aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* - Update to 2.0.1.araujo2008-06-283-395/+198
| | | | | | | | - User RF macro. PR: ports/125028 Submitted by: Philip M. Gollucci <pgollucci@p6m7g8.com> Approved by: Roderick van Domburg <r.s.a.vandomburg@nedforce.nl> (maintainer)
* - Update to 2.0.2.araujo2008-06-283-864/+272
| | | | | | | | - User RF macro. PR: ports/125016 Submitted by: Philip M. Gollucci <pgollucci@p6m7g8.com> Approved by: Roderick van Domburg <r.s.a.vandomburg@nedforce.nl> (maintainer)
* - Remove unneeded dependency on GCC 3.4 [1]gahr2008-06-261-2/+5
| | | | | | | | | - Remove NOT_FOR_ARCH for sparc64 [1] - Fix small typo in man page PR: 124518 [1] Submitted by: yours truly Approved by: maintainer timeout
* - Update to 1.18.2jadawin2008-06-262-6/+5
| | | | | | - While I'm here use SF macro Approved by: mentor (implicit)
* s/pear-Auth_OpenID2/php-Auth_OpenID2/ to go with what was actuallylinimon2008-06-261-1/+1
| | | | | | repocopied. Reported by: portsmon
* - Update to 1.9.5jadawin2008-06-263-15/+4
| | | | | | PR: ports/124986 Submitted by: Ganael Laplanche <ganael.laplanche martymac.com> (maintainer) Approved by: mentor (implicit)
* - enable cryptodevdinoex2008-06-262-1/+13
| | | | | | | 124972 PR: 124972 Submitted by: Larry Baird Obtained from: Simon L. Nielsen
* - Use new freepascal stuffacm2008-06-242-4/+4
| | | | - Bump PORTREVISION
* - Document apache -- multiple vulnerabilitiestabthorpe2008-06-241-0/+34
| | | | Reviewed by: delphij
* Add dependency on phpX-domedwin2008-06-241-1/+1
| | | | | PR: ports/124734 Submitted by: Edwin Groothuis <edwin@mavetju.org>
* [repocopy] security/php-Auth_OpenID -> security/php-Auth_OpenID2edwin2008-06-244-20/+32
| | | | | | | Now supporting OpenID protocol version 2 PR: ports/124737 Submitted by: Edwin Groothuis <edwin@mavetju.org>
* - Chase rrdtool 1.3.0 update, bump PORTREVISIONrafan2008-06-241-1/+1
| | | | | PR: ports/124749 Submitted by: Zhen REN <bg1tpt at gmail.com> (maintainer of rrdtool)
* Update to 0.13skv2008-06-242-4/+4
| | | | Changes: http://search.cpan.org/src/APOCAL/POE-Component-SSLify-0.13/Changes
* Remove security/gnutls-devel for a time while the experimental branchnovel2008-06-246-691/+0
| | | | is not active.
* Update to 2.4.0.novel2008-06-246-8/+107
| | | | | | Unlike previous major version bumps, this time ABI hasn't changed, so the shared libraries' versions stayed the same. Therefore, this update doesn't requite any special handling.
* - use DOCSDIRitetcu2008-06-232-4/+5
| | | | | | | - fix plist for -DNOPORTDOCS - bump PORTREVISION Submitted by: QA Tindy run
* - use DOCSDIRitetcu2008-06-232-43/+44
| | | | | | | - fix plist for -DNOPORTDOCS - bump PORTREVISION Submitted by: QA Tindy run
* - Update to 2.8.2.1clsung2008-06-233-5/+5
| | | | | | | | | | | - 2008-06-12 - Snort 2.8.2.1 [*] Improvements * Fix support for pass rules that sometimes did not take precedence over alert and/or drop rules. PR: ports/124717 Submitted by: Michael Scheidell <scheidell_AT_secnap dot net>
* - Add missing <code></code> block around safe_mode.stas2008-06-231-2/+2
| | | | Pointy hat to: me
* - Mark BROKEN after recent kerberos updatepav2008-06-231-0/+4
|
* - Add a note to php-posix entry, thatstas2008-06-231-3/+8
| | | | | | | | | safe_mode is considred to be insecure by FreeBSD Security Team. - Add <code> blocks around function names. Suggested by: simon
* - Document php5-posix directory traversal vulnerability.stas2008-06-221-0/+30
|
* - Update to 1.1.0johans2008-06-2110-135/+27
| | | | | - New master site; new documentation url - Remove obsolete patches
* Fix the Firefox 3 part, it has no multiple vulnerabilities.mezz2008-06-211-2/+2
| | | | Reviewed by: remko
* - Document vim -- Vim Shell Command Injection Vulnerabilitiestabthorpe2008-06-211-0/+33
| | | | Reviewed by: remko, miwi
* - Fix start scriptmiwi2008-06-212-2/+2
| | | | | | PR: 124122 Submitted by: shuyaan@gmail.com Approved by: maintainer
* - Document recent ruby vulnerabilities.stas2008-06-211-0/+34
|
* - Update to 0.2.1.1-alpha.lippe2008-06-213-5/+17
| | | | | | | | | - Add several new MASTER_SITES. PR: ports/124650 Submitted by: Peter Thoenen <peter.thoenen@yahoo.com> Reworked by: bf <bf2006a@yahoo.com> Approved by: gabor (mentor, implicit), Peter Thoenen <peter.thoenen@yahoo.com> (maintainer)
* - Update to 2.1.2miwi2008-06-213-7/+6
| | | | | | - Take over maintainership Approved by: maintainer implicit
* - Update to 2.1.0miwi2008-06-204-10/+12
| | | | | PR: 124768 Submitted by: mgrooms@shrew.net (maintainer)
* - Clean up whitespace a bitmiwi2008-06-201-32/+32
| | | | | | - Wrap long lines where appropriate Reviewed by: remko
* Document potiential crash in fetchmail < 6.3.8_6 (in -v -v verbose mode).barner2008-06-201-0/+34
|
* - Fix caca module in runtimepav2008-06-201-0/+3
|
* Update my email address in 132 ports.amdmi32008-06-201-1/+1
| | | | Approved by: miwi (mentor)
* Standardize placement and style of WWW: lines, and in some casesdougb2008-06-191-1/+1
| | | | | | remove ^M from line endings. List of files with "issues" supplied by: Alex Kozlov <spam@rm-rf.kiev.ua>
* Update to 1.4.novel2008-06-193-17/+4
|
* - Update to 0.6.6novel2008-06-193-10/+7
| | | | - Drop obsolete mastersites
* - Delete expired security/amavisd port: depends on misc/compat3x, which haspav2008-06-1911-364/+0
| | | | security problems; old version
* - Expired: No longer supported. Use p5-openxpki-client-html-mason insteadpav2008-06-195-67/+0
|
* - Unmark BROKEN: no longer segfaults during build on amd64pav2008-06-191-7/+1
|
* [PATCH] security/pwauth: make MIN_UNIX_UID configurableedwin2008-06-182-2/+4
| | | | | | PR: ports/122724 Submitted by: Scott Mitchell <rsm@freebsd.org> Approved by: maintainer timeout
* Delete security/cyrus-sasl, it has been expired for a year and a half.pav2008-06-1825-1563/+0
|
* - Fix checking of database viruses at startup script that i broke on lastgarga2008-06-174-4/+4
| | | | | | | | commit - Bump PORTREVISION again Submitted by: George L. Yermulnik <yz@iptcom.net> Pointyhat to: me
* - Fix clamd startup script to support cld containers for virus databasesgarga2008-06-174-5/+7
| | | | | | - Bump PORTREVISION Reported by: Robert Huff <roberthuff@rcn.com>
* Drop maintainershiperwin2008-06-161-1/+1
| | | | Submitted by: maintainer
* Unbreak VuXML.org build: Use correct syntax for CVE name in latestsimon2008-06-161-1/+2
| | | | moinmoin entry.
* - Update to 2.1-rc8jadawin2008-06-162-6/+7
| | | | | | PR: ports/124574 Submitted by: Matthias Andree <matthias.andree gmx.de> (maintainer) Approved by: mentor (implicit)
* Document xorg -- multiple vulnerabilities.flz2008-06-151-0/+44
|
* - Update to 0.12lwhsu2008-06-152-5/+6
| | | | | | PR: ports/124568 Submitted by: lwhsu Approved by: Peter Johnson <johnson.peter AT gmail.com> (maintainer)
* Add WITHOUT_OPENCDK and WITHOUT_LIBTASN1 knobs to respect if thenovel2008-06-151-2/+6
| | | | | | | | user wishes to build gnutls with the included versions instead of the ones from ports. PR: 121357 Submitted by: Naram Qashat <cyberbotx@cyberbotx.com>
* - Update to 5.47gabor2008-06-152-4/+4
|
* - Update to 0.05gabor2008-06-152-4/+4
|
* Update to 2.3.14.novel2008-06-154-5/+9
|
* - Document moinmoin -- superuser privilege escalationtabthorpe2008-06-141-0/+27
| | | | Notified by: Janos Mohacsi
* Temporary fix "building" by setting IS_INTERACTIVEedwin2008-06-131-0/+2
|
* - Update to 2.2.0clsung2008-06-132-4/+4
| | | | | PR: ports/124539 [1], ports/124545 [2] Submitted by: wxs [1], Wen heping <wenheping_AT_gmail dot com> [2]
* update to 0.60.6oliver2008-06-132-4/+4
|
* add an error about courier-authlib < 0.60.6oliver2008-06-131-0/+33
|
* New port: security/fwknop fwknop,"FireWall KNock OPerator", implementsedwin2008-06-1321-0/+570
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Single Packet Authorization (SPA). fwknop stands for the "FireWall KNock OPerator", and implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is based around a default-drop packet filter (fwknop supports both iptables on Linux systems and ipfw on FreeBSD and Mac OS X systems) and libpcap. SPA requires only a single encrypted packet in order to communicate various pieces of information including desired access through an iptables policy and/or complete commands to execute on the target system. By using iptables to maintain a "default drop" stance, the main application of this program is to protect services such as OpenSSH with an additional layer of security in order to make the exploitation of vulnerabilities (both 0-day and unpatched code) much more difficult. With fwknop deployed, anyone using nmap to look for sshd can't even tell that it is listening; it makes no difference if they have a 0-day exploit or not. The authorization server passively monitors authorization packets via libcap and hence there is no "server" to which to connect in the traditional sense. Access to a protected service is only granted after a valid encrypted and non-replayed packet is monitored from an fwknop client (see the following network diagram; the SSH session can only take place after the SPA packet is monitored): PR: ports/118229 Submitted by: Sean Greven <sean.greven@gmail.com>
* Fix plist, fix bash-specific idioms in openvas-nvt-sync.lx2008-06-133-7/+61
| | | | | PR: ports/124499: Submitted by: Tomoyuki Sakurai <cherry@trombik.org>
* update to 0.60.4oliver2008-06-135-214/+1085
| | | | | | | the vpopmail support was removed with 0.60.3 (because none felt responsible for maintaining it in courier-authlib) - this commit adds - togehter with this update - a patch which patches the vpopmail support back into 0.60.4 (because at least I need the interaction with vpopmail!).
* Update to 1.66mat2008-06-122-4/+4
|
* - Forgot to remove one conditional about PTHREAD_LIB on last commitgarga2008-06-102-16/+8
|
* - Remove < 6.1 conditional since it's no longer supportedgarga2008-06-102-12/+2
|
* - Remove IGNORE for 5.x since it's no longer supportedgarga2008-06-101-4/+0
|
* - Update to 0.4.1mnag2008-06-102-7/+4
| | | | | PR: 123725 Submitted by: Wen heping <wenheping___gmail.com>
* - Update to 0.93.1garga2008-06-102-5/+4
|
* - typo in files/pkg-message.inclsung2008-06-092-1/+2
| | | | | | - bump PORTREVISION Submitted by: kevlo
* - Update to 2.8.2clsung2008-06-092-5/+4
|
* - Snort now includes an updated version of FLEXRESP2 in the main snort ↵clsung2008-06-091-4/+1
| | | | | | | | | source code and no longer needs to be patched. - bump PORTREVISION PR: ports/124048 Submitted by: "Scot W. Hetzel" <swhetzel_AT_gmail dot com>
* Perform some much-needed work on aescrypt that somehow lingered forroam2008-06-093-6/+19
| | | | | | | | | | | | seven years... - make aesget actually work with the default keysize (initialize it!) - do not overflow the key filename buffers while parsing command-line options - break out common code into a single file - make the read()/write() loops a bit more robust - fix lots of compiler warnings - use snprintf() instead of strcpy()/strcat() - write mdoc manual pages for aescrypt(1) and aesget(1) - install the binaries and the manual pages with the correct permission mode
* Besides updating to v0.6.4 this patch fixes the heading include orderingitetcu2008-06-093-8/+19
| | | | | | | as pointed out by Mike Watters. PR: ports/123584 Submitted by: Mark Foster (maintainer)
* Fix 2747fc39-915b-11dc-9239-001c2514716c. zh-xpdf, ja-xpdf, andhrs2008-06-091-3/+0
| | | | | | ko-xpdf have nothing to do with "multiple remote Stream.CC vulnerabilities" because they are packages which just install additional data files.
* - Fix build on 7.x (objformat removal)pav2008-06-0813-36/+314
| | | | | | | | - Move Makefile.common from server to libraries port - Minor fixes PR: ports/124331 ports/124335-7 ports/124371 Submitted by: Tomoyuki Sakurai <cherry@trombik.org> (maintainer)
* - readd 0.9.7mdinoex2008-06-081-0/+3
|
* Bump portrevision due to upgrade of devel/gettext.edwin2008-06-06133-62/+133
| | | | | | | | | | The affected ports are the ones with gettext as a run-dependency according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT in Makefile (29 of them). PR: ports/124340 Submitted by: edwin@ Approved by: portmgr (pav)
* SpyBye is a tool to help web masters determine if their web pagesjadawin2008-06-066-0/+93
| | | | | | | | | | | | | | | | | | | are hosting browser exploits that can infect visiting users with malware. It functions as an HTTP proxy server and intercepts all browser requests. SpyBye uses a few simple rules to determine if embedded links on your web page are harmlesss, unknown or maybe even dangerous. SpyBye analyzes all downloads in the background and provides you with a warning notification whenever it encounters content that is potentially malicious. At that point, you can click on the link in the notification and receive a more detailed analysis of the web page. WWW: http://www.spybye.org/ PR: ports/123945 Submitted by: Paul Schmel <pauls utdallas.edu> Approved by: tabthorpe (mentor)
* Remove leftover binary package.ale2008-06-051-0/+0
| | | | Pointyhat to: edwin
* [NEW PORT] security/openvas-server: A security scanner: a fork of Nessusedwin2008-06-0410-0/+145
| | | | | | | | | | | | | OpenVAS stands for Open Vulnerability Assessment System and is a network security scanner with associated tools like a graphical user fontend. The core is a server component with a set of network vulnerability tests (NVTs) to detect security problems in remote systems and applications. WWW: http://www.openvas.org/ PR: ports/123128 Submitted by: Tomoyuki Sakurai <cherry@trombik.org>
* [NEW PORT] security/openvas-plugins: Plugins for OpenVASedwin2008-06-046-0/+3586
| | | | | | | | | | | | | OpenVAS stands for Open Vulnerability Assessment System and is a network security scanner with associated tools like a graphical user fontend. The core is a server component with a set of network vulnerability tests (NVTs) to detect security problems in remote systems and applications. WWW: http://www.openvas.org/ PR: ports/123130 Submitted by: Tomoyuki Sakurai <cherry@trombik.org>
* [NEW PORT] security/openvas-libraries: Libraries for OpenVASedwin2008-06-0414-0/+201
| | | | | | | | | | | | | OpenVAS stands for Open Vulnerability Assessment System and is a network security scanner with associated tools like a graphical user fontend. The core is a server component with a set of network vulnerability tests (NVTs) to detect security problems in remote systems and applications. WWW: http://www.openvas.org/ PR: ports/123127 Submitted by: Tomoyuki Sakurai <cherry@trombik.org>
* [NEW PORT] security/openvas-libnasl: NASL libraries for OpenVASedwin2008-06-046-0/+63
| | | | | | | | | | | | | OpenVAS stands for Open Vulnerability Assessment System and is a network security scanner with associated tools like a graphical user fontend. The core is a server component with a set of network vulnerability tests (NVTs) to detect security problems in remote systems and applications. WWW: http://www.openvas.org/ PR: ports/123129 Submitted by: Tomoyuki Sakurai <cherry@trombik.org>
* [NEW PORT] security/openvas-client: A GUI client for OpenVASedwin2008-06-048-0/+70
| | | | | | | | | | | | | OpenVAS stands for Open Vulnerability Assessment System and is a network security scanner with associated tools like a graphical user fontend. The core is a server component with a set of network vulnerability tests (NVTs) to detect security problems in remote systems and applications. WWW: http://www.openvas.org/ PR: ports/123131 Submitted by: Tomoyuki Sakurai <cherry@trombik.org>
* Fix kdeutils for amd64-current (and perhaps other 64-bitdeischen2008-06-042-0/+184
| | | | | | | | | | | | | | | -current archs). This has been broken for over 3 months. configure incorrectly assumes that since FreeBSD has sqrtl, that it also has other long math functions. Also, configure seems to have 2 separate checks for the long math functions: the first check looks for both asinl and sqrtl, the second check looks for just sqrtl. FreeBSD does not currently have asinl, so if configure just went by the first check it would correctly determine that we do not have all the long math functions. Remove the second check to fix the problem. No response from: kde@
* Update to stunnel-4.25.roam2008-06-032-4/+4
|
* SquidClamAV is an interface to perform antivirus checks on data passing ↵lippe2008-06-036-0/+84
| | | | | | | | | | through Squid Proxy. WWW: http://www.samse.fr/GPL/squidclamav/ PR: ports/119236 Submitted by: Laurent LEVIER <llevier@argosnet.com> Approved by: araujo (mentor)
* Reset kay_lehmann@web.de by request due to lack to time to maintain ports. Welinimon2008-06-031-1/+1
| | | | appreciate all the help in the past.
* Update to 0.3.1skv2008-06-025-82/+106
| | | | | | PR: ports/123649 Submitted by: Greg Larkin <glarkin xx sourcehosting.net> Changes: http://www.keepassx.org/change_log
* Add entry for www/ikiwiki.brix2008-06-021-0/+28
| | | | Approved by: erwin (mentor, implicit)
* This is the base class for a system of objects that encapsulatebrix2008-06-025-0/+97
| | | | | | | | | | | | | | | | | passphrases. An object of this type is a passphrase recogniser: its job is to recognise whether an offered passphrase is the right one. For security, such passphrase recognisers usually do not themselves know the passphrase they are looking for; they can merely recognise it when they see it. There are many schemes in use to achieve this effect, and the intent of this class is to provide a consistent interface to them all, hiding the details. The CPAN package Authen::Passphrase contains implementations of several specific passphrase schemes in addition to the base class. WWW: http://search.cpan.org/dist/Authen-Passphrase/ Approved by: erwin (mentor)
* Perl XS interface for a portable traditional crypt function.brix2008-06-025-0/+35
| | | | | | WWW: http://search.cpan.org/dist/Crypt/UnixCrypt_XS/ Approved by: erwin (mentor)
* Eksblowfish is a variant of the Blowfish cipher, modified to make thebrix2008-06-025-0/+60
| | | | | | | | | | | | | | | | | | | | | | key setup very expensive. ("Eks" stands for "expensive key schedule".) This doesn't make it significantly cryptographically stronger, but is intended to hinder brute-force attacks. It also makes it unsuitable for any application requiring key agility. It was designed by Niels Provos and David Mazieres for password hashing in OpenBSD. Eksblowfish is a parameterised (family-keyed) cipher. It takes a cost parameter that controls how expensive the key scheduling is. It also takes a family key, known as the "salt". Cost and salt parameters together define a cipher family. Within each family, a key determines an encryption function in the usual way. This distribution also includes an implementation of "bcrypt", the Unix crypt() password hashing algorithm based on Eksblowfish. WWW: http://search.cpan.org/dist/Crypt-Eksblowfish/ Approved by: erwin (mentor)
* This perl module implements the LGI$HPWD password hashing functionbrix2008-06-025-0/+36
| | | | | | | | | from VMS, and some associated VMS username and password handling functions. WWW: http://search.cpan.org/dist/Authen-DecHpwd/ Approved by: erwin (mentor)
* - From PRrafan2008-06-012-8/+8
| | | | | | | | | | | | | | | If a user opts out of the first part of the pkg-install script, but elects to interact with the second part of the script and decides to create new certs, the creation of the certs will fail silently if the certs directory does not exist. This is because the certs directory is created (if necessary) in the pre-install portion of the pkg-install script, but the certs are created in the post-install part of the script. This PR corrects this problem by moving the creation of the certs directory to the same subroutine that the certs are created in. PR: ports/123883 Submitted by: Paul Schmehl <pauls at utdallas.edu> (maintainer)
* - Update to 1.0miwi2008-06-013-34/+45
| | | | | | | | - Add missing dependency PR: 120705 Submitted by: lippe Approved by: maintainer timeout
* - Update to 1.20miwi2008-06-012-5/+8
| | | | | | PR: 120697 Submitted by: lippe Approved by: maintainer timeout
* - Update to 0.10 [1]miwi2008-06-013-19/+20
| | | | | | | | - Respec NOPORTEXAMPLES PR: 120696 [1] Submitted by: lippe Approved by: maintainer timeout
* Avoid confusion about backported www/ikiwiki security fix by notbrix2008-05-311-2/+3
| | | | | | mentioning version 2.48 in the entry. Approved by: erwin (mentor, implicit)
* Add www/ikiwiki entry.brix2008-05-311-0/+28
| | | | Approved by: erwin (mentor, implicit)
* - Update to 1.7.3miwi2008-05-312-4/+4
| | | | | PR: 123438 Submitted by: "Josh Paetzel" <josh@tcbug.org>
* 2008-05-15 net-p2p/dclibc: Abandoned, not used, website disappearedmiwi2008-05-314-32/+0
| | | | | | | 2008-04-07 net-mgmt/ap-utils: Does not work with gcc4.2; appears to be abandoned 2008-03-31 multimedia/xfce4-xmms-controller-plugin: Project is dead 2008-05-15 www/pear-HTTP_Session: Use www/pear-HTTP_Session2 instead 2008-05-04 security/bioapitool: All functionallity of this tools has been merged with pam_bsdbioapi
* - Update to 2.2.2miwi2008-05-303-19/+27
| | | | | PR: 123949 Submitted by: Ganael Laplanche <ganael.laplanche@martymac.com> (maintainer)
* - Fix range on previous committabthorpe2008-05-301-1/+1
| | | | Noticed by: miwi
* - Document linux-flashplugin -- unspecified remote code executiontabthorpe2008-05-301-0/+34
| | | | vulnerability
* - Security update to 0.9.8hdinoex2008-05-303-13/+10
| | | | | | | | Security: http://openssl.org/news/secadv_20080528.txt Security: http://secunia.com/advisories/30405/ Security: http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html Security: CVE-2008-0891 Security: CVE-2008-1672
* Document XSS vulnerabilities in nagios and nagios-devel.wxs2008-05-291-0/+33
| | | | | | | PR: ports/123893 ports/123894 Submitted by: Jarrod Sayers <jarrod@netleader.com.au> (maintainer) Reviewed by: miwi Approved by: garga (mentor, implicit)
* Document spamdyke open relay vulnerability.wxs2008-05-281-0/+39
| | | | | | PR: ports/124013 Reviewed by: miwi Approved by: garga (mentor), miwi
* - Add common code to support for cmake based ports.miwi2008-05-281-7/+1
| | | | | | | - Update devel/cmake to 2.6.0 (also fix ports/123092) - Use the new CMAKE build framework in all ports using cmake Approved by: portmgr (pav)
* NOPORTDOCS (r1.39) is not supported by the base release of libfwbuilder.cy2008-05-273-3/+15
| | | | Mark port BROKEN when NOPORTDOCS is specified.
* Update to 2.22.2.mezz2008-05-274-58/+4
|
* Update to 2.22.2.mezz2008-05-272-4/+4
|
* NOPORTDOCS (r1.41) is not supported by the base release of fwbuilder.cy2008-05-273-3/+15
| | | | Mark the port BROKEN when NOPORTODOCS is specified.
* - Update to 5.46gabor2008-05-272-4/+4
|
* - Update to 0.03gabor2008-05-272-4/+4
|
* - Reassign to perl@tabthorpe2008-05-261-1/+1
|
* - Update to 0.7lwhsu2008-05-266-215/+68
| | | | | | | | - Add more RUN_DEPENDS and corresponding KNOBs - New MASTER_SITES PR: ports/123996 Submitted by: cherry AT trombik.org (maintainer)
* security/barnyard, upgrade the startup scriptedwin2008-05-263-11/+34
| | | | | | | | | Improve the startup script to bring it in line with the correct way of doing rc.subr scripts, bump PORTREVISION in the Makefile and a minor change to pkg-message. PR: ports/123938 Submitted by: Paul Schmehl <pauls@utdallas.edu>
* - Use the preferred way of setting default rc parametersrafan2008-05-243-21/+56
| | | | | | | | - Move startup options to rc script - Bump PORTREVISION PR: ports/123916 (based on) Submitted by: Paul Schmehl <pauls at utdallas.edu> (maintainer)
* Convert missing WANT_KRB5_DOC pieces.cy2008-05-244-20/+20
| | | | Add HTML documentation OPTION knob.
* Update 2.1.17 --> 2.1.19cy2008-05-2418-24/+42
|
* - Update to 1.1.1tabthorpe2008-05-238-36/+22
| | | | | | | - Reassign to ports@ PR: ports/123900 Submitted by: Tony Maher <tonymaher optusnet.com.au>
* Update to 1.4mat2008-05-232-4/+4
|
* Update to 1.0.2johans2008-05-222-4/+4
|
* sqlmap is an automatic SQL injection tool entirely developed in Python. It israfan2008-05-226-0/+120
| | | | | | | | | | | | | capable to perform an extensive database management system back-end fingerprint, retrieve remote DBMS databases, usernames, tables, columns, enumerate entire DBMS, read system files and much more taking advantage of web application programming security flaws that lead to SQL injection vulnerabilities. WWW: http://sqlmap.sourceforge.net/ PR: ports/123851 Submitted by: Tomoyuki Sakurai <cherry at trombik.org>
* - Update to 0.2.0.26-rcmiwi2008-05-222-4/+4
| | | | | | PR: 123664 Submitted by: bf <bf2006a@yahoo.com> Approved by: maintainer
* - Fixed some errors introduced during the upgrade from version 0.6.1 to 0.7.0.araujo2008-05-214-14/+508
| | | | | | | | | - Bump PORTREVISION. PR: ports/123613 Reported by: pointyhat via pav Submitted by: Pauls Schmehl <pauls@utdallas.edu> (maintainer) Reviewed by: araujo (myself)
* - Add net-p2p/peercast entry.jadawin2008-05-211-0/+27
| | | | | Reviewed by: miwi Approved by: mentor (implicit)
* Oops, forgot to commit the fixkevlo2008-05-211-12/+19
|
* - Fix build on -HEADkevlo2008-05-211-1/+1
| | | | | | - Bump PORTREVISIO Approved by: maintainer timeout
* - Fixed some errors introduced during the upgrade from version 0.6.1 to 0.7.0.araujo2008-05-217-35/+171
| | | | | | | - Bump PORTREVISION. Reported by: pointyhat via erwin, pav Submitted by: Paul Schmehl <pauls@utdallas.edu> (maintainer)
* - Fix default clamd socket name: clamd -> clamd.sockgarga2008-05-213-14/+24
| | | | | | | | - Some cosmetic changes (indentation) - sort pkg-plist - Add option on clamav-milter startup script to change socket permissions (tested on clamav-devel) - Bump PORTREVISION
* - Update to 20080520garga2008-05-214-18/+23
| | | | | - Change OPTION UNRAR on by default to align with clamav port - USE_GMAKE to build fine new version
* Update to 2.2.5.novel2008-05-202-4/+4
| | | | | PR: 123828 Submitted by: Yoshisato YANAGISAWA <osho@pcc-software.org>
* Update to stunnel-4.24.roam2008-05-192-5/+4
|
* - Include some ports in perl5 category.araujo2008-05-194-4/+4
| | | | | | | PR: ports/123530 Submitted by: Philip M. Gollucci <pgollucci@p6m7g8.com> Reworked by: araujo (myself) Approved by: flz (portmgr)
* - Update libprelude dependencyclsung2008-05-191-1/+1
| | | | | PR: ports/123659 Submitted by: Robin Gruyters <r dot gruyters_AT_yirdis dot nl>
* Update to 3.0.nobutaka2008-05-182-7/+6
|
* - Removed a wrong patch forgotten in last commit.araujo2008-05-182-23/+1
| | | | | | - Bump PORTREVISION. Reported by: pointyhat via erwin
* Document libvorbis security issues.naddy2008-05-181-0/+33
|
* - Fix build on FreeBSD5 by supplying non-existing Linux error code.barner2008-05-182-0/+35
| | | | Requested by: pointhat via pav
* - add Performance Profiling optionclsung2008-05-171-1/+7
| | | | | | | - bump PORTREVISION PR: by mail Submitted by: Scott MacGregor <shadowbq_AT_gmail dot com>
* Implement OPTIONS menu.cy2008-05-158-68/+280
| | | | | | | | | | | | | Implement options that will allow the user to: - rename ftp and ftpd to kftp and kftpd - rename telnet and telnetd to ktelnet and ktelnetd - rename rlogin to krlogin - rename rsh to krsh - rename rcp to krcp This avoids shadowing by or being shadowed by, depending on one's PATH, system utilities of the same name.
* - Add CONFLICTS for sysutils/lbl-cf sysutils/lbl-hftabthorpe2008-05-151-0/+2
| | | | | | PR: ports/123681 Submitted by: tabthorpe Approved by: Paul Schmehl <pauls utdallas.edu> (maintainer)
* Take maintainership for the moment, until I can get someone from the vendor toitetcu2008-05-151-1/+1
| | | | care for this port.
* Drop maintainer, thank you for your work.wxs2008-05-151-1/+1
| | | | | | PR: ports/123658 Submitted by: Adi Pircalabu <adi.pircalabu@symstream.com> (old maintainer) Approved by: garga (mentor, implicit)
* Update dependency on libprelude.lx2008-05-151-1/+1
| | | | | PR: 123660 Submitted by: Robin Gruyters <r.gruyters@yirdis.nl>
* Document django XSS vulnerability.delphij2008-05-141-0/+42
|
* Update to 0.2.26krion2008-05-143-5/+5
|
* - Fix dependency and fix INDEXgabor2008-05-141-1/+1
| | | | | Broken by: gabor Reported by: erwin
* - Update to 0.9.12.1miwi2008-05-133-19/+18
| | | | | PR: 123208 Submitted by: Robin Gruyters <r.gruyters@yirdis.nl> (maintainer)
* - Update to 0.9.17.2miwi2008-05-134-49/+36
| | | | | PR: 123486 Submitted by: Robin Gruyters <r.gruyters@yirdis.nl> (maintainer)
* - Update to 0.9.12.2miwi2008-05-134-14/+15
| | | | | PR: 123207 Submitted by: Robin Gruyters <r.gruyters@yirdis.nl> (maintainer)
* - Chase security/libprelude shlib version bumpmiwi2008-05-131-1/+2
|
* - Update to 2.6.0 [1]gabor2008-05-133-15/+30
| | | | | | | - Add Ms Word support via textproc/ripole PR: ports/123227 [1] Submitted by: Michael Scheidell <scheidell@secnap.net> [1]
* Fix USE_XORG in preparation of ports/122340. Since USE_IMAKE is bringing inflz2008-05-131-1/+1
| | | | | | all xorg-libraries, there's no need to bump PORTREVISION for now. Approved by: portmgr (self)
* Document vorbis-tools Speex header processing vulnerability.naddy2008-05-121-0/+34
|
* Update to 0.9.24 release.ale2008-05-112-4/+4
|
* Upgrade from 0.42 to 0.43itetcu2008-05-105-110/+29
| | | | | PR: 123560 Submitted by: miantainer
* - Always refer to perl by ${PERL}rafan2008-05-101-1/+4
| | | | - Bump PORTREVISION
* - fix configure when WITH_POSTGRES=yesitetcu2008-05-102-9/+21
| | | | | | | - bump PORTREVISION PR: 123380 Submitted by: maintainer
* - fix plist when NOPORTDOCS is defineditetcu2008-05-102-7/+6
| | | | | | | - use SF macro - bump PORTREVISION Submitted by: maintainer (partially)
* Document qemu -- "drive_init()" Disk Format Security Bypassnox2008-05-091-0/+36
|
* Update to 0.05.tobez2008-05-082-4/+4
| | | | Changes: http://search.cpan.org/dist/Crypt-PassGen/ChangeLog
* - Sort previous commitmiwi2008-05-081-7/+7
|
* Add graphics/swfdec entry.brix2008-05-081-0/+33
| | | | Approved by: erwin (mentor)
* - Update to 4.62miwi2008-05-064-12/+22
| | | | | PR: 123401 Submitted by: Daniel Roethlisberger <daniel@roe.ch> (maintainer)
* - Update to 4.62miwi2008-05-062-4/+4
| | | | | PR: 123402 Submitted by: Daniel Roethlisberger <daniel@roe.ch> (maintainer)
* Pwman3 is a console based password management application.rafan2008-05-065-0/+102
| | | | | | | | | | Pwman3 is written in python. It uses sql for storage and all data is encrypted when it isn't being viewed on screen. WWW: http://pwman.bleurgh.com PR: ports/123074 Submitted by: Yarodin <yarodin at gmail.com>
* Update to 5.47mat2008-05-052-4/+4
|
* - Update to 0.51rafan2008-05-053-5/+5
| | | | | | | - Use @dirrmtry PR: ports/123355 Submitted by: Alex Kozlov <spam at rm-rf.kiev.ua> (maintainer)
* Update to 0.12.1johans2008-05-042-4/+4
|
* Update to 1.4.1arved2008-05-042-4/+4
| | | | | PR: 123099 Submitted by: Hirohisa Yamaguchi
* Assure warning-free build even with older OpenSSL-0.9.7, found on 6.xmi2008-05-041-6/+13
| | | | | | | systems. The c2i_ASN1_INTEGER function there does not explicitly guarantee const-ness of its second argument, unlike on 0.9.8... Notified by: pav
* Update to 2.3.8.novel2008-05-033-4/+5
|
* - Clean up directoriespav2008-05-031-0/+1
| | | | Reported by: pointyhat
* - Update to 0.7.0.araujo2008-05-0320-162/+252
| | | | | PR: ports/122645, ports/122646, ports/122647 Submitted by: Paul Schmehl <pauls@utdallas.edu> (maintainer)
* - Project was renamed security/barnyard-sguil6 to security/barnyard-sguil.araujo2008-05-039-2155/+5
| | | | | PR: ports/122648, ports/122700 Submitted by: Paul Schmehl <pauls@utdallas.edu> (maintainer)
* - Thunderbird 2.0.0.14 is safesat2008-05-031-2/+2
|
* - Document mt-daapd -- Integer overflowmiwi2008-05-031-0/+33
| | | | | PR: 123285 (based on) Submitted by: Mark D. Foster <mark@foster.cc>
* - Document sdl_image - Buffer Overflow Vulnerabilitiesmiwi2008-05-031-0/+35
|
* - Update to 0.10jadawin2008-05-022-5/+4
| | | | Approved by: tabthorpe (mentor)
* - Mark PHP5 as safemiwi2008-05-021-1/+2
|
* - Update to 1.6.1chinsan2008-05-012-5/+10
|
* Unbreak, upgrade to the most recent version 20071227. Instead ofmi2008-05-015-50/+352
| | | | | | | | | | | | | patching the vendor's Makefile, provide our own -- it is smaller than the patch... Address all of the compiler-warnings brought up by WARNS=3. Two of them appear to be genuine error... The patch-warnings sent to the vendor. Manual page is no longer part of the distribution, although it is still mentioned in the vendor's Makefile. Hopefully, this will be addressed by the next release (along with the warnings).
* Update to 2.4.4. Fixes some bugs, and adds the ability to store fulllx2008-05-012-4/+4
| | | | file content for small files in the signature database itself.
* Admit I'm never going to actually fix security/drupal4-ldap_integration,brooks2008-05-015-66/+0
| | | | particularly since it's clear no one uses it and remove it from the tree.
* - Mark BROKEN: error: `ENDLINE' is not a member of `log4cpp::CategoryStream'pav2008-04-302-0/+4
| | | | Reported by: pointyhat
* Assign to new volunteer, by request.linimon2008-04-304-4/+4
|
* - Update to 1.1.5lwhsu2008-04-302-5/+4
|
* - Mark graphics/png as safe.miwi2008-04-291-1/+2
|
* - Update to 1.3.2miwi2008-04-293-6/+55
| | | | | | PR: 123204 Submitted by: Lukasz Wasikowski <lukasz@wasikowski.net> Approved by: maintainer implicit
* Reset aaron's port maintainerships due to many maintainer-timeouts.linimon2008-04-2915-15/+15
|
* - Fix last gnupg entry.miwi2008-04-291-5/+3
| | | | | | PR: 123178 [1] Submitted by: Nick Barkas (via privat mail) bf <bf2006a@yahoo.com> [1]
* - Clean up whitespace a bitsat2008-04-291-1768/+1798
| | | | | - Wrap long lines where appropriate - Add a vim-friendly modeline
* - A new Firefox vulnerability currently affects 10 of our ports, onsat2008-04-291-6/+28
| | | | | | average. A new VuXML entry usually forgets about 8 of them. Wiki: http://wiki.freebsd.org/VuXML
* - Update to 0.2.0.25.rmiwi2008-04-282-7/+11
| | | | | PR: 123170 Submitted by: maintainer
* - Update last python entry python23 and python24 also affectedmiwi2008-04-281-1/+10
| | | | | PR: 123153 Submitted by: Nick Barkas <snb@threerings.net>
* - Uses "CC" to build in any case, regardless of what CC is set to.araujo2008-04-281-1/+3
| | | | | | | - Bump PORTREVISION. PR: ports/122942 Submitted by: Frank Fenor <frank@fenor.de>
* - Update to 1.4.0rafan2008-04-273-4/+5
| | | | | PR: ports/123125 Submitted by: Linh Pham <question+fbsdports at closedsrc.org> (maintainer)
* - Mark gnupg and gnupg1 as securemiwi2008-04-271-2/+2
|
* - Update to 1.4.9miwi2008-04-272-7/+7
| | | | | | | | | | | | Notes: This update fixes a possible security vulnerability involving memory corruption from importing malicious keys. PR: 122349 / 122155 Submitted by: Nick Barkas <snb@threerings.net> / Hirohisa Yamaguchi <umq@ueo.co.jp> Approved by: maintainer timeout Security: http://www.vuxml.org/freebsd/30394651-13e1-11dd-bab7-0016179b2dd5.html
* - Update to 2.0.9miwi2008-04-272-7/+7
| | | | | | | | | | | Notes: This update fixes a possible security vulnerability involving memory corruption from importing malicious keys. PR: 122114/122349 Submitted by: Hirohisa Yamaguchi <umq@ueo.co.jp> / Nick Barkas <snb@threerings.net> Approved by: maintainer timeout Security: http://www.vuxml.org/freebsd/30394651-13e1-11dd-bab7-0016179b2dd5.html
* - Document gnupg -- memory corruption vulnerabilitymiwi2008-04-271-0/+39
|
* - Remove, it's ancient and newer version is included in base of all supportedpav2008-04-269-232/+0
| | | | | | releases Suggested by: sam
* - Fix build on -CURRENT (typo in configure script)pav2008-04-261-0/+11
| | | | | PR: ports/123093 Submitted by: Ganael Laplanche <ganael.laplanche@martymac.com> (maintainer)
* - Respect CCmiwi2008-04-261-0/+1
| | | | | | PR: 122941 Submitted by: Frank Fenor <frank@fenor.de> Approved by: maintainer
* Document extman password bypass vulnerability.delphij2008-04-261-0/+28
|
* Update to 2.3.7.novel2008-04-264-5/+10
|
* - Update to 1.0miwi2008-04-252-4/+4
| | | | | PR: 122763 Submitted by: Ports Fury
* - Document mailman -- script insertion vulnerability.miwi2008-04-251-0/+37
| | | | | Submitted by: tabthorpe (one a month ago) Discussed/Reviewed by: tabthorpe
* - now really fix the CVE entrymiwi2008-04-251-1/+1
|
* - Fix CVE entry from the previous commitmiwi2008-04-251-1/+1
|
* - Document mksh -- TTY Attachment Privilege Escalation.miwi2008-04-251-0/+30
|
* - Document serendipity -- multiple cross site scripting vulnerabilities.miwi2008-04-251-0/+43
|
* - Document firefox -- javascript harbage collector vulnerability.miwi2008-04-251-0/+38
|
* - Add missing - in the previous entrymiwi2008-04-251-1/+1
|
* - Remove whitespacesmiwi2008-04-251-2/+2
| | | | - Fix spelling
* - Document png - unknown chunk processing uninitialized memory accessmiwi2008-04-251-0/+38
|
* - Document openfire - unspecified denial of servicemiwi2008-04-251-0/+31
| | | | PR: 122872 (based on)
* - Document php -- Integer Overflow Vulnerabilitymiwi2008-04-251-0/+32
| | | | PR: based on 122872
* - Document python -- Integer Signedness Error in zlib Modulemiwi2008-04-251-0/+31
|
* Document postgresql -- multiple vulnerabilitiesmiwi2008-04-251-0/+57
| | | | | PR: 120133 (basic on) Submitted by: Nick Barkas <snb@threerings.net>
* - Document phpMyAdmin - Shared Host Information Disclosure.miwi2008-04-251-0/+31
|
* - Document phpMyAdmin - Username/Password Session File Information Disclosure.miwi2008-04-251-0/+29
|
* - Document libxine -- array index vulnerabilitytabthorpe2008-04-241-0/+30
| | | | Reviewed by: remko, miwi
* - Add flexible response (v1) support to snort_inline. It borrows heavily frombeech2008-04-241-7/+28
| | | | | | | | | | | | | | | | the snort port, which also has this feature. Adds libnet10 as a dependency if this is chosen. - Add options, ODBC, POSTGRESQL, and MySQL support (plus flexible responses). - Add dependency on libnet10 if flexible responses is defined. - Bump portrevision - Note that flexible response v2 (needing libnet11) is unsupported due to libnet11 patches not applying cleanly. When this is cleared up for snort, it can be ported to snort_inline. PR: ports/121710 Submitted by: Yousif Hassan <yousif@alumni.jmu.edu> Approved by: maintainer timeout (1+ months)
* Update to 2.29mat2008-04-232-4/+4
|
* - update to 1.4bleeym2008-04-232-4/+4
|
* Update to 2.11mat2008-04-222-5/+4
|
* - Update signatures to 20080419sat2008-04-212-4/+4
|
* - Update to 0.6.0miwi2008-04-202-6/+8
| | | | | PR: 122529 Submitted by: Wen heping <wenheping@gmail.com>
* - Remove unneeded dependency from gtk12/gtk20 [1]miwi2008-04-2043-67/+59
| | | | | | | | | | | | | | | - Remove USE_XLIB/USE_X_PREFIX/USE_XPM in favor of USE_XORG - Remove X11BASE support in favor of LOCALBASE or PREFIX - Use USE_LDCONFIG instead of INSTALLS_SHLIB - Remove unneeded USE_GCC 3.4+ Thanks to all Helpers: Dmitry Marakasov, Chess Griffin, beech@, dinoex, rafan, gahr, ehaupt, nox, itetcu, flz, pav PR: 116263 Tested on: pointyhat Approved by: portmgr (pav)
* - Update to 5.0p1mnag2008-04-195-58/+1915
| | | | | | | | | | | | | | - Port LPK patch to 5.0p1 and add to files dir - Remove USE_PERL_BUILD since doesn't need [1] - Update KERB_GSSAPI to 5.0p1 - Update HPN patch to 5.0p1 13v3 - Respect LOCALBASE on configure_args of LPK [2] - Change MASTER_SITE of snapshot - portlint(1) PR: 121826 [2] Submitted by: Andrew Kolchoogin <andrew___rinet.ru> [2] Reported by: Björn König <bkoenig___alpha-tierchen.d [1]
* - Fix build with gcc3 / FreeBSD6barner2008-04-192-0/+22
| | | | - Reported by: pointyhat via pav
* - Update mastersite.jmelo2008-04-192-2/+2
| | | | | | | | | - Update WWW. PR: ports/121705 Submitted by: Sofian Brabez <sbrabez@gmail.com> Reviewed by: Jonatan B <onatan@gmail.com> (maintainer) Approved by: Jonatan B <onatan@gmail.com> (maintainer)
* Drop maintainership.flz2008-04-181-1/+1
|
* - Update to 0.25clsung2008-04-183-18/+27
|
* - Fix plistsat2008-04-182-0/+3
| | | | Reported by: pointyhat via pav
* Fix to mkdir unnecessary directory.sumikawa2008-04-182-3/+3
|
* - Fix build with clamav-0.93garga2008-04-182-3/+92
| | | | | | - Bump PORTREVISION Submitted by: maintainer by email
* - Take advantage of CPAN macro from bsd.sites.mk, change ↵araujo2008-04-17156-309/+158
| | | | | | | | | ${MASTER_SITE_PERL_CPAN} to CPAN. PR: ports/122674 Submitted by: Philip M. Gollucci <pgollucci@p6m7g8.com> Reworked by: araujo (myself) Approved by: portmgr (pav)
* Upgrade to 20071227e.sumikawa2008-04-1710-497/+87
| | | | | PR: ports/119795 From: Yarema <yds@CoolRat.org>
* - Update WWWpav2008-04-172-2/+2
|
* - Chase clamav library to version 4garga2008-04-176-8/+14
| | | | | | | | | | | | | | | | | | | - Bump PORTREVISION Following ports are marked as BROKEN since they don't build with new clamav 0.93: www/c-icap mail/claws-mail-clamav www/gurlchecker www/havp security/klamav devel/p5-Mail-ClamAV devel/py-clamav www/squidclam This clamav version needed to be updated without wait other ports fixes because it fixes important vulnerabilities.
* - Update to 0.93garga2008-04-174-8/+17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This version fixes lock problem reported at ports/122534 Most important changes: *libclamav: - New logic in scan limits: provides much more efficient protection against DoS attacks but also results in different command line and config options to clamscan and clamd (see below) - New/improved modules: unzip, SIS, cabinet, CHM, SZDD, text normalisator, entity converter - Improved filetype detection; filetype definitions can be remotely updated - Support for .cld containers (which replace .inc directories) - Improved pattern matcher and signature formats - More efficient scanning of HTML files - Many other improvements * clamd: - NEW CONFIG FILE OPTIONS: MaxScanSize, MaxFileSize, MaxRecursion, MaxFiles - ** THE FOLLOWING OPTIONS ARE NO LONGER SUPPORTED **: MailMaxRecursion, ArchiveMaxFileSize, ArchiveMaxRecursion, ArchiveMaxFiles, ArchiveMaxCompressionRatio, ArchiveBlockMax * clamscan: - NEW CMDLINE OPTIONS: --max-filesize, --max-scansize - REMOVED OPTIONS: --block-max, --max-space, --max-ratio * freshclam: - NEW CONFIG OPTION CompressLocalDatabase - NEW CMDLINE SWITCH --no-warnings - main.inc and daily.inc directories are no longer used by ClamAV; please remove them manually from your database directory PR: ports/122770 [1] (based on) ports/122534 [2] Submitted by: Michael Scheidell <scheidell@secnap.net> [1] Sebastian Inacker <inacker@fmsweb.de> [2] Security: http://secunia.com/advisories/29000
* Add an entry about clamav < 0.93 vulnerabilitiesgarga2008-04-161-0/+43
| | | | Reviewed by: mnag
* EzCrypto is an easy to use wrapper around the poorly documented OpenSSL rubyclsung2008-04-165-0/+203
| | | | | | | | | | | | | | | | library. Features * Defaults to AES 128 CBC * Will use the systems OpenSSL library for transparent hardware crypto support * Single class object oriented access to most commonly used features * Ruby like WWW: http://ezcrypto.rubyforge.org/ PR: ports/122805 Submitted by: Steven Kreuzer
* - Update to 0.5.4sat2008-04-163-5/+5
|
* Add fprint_demo 0.4, demo and test application for libfprint.barner2008-04-165-0/+65
|
* Add pam_fprint 0.2, PAM module offering finger print authenticationbarner2008-04-167-0/+112
| | | | using libfprint.