summaryrefslogtreecommitdiff
path: root/net (follow)
Commit message (Collapse)AuthorAgeFilesLines
* net/freerdp: Update to 2.9.0 (security fixes)VVD2022-12-242-7/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Notewhorth changes: * Backported #8252: Support sending server redirection PDU * Backported #8406: Ensure X11 client cursor is never smaller 1x1 * Backported #8403: Fixed multiple client side input validation issues (CVE-2022-39316, CVE-2022-39317, CVE-2022-39318, CVE-2022-39319, CVE-2022-39320, CVE-2022-41877, CVE-2022-39347) * Backported #7282: Proxy server now discards input events sent before activation was received * Backported #8324: Internal replacements for md4, md5 and hmac-md5 For the time being the RDP protocol requires these outdated hash algorithms. So any distribution that wants to ship a working FreeRDP should check the options WITH_INTERNAL_MD4 (and depending on OpenSSL deprecation status WITH_INTERNAL_MD5) Fixed issues: * Backported #8341: Null checks in winpr_Digest_Free * Backported #8335: Missing NULL return in winpr_Digest_New * Backported #8192: Support for audin version 2 microphone channel * Backported #7282: Discard input events before activation (Fixes #8374) ChangeLog: https://www.freerdp.com/2022/11/16/2_9_0-release PR: 268539 MFH: 2022Q4 Security: 1f0421b1-8398-11ed-973d-002b67dfc673 (cherry picked from commit 0b16928300fd7e1377e0200456d73dc6cb03d65e)
* net/traefik: Update to upstream release 2.9.6Thomas Zander2022-12-102-4/+4
| | | | | | | | | | | | Details: - Security update, fixes multiple CVEs, see https://github.com/traefik/traefik/releases/tag/v2.9.6 - Additional bugfixes and doc improvements MFH: 2022Q4 Security: CVE-2022-23469 CVE-2022-46153 (cherry picked from commit 332d96dd4d0b5e8ff05a6c9fdbbb4fe4120fa426)
* net/xrdp: Update to 0.9.21Koichiro Iwao2022-12-102-4/+4
| | | | | | | | | | | | | | | Changes: https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.21 Security: CVE-2022-23468 Security: CVE-2022-23477 Security: CVE-2022-23478 Security: CVE-2022-23479 Security: CVE-2022-23480 Security: CVE-2022-23481 Security: CVE-2022-23483 Security: CVE-2022-23482 Security: CVE-2022-23484 Security: CVE-2022-23493 (cherry picked from commit 49b0f4b6e88cecddbbd9898be9e7d36c6515f025)
* net/gmid: Update to 1.8.6Omar Polo2022-12-022-8/+4
| | | | | | | | | - remove unneeded STRIP_CMDs ChangeLog: https://gmid.omarpolo.com/changelog.html PR: 268128 MFH: 2022Q4 (bugfix release) (cherry picked from commit 73576a4aca59d87f8b39bd1ae58ecf35c6837473)
* net/gitup: Update to 0.98Nuno Teixeira2022-11-302-16/+4
| | | | | | ChangeLog: https://github.com/johnmehr/gitup/releases/tag/0.98 MFH: 2022Q4 (bugfixes) (cherry picked from commit a75c82396ed2fcbda891f7e501acf3702eb41be9)
* net/rospo: update to 0.10.1Robert Clausecker2022-11-252-116/+10
| | | | | | | | | ChangeLog: https://github.com/ferama/rospo/releases/tag/v0.10.1 PR: 267961 Reported by: fuz@fuz.su (maintainer) (cherry picked from commit f7f64527287859605f48f360e7f68dc04e4177a5)
* net/unfs3: update to 0.9.23Robert Clausecker2022-11-2210-41/+99
| | | | | | | | | | | | | | | | | | ChangeLog: https://github.com/unfs3/unfs3/blob/master/NEWS * include AFS support for better serving of files from AFS filesystems * use svc_getreq_poll() when available * fix serving files larger than 4GB from Windows * better support for 64-bit systems * fixes for macOS and Windows support * fixes when cross compiling * better support for exporting FAT filesystems PR: 267848 Reported by: fuz@fuz.su (maintainer) MFH: 2022Q4 (bugfix release) (cherry picked from commit c6dc382584dcee8bca54884ec217c73f9ac621c3)
* net/traefik: Update to upstream version 2.9.5Thomas Zander2022-11-192-4/+4
| | | | | | | | | Details: - Bugfix release, see https://github.com/traefik/traefik/releases/tag/v2.9.5 MFH: 2022Q4 (cherry picked from commit f15161d74fef8724a69ac7e437b04bbfacf2b9cf)
* net/traff: fix build with -fno-commonRobert Clausecker2022-11-173-6/+26
| | | | | | | | | | | | | | Also: * define LICENSE * fix missing LIB_DEPENDS on libargp.so PR: 267594 Reported by: fuz@fuz.su Approved by: daniel@freebsd.ro (maintainer, timeout 2 weeks) MFH: 2022Q4 (build fix) (cherry picked from commit 98a1bc7f0d2f5539100fe22e27f83cedb29ab040)
* net/py-trio: Add missing dependencyEmanuel Haupt2022-11-141-1/+9
| | | | | | | | | Add missing dependency (exceptiongroup), backported from python 3.11. PR: 267133 Reported by: parv.0zero9+freebsd@gmail.com (cherry picked from commit ee1cad90ea2430c6148eed8c11e841a4360b5e03)
* net/grilo-plugins: do not detect sysutils/tracker3 when it is installed (+)Dima Panov2022-11-131-0/+1
| | | | | PR: 262850 (cherry picked from commit 3d5b522360d0f8b6e0f3fcd845a935fc1972d7e7)
* net/tsocks: Fix erroneous substitutionEmanuel Haupt2022-11-103-15/+138
| | | | | | | | | | | | | | | | | When patching the wrapper script for /usr to ${PREFIX} a part in a sed statement gets substituted that should be escaped. Adjust sed statement in a way that it doesn't break after patching ${PREFIX}. While here: - move a REINPLACE_CMD operation to a pre-existing patch file - pacify portclippy - reformat with portfmt PR: 267670 Reported by: chris@mumac.de (cherry picked from commit d9f28ee265f94f4bcedb7d24648042ca1325c230)
* net/opennx: Fix build on armv7Robert Clausecker2022-11-082-1/+23
| | | | | | | | | | | | time_t is a long long on armv7, but OpenNX tries to store time stamps into configuration storage that only eats long variables. Cast to long and cross fingers that nobody is going to use this port past 2036. PR: 267618 Approved by: portmgr (blanket: build fix) MFH: 2022Q4 (cherry picked from commit dceaf660a726b36ac871827a7bbb70b89930f049)
* net/wlvncc: update to s20221023Jan Beich2022-11-062-5/+5
| | | | | Changes: https://github.com/any1/wlvncc/compare/9ef4184...ed52288 (cherry picked from commit cc49ff53e2a00a27a155c51443fd3d51cb9e7b33)
* net/gmid: Update to 1.8.5Omar Polo2022-11-012-4/+4
| | | | | | | ChangeLog: https://gmid.omarpolo.com/changelog.html PR: 267491 MFH: 2022Q4 (bugfixes) (cherry picked from commit 315a41c0b7da15fa53af36599469c65ea01ebd4f)
* net/traefik: Update to upstream version 2.9.4Thomas Zander2022-10-302-6/+5
| | | | | | | | | | | | Details: - Update to 2.9.x branch: https://github.com/traefik/traefik/releases/tag/v2.9.4 - No breaking config changes, see https://doc.traefik.io/traefik/migration/v2/#v29 - but "Traefik Pilot" has been removed. MFH: 2022Q4 (cherry picked from commit f7d27b2826592362278b4f99d92c0c8bd68dbeb9)
* net/waypipe: update to 0.8.4Jan Beich2022-10-302-5/+5
| | | | | | | Changes: https://gitlab.freedesktop.org/mstoeckl/waypipe/-/releases/v0.8.4 Reported by: GitLab (notify releases) (cherry picked from commit 1d9b380d6976a6cb946355bd6205b450e9152d91)
* net/openldap25-{server,client}: fix proper usage of FETCH/GSSAPI optionsMichael Osipov2022-10-211-8/+8
| | | | | | | | | | | | * FETCH_DESC is not present with client * FETCH applies to *both* client and server since both slapd and client tools use ldif_parse_line2() via libldap which can use libfetch * GSSAPI is also required for the client as well since ldap*(1) commands can be used to connect and authenticate to directory servers like Active Directory and OpenLDAP with Kerberos via SASL GSSAPI mechanism PR: ports/267056 (cherry picked from commit b7db3e41f324cdbc95a33256dd4cdf7e38928fc0)
* net/openldap24-server: Deprecate and set expiration date to 2022-12-31Xin LI2022-10-211-0/+3
| | | | | | | | | | | Upstream is no longer supporting OpenLDAP 2.4 series; existing users should migrate to a newer OpenLDAP release. Reference: https://github.com/openldap/openldap.github.io/issues/2#issuecomment-1003778077 Reported by: Michael Osipov PR: 267149 (cherry picked from commit fb3af46227299bbf20930ee853769bfacb734d66)
* net/openldap26-{server,client}: fix proper usage of FETCH/GSSAPI optionsMichael Osipov2022-10-211-7/+8
| | | | | | | | | | | | * FETCH_DESC is not present with client * FETCH applies to *both* client and server since both slapd and client tools use ldif_parse_line2() via libldap which can use libfetch * GSSAPI is also required for the client as well since ldap*(1) commands can be used to connect and authenticate to directory servers like Active Directory and OpenLDAP with Kerberos via SASL GSSAPI mechanism PR: ports/267056 (cherry picked from commit de29d5bd2acda093fe3a5472df80c7cbd5a7b794)
* net/freerdp: update to 2.8.1 release (+)Dima Panov2022-10-142-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | Notewhorth changes: * Fixed CVE-2022-39282 * Fixed CVE-2022-39283 * Added missing commit for backported #8041: Remove ALAW/ULAW codecs from linux backends (unreliable) * Added hash checks for android build script dependencies Fixed issues: * Backported #8190: Fix build break with newer FFMPEG versions * Backported #8234: Updated flatpak with build script * Backported #8210: Better execinfo support check for android * Backported #7708: Header now defines DumpThreadHandles * Backported #8176: Check fullscreen state and not setting * Backported #8236: Send resize on window state change * Backported #7611: Audin macOS monterey fix * Backported #8291: Android build script update Changelog: https://github.com/FreeRDP/FreeRDP/blob/2.8.1/ChangeLog Release notes: https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1 PR: 267034 Submitted by: maintainer MFH: 2022Q4 (cherry picked from commit c35733e72db722d42788a2ff7ae96c26e1079d4e)
* net/keycloak: Update to 19.0.3Matthias Wolf2022-10-113-33/+33
| | | | | | | | | | | | | | | | | | ChangeLog: https://www.keycloak.org/2022/10/keycloak-1903-released.html * AdminV2 not using admin hostname keycloak-ui admin/ui * Clear expired events errors keycloak storage * CryptoIntegration fails to init on WebSphere Liberty keycloak * keycloak 19 legacy: unable to deploy war-packaged user storage provider keycloak storage * Missing variable declaration in AuthZ JS keycloak adapter/javascript * Browser-based flows not working properly due to 3rd party cookie policies on Firefox PR: 266939 Reported by: freebsd@rheinwolf.de (maintainer) (cherry picked from commit b82ed46853b8647bfdddabcce434c4a4548d41b2)
* net/samba413: Backport security fix from 4.14.14Yasuhiro Kimura2022-10-119-6/+17376
| | | | | | | | | | | | | | * Add upstream patch to fix configure error with Python 3.11. * Fix plist error when AD_DC option is off and PYTHON3 option is on. * Replace BIND911 option with BIND918 as dns/bind911 is removed from ports tree and dns/bind918 is added instead. PR: 266641 Approved by: maintainer timeout MFH: 2022Q4 Security: f9140ad4-4920-11ed-a07e-080027f5fec9 (cherry picked from commit dfaa714fc960fb4d0a5bc6983d3882a974857f12)
* net/routinator: Update to 0.11.3Jaap Akkerhuis2022-10-093-6/+5
| | | | | | | | | | | | | | | | ChangeLog: https://github.com/NLnetLabs/routinator/releases Fixes an issue in error handling in the RRDP collector that causes Routinator to exit if it encountered malformed base r64 in RRDP snapshot and delta files. (Found by Donika Mirdita and Haya Shulman. Assigned CVE-2022-3029.) PR: 266865 Reported by: jaap@NLnetLabs.nl (maintainer) MFH: 2022Q4 (security fix release) Security: CVE-2022-302 (cherry picked from commit 3488bf3779725a73032aeff271926dee14e10e70)
* all: Bump PORTREVISION after lang/go{118,119} updateDmitri Goutnik2022-10-0854-47/+54
| | | | (cherry picked from commit bde51869ee0206eeaa2849d8ef28b14da59727a3)
* net/traefik: Update to upstream version 2.8.8Thomas Zander2022-10-032-4/+4
| | | | | | | | | Details: - Bugfix release, see: https://github.com/traefik/traefik/releases/tag/v2.8.8 MFH: 2022Q4 (cherry picked from commit d2403f6628bd75df54bbbbbe4add5ef187453339)
* net/freebsd-telnetd: Update to 14.0.5Cy Schubert2022-10-032-4/+4
| | | | | | 14.0.5 contains a fix for FreeBSD 12 & 13, ncursesw instead of ncurses. (cherry picked from commit 51176cc2fa808c44b404e109877b2795e0f2005d)
* net/freebsd-telnetd: Remove OPIE supportCy Schubert2022-10-032-4/+4
| | | | | | | My upstream GH repo recently chased FreeBSD src 0aa2700123e2 removing OPIE support. Point to v14.0.4 which removes OPIE support. (cherry picked from commit ed432145435bb18f1eb86a811c43ce9b51d8ab2a)
* net/nats-server: update to version 2.9.2Jimmy Olgeni2022-10-012-19/+19
|
* cleanup: Remove expired ports:Rene Ladan2022-09-306-51/+0
| | | | 2022-09-30 net/libmms: Obsolete, Microsoft deprecated MMS protocol in favour of RTSP in 2003
* all: deprecate ports depending on expired py-pyjwt1Rene Ladan2022-09-301-0/+3
|
* net/py-trio: Update to 0.22.0Emanuel Haupt2022-09-302-4/+4
|
* net/openbgpd7: update 7.5 -> 7.6Kurt Jaeger2022-09-303-8/+4
| | | | | | | See https://marc.info/?l=openbgpd-users&m=166326222102367&w=2 for the changes in that update. Reported by: Mike Geiger <Myke@ServerNorth.net>
* net/haproxy24: update to version 2.4.19.Dmitry Sivachenko2022-09-292-4/+4
|
* net/freebsd-telnetd: Update to 14.0.3Cy Schubert2022-09-283-4/+8
| | | | | | | 14.0.3 adds pam.d/telnetd. It was removed in src 0eea46fb1f83f6091df92b5f2eae993cd6c2c873. MFH: 2022Q3
* net/cppzmq: add tests target, disabled by defaultVasil Dimov2022-09-281-2/+4
| | | | PR: 266633
* net/libdaq: Use new divert(4) APIMuhammad Moinur Rahman2022-09-272-3/+11
| | | | | | | | | | * In the FreeBSD CURRENT the API has changed. I posted patch on libdaq github, but their slow with reviewing the pull request. Meanwhile add the patch to the port. * Pet portclippy PR: 266663 Reported by: glebius
* net/netatalk3: Restore former SUB that was taken out in makepatchJoe Marcus Clarke2022-09-271-1/+1
|
* net/netatalk3: Add a slew of upstream patches.Joe Marcus Clarke2022-09-2711-98/+696
| | | | | | | | These are primarily focused on clearing out the remaining CVE fix fallout. They handle the cases where ad_entries can be NULL, don't remove metadata, and don't allow adouble for symlinks. PR: 263123
* net/frp: Update 0.43.0 -> 0.44.0Yuri Victorovich2022-09-262-7/+6
| | | | Reported by: portscout
* net/fb303: Update 2022.09.19.00 -> 2022.09.26.00Yuri Victorovich2022-09-262-4/+4
|
* net/wangle: Update 2022.09.19.00 -> 2022.09.26.00Yuri Victorovich2022-09-262-4/+4
|
* net/mvfst: Update g20220328 -> g20220926Yuri Victorovich2022-09-263-14/+16
|
* net/glib-networking: add missed distinfo after ↵Dima Panov2022-09-271-3/+3
| | | | | | 3665c9e3e762bb25cb7993254f44c8cc1d7901a5 Reported by: jbeich
* net/exabgp4: Update to 4.2.21Dan Langille2022-09-263-16/+4
| | | | Approved by: maintainer (via private email)
* net/glib-networking: update to 2.74.0 release(+)Dima Panov2022-09-272-2/+6
| | | | | | Keep it in sync with glib20 which uodate to 2.74.0 release Changelog: https://gitlab.gnome.org/GNOME/glib-networking/-/blob/2.74.0/NEWS
* net/geoipupdate: Update to 4.10.0Adam Weinberger2022-09-262-7/+6
|
* net/storj: update Storj programs to version 1.64.1Alexey Dokuchaev2022-09-264-18/+9
| | | | | | Some auxiliary utilities are no longer built and installed. Reported on: https://t.me/storjRU
* net/py-siosocks: update 0.2.0 → 0.3.0Dmitry Marakasov2022-09-262-5/+5
|
* audio/flac: bump port revision of consumers after update to 1.4.1Christian Weisgerber2022-09-251-1/+1
|