ports/156696: [PATCH] security/gwee: add distfile mirror

Ruslan Mahmatkhanov cvs-src at yandex.ru
Thu Apr 28 12:00:18 UTC 2011


>Number:         156696
>Category:       ports
>Synopsis:       [PATCH] security/gwee: add distfile mirror
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Thu Apr 28 12:00:17 UTC 2011
>Closed-Date:
>Last-Modified:
>Originator:     Ruslan Mahmatkhanov
>Release:        9.0-CURRENT
>Organization:
>Environment:
9.0-CURRENT i386
>Description:
- add PACKETSTORM mirror
- remove MD5
- remove WWW because it's no more available
>How-To-Repeat:

>Fix:


Patch attached with submission follows:

diff -ruNa gwee.orig/Makefile gwee/Makefile
--- gwee.orig/Makefile	2011-04-28 15:45:38.000000000 +0400
+++ gwee/Makefile	2011-04-28 15:41:29.000000000 +0400
@@ -8,14 +8,12 @@
 PORTNAME=	gwee
 PORTVERSION=	1.36
 CATEGORIES=	security www
-MASTER_SITES=	http://tigerteam.se/dl/gwee/
+MASTER_SITES=	PACKETSTORM
+MASTER_SITE_SUBDIR=	UNIX/utilities
 
 MAINTAINER=	ports at FreeBSD.org
 COMMENT=	Tool to exploit command execution vulnerabilities in web scripts
 
-DEPRECATED=     Upstream disapear and distfile is no more available
-EXPIRATION_DATE=        2011-05-01
-
 USE_OPENSSL=	yes
 USE_PERL5=	yes
 USE_PYTHON=	yes
diff -ruNa gwee.orig/distinfo gwee/distinfo
--- gwee.orig/distinfo	2005-11-09 19:02:29.000000000 +0300
+++ gwee/distinfo	2011-04-28 15:41:44.000000000 +0400
@@ -1,3 +1,2 @@
-MD5 (gwee-1.36.tar.gz) = 4e0c09fdc6a261e80bdba34aba1f9a29
 SHA256 (gwee-1.36.tar.gz) = 5b057dc779cbc8e9e663251dac2448b253002f74a9570a2e50b915bf2bed149b
 SIZE (gwee-1.36.tar.gz) = 313562
diff -ruNa gwee.orig/pkg-descr gwee/pkg-descr
--- gwee.orig/pkg-descr	2005-10-09 22:21:28.000000000 +0400
+++ gwee/pkg-descr	2011-04-28 15:41:53.000000000 +0400
@@ -1,5 +1,3 @@
 gwee (Generic Web Exploitation Engine) is a small program written in C designed
 to exploit input validation vulnerabilities in web scripts, such as Perl CGIs,
-PHP, etc. 
-
-WWW: http://tigerteam.se/dl/gwee/
+PHP, etc.


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list