Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 Apr 2011 11:50:49 GMT
From:      Ruslan Mahmatkhanov <cvs-src@yandex.ru>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/156696: [PATCH] security/gwee: add distfile mirror
Message-ID:  <201104281150.p3SBonC5014335@red.freebsd.org>
Resent-Message-ID: <201104281200.p3SC0IMo019419@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         156696
>Category:       ports
>Synopsis:       [PATCH] security/gwee: add distfile mirror
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Thu Apr 28 12:00:17 UTC 2011
>Closed-Date:
>Last-Modified:
>Originator:     Ruslan Mahmatkhanov
>Release:        9.0-CURRENT
>Organization:
>Environment:
9.0-CURRENT i386
>Description:
- add PACKETSTORM mirror
- remove MD5
- remove WWW because it's no more available
>How-To-Repeat:

>Fix:


Patch attached with submission follows:

diff -ruNa gwee.orig/Makefile gwee/Makefile
--- gwee.orig/Makefile	2011-04-28 15:45:38.000000000 +0400
+++ gwee/Makefile	2011-04-28 15:41:29.000000000 +0400
@@ -8,14 +8,12 @@
 PORTNAME=	gwee
 PORTVERSION=	1.36
 CATEGORIES=	security www
-MASTER_SITES=	http://tigerteam.se/dl/gwee/
+MASTER_SITES=	PACKETSTORM
+MASTER_SITE_SUBDIR=	UNIX/utilities
 
 MAINTAINER=	ports@FreeBSD.org
 COMMENT=	Tool to exploit command execution vulnerabilities in web scripts
 
-DEPRECATED=     Upstream disapear and distfile is no more available
-EXPIRATION_DATE=        2011-05-01
-
 USE_OPENSSL=	yes
 USE_PERL5=	yes
 USE_PYTHON=	yes
diff -ruNa gwee.orig/distinfo gwee/distinfo
--- gwee.orig/distinfo	2005-11-09 19:02:29.000000000 +0300
+++ gwee/distinfo	2011-04-28 15:41:44.000000000 +0400
@@ -1,3 +1,2 @@
-MD5 (gwee-1.36.tar.gz) = 4e0c09fdc6a261e80bdba34aba1f9a29
 SHA256 (gwee-1.36.tar.gz) = 5b057dc779cbc8e9e663251dac2448b253002f74a9570a2e50b915bf2bed149b
 SIZE (gwee-1.36.tar.gz) = 313562
diff -ruNa gwee.orig/pkg-descr gwee/pkg-descr
--- gwee.orig/pkg-descr	2005-10-09 22:21:28.000000000 +0400
+++ gwee/pkg-descr	2011-04-28 15:41:53.000000000 +0400
@@ -1,5 +1,3 @@
 gwee (Generic Web Exploitation Engine) is a small program written in C designed
 to exploit input validation vulnerabilities in web scripts, such as Perl CGIs,
-PHP, etc. 
-
-WWW: http://tigerteam.se/dl/gwee/
+PHP, etc.


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201104281150.p3SBonC5014335>