Commit graph

318 commits

Author SHA1 Message Date
Yasuhiro Kimura
583ec468df security/clamav: Update to 0.104.2
ReleaseNotes:	https://blog.clamav.net/2022/01/clamav-01035-and-01042-security-patch.html
MFH:		2022Q1
Security:	CVE-2022-20698
2022-01-13 12:32:30 +09:00
Oclair
e9d6c3d3d0 security/clamav: Make the value of user/group overridable with make.conf
PR:		259987
2021-12-14 10:21:45 +09:00
Stefan Eßer
5933ac0b09 */*: Remove redundant '-[0-9]*' from CONFLICTS_INSTALL
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").

Approved by: portmgr (blanket)
2021-11-23 23:11:40 +01:00
Rodrigo Osorio
e449f292ca security/clamav: Revert changes introduced in d97161a978 2021-11-19 15:59:10 +01:00
Rodrigo Osorio
d97161a978 net-mgmt/smokeping: Fix patches filepath
PR:             259891
Reported by:    shaun <freebsd@shaunc.com>
2021-11-19 15:51:11 +01:00
Yasuhiro Kimura
36f9d031ea security/clamav: Update to new bugfix release 0.104.1
Update COMMENT and pkg-descr

ReleaseNotes:	https://blog.clamav.net/2021/11/clamav-01034-and-01041-patch-releases.html
2021-11-04 06:18:10 +09:00
Yasuhiro Kimura
11ce5b3d71 security/clamav: Update to 0.104.0
* Upstream changed build tool from GNU Autotools to CMake
* Set TEST_TARGET
* Add pre-test-TESTS-off target to display message that TESTS option
  needs to be enabled to execute `make test`
* Switch to use pkg-messge instead of pkg-deinstall to display message
  for those who removes ClamAV permanently from you system
* Stop checking in rc scripts if /var/run/clamav exists
* Pet portclippy
* Reformat Makefile with portfmt

Release Notes:	https://blog.clamav.net/2021/09/clamav-01040-released.html
PR:		258565
Differential Revision:	https://reviews.freebsd.org/D32354
2021-10-30 07:52:24 +09:00
Yasuhiro Kimura
e761728685 security/clamav-lts: Add new port
* Add Long Term Support release of ClamAV
* Add CONFLICTS_INSTALL to security/clamav
* Add entry to UPDATING that explains
  - Upstream changed their end-of-life policy and LTS release is
    introduced
  - How to switch from regular release (security/clamav) to LTS
    release (security/clamav-lts)

Note about setting PORTEPOCH

In general new port should not set PORTEPOCH. But in this case it
should be set with following reason.

1. Recently upstream changed their end-of-life policy as following.
  - Regular feature release (= 0.xyz.0 release) is released more
    frequently, and life time of each feature release is shortened to
    about 4 months.
  - To compensate for the short lifetime of regular feature release,
    Long Term Support feature release is introduced and its life time
    is about 3 years.
2. First LTS starts with version 0.103.3 and it is same as current
   version of security/clamav.
3. Because of short lifetime of regular feature release, it is
   probable that not a few users of security/clamav want to switch to
   security/clamav-lts after the latter is connected (and the former
   is updated to 0.104.0).
3. For such users the entry is added to UPDATING about how to switch
   from security/clamav to security/clamav-lts. And binary package
   user is suggested to execute
   `pkg set -o security/clamav:security/clamav-lts`. This command
   changes the origin of already installed clamav packages. So user
   can switch to LTS version without reinstalling.
4. But if PORTEPOCH isn't set in security/clamav-lts, binary package
   user who executed above command will notice that version of
   installed package (0.103.3,1) succeeds to current version of
   security/clamav-lts (0.103.3). The situation doesn't change after
   new patch release (0.103.4 for example) is released and it causes
   the problem that installed package isn't properly upgraded with
   `pkg upgrade`.
5. So PORTEPOCH is set in  security/clamav-lts to prevent binary
   package user from suffering from such problem.
2021-10-07 17:52:06 +09:00
Yasuhiro Kimura
10c30f1825 */*: Update MAINTAINER address of my ports to that of FreeBSD.org
Approved by:	meta (mentor)
Differential Revision:	https://reviews.freebsd.org/D32170
2021-09-28 14:13:33 +09:00
Yasuhiro Kimura
ec74b5a779 security/clamav: Update to 0.103.3
Changes:	https://blog.clamav.net/2021/06/clamav-01033-patch-release.html

PR:		256751
Approved by:	lwhsu (mentor, implicit)
2021-06-22 19:49:42 -04:00
Neel Chauhan
e01c3f0b80 security/clamav: Update to 0.103.2
Changes: https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html

PR:		254862
Submitted by:	Yasuhiro Kimura <yasu AT utahime DOT org> (maintainer)
2021-04-07 21:37:17 -07:00
Mathieu Arnold
cf118ccf87
One more small cleanup, forgotten yesterday.
Reported by:	lwhsu
2021-04-07 10:09:01 +02:00
Mathieu Arnold
135fdeebb9
all: Remove all other $FreeBSD keywords. 2021-04-06 16:31:13 +02:00
Mathieu Arnold
305f148f48
Remove # $FreeBSD$ from Makefiles. 2021-04-06 16:31:07 +02:00
Jason E. Hale
511e8b2cc3 security/clamav: Update to 0.103.1
PR:		253242
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
Relnotes:	https://blog.clamav.net/2021/02/clamav-01031-patch-release.html
2021-02-07 16:33:52 +00:00
Vanilla I. Shu
2d6ce201d9 Update to 0.103.0.
PR:		249318
Submitted by:	maintainer
2020-09-15 11:14:50 +00:00
Li-Wen Hsu
3c416c406f security/clamav: Fix build after r541115
Fix build when base system is built with WITHOUT_SENDMAIL=yes

PR:		247792
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2020-08-20 09:54:34 +00:00
Kurt Jaeger
fe1b4f7fbb security/clamav: update 0.102.3 -> 0.102.4
PR:		248028
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
MFH:		2020Q3
Relnotes:	https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html
Security:	CVE-2020-3350, CVE-2020-3327, CVE-2020-3481
2020-07-17 05:38:19 +00:00
Li-Wen Hsu
67a7fcba5c Fix build with non-default LOCALBASE, PREFIX
PR:		246059
Submitted by:	John Hein <jcfyecrayz@liamekaens.com>
Approved by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2020-07-03 14:54:09 +00:00
Sunpoet Po-Chuan Hsieh
aabbea4dfa Bump PORTREVISION for devel/json-c json-c 2020-05-22 19:20:42 +00:00
Ryan Steinmetz
f7b60f861f - Update to 0.102.3 to address CVEs (CVE-2020-3327, CVE-2020-3341)
PR:		246452
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org>
Security:	91ce95d5-cd15-4105-b942-af5ccc7144c1
2020-05-17 20:42:11 +00:00
Kurt Jaeger
bccdbb3add security/clamav: upgrade 0.102.1 -> 0.102.2
- Remove MSPACK option and always use archivers/libmspack in
  accordance with policy about bundled library described in 6.2 of
  Porter's Handbook.
- Remove obsolete and no-op options from CONFIGURE_ARGS.

PR:		243914
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
Relnotes:	https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html
Security:	CVE-2020-3123
2020-02-06 20:59:17 +00:00
Jochen Neumeister
861be41b5f Update to 0.102.1
Changelog: https://blog.clamav.net/2019/11/clamav-01021-and-01015-patches-have.html

PR:		242119
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
MFH:		2019Q4
Security:	6ade62d9-0f62-11ea-9673-4c72b94353b5
Sponsored by:	Netzkommune GmbH
2019-11-25 09:24:27 +00:00
Kurt Jaeger
2190fcbe23 security/clamav: upgrade 0.101.4 -> 0.102.0
- Enable MILTER option by default
- Disable MSPACK option by default
- Sort OPTIONS_DEFINE, OPTIONS_DEFAULT and *_DESC
- Remove security/clamav-milter, slave port that enables MILTER option
- Add entry for security/clamav-milter to MOVED

PR:		241860
Submitted by:	Yasuhiro Kimura <yasu@utahime.org> (maintainer)
2019-11-12 20:07:20 +00:00
Kurt Jaeger
5b078499a4 security/clamav: upgrade 0.101.3 -> 0.101.4
PR:		239684
Approved by:	ports-secteam (joneum)
Relnotes:	https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html
Security:	CVE-2019-12900, CVE-2019-12625
MFH:		2019Q3
2019-08-23 06:27:15 +00:00
Kurt Jaeger
76ecec3581 security/clamav: upgrade 0.101.2 -> 0.101.3, partial security fix
- please note another fix is coming soonish:
  https://www.openwall.com/lists/oss-security/2019/08/06/3
- see also
  https://bugzilla.clamav.net/show_bug.cgi?id=12356

PR:		239684
Approved by:	delphij (ports-secteam)
Relnotes:	https://blog.clamav.net/2019/08/clamav-01013-security-patch-release-and.html
MFH:		2019Q3
Security:	CVE-2019-13232
2019-08-08 09:30:04 +00:00
Mark Linimon
7bfae932f7 Prepare for powerpc-on-clang by deleting hard-coded tests for libstdc++.so
as a stand-in for "are we running on gcc".

For people already testing powerpc on clang, it is possible that they
already have both compilers in base.  Thus, the assumption that "gcc is
in base" (e.g.  libstdc++.so exists) always means "force use of GCC" is
already broken.  It will be for everyone on -CURRENT once the switch is
made.

While here, standardize on compiler:c++11-lang instead of -lib (they are
equivalent these days), pet portlint, and do some other cleanup.

Approved by:	portmgr (tier-2 blanket)
2019-07-12 02:25:07 +00:00
Steve Wills
45d8c56f90 security/clamav: Update to 0.101.2
PR:		236818
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2019-04-11 00:56:12 +00:00
Sunpoet Po-Chuan Hsieh
d1ccd06cb9 Update MASTER_SITES
Approved by:	portmgr (blanket)
2019-02-01 21:44:06 +00:00
Steve Wills
da63d1c179 security/clamav: Fix build when MSPACK options is off
PR:		234970
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2019-01-15 17:45:53 +00:00
Steve Wills
e1c313021f security/clamav: update to 0.101.1
PR:		234835
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2019-01-13 19:32:17 +00:00
Steve Wills
848e60ea3d security/clamav: Fix build on base system without sendmail when MILTER option is ON
PR:		234289
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2018-12-27 13:17:39 +00:00
Antoine Brodin
33cba0a8ac Pass maintainership to Yasuhiro KIMURA
Approved by:	ler@ in r486630
2018-12-10 10:18:30 +00:00
Antoine Brodin
d5278bc960 Downgrade to 0.100.2
Upstream plans to release version 0.101.1 which fixes header issues in January
2019

With hat:	portmgr
2018-12-09 17:33:26 +00:00
Steve Wills
5b3daf5b89 security/clamav: Install missing headers
PR:		233879
Submitted by:	Yasuhiro KIMURA <yasu@utahime.org> (maintainer)
2018-12-09 13:22:22 +00:00
Mark Linimon
03cb50a9e9 Remove artifact from earlier version of patch.
Reported by:	jbeich
2018-12-07 17:31:07 +00:00
Mark Linimon
a8d38e94f8 Base GCC supports neither -Wno-logical-op-parentheses nor -Wno-dangling-else.
Remove them on GCC-based architectures to fix build.

PR:		233800
Submitted by:	Piotr Kubaj
Approved by:	maintainer
2018-12-07 15:34:52 +00:00
Larry Rosenman
a5a18c2816 security/clamav: Give maintainership to Yasuhiro KIMURA <yasu@utahime.org> 2018-12-04 19:11:15 +00:00
Larry Rosenman
ce26bf8ca1 security/clamav: build no longer produces libclammspack.a and
libclammspack.pc with the MSPACK option unset.

PR:		233763
Reported by:	PopularMoment@protonmail.com
2018-12-04 02:39:58 +00:00
Larry Rosenman
1d7ef1f709 security/clamav: update to 0.101.0
PR:		2337761
Submitted by:	yasu@utahime.org
2018-12-03 23:42:21 +00:00
Larry Rosenman
d9fc5987ac security/clamav: remove unneeded build_depends for pkgconfig.
Reported by:	sunpoet
2018-11-30 13:12:02 +00:00
Larry Rosenman
54dfab6fa6 security/clamav: really do the right thing with the MSPACK option.
previous patch added the configure argument to find archivers/libmspack
installed, but neglected to set USES+= pkgconfig to actually have the binary
use that version.  With it now properly finding libmspack.so, revert to
not trying to install libclammspack* if the MSPACK option is set.

PR:		233658
2018-11-30 10:53:39 +00:00
Larry Rosenman
ac8abded04 security/clamav: install libclammspack regardless of the MSPACK option.
PR:		233658
Reported by:	ohartmann@walstatt.org
2018-11-30 10:12:44 +00:00
Larry Rosenman
cb672f9e13 security/clamav: fix test failures.
It adds a few more fixes and improvements.

- Solves the bug, by adding a MSPACK option (enabled by default) and a build dependency on pkg-config.

- Makes massive use of options helpers and similar tools to improve Makefile's readability. In the rewriting I have not maintained the dependency of option LDAP on option MILTER and the two options are now indipendent: if this is bad, it as to be fixed on my patch. I avoided to do it directly because I am unsure it is needed.

- Uses now libpcre2 consistently (before the port could link to libpcre2 by mistake).

- Removes useless arguments about zlib in CONFIGURE_ARGS.

- Reorders variables consistently with the standard order.

- Cleans header.

- Updates pkg-plist and sort if alphabetically.

- Bump PORTREVISION, needed because of some fixes.

PR:		228468
Submitted by:	phascolarctos@protonmail.ch
Reported by:	gondim@bsdinfo.com.br
2018-11-30 02:34:20 +00:00
Larry Rosenman
b53623defe security/clamav: update to 0.100.2.
* Update to 0.100.2
  - Reference: https://blog.clamav.net/2018/10/clamav-01002-has-been-released.html
  - Security: CVE-2018-14680, CVE-2018-14681, CVE-2018-14682, CVE-2018-15378
* Add gnome to USES to fix developer mode warning.

PR:		231925
Submitted by:	yasu@utahime.org
Security:	CVE-2018-14680, CVE-2018-14681, CVE-2018-14682, CVE-2018-15378
2018-10-04 01:53:09 +00:00
Sunpoet Po-Chuan Hsieh
29632fcc45 Update devel/json-c to 0.13.1
- Add my LOCAL to MASTER_SITES
- Bump PORTREVISION of dependent ports for shlib change

Changes:	https://github.com/json-c/json-c/blob/master/ChangeLog
PR:		231007
Exp-run by:	antoine
2018-09-05 22:01:55 +00:00
Larry Rosenman
1711ab2455 security/clamav: update to 0.100.1
PR:	229651
Submitted by:	yasu@utahime.org
MFH:	2018Q3
Security:	CVE-2017-16932
Security:	CVE-2018-0360
Security:	CVE-2018-0361
2018-07-09 19:18:57 +00:00
Dmitry Marakasov
bd93066b42 - Add LICENSE_FILE
- Update WWW

Approved by:	portmgr blanket
2018-06-09 09:34:27 +00:00
Larry Rosenman
c1973ddd01 security/clamav: fix packaging when JSON option is NOT set.
Reported by:	Serg Renkas <rsf@ntc-raduga.ru>
2018-04-13 11:07:06 +00:00
Larry Rosenman
6fe46f315f security/clamav: Unbreak package without unrar.
PR:		227420
Submitted by:	PopularMoment@protonmail.com
2018-04-12 16:01:16 +00:00