. *) mod_auth_digest: Fix a race condition. Authentication with valid credentials could be refused in case of concurrent accesses from different users. *) mod_http2: enable re-use of slave connections again. Fixed slave connection keepalives counter. *) mod_reqtimeout: Allow to configure (TLS-)handshake timeouts. *) mod_proxy_wstunnel: Fix websocket proxy over UDS. *) mod_ssl: Don't unset FIPS mode on restart unless it's forced by configuration (SSLFIPS on) and not active by default in OpenSSL.
2019-04-10Pullup ticket #5941 - requested by gutteridgebsiegert2-7/+7
net/wget: security fix Revisions pulled up: - net/wget/Makefile 1.146 - net/wget/distinfo 1.59 --- Module Name: pkgsrc Committed By: gutteridge Date: Sun Apr 7 09:02:00 UTC 2019 Modified Files: pkgsrc/net/wget: Makefile distinfo Log Message: Update wget to 1.20.3, which fixes CVE-2019-5953 It appears that the buffer overflow issue referred to is the same in both 1.20.2 and 1.20.3 (they had to fix the fix). Upstream changelog: * Changes in Wget 1.20.3 ** Fixed a buffer overflow vulnerability * Changes in Wget 1.20.2 ** NTLM authentication will retry under certain cases ** Fixed a buffer overflow vulnerability
2019-04-07Pullup tickets #5926 to #5929bsiegert1-1/+14
2019-04-07Pullup ticket #5929 - requested by tsutsuibsiegert4-14/+14
devel/protobuf, devel/py-protobuf: update (mozc-server build fix) Revisions pulled up: - devel/protobuf/Makefile 1.19 - devel/protobuf/distinfo 1.24 - devel/py-protobuf/Makefile 1.18 - devel/py-protobuf/distinfo 1.17 --- Module Name: pkgsrc Committed By: adam Date: Mon Apr 1 12:36:41 UTC 2019 Modified Files: pkgsrc/devel/protobuf: Makefile distinfo pkgsrc/devel/py-protobuf: Makefile distinfo Log Message: protobuf: updated to 3.7.1 Protocol Buffers v3.7.1: C++ Avoid linking against libatomic in prebuilt protoc binaries Avoid marking generated C++ messages as final, though we will do this in a future release Miscellaneous build fixes
2019-04-07Pullup ticket #5928 - requested by niabsiegert2-6/+10
chat/unrealircd: build fix Revisions pulled up: - chat/unrealircd/Makefile 1.58-1.59 - chat/unrealircd/distinfo 1.22-1.23 --- Module Name: pkgsrc Committed By: nia Date: Tue Apr 2 11:29:46 UTC 2019 Modified Files: pkgsrc/chat/unrealircd: distinfo Log Message: chat/unrealircd: update distinfo. The tarball was silently updated without a release. After diffing this against the git tag, the updated tarball seems to change some if statements from if (x = y) to if (x == y)... https://github.com/unrealircd/unrealircd/commit/766055d5c0399fa55d03ac6ab33804dc084e2547 The bug fixed by this change is apparently not exploitable. --- Module Name: pkgsrc Committed By: nia Date: Tue Apr 2 12:42:44 UTC 2019 Modified Files: pkgsrc/chat/unrealircd: Makefile Log Message: unrealircd: bump PKGREVISION for distinfo change --- Module Name: pkgsrc Committed By: wiz Date: Tue Apr 2 13:20:21 UTC 2019 Modified Files: pkgsrc/chat/unrealircd: Makefile distinfo Log Message: unrealircd: set DIST_SUBDIR for new distfile
2019-04-07Pullup ticket #5927 - requested by markdbsiegert2-8/+9
x11/qt5-qtbase: build fix Revisions pulled up: - x11/qt5-qtbase/Makefile 1.74 - x11/qt5-qtbase/files/qmake.conf 1.9 --- Module Name: pkgsrc Committed By: markd Date: Mon Apr 1 19:58:51 UTC 2019 Modified Files: pkgsrc/x11/qt5-qtbase: Makefile pkgsrc/x11/qt5-qtbase/files: qmake.conf Log Message: qt5-qtbase: fix setting QMAKE_COMPILER QMAKE_COMPILER is meant to signify the compiler family being used gcc for gcc gcc clang llvm for clang should properly fix the build issue seen on CentOS and likely other systems.
2019-04-06Pullup ticket #5926 - requested by markdbsiegert1-2/+2
x11/qt5-qtbase: build fix Revisions pulled up: - x11/qt5-qtbase/Makefile 1.73 --- Module Name: pkgsrc Committed By: markd Date: Mon Apr 1 04:33:01 UTC 2019 Modified Files: pkgsrc/x11/qt5-qtbase: Makefile Log Message: qt5-qtbase: add missing # to comment
2019-03-31Add CHANGES file for 2019Q1 branch.jperkin1-0/+3
2019-03-31qt5-qtbase: workaround to get package building correctly on redhat/centosmarkd1-1/+7
2019-03-31doc: Updated chat/znc to 1.7.3nia1-1/+2
2019-03-31chat/znc: Update to 1.7.3.nia2-7/+7
Changes from 1.7.2 to 1.7.3: * Fix CVE-2019-9917. ZNC before 1.7.3-rc1 allows an existing remote user to cause a Denial of Service (crash) via invalid encoding.
2019-03-31virt-manager: prevent build failure with newer pod2man.bsiegert2-1/+17
2019-03-31libvirt: explicitly disable polkit.bsiegert1-1/+2
Otherwise, it picks it up if it is installed, leading to a PLIST mismatch.
2019-03-31x11/vte3: Use += for GCC_REQD, per normsgdt1-2/+2
2019-03-31doc/TODO: add somewiz1-3/+17
+ ImageMagick-7.0.8.35, MesaLib-19.0.1, apache24-2.4.39, harfbuzz-2.4.0, khal-0.10.1, ledger-3.1.3, libssh2-1.8.2, libyaml-0.2.2, mame-0.208, meld-3.20.1, ncdc-1.21, py-test-mock-1.10.3, py-yaml-5.1, subversion-base-1.11.1, thunderbird-enigmail-2.0.10, utf8proc-2.3.0.
2019-03-31CHANGES-2017: belatedly note ncdc packagewiz1-1/+2
2019-03-31py-cryptodome: Fix build on !i386 and !x86_64 MACHINE_ARCHsleot3-3/+7
2019-03-31xmlada: fix PLIST, bump revisionbsiegert2-4/+6
Patch from Piotr Meyer via pkgsrc-users, thanks!
2019-03-31ham/uhd: Deeclare gnu++11 instead of c++11gdt1-2/+8
Upstream does not document language requirements, but this lets it build on netbsd-8 so it must be right.
2019-03-31x11/vte3: Require c++14 and hence gcc 5gdt1-2/+4
With gcc 4.8, the configure script errors out about c++14. The build works with gcc5 or gcc6, so set GCC_REQD to 5.
2019-03-31textproc/itstool: Declare python 2.7 not acceptablegdt1-1/+8
With python 2.7, itstool fails to process the cs translation as part of the gnumeric112 build. This appears to be about confusion between ascii and utf-8 on stderr or something like that. Because it appears that few who might debug this are still using python 2.7, mark it incompatible, which will cause the python3.7 version of itstool to be built and used. Proposed on pkgsrc-users without objection, and with no reports of the 2.7 version working.
2019-03-30caja: note explicit C99 dependencygutteridge1-1/+3
Build fix for issue noted in Joyent CentOS bulk builds.
2019-03-30mate-screensaver: build fix for Linuxgutteridge1-2/+2
Extend non-PAM coverage to Linux. security/pam-pwauth_suid has BSDisms in it that don't build on Linux. Someone may want to revisit this later and alter support here, but that's not something to apply during a freeze, anyway.
2019-03-30mate-settings-daemon: build fix for Linux (rfkill)gutteridge2-2/+9
Handle rfkill being enabled on Linux builds by conditionalizing this in the PLIST. Build fix for Linux only, does not affect other OSes.
2019-03-29qt5-qtlocation: catch PLIST.Linux up with 5.12.2markd1-1/+6
2019-03-29qt5-qtsensors: add PLIST.Linuxmarkd1-0/+5
Seems I forgot to commit this back in Nov. Fixes PR pkg/54078
2019-03-29doc: Updated mail/dovecot2 to 2.3.5.1hauke1-1/+2
2019-03-29Security fix:hauke2-8/+8
* CVE-2019-7524: Missing input buffer size validation leads into arbitrary buffer overflow when reading fts or pop3 uidl header from Dovecot index. Exploiting this requires direct write access to the index files.
2019-03-29doc/TODO: add somewiz1-2/+5
+ Sigil-0.9.13, hatari-2.2.0, llvm-8.0.0, wine-4.0.
2019-03-29Fix ldb build as per suggestion from wiz@prlw11-2/+2
2019-03-29Compton requires GCC 4.9 and later because of the __auto_type extensionpho1-1/+4
2019-03-29couchdb: add test target to Makefilegutteridge1-1/+2
2019-03-28miller: Add flex as tool dependencyleot1-1/+2
(flex is explicitly needed in c/parsing/Makefile for mlr_dsl_lexer.c.)
2019-03-28unicode-character-database: pax is needed as tool dependencyleot1-1/+2
2019-03-28doc: Updated net/py-grpcio to 1.19.0leot1-1/+2
2019-03-28py-grpcio: Update to 1.19.1leot4-29/+29
1.19.1 ------ Python * Backport "Add the missing grpc_cfstream dependency" to v1.19.x. 1.19.0 ------ Python * grpc_prefork(): check grpc_is_initialized before creating execctx. * [gRPC] Enable Python 3 for Bazel to Run Tests. * Escalate the failure of protoc execution. * Remove dependency of grpc.framework.foundation.callable_util. 1.18.0 ------ Python * Servers are no longer guaranteed to automatically shutdown when garbage collected. Applications must explicitly invoke grpc.Server.stop() to shutdown the server and release its resources. This aligns server behavior with the grpc.Channel.close() semantics introduced in v1.12.0. * Add python API to retrieve library version. (#17580) * Add Watch method to health check service. (#17597) * Refactor server deallocation. (#17444) * Add grpcio-status extension package. (#17490) * Add gRPC Python Example: Metadata. (#17485) * New abort with grpc.Status API. (#17481) * Update urllib3 to avoid security vulnerability. (#17476) * Add License to Python tarball. (#17411) * Revert "Strip manylinux1 binary wheels". (#17412) * Surface exceptions from Cython to Python as much as possible. (#16971) * Add logging.basicConfig() for example servers. (#17322) * Channelz Python wrapper implementation. (#17266) * Fix Python blocking interceptors facing RpcError. (#17317) * Raise the exception while credential initialization. (#17281) 1.17.1 ------ Python * Update urllib3 version number to avoid security vulnerability. (#17477) * Revert stripping manylinux1 binary wheels to fix bad checksum of .so file. (#17415) 1.17.0 ------ Python * Update Python documentation. (#17194) * Migrate tests from Python 3.4 to Python 3.7. (#16995) * Add wait-for-ready option. (#16919) * The new gRPC Python documentation generator. (#17074) * Allow gpr compatibility mode to be disabled in the Python build. (#16916) * Fix logging issues introduced due to root logger being configured by gRPC. (#17091) * Add support for utf-8 error messages. (#16946) * Ensure libboringssl.a is always built for Python. (#17049) * Add python example to show the use of channel options. (#16924) * Add type checking for channel args. (#16864) * Strip manylinux1 binary wheels. (#16836) 1.16.1 ------ This is 1.16.1 patch release for gRPC-Python. Please see the notes for the previous releases here: https://github.com/grpc/ grpc/releases. Please consult https://grpc.io/ for all information regarding this product. This prerelease contains refinements, improvements, and bug fixes. * Python: Fixed the issue where calls to logging.basicConfig() in various modules added a handler to the root logger. This also fixes "No handlers could be found" message in some cases. (#17064) 1.16.0 ------ Python * Fix SSL channel credential when an argument is None. (#16640) * Bazel: Fix python BUILD rules. (#16561) 1.15.1 ------ Python * Added experimental support for client-side fork on Linux and Mac by setting the environment variable GRPC_ENABLE_FORK_SUPPORT=1. Applications may fork with active RPCs, as long as no user threads are currently invoking gRPC library methods. In-progress RPCs continue in the parent process, and the child process may use gRPC by creating new channels. (#16264) * Improve PyPy compatibility. (#16364) * Fix segmentation fault caused by channel.close() when used with connectivity-state subscriptions. (#16296) * Add server reflection guide for Python. See https://github.com/grpc/grpc/ blob/master/doc/python/server_reflection.md. * Add Cython functionality to directly wrap grpc_arg. (#16192, #16197) 1.14.2 ------ * Python: Segmentation fault caused by channel.close() when used with connectivity-state subscriptions. (#16296) 1.14.1 ------ If you are using version 1.14.0, please upgrade to this patch. A fix for issue #15889 is reverted in this patch. The fix may cause memory corruption is some corner cases. We advise not to use release 1.14.0. 1.14.0 ------ Python * Explicitly check conformance of handlers added to a gRPC server to grpc.GenericRpcHandler type. (#15689) * Expose SERVICE_NAME field from reflection and health checking services. (# 16153) * Explicitly close channels in examples via the Channel.close API. (#15725) + Please note that gRPC requires explicit closure of Channel objects via a with block or directly invoking the Channel.close API to ensure resources are appropriately released. * Official Python 3.7 binary wheels for Windows (x64), macOS, and Linux (x86 and x64) are now available. (#15632) * Optimize blocking intercepted response-unary calls to use the blocking API and not rely on a future underneath. (#14639)
2019-03-28math/py-Scientific: Revert patch I'm unable to commitbacon1-2/+2
Put package into a consistent state until problem is diagnosed
2019-03-28math/py-Scientific: Finish commit of Linux build fixbacon1-6/+6
Previous commit partially failed for unknown reason
2019-03-28math/py-Scientific: Fix install on CentOS 7bacon2-5/+9
PLIST was wrong due to build system using python's sys.platorm, which the package Makefile incorrectly tried to replicate using pkgsrc variables. Also added LICENSE and fixed one undocumented patch.
2019-03-28vala: remove obsolete patchwiz1-14/+0
2019-03-28turn off builtins for: calloc, malloc, memalign, realloc, valloc, and free.mrg1-2/+11
bump pkg revision. this makes efence work with modern compilers.
2019-03-27biology/samtools: Add zlib dependency for Linuxbacon1-1/+2
Fixes build on CentOS 7 minimal.
2019-03-27blender: add comment explaining the "M="markd1-2/+2
will figure out the best way to implement it after the freeze
2019-03-27doc: Updated security/gnutls to 3.6.7leot1-1/+2
2019-03-27gnutls: Update to 3.6.7leot2-7/+7
Bug fix and security release on the stable 3.6.x branch. OK during the freeze by <jperkin>, thanks! Changes: 3.6.7 ----- - libgnutls, gnutls tools: Every gnutls_free() will automatically set the free'd pointer to NULL. This prevents possible use-after-free and double free issues. Use-after-free will be turned into NULL dereference. The counter-measure does not extend to applications using gnutls_free(). - libgnutls: Fixed a memory corruption (double free) vulnerability in the certificate verification API. Reported by Tavis Ormandy; addressed with the change above. [GNUTLS-SA-2019-03-27, #694] - libgnutls: Fixed an invalid pointer access via malformed TLS1.3 async messages; Found using tlsfuzzer. [GNUTLS-SA-2019-03-27, #704] - libgnutls: enforce key usage limitations on certificates more actively. Previously we would enforce it for TLS1.2 protocol, now we enforce it even when TLS1.3 is negotiated, or on client certificates as well. When an inappropriate for TLS1.3 certificate is seen on the credentials structure GnuTLS will disable TLS1.3 support for that session (#690). - libgnutls: the default number of tickets sent under TLS 1.3 was increased to two. This makes it easier for clients which perform multiple connections to the server to use the tickets sent by a default server. - libgnutls: enforce the equality of the two signature parameters fields in a certificate. We were already enforcing the signature algorithm, but there was a bug in parameter checking code. - libgnutls: fixed issue preventing sending and receiving from different threads when false start was enabled (#713). - libgnutls: the flag GNUTLS_PKCS11_OBJ_FLAG_LOGIN_SO now implies a writable session, as non-writeable security officer sessions are undefined in PKCS#11 (#721). - libgnutls: no longer send downgrade sentinel in TLS 1.3. Previously the sentinel value was embedded to early in version negotiation and was sent even on TLS 1.3. It is now sent only when TLS 1.2 or earlier is negotiated (#689). - gnutls-cli: Added option --logfile to redirect informational messages output. - No API and ABI modifications since last version.
2019-03-27x11: Add missing qt5-qtconnectivity, unbreak bulk builds.jperkin1-1/+2
2019-03-27doc: Updated math/py-numba to 0.43.0nb1bacon1-1/+2
2019-03-27mathy/py-numba: Add PLIST.Linux to fix install on CentOS 7bacon2-1/+3
2019-03-27biology/bcftools: Add zlib dependency for Linuxbacon1-2/+3
Resolves build failures on CentOS
2019-03-27rust-1.32.0-x86_64-unknown-linux-gnu.tar.gz had the wrong checksum.he1-5/+5
Download must have failed and I didn't pay attention -- sorry...