aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* FreeBSD 6 no longer adds debug.if_* sysctl variables in its default kernelvs2005-09-186-3/+18
| | | | | | | | (according to the release notes), so our heuristic assumes the module is missing and tries to load it, which fails as the module already exists. PR: ports/86286 Submitted by: maintainer
* Document the following items:remko2005-09-181-0/+60
| | | | | | | o apache -- Certificate Revocation List (CRL) off-by-one vulnerability o squirrelmail -- _$POST variable handling allows for various attacks Reviewed by: simon
* Add p5-Digest-SHA 5.31, Perl extension for SHA-1/224/256/384/512.lth2005-09-185-0/+47
| | | | | PR: ports/84570 Submitted by: Travis Campbell <hcoyote@ghostar.org>
* Fixed plistlth2005-09-171-1/+1
| | | | Reported by: pointyhat via kris
* Update to 0.6.0mnag2005-09-176-140/+15
| | | | | | | | Submitted to ports@ for test. Without reply. PR: ports/83748 Submitted by: Marcus Grando <marcus@corp.grupos.com.br> Approved by: pav (mentor), anders (maintainer timeout, 58 days)
* Update my emailmnag2005-09-175-6/+6
| | | | Approved by: pav (mentor)
* Update to 3.2.2mnag2005-09-163-11/+11
| | | | Approved by: pav (mentor)
* - Update to 3.93garga2005-09-162-3/+3
| | | | | PR: ports/86113 Submitted by: maintainer
* ClusterSSH controls a number of xterm windows via a single graphicalpav2005-09-164-0/+35
| | | | | | | | console window to allow commands to be interactively run on multiple servers over an ssh connection. PR: ports/84970 Submitted by: David Thiel <lx@redundancy.redundancy.org>
* - Add an entry on possible DOS condition regarding NTLM in squidpav2005-09-161-0/+28
| | | | | PR: ports/86179 Submitted by: Thomas-Martin Seck <tmseck@netcologne.de>
* Udate to DAT 4582jeh2005-09-162-3/+3
|
* Add p5-Crypt-NULL 1.02, perl implementation of the NULL encryptionlth2005-09-155-0/+39
| | | | | | | algorithm. PR: ports/84629 Submitted by: TAKAHASHI Kaoru <kaoru@kaisei.org>
* Update to 0.6.1vsevolod2005-09-153-4/+3
| | | | Submitted by: Yvan Vanhullebus (maintainer)
* - Firewalk port really depends on net/libnet-devel, but the check can be ↵vs2005-09-152-1/+14
| | | | | | | | | satisfied by net/libnet. - BIOCIMMEDIATE is undefined in some cases. PR: ports/86132 Submitted by: Michael Scheidell via maintainer
* Update to 0.4.5.marcus2005-09-154-6/+6
|
* - Update to 0.9.6pav2005-09-155-27/+23
| | | | | | PR: ports/83453 Submitted by: Janos Mohacsi <janos.mohacsi@bsd.hu> Approved by: bms (maintainer; blanket)
* - Remove dependencies on security/pf, it was removed. pf is in base sincepav2005-09-151-4/+2
| | | | | | 502106 Pointy hat to: pav
* - Remove security/pf and security/authpf ports. They were only useful onpav2005-09-1521-1392/+0
| | | | | | FreeBSD 5.0 - 5.2.1. Requested by: mlaier (maintainer) via linimon
* Document X11 server -- pixmap allocation vulnerability.lesi2005-09-151-0/+33
| | | | Reviewed by: simon
* Update to DAT 4581jeh2005-09-152-3/+3
|
* Drop maintainership, since I'm buried in the $REALLIFE stuff.krion2005-09-141-1/+1
|
* Add signing-party.jylefort2005-09-144-0/+81
| | | | | | | | | | | | | | | | | | | signing-party is a collection for all kinds of PGP/GnuPG related things, including signing scripts, party preparation scripts, etc. * caff: CA - Fire and Forget signs and mails a key * pgp-clean: removes all non-self signatures from key * pgp-fixkey: removes broken packets from keys * gpg-mailkeys: simply mail out a signed key to its owner * gpg-key2ps: generate PostScript file with fingerprint paper strips * gpglist: show who signed which of your UIDs * gpgsigs: annotates list of GnuPG keys with already done signatures * keylookup: ncurses wrapper around gpg --search WWW: http://pgp-tools.alioth.debian.org/ PR: ports/86077 Submitted by: Johan van Selst <johans@stack.nl>
* - Website is gonepav2005-09-141-1/+0
|
* Document unzip -- permission race vulnerability. [1]remko2005-09-141-1/+35
| | | | | | Update the recent htdig entry with it's corrected version. Reviewed by: simon [1]
* Update to DAT 4580jeh2005-09-142-3/+3
|
* change USE_PERL5 to USE_PERL5_BUILD because perl is only needed during theoliver2005-09-131-1/+1
| | | | | | build process Approved by: maintainer
* - Fix WWWgarga2005-09-131-1/+1
| | | | | PR: ports/86042 Submitted by: Marcus Alves Grando <marcus@corp.grupos.com.br>
* Update to DAT 4579jeh2005-09-132-3/+3
|
* Update to 0.3.6b that fixes build with samba 3.0.20.vsevolod2005-09-122-3/+3
| | | | | PR: 86013 Submitted by: Jean Milanez Melo (maintainer)
* Update to 1.9.19lofi2005-09-123-14/+3
|
* Update to 0.9.12lofi2005-09-123-3/+15
|
* Update to 1.16skv2005-09-122-3/+3
|
* Update to 1.11skv2005-09-122-3/+3
| | | | Changes: http://search.cpan.org/src/GAAS/Digest-1.11/Changes
* - Revive CONFLICTS with gnutls-devel [1]novel2005-09-112-4/+3
| | | | | | | - Do not build static libraries [2] Requested by: kris [1] vs [2]
* Document firefox & mozilla -- buffer overflow vulnerability.simon2005-09-111-0/+97
| | | | Prodded by: pav
* - Replace .error with IGNORE to prevent INDEX build failurespav2005-09-111-12/+3
|
* - Only for FreeBSD 4.X and 5.Xpav2005-09-111-0/+4
| | | | Reported by: krismail
* Update to DAT 4578jeh2005-09-102-3/+3
|
* - Update WWWpav2005-09-101-4/+1
|
* - Update to 2.1.0pav2005-09-102-7/+3
| | | | | PR: ports/85899 Submitted by: Rob Evers <rob@debank.tv> (maintainer)
* Don't CONFLICTS with gnutls-devel since it has been removed.novel2005-09-091-2/+0
|
* Update to 0.9.6lawrance2005-09-0923-503/+118
| | | | | | | | | | | | - Add rcng startup - No longer touch pksd.conf, only pksd.conf.sample - Ensure the port builds against db2 from ports by deleting the included version. Add post-patch bits to help this happen. - Submitter takes maintainership PR: ports/85802 Submitted by: Graham Todd <gtodd@bellanet.org> (new maintainer) Approved by: Jason Harris <jharris@widomaker.com> (maintainer)
* Give maintainership to submitterlawrance2005-09-091-1/+1
| | | | | PR: ports/85870 Submitted by: Daniel Roethlisberger <daniel@roe.ch>
* Update to DAT 4577jeh2005-09-092-3/+3
|
* Update to version 3.90krion2005-09-082-3/+4
|
* Assign maintainership to daniel@roe.chkrion2005-09-081-1/+1
| | | | | PR: ports/85855 Submitted by: Daniel Roethlisberger <daniel@roe.ch>
* Update to DAT 4576jeh2005-09-082-3/+3
|
* s/BROKEN/IGNORE/lawrance2005-09-071-1/+1
| | | | | | | | | | | Reported by: linimon Log: Mark broken for OSVERSION >= 500000. Does not build without S/Key libraries and headers. PR: ports/85256 Submitted by: Christoph Weber-Fahr <wefa@tnd37.tnd.arcor.net>
* Mark broken for OSVERSION >= 500000. Does not build withoutlawrance2005-09-071-0/+4
| | | | | | | S/Key libraries and headers. PR: ports/85256 Submitted by: Christoph Weber-Fahr <wefa@tnd37.tnd.arcor.net>
* Forgot to uncomment OPTIONS after testing.novel2005-09-071-4/+4
| | | | Noted by: David Thiel <lx@redundancy.redundancy.org>
* Mark the latest version of cups-base fixed for "xpdf -- disk fill DoSlawrance2005-09-071-2/+2
| | | | vulnerability"
* - Patch file updated to process rule numbers above 999.leeym2005-09-073-10/+2
| | | | | | | | - remove redundant entries in pkg-plist PR: 85189 Submitted by: Michael Butler Reviewed by: Michael Ranner <mranner@inode.at> (maintainer)
* Update to DAT 4575jeh2005-09-072-3/+3
|
* Add ncrypt 0.7.0, advanced AES file encryption tool.garga2005-09-066-0/+72
| | | | | PR: ports/85486 Submitted by: Frank Laszlo <laszlof@vonostingroup.com>
* - Pass maintainership to submitter, since he sent the last patch.garga2005-09-061-1/+1
| | | | | PR: ports/85775 Submitted by: Marcus Alves Grando <marcus@corp.grupos.com.br>
* Update to DAT 4574jeh2005-09-062-3/+3
|
* Update WWW and MASTER_SITES.demon2005-09-062-2/+3
|
* Fix build with openssl-0.9.8.demon2005-09-063-12/+51
| | | | | PR: 85309 Submitted by: Daniel Roethlisberger <daniel@roe.ch>
* Update to 0.4.4.marcus2005-09-064-8/+6
|
* Add IPSec tools port - the new "official" version of racoon,vsevolod2005-09-056-0/+185
| | | | | | | | is the only one which is maintained and have lots of new features. PR: 85544 Submitted by: VANHULLEBUS Yvan <vanhu@netasq.com> Approved by: perky (mentor)
* - clamsmtp 1.5 works only in debug mode.clsung2005-09-053-3/+60
| | | | | | | | | | Included patch fix this bug by moving socket creation after daemonizing as suggested in mailing list clamsmtp-users@lists.sourceforge.net http://sourceforge.net/mailarchive/forum.php?thread_id=8060741&forum_id=42732 - bump PORTREVISION PR: ports/85706 Submitted by: Alex L. Demidov <alexd AT vinf dot ru>
* Revert back to devel/bisonade2005-09-051-1/+1
|
* - Update to 1.1sem2005-09-055-43/+4
| | | | | PR: ports/85585 Submitted by: maintainer
* - Update to 1.1.4sem2005-09-053-4/+5
| | | | | PR: ports/84725 Submitted by: maintainer
* Add forgotten </package> line.remko2005-09-041-0/+1
| | | | Spotted by: simon
* Mark b2evolution prior to 0.9.0.12_2 vulnerable to the XML_RPC remote php ↵remko2005-09-041-1/+5
| | | | | | code injection vulnerability. Inspired by: pav's commit, updating the port.
* - Unbreak vpnc-disconnect by fixing the config.c patchlawrance2005-09-043-19/+18
| | | | | | | | | | - Remove obsolete vpnc-wrapper leftovers to make portlint happy - Use PLIST_FILES and PORTDOCS instead of pkg-plist - Bump PORTREVISION PR: ports/84491 Submitted by: Daniel Roethlisberger <daniel@roe.ch> Approved by: Christian Lackas <delta@lackas.net> (maintainer)
* Document htdig -- cross site scripting vulnerability.remko2005-09-041-0/+29
| | | | Reviewed by: simon
* - Document two squid security related issues.sem2005-09-041-0/+55
| | | | | PR: ports/85688 Submitted by: Thomas-Martin Seck <tmseck@netcologne.de> (squid maintainer)
* Document bind9 -- denial of service.remko2005-09-041-0/+44
| | | | | | | Also merge the FreeBSD-SA-05:12.bind9 advisory in the entry. [1] Suggested by: simon [1] Reviewed by: simon
* Bcrypt is a blowfish file encryption utility which aims for cross-platformsem2005-09-044-0/+54
| | | | | | | portability. PR: ports/84798 Submitted by: Emanuel Haupt <ehaupt@critical.ch>
* ipguard listens network for ARP packets. All permitted MAC/IP pairssem2005-09-047-0/+83
| | | | | | | | | | listed in 'ethers' file. If it recieves one with MAC/IP pair, which is not listed in 'ethers' file, it will send ARP reply with configured fake address. This will prevent not permitted host to work properly in this ethernet segment. Especially Windows(TM) hosts. PR: ports/84627, ports/85671 Submitted by: SeaD <sead@mail.ru>
* Document bind -- buffer overrun vulnerabilityremko2005-09-041-0/+28
|
* - update to 2.15leeym2005-09-042-4/+5
| | | | | PR: 85550 Submitted by: Tsung-Han Yeh <snowfly@yuntech.edu.tw>
* - version 1.5 must start with '-d 4'clsung2005-09-032-3/+3
| | | | | (Thanks to Jack Raats <jack AT raats dot org>) - bump PORTREVISION
* Update to 4.1.9.novel2005-09-033-7/+22
| | | | | PR: 85673 Submitted by: David Thiel (maintainer)
* Correctly fix RUN_DEPENDSade2005-09-031-1/+1
|
* Update to DAT 4573jeh2005-09-032-3/+3
|
* Add p5-Net-Daemon-SSL 1.0, perl5 extension for portable daemons.garga2005-09-035-0/+42
| | | | | PR: ports/85125 Submitted by: Simon Dick <simond@irrelevant.org>
* Fix build on 4-stable: Use ports version of libpcap since system versionse2005-09-031-1/+7
| | | | is too old.
* Compile errors on ia64 and sparc64, do not build on those archs.se2005-09-031-0/+1
|
* - Update to 0.1.0.14garga2005-09-026-10/+28
| | | | | PR: ports/85635 Submitted by: maintainer
* Add a more or less bogus reference section to the last entry, to make itsimon2005-09-021-0/+7
| | | | | | | a valid entry. The reference simply references the VuXML entry itself, but at least it fixes the build for now. Missed by: simon
* Document stack overflow vulnerabilities in games/urban.jylefort2005-09-021-0/+22
| | | | Approved by: simon
* Update to DAT 4572jeh2005-09-022-3/+3
|
* - Switch bison dependency to bison175 portpav2005-09-021-1/+2
|
* Add p5-Net-OpenID-Server.jylefort2005-09-025-0/+50
| | | | | | | | | | | | | | | | | | | | OpenID is a decentralized identity system, but one that's actually decentralized and doesn't entirely crumble if one company turns evil or goes out of business. An OpenID identity is just a URL. You can have multiple identities in the same way you can have multiple URLs. All OpenID does is provide a way to prove that you own a URL (identity). Anybody can run their own site using OpenID, and anybody can be an OpenID server, and they all work with each other without having to register with or pay anybody to "get started". An owner of a URL can pick which OpenID server to use. WWW: http://www.openid.net PR: ports/85284 Submitted by: Alex Kapranoff <kappa@rambler-co.ru>
* Add p5-Data-Password.jylefort2005-09-025-0/+37
| | | | | | | | | | | | | Data::Password checks potential passwords for crackability. It checks that the password has the appropriate length, that it has enough character groups, that it does not contain the same characters repeatedly, that it does not contain ascending or descending characters, or characters close to each other on the keyboard. It also searches for the password in the ispell word file. WWW: http://search.cpan.org/~razinf/Data-Password/ PR: ports/84513 Submitted by: ports@c0decafe.net
* - Update to 4.2p1garga2005-09-025-146/+70
| | | | | PR: ports/85578 Submitted by: Marcus Grando <marcus@corp.grupos.com.br>
* Fix build with openldap23 libraries.vsevolod2005-09-011-1/+1
| | | | Submitted by: skv
* Remove mastersite which has gone away.linimon2005-09-012-3/+1
|
* Update snortsms to version 1.0.0lawrance2005-09-013-7/+41
| | | | | | | - what a lovely number! PR: ports/85500 Submitted by: J Randolph <snortsms@servangle.net> (maintainer)
* - Update to 0.4.5pav2005-09-013-24/+35
| | | | | PR: ports/85332 Submitted by: ports@c0decafe.net <ports@c0decafe.net> (maintainer)
* Update to DAT 4571jeh2005-09-012-3/+3
|
* - Update to 0.76sergei2005-08-312-5/+5
|
* Update to 0.9skv2005-08-313-7/+7
|
* - Update to 2.0.9pav2005-08-312-7/+30
| | | | | | | | | - samhainrc.sample file is chgrp'd to wheel - RUNAS_USER now defaults to "yule" properly - XML logging is now on by default and tunable PR: ports/85448 Submitted by: David Thiel <lx@redundancy.redundancy.org> (maintainer)
* - Bandaid compilation on FreeBSD 5.2.1pav2005-08-311-0/+4
| | | | | | PR: ports/84131 Submitted by: Thorolf <thorolf@grid.einherjar.de> Approved by: maintainer timeout (1 month)
* - Revert back to MASTER_SITE_MOZILLApav2005-08-311-5/+2
|
* The distfile was rerolled to include a dbm subdirectory (which we no longermarcus2005-08-312-9/+6
| | | | | use), and a RELEASE bump. There is no need to reinstall this port if you already have it installed.
* Now that misc/compat5x exists use the FreeBSD 5 binary on FreeBSD > 600004marius2005-08-311-4/+4
| | | | | | | rather than the FreeBSD 4 binary. Prodded by: ache Approved by: netchild
* Update to 1.8.novel2005-08-312-10/+10
| | | | | | PR: 85476 Submitted by: Andrej Zverev <az@inec.ru> Approved by: Frank Laszlo (maintainer)
* Update to DAT 4570jeh2005-08-312-3/+3
|
* - Distfile was rerolled; put old distfile on MASTER_SITE_LOCAL for nowpav2005-08-301-2/+5
| | | | Reported by: few
* - Pass maintainership of gnutls, libtasn1 and opencdk ports tosergei2005-08-303-3/+3
| | | | Roman Bogorodskiy (novel) who kindly agreed to look after them
* - Remove gnutls-devel port: this development version of GnuTLS librarysergei2005-08-304-122/+0
| | | | | is no longer being released upstream since 1.2.0 update of the stable branch. Thus, it does not make sense that we keep it anymore.
* - Disconnect gnutls-devel from the parent Makefile prior to removalsergei2005-08-301-1/+0
|
* upgrade to 0.0.16ijliao2005-08-304-4/+7
| | | | | PR: 85388 Submitted by: Ports Fury
* upgrade to 0.0.22ijliao2005-08-303-3/+5
| | | | | PR: 85389 Submitted by: Ports Fury
* Remove old library compatibility checking.sumikawa2005-08-301-4/+0
| | | | It was necessary for 4.0-RELEASE.
* Mark latest evolution port version as fixed wrt. evolution -- remotesimon2005-08-301-1/+2
| | | | format string vulnerabilities.
* - Update to 2.0.2 that brings these upstream changes:garga2005-08-309-162/+9
| | | | | | | | | | - fix bug that would exhaust file descriptors as the routing table was modified (this had already been part of the port previously) - fix bug that would block the management socket until the peer connected - fix pkitool sh incompatibilities (from NetBSD) PR: ports/85299 Submitted by: maintainer
* Update to DAT 4569jeh2005-08-302-4/+3
|
* Add entry for fswiki's vuln.kuriyama2005-08-291-0/+22
|
* - Update to 1.06pav2005-08-294-16/+84
| | | | | | | | | - Provide options for new mathematical backends - Transfer maintainership to submitter PR: ports/83040 Submitted by: Wesley Shields <wxs@csh.rit.edu> Approved by: Afarsec <afarsec@012.net.il> (maintainer)
* - Update to 1.3.6sem2005-08-293-9/+9
| | | | | | | | - Update WWW in pkg-descr - Pass maintainership to submitter PR: ports/84998 Submitted by: Emanuel Haupt <ehaupt@critical.ch>
* - Update to 1.5.0sem2005-08-295-24/+39
| | | | | | | | - Reformat pkg-descr - Pass maintainership to submitter PR: ports/85002 Submitted by: Emanuel Haupt <ehaupt@critical.ch>
* - Update to 0.75sergei2005-08-293-10/+30
| | | | - Chase changed location of bglibs files
* Update to DAT 4568jeh2005-08-292-3/+3
|
* Dante 1.1.15 is no longer affected by the fd_set bitmap index overflow.niels2005-08-291-2/+5
| | | | | | Updated the version in VuXML (was 0). Approved by: nectar (mentor)
* Update amavisd-new to 2.3.3. [1]lesi2005-08-293-5/+3
| | | | | | | Start amavisd as root so that it works both with and without chroot. [2] PR: ports/85241 [1], ports/83988 [2] Submitted by: Blaz Zupan (maintainer)
* - Update to 1.5clsung2005-08-292-3/+3
| | | | | PR: 85404 Submitted by: Marcus Grando <marcus AT corp dot grupos dot com dot br>
* - Fill out part of the std. VuXML template missed in the last entry.simon2005-08-291-2/+3
| | | | | | | - Mark acroread 7.0.1 as fixed for acroread -- XML External Entity vulnerability. [1] Reported by: Sverre H. Huseby [1]
* Update to 1.3lioux2005-08-293-96/+13
|
* Update to 0.2.7krion2005-08-282-3/+3
|
* Chase the libsoup shared lib version.marcus2005-08-281-1/+2
|
* Chase the Gaim 1.5.0 update.marcus2005-08-284-4/+4
|
* Document evolution -- remote format string vulnerabilities.simon2005-08-281-0/+43
| | | | Approved by: portmgr (blanket, VuXML)
* Document pam_ldap -- authentication bypass vulnerability.simon2005-08-281-0/+32
| | | | Approved by: portmgr (blanket, VuXML)
* Update to 1.8.0.marcus2005-08-284-11/+8
| | | | | | | Security: Fixes a security vulnerability described at http://www.kb.cert.org/vuls/id/778916 Requested by: simon Approved by: portmgr (implicit)
* Mark phpgroupware as vulnerable to pear-XML_RPC -- remote PHP codesimon2005-08-281-1/+6
| | | | | | | injection vulnerability. Reported by: olgeni Approved by: portmgr (blanket, VuXML)
* Document pcre -- regular expression buffer overflow.simon2005-08-271-0/+29
| | | | Approved by: portmgr (blanket, VuXML)
* Fix build on 6.xkrion2005-08-261-0/+3
| | | | | Submitted by: lesi Approved by: portmgr (self)
* Fix build on 6.xkrion2005-08-241-0/+14
| | | | Approved by: portmgr (self)
* Fix for broken build under 4.X.cy2005-08-241-4/+7
| | | | Approved by: portsmgr (clement)
* Mark latest awstats port as fixed for awstats -- arbitrary codesimon2005-08-241-1/+2
| | | | | | execution vulnerability. Approved by: portmgr (blanket, VuXML)
* Document mail/elm remote buffer overflow vulnerability.sem2005-08-241-0/+34
| | | | | | PR: ports/85225 Submitted by: Kevin Day <toasty@dragondata.com> (elm maintainer) Approved by: portmgr (blanket, VuXML)
* Fix a typo in the new rc file, where documentation didn't match thegarga2005-08-226-6/+9
| | | | | | | | | actual variables. PR: ports/85156 Submitted by: maintainer Reported by: Benjamin Lutz <benlutz@datacomm.ch> Approved by: portmgr (krion)
* Fix so the distfile can be manually fetched for package buildinglawrance2005-08-201-16/+11
| | | | | | PR: ports/84573 Submitted by: Adi Pircalabu <apircalabu@bitdefender.com> (maintainer) Approved by: portmgr (krion)
* - Security update to version 2.0.1, fixing four denial of service bugs,garga2005-08-2021-168/+471
| | | | | | | | | | | | | | | | | CAN-2005-2531, CAN-2005-2532, CAN-2005-2533, CAN-2005-2534 - Drop old init script and add a modern rcNG script in its place, requested by Matthias Grimm and Dirk Gouders (although the script below is one I, Matthias Andree, wrote). It can automatically load tun/tap drivers. - move pkg-message to files/pkg-message.in, revise it, list it in SUB_FILES to expand ${PREFIX}. - print pkg-message after installation from port - switch to official "make check" as smoke-test, rather than wiring our own. - prefer LZO2 in most situations, as OpenVPN will pick up LZO2 rather than LZO1 if both are installed. PR: ports/85109 Submitted by: maintainer Approved by: portmgr (krion)
* Document four vulnerabilities in openvpn:remko2005-08-191-0/+123
| | | | | | | | | | * openvpn -- multiple TCP clients connecting with the same certificate at the same time can crash the server * openvpn -- denial of service: malicious authenticated &quot;tap&quot; client can deplete server virtual memory * openvpn -- denial of service: undecryptable packet from authorized client can disconnect unrelated clients * openvpn -- denial of service: client certificate validation can disconnect unrelated clients Approved by: portsmgr (blanket VuXML) Submitted by: Matthias Andree <matthias dot andree at gmx dot de>
* - Update to 0.6.1.sem2005-08-198-514/+55
| | | | | | - Unbreak. Approved by: portmgr (krion)
* Update the MASTER_SITES. This is the only part of PR/84815 what wasjeh2005-08-181-1/+2
| | | | | | | approved for commit during the port freeze. Submitted by: Marcus Grando <marcus@corp.grupos.com.br> Approved by: portmgr (mcl)
* Also mark phpAdsNew as affected by "pear-XML_RPC -- remote PHP codesimon2005-08-181-1/+6
| | | | | | injection vulnerability". Approved by: portmgr (blanket, VuXML)
* Add the fixed version so that people do not get a stale portaudit when the ↵remko2005-08-181-7/+7
| | | | | | | | | update is there. Also fix some indentation that i overlooked. Noticed by: simon (both of the items) Approved by: portsmgr (blanket VuXML)
* Document tor -- diffie-hellman handshake flaw.remko2005-08-181-0/+31
| | | | | Submitted by: Michal Bartkowiak <michal at nonspace dot net> Approved by: portsmgr (blanket VuXML)
* gpdf has been fixed for "xpdf -- disk fill DoS vulnerability", mark itsimon2005-08-171-0/+4
| | | | | | as such. Approved by: portmgr (blanket, VuXML)
* Add eGroupWare to the list of packages affected by "pear-XML_RPC --simon2005-08-171-0/+6
| | | | | | remote PHP code injection vulnerability". Approved by: portmgr (blanket, VuXML)
* Document acroread -- plug-in buffer overflow vulnerability.simon2005-08-171-0/+42
| | | | Approved by: portmgr (blanket, VuXML)
* Add phpmyfaq and drupal to the "pear-XML_RPC -- remote PHP codesimon2005-08-161-1/+15
| | | | | | | | | | injection vulnerability" entry since they contain an embedded version of pear-XML_RPC. Fix typo in body of the latest xpdf entry (note: no modified date bump as this is a minor typo fix which does change <affects>). Approved by: portmgr (blanket, VuXML)
* Document pear-XML_RPC -- remote PHP code injection vulnerability.simon2005-08-151-0/+36
| | | | | Submitted by: hrs Approved by: portmgr (blanket, VuXML)
* Document awstats -- arbitrary code execution vulnerability.simon2005-08-151-0/+45
| | | | Approved by: portmgr (blanket, VuXML)
* After further examination it turns out that gnugadu does not includesimon2005-08-131-2/+1
| | | | | | | | | | | | | | libgadu, at least not any in any current version, and from looking at the gnugadu code there is no direct indication that this code should actually be vulnerable to the other libgadu vulnerabilities. [1] The gaim part of libgadu -- multiple vulnerabilities was fixed in 1.4.0_1. [2] Polish translation clue: pjd [1] General clue by: markus [2] Not enough checking: simon Approved by: portmgr (blanket, VuXML)
* Remove pl-gnugadu2 and kadu from being affected by libgadu -- multiplesimon2005-08-121-5/+0
| | | | | | | vulnerabilities, since it turns out that they use libgadu from the ekg port. Approved by: portmgr (blanket, VuXML)
* Document libgadu -- multiple vulnerabilities.simon2005-08-121-0/+78
| | | | Approved by: portmgr (blanket, VuXML)
* Document gaim -- AIM/ICQ away message buffer overflow and gaim --simon2005-08-121-0/+65
| | | | | | AIM/ICQ non-UTF-8 filename crash. Approved by: portmgr (blanket, VuXML)
* Remove pdftohtml from the list of packages affected by xpdf -- disksimon2005-08-121-4/+0
| | | | | | | fill DoS vulnerability, since it includes xpdf 2, which should not be affected. Approved by: portmgr (blanket, VuXML)
* Document xpdf -- disk fill DoS vulnerability.simon2005-08-121-0/+45
| | | | Approved by: portmgr (blanket, VuXML)
* Mark apache 1.3.33_2 as fixed for apache -- http request smuggling.simon2005-08-111-2/+3
| | | | Approved by: portmgr (blanket, VuXML)
* Fix ports/84648 (Interactive tripwire's database update does not work on 5.x).cy2005-08-112-1/+15
| | | | | PR: ports/84648 Approved by: portsmgr (marcus)
* Fix a fetch error.cy2005-08-111-1/+2
| | | | Approved by: portsmgr (marcus)
* Update twpol.txt to make it current with 5.X and beyond.cy2005-08-103-1/+13
| | | | Approved by: portsmgr (marcus)
* Document gforge -- XSS and email flood vulnerabilities.simon2005-08-091-0/+46
| | | | Approved by: portmgr (blanket, VuXML)
* Fix compilation on FreeBSD 6 or later in the WITH_PTH case.lofi2005-08-092-3/+117
| | | | | Reported by: Ion-Mihai Tetcu <itetcu@people.tecnik93.com> Approved by: portmgr (clement)
* Document postnuke -- multiple vulnerabilities.simon2005-08-081-0/+47
| | | | Approved by: portmgr (blanket, VuXML)
* Document mambo -- multiple vulnerabilities.simon2005-08-051-0/+41
| | | | Approved by: portmgr (blanket, VuXML)
* Correct the ranges for the IPSec advisory and the devfs advisory.remko2005-08-051-3/+3
| | | | | | Also correct proper ranges for the zlib advisory. Approved by: portsmgr (blanket VuXML)
* Document some recent FreeBSD advisories:remko2005-08-051-0/+105
| | | | | | | | o devfs -- ruleset bypass. o zlib -- buffer overflow vulnerability. o ipsec -- Incorrect key usage in AES-XCBC-MAC. Approved by: portsmgr (blanket VuXML)
* Add some more entries to the apache -- http smuggling vulnerability.remko2005-08-041-2/+14
| | | | | | PR: ports/84312 Submitted by: Dmitry A Grigorovich <odip at bionet dot nsc dot ru> Approved by: portsmgr (blanket VuXML)
* Disable automatic tests on all versions of FreeBSD as they seem to fail inmarcus2005-08-041-4/+4
| | | | | | | a read-only port directory. More investigation is needed. Reported by: GNOME Tinderbox Approved by: portmgr (implicit)
* Disable the automatic tests on 4.X. They are known to fail.marcus2005-08-041-1/+1
| | | | | Reported by: pointyhat via kris Approved by: portmgr (implicit)
* Document proftpd -- format string vulnerabilities.simon2005-08-041-0/+37
| | | | Approved by: portmgr (blanket, VuXML)
* Note that the fix for gnupg -- OpenPGP symmetric encryptionsimon2005-08-041-0/+9
| | | | | | | vulnerability in gnupg is not complete (see entry for details). Discussed with: nectar Approved by: portmgr (blanket, VuXML)
* Mark p5-Crypt-OpenPGP, pgp, and pgpin as vulnerable to gnupg --simon2005-08-031-0/+7
| | | | | | | OpenPGP symmetric encryption vulnerability. Reminded by: nectar Approved by: portmgr (blanket, VuXML)
* Mark latest gdal version as fixed for all tiff vulnerabilities.simon2005-08-021-9/+24
|
* UPdate to DAT 4547jeh2005-08-022-3/+3
|
* Fix build failure on 4.x.kuriyama2005-08-012-0/+8
| | | | Reported by: "Sander Holthaus - Orange XL" <info@orangexl.com>
* Added nbsmtp format string vulnerability.niels2005-08-011-0/+28
| | | | Approved by: nectar (mentor)
* Mark latest the linux-tiff and pdflib ports safe from latest tiffsimon2005-08-011-1/+8
| | | | | | vulnerability. Thanks to lawrance and netchild for fast fixes.
* Update to KDE 3.4.2 / KOffice 1.4.1lofi2005-08-012-4/+4
|
* Upgrade to 1.4.2.kuriyama2005-08-014-12/+10
| | | | | PR: ports/84289 Submitted by: Vasil Dimov <vd@datamax.bg>
* Re-add IGNORE message for Alpha < 500035.marcus2005-08-011-0/+4
| | | | Reported by: mjl on #freebsd-gnome
* Update to 2.0.8.thierry2005-08-012-3/+3
| | | | | | PR: 83960 Submitted by: Babak Farrokhi <babak (at) farrokhi.net> Approved by: maintainer
* - Update to 0.97leeym2005-08-012-3/+3
| | | | | | PR: 83639 Submitted by: leeym Approved by: maintainer timeout
* Document sylpheed -- MIME-encoded file name buffer overflowsimon2005-07-311-0/+31
| | | | vulnerability.
* Document phpmyadmin -- cross site scripting vulnerability.simon2005-07-311-0/+30
|
* Document gnupg -- OpenPGP symmetric encryption vulnerability.simon2005-07-311-0/+37
| | | | Note: this is mainly a theoretical vulnerability.
* - Look for libraries in LOCALBASEsem2005-07-311-0/+1
| | | | | PR: ports/83455 Submitted by: maintainer
* Bump entry date.remko2005-07-311-1/+1
| | | | | Forgotten by: remko Spotted by: simon
* Document vim -- vulnerabilities in modeline handling: glob, expand.remko2005-07-311-0/+36
| | | | Discussed with: nectar, simon
* - Update to 20050730sem2005-07-312-3/+3
| | | | | PR: ports/84360 Submitted by: maintainer
* * Update to 3.10 [1]marcus2005-07-3110-30/+916
| | | | | | | | * Add a target for regression testing, and run that target automatically when building on the package build cluster [1] * Cleanup some portlint nits Submitted by: mi [1]
* Document that ekg -- insecure temporary file creation was fixed insimon2005-07-311-1/+2
| | | | | | 1.6r2,1. Noted by: Michal Kalkowski
* Just remove the user if BATCH is set in env, don't ask for users feedback.oliver2005-07-311-1/+1
| | | | | PR: 84349 Submitted by: Matthias Andree <matthias.andree@gmx.de>
* Add pdflib-perl, fractorama, gdal, iv, ivtools, ja-iv, ja-libimg,simon2005-07-311-3/+56
| | | | | paraview to recent libtiff vulnerabilities since they contain (and compile) an embedded version of libtiff...
* Change MAINTAINER address for ports maintained by the Security Team tosimon2005-07-313-3/+3
| | | | | | secteam@ instead of security@ to make it more clear that the ports are not maintained by the freebsd-security@ mailing list. Both addresses go to the same people.
* Document tiff -- buffer overflow vulnerability.simon2005-07-301-0/+39
|
* - Misc. markup/whitespace fixes.simon2005-07-301-39/+23
| | | | | | | - Collapse a few package entries from the latest apache entry (still matches same package names, is just shorter markup-wise). - Use standard topic style for jaberd entry. - Fix entry date for jaberd entry.
* Document jabberd vulnerabilities that were fixed by the latest update.vsevolod2005-07-301-0/+37
| | | | Approved by: perky (mentor)
* Be consistent and use the same title for the latest etherealsimon2005-07-301-1/+1
| | | | vulnerabilities as used for previous entries.
* Document opera -- image dragging vulnerability and opera -- downloadsimon2005-07-301-0/+78
| | | | dialog spoofing vulnerability.
* Document ethereal -- multiple vulnerabilities.simon2005-07-301-0/+71
|
* Fix build on amd64 with -fPICvs2005-07-301-0/+4
| | | | | | | | | | PR: ports/84156 Submitted by: Hirohisa Yamaguchi Approved by: maintainer Note w.r.t. 4.x: The .depend-issue can be fixed through 'gmake'. However, then it still needs a patch for a missing <sys/time.h>, and still won't build with neither gcc-2.95, 3.4 or 4.0, so I didn't bother.
* Pass maintainership to last submittergarga2005-07-291-1/+1
| | | | Approved by: actual maintainer
* - Update to 0.1.0.12garga2005-07-296-6/+8
| | | | | PR: ports/84281 Submitted by: rik <freebsd-ports@rikrose.net> (maintainer)
* - Fix pkg-plist and Unbreak the portgarga2005-07-292-4/+10
| | | | | | PR: ports/84261 Submitted by: Jean Milanez Melo <jmelo@freebsdbrasil.com.br> Approved by: maintainer timeout - BROKEN over to 4 months
* * Update second master sitejeh2005-07-292-4/+4
| | | | * Update to DAT 4545
* This package implements an algorithm for breaking the PkZip cipher that wasgarga2005-07-284-0/+77
| | | | | | | | | | | | | | | | | | | | | | | | | | devised by Eli Biham and Paul Kocher. This program applies a known plaintext attack to an encrypted file. A known-plaintext-attack recovers a password using the encrypted file and (part of) the unencrypted file. Please note that cryptographers use the word 'plaintext' for any kind of unencrypted data - not necessarily readable ASCII text. Before you ask why somebody may want to know the password when he already knows the plaintext think of the following situations: - Usually there's a large number of files in a ZIP-archive. Usually all these files are encrypted using the same password. So if you know one of the files, you can recover the password and decrypt the other files. - You need to know only a part of the plaintext (at least 13 bytes). Many files have commonly known headers, like DOS .EXE-files. Knowing a reasonably long header you can recover the password and decrypt the entire file. WWW: http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html PR: ports/84192 Submitted by: Emanuel Haupt <ehaupt@critical.ch>
* - Fix apache 2.1 range for CAN-2005-2088 entry which prevents apache 2.0 fromclement2005-07-281-1/+4
| | | | | | | upgrading. Pointyhat to: clement, remko Reviewed by: erwin
* Update to 0.7.9.marcus2005-07-284-12/+16
|
* Mark apache+mod_ssl-1.3.33+2.8.22_1 as not vulnerable in the latest Apache ↵remko2005-07-281-1/+2
| | | | entry.
* Patch MASTER_SITE since they seem to redirect to a second one sometimesjeh2005-07-281-1/+2
|
* - Fix startup script for miltersem2005-07-282-2/+3
| | | | | | PR: ports/84104 Submitted by: maintainer Reported by: Erin Fortenberry <kahn@deadbbs.com>
* There must be an curse. s/il/li/.remko2005-07-281-7/+7
| | | | Noticed by: nectar
* Update my latest Apache entry to make clear that this only affects certainremko2005-07-281-1/+12
| | | | | | | | installations (when Apache is used as a HTTP proxy in combination with some web servers). I didn't make that clear in the first commit. Requested by: nectar Discussed with: clement
* update to DAT 4544jeh2005-07-282-3/+3
|
* Document apache -- http request smuggling.remko2005-07-271-0/+64
| | | | | Requested by: clement Glanced at by: clement
* Add courierpasswd, a user authentication and password changing utilityade2005-07-275-0/+56
| | | | for the courier imap/pop3 system.
* - Update to 1.7ahze2005-07-272-3/+3
| | | | | PR: ports/84149 Submitted by: maintainer
* - Update to 1.2.8pav2005-07-273-15/+6
| | | | | | PR: ports/84074 Submitted by: Andrej Zverev <az@inec.ru> Approved by: Keith J. Jones <kjones@realdigitalforensics.com> (maintainer)
* Fix URL of project web site.se2005-07-271-1/+1
| | | | Submitted by: Dru Lavigne via Dan Langille
* Update to DAT 4543jeh2005-07-272-3/+3
|
* TLSWrap is a TLS/SSL FTP wrapper/proxy for UNIX and Windows, allowing you togarga2005-07-274-0/+49
| | | | | | | | | | use your favourite FTP client with any TLS/SSL-enabled FTP server. WWW: http://tlswrap.sunsite.dk/ PR: ports/84028 Submitted by: Daniel J. O'Connor <darius@dons.net.au> Thanks to: novel
* New port: Yersiniase2005-07-278-0/+386
| | | | | | | | | | | | | Yersinia is a layer 2 vulnerability scanner with support for the following protocols: - Cisco Discovery Protocol (CDP) - Dynamic Host Configuration Protocol (DHCP) - Dynamic Trunking Protocol (DTP) - Hot Standby Router Protocol (HSRP) - IEEE 802.1q - Spanning Tree Protocol (STP, RSTP) - Virtual Trunking Protocol (VTP)
* BSDsfv is a flexible and highly compatible SFV checksum utility.garga2005-07-274-0/+52
| | | | | | | | | | | | | | | | | | Features: - create SFV files, verify downloaded single files or whole releases - add banners to your SFV files - very flexible and compatible with all other SFV tools currently known, including SFVNIX compatibility mode concerning SFV files created - easy to console application - plug & play support for glFTPd and other demons including count-missing-files feature for race scripts WWW: http://bsdsfv.sourceforge.net/ PR: ports/84108 Submitted by: Emanuel Haupt <ehaupt@critical.ch> Approved by: flz (mentor)
* This utility creates .SFV (Simple File Verify) and .PAR (Parity Archive) datagarga2005-07-274-0/+56
| | | | | | | | | | | | | | | | | | | files. Features: * Recursive directories handling * Automatic checksum file naming ability in create mode * Meaningful and documented exit values for easy scripting * Wildcards for file names * Creation of PAR (Parity Archive) files * Create Multiple recovery sets if number of files in SFV greater than 255 WWW: http://pure-sfv.sourceforge.net/ PR: ports/84127 Submitted by: Emanuel Haupt <ehaupt@critical.ch> Approved by: flz (mentor)
* Set modified date in entry for previous commit.erwin2005-07-261-0/+1
| | | | Cluebat swung by: simon
* Note that the fd_set vulnerability in net/bld was fixed in 0.3.3erwin2005-07-261-1/+4
| | | | | Prodded by: garga Glanced at by: remko
* Document clamav -- multiple remote buffer overflows.hrs2005-07-251-0/+46
|
* - Update to 0.86.2sem2005-07-252-3/+3
| | | | | | PR: ports/84038 Submitted by: dawnshade <h-k@mail.ru> Approved by: maintainer
* Update to 4541jeh2005-07-252-3/+3
|
* Don't overwrite installed aide.conf by using -f FILEnork2005-07-241-1/+1
| | | | | | | | instead of -d FILE. Damaged by: ume Wept by: ume Approved by: maintainer slience
* Update to 2.2.5.mezz2005-07-249-1081/+95
| | | | | PR: ports/83927 Submitted by: Udo Schweigert <udo.schweigert@siemens.com> (maintainer)
* update to 0.57oliver2005-07-234-31/+63
|
* - update distinfoleeym2005-07-231-2/+2
| | | | | | | (I compared the new distfile with the old one. The author didn't change anything, just repacked the distfile) Noticed by: kris
* - Document isc-dhcpd -- format string vulnerabilities (oldersimon2005-07-231-1/+37
| | | | | | | vulnerabilty). [1] - Use standard title format for latest egroupware entry. Reminded by: Panagiotis Christias [1]
* This port is scheduled for deletion on 2005-09-22 if it is still brokenkris2005-07-231-0/+2
| | | | at that time and no PRs have been submitted to fix it.
* Add entry for eGroupWare's recent vulnerabilities.kuriyama2005-07-231-0/+31
|
* Document denial of service attack in fetchmail 6.5.2.1.barner2005-07-221-0/+30
| | | | | Reported by: Matthias Andree <matthias.andree@gmx.de> Reviewed by: simon
* Update my email address.vsevolod2005-07-227-7/+7
| | | | Approved by: perky (mentor)
* Update phppgadmin entry to note that it was fixed in 3.5.4 and add asimon2005-07-221-1/+4
| | | | | | few references while here anyway. Prodded by: Tobias Roth (I think :-) )
* Change MASTERSITE from ~renato to ~garga because I change my accountgarga2005-07-221-1/+1
| | | | | | here Approved by: flz (mentor)
* Document dnrd -- remote buffer and stack overflow vulnerabilities.simon2005-07-221-0/+33
|
* Fix typo in last commitsimon2005-07-211-1/+1
| | | | Noticed by: Matthias Andree <matthias.andree@gmx.de>
* Add more references to latest fetchmail entry [1] and sort referencessimon2005-07-211-1/+4
| | | | | | while here anyway. Submitted by: Matthias Andree <matthias.andree@gmx.de> [1]
* - Fix a bug in SHA256sem2005-07-212-0/+12
| | | | | | PR: ports/76289 Reported by: Kenichi Morioka <morioka@openloop.co.jp> Fixed by: Vsevolod Stakhov <vsevolod@highsecure.ru> (maintainer)
* - Update to 1.3.5pav2005-07-215-44/+10
| | | | | PR: ports/83823 Submitted by: Travis Poppe <tlp@liquidx.org>
* Document an issue with the LDAP backend provided by PowerDNS.trhodes2005-07-211-0/+30
|
* BROKEN on !i386: Does not compilekris2005-07-211-0/+4
|
* Document fetchmail -- remote root/code injection from malicious POP3simon2005-07-211-0/+28
| | | | | | server. Submitted by: Matthias Andree <matthias.andree@gmx.de>