Date: Thu, 28 Apr 2011 11:50:49 GMT From: Ruslan Mahmatkhanov <cvs-src@yandex.ru> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/156696: [PATCH] security/gwee: add distfile mirror Message-ID: <201104281150.p3SBonC5014335@red.freebsd.org> Resent-Message-ID: <201104281200.p3SC0IMo019419@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 156696 >Category: ports >Synopsis: [PATCH] security/gwee: add distfile mirror >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Thu Apr 28 12:00:17 UTC 2011 >Closed-Date: >Last-Modified: >Originator: Ruslan Mahmatkhanov >Release: 9.0-CURRENT >Organization: >Environment: 9.0-CURRENT i386 >Description: - add PACKETSTORM mirror - remove MD5 - remove WWW because it's no more available >How-To-Repeat: >Fix: Patch attached with submission follows: diff -ruNa gwee.orig/Makefile gwee/Makefile --- gwee.orig/Makefile 2011-04-28 15:45:38.000000000 +0400 +++ gwee/Makefile 2011-04-28 15:41:29.000000000 +0400 @@ -8,14 +8,12 @@ PORTNAME= gwee PORTVERSION= 1.36 CATEGORIES= security www -MASTER_SITES= http://tigerteam.se/dl/gwee/ +MASTER_SITES= PACKETSTORM +MASTER_SITE_SUBDIR= UNIX/utilities MAINTAINER= ports@FreeBSD.org COMMENT= Tool to exploit command execution vulnerabilities in web scripts -DEPRECATED= Upstream disapear and distfile is no more available -EXPIRATION_DATE= 2011-05-01 - USE_OPENSSL= yes USE_PERL5= yes USE_PYTHON= yes diff -ruNa gwee.orig/distinfo gwee/distinfo --- gwee.orig/distinfo 2005-11-09 19:02:29.000000000 +0300 +++ gwee/distinfo 2011-04-28 15:41:44.000000000 +0400 @@ -1,3 +1,2 @@ -MD5 (gwee-1.36.tar.gz) = 4e0c09fdc6a261e80bdba34aba1f9a29 SHA256 (gwee-1.36.tar.gz) = 5b057dc779cbc8e9e663251dac2448b253002f74a9570a2e50b915bf2bed149b SIZE (gwee-1.36.tar.gz) = 313562 diff -ruNa gwee.orig/pkg-descr gwee/pkg-descr --- gwee.orig/pkg-descr 2005-10-09 22:21:28.000000000 +0400 +++ gwee/pkg-descr 2011-04-28 15:41:53.000000000 +0400 @@ -1,5 +1,3 @@ gwee (Generic Web Exploitation Engine) is a small program written in C designed to exploit input validation vulnerabilities in web scripts, such as Perl CGIs, -PHP, etc. - -WWW: http://tigerteam.se/dl/gwee/ +PHP, etc. >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201104281150.p3SBonC5014335>