ports/143641: [patch] security/metasploit port upgrade to 3.3.3
Niels Heinen
niels at heinen.ws
Sun Feb 7 12:10:01 UTC 2010
>Number: 143641
>Category: ports
>Synopsis: [patch] security/metasploit port upgrade to 3.3.3
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: update
>Submitter-Id: current-users
>Arrival-Date: Sun Feb 07 12:10:00 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator: Niels Heinen
>Release: 8.0-RELEASE
>Organization:
>Environment:
FreeBSD devbsd.lan 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21 15:48:17 UTC 2009 root at almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC i386
>Description:
Hi all,
Attached is an update of the Metasploit port (version 3.2 -> 3.3.3)
Portlint seems to be OK with the changes and the updated port works fine on my machine. Can you please double check the port dependency changes ?
Thanks!
Niels
>How-To-Repeat:
Apply the patch
>Fix:
Apply the patch
Patch attached with submission follows:
diff -ur metasploit.orig/Makefile metasploit/Makefile
--- metasploit.orig/Makefile 2010-02-07 11:11:02.000000000 +0100
+++ metasploit/Makefile 2010-02-07 12:42:31.000000000 +0100
@@ -6,9 +6,9 @@
#
PORTNAME= metasploit
-DISTVERSION= 3.2
+DISTVERSION= 3.3.3
CATEGORIES= security
-MASTER_SITES= http://spool.metasploit.com/releases/
+MASTER_SITES= http://www.metasploit.com/releases/
DISTNAME= framework-${DISTVERSION}
MAINTAINER= onatan at gmail.com
@@ -17,20 +17,16 @@
SCRIPTS= msfcli msfconsole msfd msfselfscan msfencode msfmachscan \
msfopcode msfpayload msfpescan msfweb
+WRKSRC= ${WRKDIR}/msf3
NO_BUILD= yes
USE_RUBY= yes
+USE_BZIP2= yes
.include <bsd.port.pre.mk>
-.if ${RUBY_VER} == 1.9
+RUN_DEPENDS+= ${LOCALBASE}/bin/infocmp:${PORTSDIR}/devel/ncurses
RUN_DEPENDS+= ${LOCALBASE}/bin/gem:${PORTSDIR}/devel/ruby-gems
-.endif
-
-.if defined(WITH_MSFGUI)
-RUN_DEPENDS+= ${RUBY_SITEARCHLIBDIR}/gtk2.so:${PORTSDIR}/x11-toolkits/ruby-gtk2
-RUN_DEPENDS+= ${RUBY_SITEARCHLIBDIR}/libglade2.so:${PORTSDIR}/devel/ruby-libglade2
-SCRIPTS+= msfgui
-.endif
+RUN_DEPENDS+= ${RUBY_SITEARCHLIBDIR}/iconv.so:${PORTSDIR}/converters/ruby-iconv
do-install:
${MKDIR} ${DATADIR}
diff -ur metasploit.orig/distinfo metasploit/distinfo
--- metasploit.orig/distinfo 2010-02-07 11:11:02.000000000 +0100
+++ metasploit/distinfo 2010-02-07 11:28:29.000000000 +0100
@@ -1,3 +1,3 @@
-MD5 (framework-3.2.tar.gz) = d543bda031b36a247912aa9c6a0f74d9
-SHA256 (framework-3.2.tar.gz) = fc9366a2ab01924e91575352889970e57a551e087c78b5d1dd4287aaf2136a04
-SIZE (framework-3.2.tar.gz) = 13099756
+MD5 (framework-3.3.3.tar.bz2) = aee22d8cfa2c081051434ad893cd3533
+SHA256 (framework-3.3.3.tar.bz2) = a650778f7946a7f113acd716023978fd94f01325e9a4cf6342fb00ba3f6a2c0b
+SIZE (framework-3.3.3.tar.bz2) = 23438382
diff -ur metasploit.orig/pkg-descr metasploit/pkg-descr
--- metasploit.orig/pkg-descr 2010-02-07 11:11:02.000000000 +0100
+++ metasploit/pkg-descr 2010-02-07 12:31:20.000000000 +0100
@@ -1,14 +1,10 @@
The Metasploit Project
-This is the Metasploit Project. The goal is to provide useful
-information to people who perform penetration testing, IDS signature
-development, and exploit research. This site was created to fill the
-gaps in the information publicly available on various exploitation
-techniques and to create a useful resource for exploit developers. The
-tools and information on this site are provided for legal penetration
-testing and research purposes only.
-
-This port is an in-development version of the upcoming Metasploit Framework.
-It is based on Ruby instead of perl, and has a different license.
+Metasploit provides useful information and tools for penetration
+testers, security researchers, and IDS signature developers. This
+project was created to provide information on exploit techniques
+and to create a functional knowledgebase for exploit developers and
+security professionals. The Metasploit Framework is provided for
+legal security research and testing purposes only.
WWW: http://www.metasploit.org
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list