Commit graph

299 commits

Author SHA1 Message Date
Sunpoet Po-Chuan Hsieh
aabbea4dfa Bump PORTREVISION for devel/json-c json-c 2020-05-22 19:20:42 +00:00
Ryan Steinmetz
f7b60f861f - Update to 0.102.3 to address CVEs (CVE-2020-3327, CVE-2020-3341)
PR:		246452
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Security:	91ce95d5-cd15-4105-b942-af5ccc7144c1
2020-05-17 20:42:11 +00:00
Kurt Jaeger
bccdbb3add security/clamav: upgrade 0.102.1 -> 0.102.2
- Remove MSPACK option and always use archivers/libmspack in
  accordance with policy about bundled library described in 6.2 of
  Porter's Handbook.
- Remove obsolete and no-op options from CONFIGURE_ARGS.

PR:		243914
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
Relnotes:	https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html
Security:	CVE-2020-3123
2020-02-06 20:59:17 +00:00
Jochen Neumeister
861be41b5f Update to 0.102.1
Changelog: https://blog.clamav.net/2019/11/clamav-01021-and-01015-patches-have.html

PR:		242119
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
MFH:		2019Q4
Security:	6ade62d9-0f62-11ea-9673-4c72b94353b5
Sponsored by:	Netzkommune GmbH
2019-11-25 09:24:27 +00:00
Kurt Jaeger
2190fcbe23 security/clamav: upgrade 0.101.4 -> 0.102.0
- Enable MILTER option by default
- Disable MSPACK option by default
- Sort OPTIONS_DEFINE, OPTIONS_DEFAULT and *_DESC
- Remove security/clamav-milter, slave port that enables MILTER option
- Add entry for security/clamav-milter to MOVED

PR:		241860
Submitted by:	Yasuhiro Kimura <yasu@utahime.org> (maintainer)
2019-11-12 20:07:20 +00:00
Kurt Jaeger
5b078499a4 security/clamav: upgrade 0.101.3 -> 0.101.4
PR:		239684
Approved by:	ports-secteam (joneum)
Relnotes:	https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html
Security:	CVE-2019-12900, CVE-2019-12625
MFH:		2019Q3
2019-08-23 06:27:15 +00:00
Kurt Jaeger
76ecec3581 security/clamav: upgrade 0.101.2 -> 0.101.3, partial security fix
- please note another fix is coming soonish:
  https://www.openwall.com/lists/oss-security/2019/08/06/3
- see also
  https://bugzilla.clamav.net/show_bug.cgi?id=12356

PR:		239684
Approved by:	delphij (ports-secteam)
Relnotes:	https://blog.clamav.net/2019/08/clamav-01013-security-patch-release-and.html
MFH:		2019Q3
Security:	CVE-2019-13232
2019-08-08 09:30:04 +00:00
Mark Linimon
7bfae932f7 Prepare for powerpc-on-clang by deleting hard-coded tests for libstdc++.so
as a stand-in for "are we running on gcc".

For people already testing powerpc on clang, it is possible that they
already have both compilers in base.  Thus, the assumption that "gcc is
in base" (e.g.  libstdc++.so exists) always means "force use of GCC" is
already broken.  It will be for everyone on -CURRENT once the switch is
made.

While here, standardize on compiler:c++11-lang instead of -lib (they are
equivalent these days), pet portlint, and do some other cleanup.

Approved by:	portmgr (tier-2 blanket)
2019-07-12 02:25:07 +00:00
Steve Wills
45d8c56f90 security/clamav: Update to 0.101.2
PR:		236818
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2019-04-11 00:56:12 +00:00
Sunpoet Po-Chuan Hsieh
d1ccd06cb9 Update MASTER_SITES
Approved by:	portmgr (blanket)
2019-02-01 21:44:06 +00:00
Steve Wills
da63d1c179 security/clamav: Fix build when MSPACK options is off
PR:		234970
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2019-01-15 17:45:53 +00:00
Steve Wills
e1c313021f security/clamav: update to 0.101.1
PR:		234835
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2019-01-13 19:32:17 +00:00
Steve Wills
848e60ea3d security/clamav: Fix build on base system without sendmail when MILTER option is ON
PR:		234289
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2018-12-27 13:17:39 +00:00
Antoine Brodin
33cba0a8ac Pass maintainership to Yasuhiro KIMURA
Approved by:	ler@ in r486630
2018-12-10 10:18:30 +00:00
Antoine Brodin
d5278bc960 Downgrade to 0.100.2
Upstream plans to release version 0.101.1 which fixes header issues in January
2019

With hat:	portmgr
2018-12-09 17:33:26 +00:00
Steve Wills
5b3daf5b89 security/clamav: Install missing headers
PR:		233879
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2018-12-09 13:22:22 +00:00
Mark Linimon
03cb50a9e9 Remove artifact from earlier version of patch.
Reported by:	jbeich
2018-12-07 17:31:07 +00:00
Mark Linimon
a8d38e94f8 Base GCC supports neither -Wno-logical-op-parentheses nor -Wno-dangling-else.
Remove them on GCC-based architectures to fix build.

PR:		233800
Submitted by:	Piotr Kubaj
Approved by:	maintainer
2018-12-07 15:34:52 +00:00
Larry Rosenman
a5a18c2816 security/clamav: Give maintainership to Yasuhiro KIMURA <yasu@utahime.org> 2018-12-04 19:11:15 +00:00
Larry Rosenman
ce26bf8ca1 security/clamav: build no longer produces libclammspack.a and
libclammspack.pc with the MSPACK option unset.

PR:		233763
Reported by:	PopularMoment@protonmail.com
2018-12-04 02:39:58 +00:00
Larry Rosenman
1d7ef1f709 security/clamav: update to 0.101.0
PR:		2337761
Submitted by:	yasu@utahime.org
2018-12-03 23:42:21 +00:00
Larry Rosenman
d9fc5987ac security/clamav: remove unneeded build_depends for pkgconfig.
Reported by:	sunpoet
2018-11-30 13:12:02 +00:00
Larry Rosenman
54dfab6fa6 security/clamav: really do the right thing with the MSPACK option.
previous patch added the configure argument to find archivers/libmspack
installed, but neglected to set USES+= pkgconfig to actually have the binary
use that version.  With it now properly finding libmspack.so, revert to
not trying to install libclammspack* if the MSPACK option is set.

PR:		233658
2018-11-30 10:53:39 +00:00
Larry Rosenman
ac8abded04 security/clamav: install libclammspack regardless of the MSPACK option.
PR:		233658
Reported by:	ohartmann@walstatt.org
2018-11-30 10:12:44 +00:00
Larry Rosenman
cb672f9e13 security/clamav: fix test failures.
It adds a few more fixes and improvements.

- Solves the bug, by adding a MSPACK option (enabled by default) and a build dependency on pkg-config.

- Makes massive use of options helpers and similar tools to improve Makefile's readability. In the rewriting I have not maintained the dependency of option LDAP on option MILTER and the two options are now indipendent: if this is bad, it as to be fixed on my patch. I avoided to do it directly because I am unsure it is needed.

- Uses now libpcre2 consistently (before the port could link to libpcre2 by mistake).

- Removes useless arguments about zlib in CONFIGURE_ARGS.

- Reorders variables consistently with the standard order.

- Cleans header.

- Updates pkg-plist and sort if alphabetically.

- Bump PORTREVISION, needed because of some fixes.

PR:		228468
Submitted by:	phascolarctos@protonmail.ch
Reported by:	gondim@bsdinfo.com.br
2018-11-30 02:34:20 +00:00
Larry Rosenman
b53623defe security/clamav: update to 0.100.2.
* Update to 0.100.2
  - Reference: https://blog.clamav.net/2018/10/clamav-01002-has-been-released.html
  - Security: CVE-2018-14680, CVE-2018-14681, CVE-2018-14682, CVE-2018-15378
* Add gnome to USES to fix developer mode warning.

PR:		231925
Submitted by:	yasu@utahime.org
Security:	CVE-2018-14680, CVE-2018-14681, CVE-2018-14682, CVE-2018-15378
2018-10-04 01:53:09 +00:00
Sunpoet Po-Chuan Hsieh
29632fcc45 Update devel/json-c to 0.13.1
- Add my LOCAL to MASTER_SITES
- Bump PORTREVISION of dependent ports for shlib change

Changes:	https://github.com/json-c/json-c/blob/master/ChangeLog
PR:		231007
Exp-run by:	antoine
2018-09-05 22:01:55 +00:00
Larry Rosenman
1711ab2455 security/clamav: update to 0.100.1
PR:	229651
Submitted by:	yasu@utahime.org
MFH:	2018Q3
Security:	CVE-2017-16932
Security:	CVE-2018-0360
Security:	CVE-2018-0361
2018-07-09 19:18:57 +00:00
Dmitry Marakasov
bd93066b42 - Add LICENSE_FILE
- Update WWW

Approved by:	portmgr blanket
2018-06-09 09:34:27 +00:00
Larry Rosenman
c1973ddd01 security/clamav: fix packaging when JSON option is NOT set.
Reported by:	Serg Renkas <rsf@ntc-raduga.ru>
2018-04-13 11:07:06 +00:00
Larry Rosenman
6fe46f315f security/clamav: Unbreak package without unrar.
PR:		227420
Submitted by:	PopularMoment@protonmail.com
2018-04-12 16:01:16 +00:00
Larry Rosenman
ffda66a9e0 security/clamav: upgrade to 0.100.0
Release notes: https://blog.clamav.net/2018/04/clamav-01000-has-been-released.html

PR:	227420
Submitted by:	nevecherya@gmail.com
2018-04-12 11:52:54 +00:00
Larry Rosenman
f6505081c8 security/clamav: upgrade to 0.99.4
Release notes: http://blog.clamav.net/2018/03/clamav-0994-has-been-released.html

Submitted by:	mmokhi
Security:	CVE-2012-6706
Security:	CVE-2017-6419
Security:	CVE-2017-11423
Security:	CVE-2018-1000085
Security:	CVE-2018-0202
Differential Revision:	https://reviews.freebsd.org/D14562
2018-03-02 14:54:34 +00:00
Larry Rosenman
433f4d3f66 security/clamav: upgrade to 0.99.3.
* Update to 0.99.3.
* Fix following portlint warnings.
** Move position of USES in Makefile.
** Remove reference of undefined LLVM option.
** Regenerate files/patch-libclamav_regex_pcre.c by 'make makepatch
** add USES=ssl

PR:		225461
Submitted by:	yasu@utahime.org
2018-01-26 00:16:16 +00:00
Larry Rosenman
cb48e8c320 security/clamav: remove LHA from default options.
r459039 made distribution of the lha binary not allowed.

PR:		225180
Submitted by:	antoine
2018-01-15 14:32:54 +00:00
Sunpoet Po-Chuan Hsieh
97064443de Update devel/json-c to 0.13
- Add TEST_TARGET
- While I'm here, fix shebang for net/opensips
- Bump PORTREVISION of dependent ports for shlib change

Changes:	https://github.com/json-c/json-c/blob/master/ChangeLog
PR:		224675
Exp-run by:	antoine
2018-01-03 13:36:58 +00:00
Larry Rosenman
181b7c02ee security/clamav: handle memfs/tmpfs /var/run.
PR:		224728
Submitted by:	O. Harmann <ohartmann@walstatt.org>
2017-12-30 22:25:18 +00:00
Larry Rosenman
56b5c974a1 security/clamav: incorrect type size on amd64 in pcre2.
PR:		223945
Submitted by:	coyote@bks.tv
2017-11-29 02:56:26 +00:00
Larry Rosenman
29eaffdae3 security/clamav: bump PORTREVISION, missed in previous commit
pointyhat to: ler (myself)
2017-09-22 16:17:16 +00:00
Larry Rosenman
1faef9ef46 security/clamav: Compile-time test fails during portinstall
Apply patch from upstream.

PR:	221513
Submitted by:	jny@jny.dk, fsbruva@yahoo.com
2017-09-22 16:11:54 +00:00
Larry Rosenman
23ca3ee85c security/clamav: Take maintainership
Approved by:	garga (via IRC)
2017-08-15 19:11:29 +00:00
Martin Wilke
e174fc2f9d - Remove clang36 support
Reviewed by:	garga
Approved by:	garga (maintainer via irc)
2017-05-02 14:26:06 +00:00
Mark Felder
d19088291f UNRAR description is now available in bsd.options.desc.mk
Approved by:	portmgr (with hat)
2017-04-26 17:34:18 +00:00
Gerald Pfeifer
04d6f52202 Bump PORTREVISIONs for ports depending on the canonical version of GCC and
lang/gcc which have moved from GCC 4.9.4 to GCC 5.4 (at least under some
circumstances such as versions of FreeBSD or platforms).

This includes ports
 - with USE_GCC=yes or USE_GCC=any,
 - with USES=fortran,
 - using using Mk/bsd.octave.mk which in turn has USES=fortran, and
 - with USES=compiler specifying openmp, nestedfct, c++11-lib, c++14-lang,
   c++11-lang, c++0x, c11, or gcc-c++11-lib.

PR:		216707
2017-04-01 15:23:30 +00:00
Sunpoet Po-Chuan Hsieh
a9c2ade8fc Move devel/libcheck to devel/check
- Bump PORTREVISION for dependent ports
2017-02-05 11:14:37 +00:00
Renato Botelho
ab098bd99c Fix zlib version detect to make sure it doesn't consider 1.2.10 as bad
version. It fixes build on 12-CURRENT
2017-01-09 13:35:57 +00:00
Antoine Brodin
6f0e1ce3a6 Unbreak configure with zlib 1.2.10, configure script believes that version
1.2.10 is vulnerable version 1.2.1

Reported by:	pkg-fallout
MFH:		2017Q1
2017-01-06 21:35:34 +00:00
Mathieu Arnold
a0bcd2cf68 Use USES=pathfix where applicable.
PR:		213195
Submitted by:	mat
Exp-run by:	antoine
Sponsored by:	Absolight
Differential Revision:	https://reviews.freebsd.org/D8093
2016-10-21 15:21:13 +00:00
Dima Panov
74c46cb260 - Stage II. FreeBSD 9.x brach need a bit more love to deal with c++11-aware code
for Jit/LLVM bytecode engine [1]
- Disable Jit engine by default for package building [2]

Reported by:	pi [1]
Discussed with:	garga [2]
Approved by:	garga (maintainer)
MFH:		2016Q3
2016-08-11 03:49:42 +00:00
Dima Panov
ee79543642 - security/clamav: Unbroke Jit engine
Buldled LLVM is very limited/outdated and produce the broken code on recent FreeBSD releases,
so unconditionally rely on latest supported (3.6) LLVM framework from ports to build ClamAV Jit parser

PR:		211683
Reported by:	many
Submitted by:	myself
Approved by:	garga (maintainer)
MFH:		2016Q3
2016-08-10 07:10:30 +00:00