aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* Update to DAT 4577jeh2005-09-092-3/+3
|
* Update to version 3.90krion2005-09-082-3/+4
|
* Assign maintainership to daniel@roe.chkrion2005-09-081-1/+1
| | | | | PR: ports/85855 Submitted by: Daniel Roethlisberger <daniel@roe.ch>
* Update to DAT 4576jeh2005-09-082-3/+3
|
* s/BROKEN/IGNORE/lawrance2005-09-071-1/+1
| | | | | | | | | | | Reported by: linimon Log: Mark broken for OSVERSION >= 500000. Does not build without S/Key libraries and headers. PR: ports/85256 Submitted by: Christoph Weber-Fahr <wefa@tnd37.tnd.arcor.net>
* Mark broken for OSVERSION >= 500000. Does not build withoutlawrance2005-09-071-0/+4
| | | | | | | S/Key libraries and headers. PR: ports/85256 Submitted by: Christoph Weber-Fahr <wefa@tnd37.tnd.arcor.net>
* Forgot to uncomment OPTIONS after testing.novel2005-09-071-4/+4
| | | | Noted by: David Thiel <lx@redundancy.redundancy.org>
* Mark the latest version of cups-base fixed for "xpdf -- disk fill DoSlawrance2005-09-071-2/+2
| | | | vulnerability"
* - Patch file updated to process rule numbers above 999.leeym2005-09-073-10/+2
| | | | | | | | - remove redundant entries in pkg-plist PR: 85189 Submitted by: Michael Butler Reviewed by: Michael Ranner <mranner@inode.at> (maintainer)
* Update to DAT 4575jeh2005-09-072-3/+3
|
* Add ncrypt 0.7.0, advanced AES file encryption tool.garga2005-09-066-0/+72
| | | | | PR: ports/85486 Submitted by: Frank Laszlo <laszlof@vonostingroup.com>
* - Pass maintainership to submitter, since he sent the last patch.garga2005-09-061-1/+1
| | | | | PR: ports/85775 Submitted by: Marcus Alves Grando <marcus@corp.grupos.com.br>
* Update to DAT 4574jeh2005-09-062-3/+3
|
* Update WWW and MASTER_SITES.demon2005-09-062-2/+3
|
* Fix build with openssl-0.9.8.demon2005-09-063-12/+51
| | | | | PR: 85309 Submitted by: Daniel Roethlisberger <daniel@roe.ch>
* Update to 0.4.4.marcus2005-09-064-8/+6
|
* Add IPSec tools port - the new "official" version of racoon,vsevolod2005-09-056-0/+185
| | | | | | | | is the only one which is maintained and have lots of new features. PR: 85544 Submitted by: VANHULLEBUS Yvan <vanhu@netasq.com> Approved by: perky (mentor)
* - clamsmtp 1.5 works only in debug mode.clsung2005-09-053-3/+60
| | | | | | | | | | Included patch fix this bug by moving socket creation after daemonizing as suggested in mailing list clamsmtp-users@lists.sourceforge.net http://sourceforge.net/mailarchive/forum.php?thread_id=8060741&forum_id=42732 - bump PORTREVISION PR: ports/85706 Submitted by: Alex L. Demidov <alexd AT vinf dot ru>
* Revert back to devel/bisonade2005-09-051-1/+1
|
* - Update to 1.1sem2005-09-055-43/+4
| | | | | PR: ports/85585 Submitted by: maintainer
* - Update to 1.1.4sem2005-09-053-4/+5
| | | | | PR: ports/84725 Submitted by: maintainer
* Add forgotten </package> line.remko2005-09-041-0/+1
| | | | Spotted by: simon
* Mark b2evolution prior to 0.9.0.12_2 vulnerable to the XML_RPC remote php ↵remko2005-09-041-1/+5
| | | | | | code injection vulnerability. Inspired by: pav's commit, updating the port.
* - Unbreak vpnc-disconnect by fixing the config.c patchlawrance2005-09-043-19/+18
| | | | | | | | | | - Remove obsolete vpnc-wrapper leftovers to make portlint happy - Use PLIST_FILES and PORTDOCS instead of pkg-plist - Bump PORTREVISION PR: ports/84491 Submitted by: Daniel Roethlisberger <daniel@roe.ch> Approved by: Christian Lackas <delta@lackas.net> (maintainer)
* Document htdig -- cross site scripting vulnerability.remko2005-09-041-0/+29
| | | | Reviewed by: simon
* - Document two squid security related issues.sem2005-09-041-0/+55
| | | | | PR: ports/85688 Submitted by: Thomas-Martin Seck <tmseck@netcologne.de> (squid maintainer)
* Document bind9 -- denial of service.remko2005-09-041-0/+44
| | | | | | | Also merge the FreeBSD-SA-05:12.bind9 advisory in the entry. [1] Suggested by: simon [1] Reviewed by: simon
* Bcrypt is a blowfish file encryption utility which aims for cross-platformsem2005-09-044-0/+54
| | | | | | | portability. PR: ports/84798 Submitted by: Emanuel Haupt <ehaupt@critical.ch>
* ipguard listens network for ARP packets. All permitted MAC/IP pairssem2005-09-047-0/+83
| | | | | | | | | | listed in 'ethers' file. If it recieves one with MAC/IP pair, which is not listed in 'ethers' file, it will send ARP reply with configured fake address. This will prevent not permitted host to work properly in this ethernet segment. Especially Windows(TM) hosts. PR: ports/84627, ports/85671 Submitted by: SeaD <sead@mail.ru>
* Document bind -- buffer overrun vulnerabilityremko2005-09-041-0/+28
|
* - update to 2.15leeym2005-09-042-4/+5
| | | | | PR: 85550 Submitted by: Tsung-Han Yeh <snowfly@yuntech.edu.tw>
* - version 1.5 must start with '-d 4'clsung2005-09-032-3/+3
| | | | | (Thanks to Jack Raats <jack AT raats dot org>) - bump PORTREVISION
* Update to 4.1.9.novel2005-09-033-7/+22
| | | | | PR: 85673 Submitted by: David Thiel (maintainer)
* Correctly fix RUN_DEPENDSade2005-09-031-1/+1
|
* Update to DAT 4573jeh2005-09-032-3/+3
|
* Add p5-Net-Daemon-SSL 1.0, perl5 extension for portable daemons.garga2005-09-035-0/+42
| | | | | PR: ports/85125 Submitted by: Simon Dick <simond@irrelevant.org>
* Fix build on 4-stable: Use ports version of libpcap since system versionse2005-09-031-1/+7
| | | | is too old.
* Compile errors on ia64 and sparc64, do not build on those archs.se2005-09-031-0/+1
|
* - Update to 0.1.0.14garga2005-09-026-10/+28
| | | | | PR: ports/85635 Submitted by: maintainer
* Add a more or less bogus reference section to the last entry, to make itsimon2005-09-021-0/+7
| | | | | | | a valid entry. The reference simply references the VuXML entry itself, but at least it fixes the build for now. Missed by: simon
* Document stack overflow vulnerabilities in games/urban.jylefort2005-09-021-0/+22
| | | | Approved by: simon
* Update to DAT 4572jeh2005-09-022-3/+3
|
* - Switch bison dependency to bison175 portpav2005-09-021-1/+2
|
* Add p5-Net-OpenID-Server.jylefort2005-09-025-0/+50
| | | | | | | | | | | | | | | | | | | | OpenID is a decentralized identity system, but one that's actually decentralized and doesn't entirely crumble if one company turns evil or goes out of business. An OpenID identity is just a URL. You can have multiple identities in the same way you can have multiple URLs. All OpenID does is provide a way to prove that you own a URL (identity). Anybody can run their own site using OpenID, and anybody can be an OpenID server, and they all work with each other without having to register with or pay anybody to "get started". An owner of a URL can pick which OpenID server to use. WWW: http://www.openid.net PR: ports/85284 Submitted by: Alex Kapranoff <kappa@rambler-co.ru>
* Add p5-Data-Password.jylefort2005-09-025-0/+37
| | | | | | | | | | | | | Data::Password checks potential passwords for crackability. It checks that the password has the appropriate length, that it has enough character groups, that it does not contain the same characters repeatedly, that it does not contain ascending or descending characters, or characters close to each other on the keyboard. It also searches for the password in the ispell word file. WWW: http://search.cpan.org/~razinf/Data-Password/ PR: ports/84513 Submitted by: ports@c0decafe.net
* - Update to 4.2p1garga2005-09-025-146/+70
| | | | | PR: ports/85578 Submitted by: Marcus Grando <marcus@corp.grupos.com.br>
* Fix build with openldap23 libraries.vsevolod2005-09-011-1/+1
| | | | Submitted by: skv
* Remove mastersite which has gone away.linimon2005-09-012-3/+1
|
* Update snortsms to version 1.0.0lawrance2005-09-013-7/+41
| | | | | | | - what a lovely number! PR: ports/85500 Submitted by: J Randolph <snortsms@servangle.net> (maintainer)
* - Update to 0.4.5pav2005-09-013-24/+35
| | | | | PR: ports/85332 Submitted by: ports@c0decafe.net <ports@c0decafe.net> (maintainer)
* Update to DAT 4571jeh2005-09-012-3/+3
|
* - Update to 0.76sergei2005-08-312-5/+5
|
* Update to 0.9skv2005-08-313-7/+7
|
* - Update to 2.0.9pav2005-08-312-7/+30
| | | | | | | | | - samhainrc.sample file is chgrp'd to wheel - RUNAS_USER now defaults to "yule" properly - XML logging is now on by default and tunable PR: ports/85448 Submitted by: David Thiel <lx@redundancy.redundancy.org> (maintainer)
* - Bandaid compilation on FreeBSD 5.2.1pav2005-08-311-0/+4
| | | | | | PR: ports/84131 Submitted by: Thorolf <thorolf@grid.einherjar.de> Approved by: maintainer timeout (1 month)
* - Revert back to MASTER_SITE_MOZILLApav2005-08-311-5/+2
|
* The distfile was rerolled to include a dbm subdirectory (which we no longermarcus2005-08-312-9/+6
| | | | | use), and a RELEASE bump. There is no need to reinstall this port if you already have it installed.
* Now that misc/compat5x exists use the FreeBSD 5 binary on FreeBSD > 600004marius2005-08-311-4/+4
| | | | | | | rather than the FreeBSD 4 binary. Prodded by: ache Approved by: netchild
* Update to 1.8.novel2005-08-312-10/+10
| | | | | | PR: 85476 Submitted by: Andrej Zverev <az@inec.ru> Approved by: Frank Laszlo (maintainer)
* Update to DAT 4570jeh2005-08-312-3/+3
|
* - Distfile was rerolled; put old distfile on MASTER_SITE_LOCAL for nowpav2005-08-301-2/+5
| | | | Reported by: few
* - Pass maintainership of gnutls, libtasn1 and opencdk ports tosergei2005-08-303-3/+3
| | | | Roman Bogorodskiy (novel) who kindly agreed to look after them
* - Remove gnutls-devel port: this development version of GnuTLS librarysergei2005-08-304-122/+0
| | | | | is no longer being released upstream since 1.2.0 update of the stable branch. Thus, it does not make sense that we keep it anymore.
* - Disconnect gnutls-devel from the parent Makefile prior to removalsergei2005-08-301-1/+0
|
* upgrade to 0.0.16ijliao2005-08-304-4/+7
| | | | | PR: 85388 Submitted by: Ports Fury
* upgrade to 0.0.22ijliao2005-08-303-3/+5
| | | | | PR: 85389 Submitted by: Ports Fury
* Remove old library compatibility checking.sumikawa2005-08-301-4/+0
| | | | It was necessary for 4.0-RELEASE.
* Mark latest evolution port version as fixed wrt. evolution -- remotesimon2005-08-301-1/+2
| | | | format string vulnerabilities.
* - Update to 2.0.2 that brings these upstream changes:garga2005-08-309-162/+9
| | | | | | | | | | - fix bug that would exhaust file descriptors as the routing table was modified (this had already been part of the port previously) - fix bug that would block the management socket until the peer connected - fix pkitool sh incompatibilities (from NetBSD) PR: ports/85299 Submitted by: maintainer
* Update to DAT 4569jeh2005-08-302-4/+3
|
* Add entry for fswiki's vuln.kuriyama2005-08-291-0/+22
|
* - Update to 1.06pav2005-08-294-16/+84
| | | | | | | | | - Provide options for new mathematical backends - Transfer maintainership to submitter PR: ports/83040 Submitted by: Wesley Shields <wxs@csh.rit.edu> Approved by: Afarsec <afarsec@012.net.il> (maintainer)
* - Update to 1.3.6sem2005-08-293-9/+9
| | | | | | | | - Update WWW in pkg-descr - Pass maintainership to submitter PR: ports/84998 Submitted by: Emanuel Haupt <ehaupt@critical.ch>
* - Update to 1.5.0sem2005-08-295-24/+39
| | | | | | | | - Reformat pkg-descr - Pass maintainership to submitter PR: ports/85002 Submitted by: Emanuel Haupt <ehaupt@critical.ch>
* - Update to 0.75sergei2005-08-293-10/+30
| | | | - Chase changed location of bglibs files
* Update to DAT 4568jeh2005-08-292-3/+3
|
* Dante 1.1.15 is no longer affected by the fd_set bitmap index overflow.niels2005-08-291-2/+5
| | | | | | Updated the version in VuXML (was 0). Approved by: nectar (mentor)
* Update amavisd-new to 2.3.3. [1]lesi2005-08-293-5/+3
| | | | | | | Start amavisd as root so that it works both with and without chroot. [2] PR: ports/85241 [1], ports/83988 [2] Submitted by: Blaz Zupan (maintainer)
* - Update to 1.5clsung2005-08-292-3/+3
| | | | | PR: 85404 Submitted by: Marcus Grando <marcus AT corp dot grupos dot com dot br>
* - Fill out part of the std. VuXML template missed in the last entry.simon2005-08-291-2/+3
| | | | | | | - Mark acroread 7.0.1 as fixed for acroread -- XML External Entity vulnerability. [1] Reported by: Sverre H. Huseby [1]
* Update to 1.3lioux2005-08-293-96/+13
|
* Update to 0.2.7krion2005-08-282-3/+3
|
* Chase the libsoup shared lib version.marcus2005-08-281-1/+2
|
* Chase the Gaim 1.5.0 update.marcus2005-08-284-4/+4
|
* Document evolution -- remote format string vulnerabilities.simon2005-08-281-0/+43
| | | | Approved by: portmgr (blanket, VuXML)
* Document pam_ldap -- authentication bypass vulnerability.simon2005-08-281-0/+32
| | | | Approved by: portmgr (blanket, VuXML)
* Update to 1.8.0.marcus2005-08-284-11/+8
| | | | | | | Security: Fixes a security vulnerability described at http://www.kb.cert.org/vuls/id/778916 Requested by: simon Approved by: portmgr (implicit)
* Mark phpgroupware as vulnerable to pear-XML_RPC -- remote PHP codesimon2005-08-281-1/+6
| | | | | | | injection vulnerability. Reported by: olgeni Approved by: portmgr (blanket, VuXML)
* Document pcre -- regular expression buffer overflow.simon2005-08-271-0/+29
| | | | Approved by: portmgr (blanket, VuXML)
* Fix build on 6.xkrion2005-08-261-0/+3
| | | | | Submitted by: lesi Approved by: portmgr (self)
* Fix build on 6.xkrion2005-08-241-0/+14
| | | | Approved by: portmgr (self)
* Fix for broken build under 4.X.cy2005-08-241-4/+7
| | | | Approved by: portsmgr (clement)
* Mark latest awstats port as fixed for awstats -- arbitrary codesimon2005-08-241-1/+2
| | | | | | execution vulnerability. Approved by: portmgr (blanket, VuXML)
* Document mail/elm remote buffer overflow vulnerability.sem2005-08-241-0/+34
| | | | | | PR: ports/85225 Submitted by: Kevin Day <toasty@dragondata.com> (elm maintainer) Approved by: portmgr (blanket, VuXML)
* Fix a typo in the new rc file, where documentation didn't match thegarga2005-08-226-6/+9
| | | | | | | | | actual variables. PR: ports/85156 Submitted by: maintainer Reported by: Benjamin Lutz <benlutz@datacomm.ch> Approved by: portmgr (krion)
* Fix so the distfile can be manually fetched for package buildinglawrance2005-08-201-16/+11
| | | | | | PR: ports/84573 Submitted by: Adi Pircalabu <apircalabu@bitdefender.com> (maintainer) Approved by: portmgr (krion)
* - Security update to version 2.0.1, fixing four denial of service bugs,garga2005-08-2021-168/+471
| | | | | | | | | | | | | | | | | CAN-2005-2531, CAN-2005-2532, CAN-2005-2533, CAN-2005-2534 - Drop old init script and add a modern rcNG script in its place, requested by Matthias Grimm and Dirk Gouders (although the script below is one I, Matthias Andree, wrote). It can automatically load tun/tap drivers. - move pkg-message to files/pkg-message.in, revise it, list it in SUB_FILES to expand ${PREFIX}. - print pkg-message after installation from port - switch to official "make check" as smoke-test, rather than wiring our own. - prefer LZO2 in most situations, as OpenVPN will pick up LZO2 rather than LZO1 if both are installed. PR: ports/85109 Submitted by: maintainer Approved by: portmgr (krion)
* Document four vulnerabilities in openvpn:remko2005-08-191-0/+123
| | | | | | | | | | * openvpn -- multiple TCP clients connecting with the same certificate at the same time can crash the server * openvpn -- denial of service: malicious authenticated &quot;tap&quot; client can deplete server virtual memory * openvpn -- denial of service: undecryptable packet from authorized client can disconnect unrelated clients * openvpn -- denial of service: client certificate validation can disconnect unrelated clients Approved by: portsmgr (blanket VuXML) Submitted by: Matthias Andree <matthias dot andree at gmx dot de>
* - Update to 0.6.1.sem2005-08-198-514/+55
| | | | | | - Unbreak. Approved by: portmgr (krion)
* Update the MASTER_SITES. This is the only part of PR/84815 what wasjeh2005-08-181-1/+2
| | | | | | | approved for commit during the port freeze. Submitted by: Marcus Grando <marcus@corp.grupos.com.br> Approved by: portmgr (mcl)
* Also mark phpAdsNew as affected by "pear-XML_RPC -- remote PHP codesimon2005-08-181-1/+6
| | | | | | injection vulnerability". Approved by: portmgr (blanket, VuXML)
* Add the fixed version so that people do not get a stale portaudit when the ↵remko2005-08-181-7/+7
| | | | | | | | | update is there. Also fix some indentation that i overlooked. Noticed by: simon (both of the items) Approved by: portsmgr (blanket VuXML)
* Document tor -- diffie-hellman handshake flaw.remko2005-08-181-0/+31
| | | | | Submitted by: Michal Bartkowiak <michal at nonspace dot net> Approved by: portsmgr (blanket VuXML)
* gpdf has been fixed for "xpdf -- disk fill DoS vulnerability", mark itsimon2005-08-171-0/+4
| | | | | | as such. Approved by: portmgr (blanket, VuXML)
* Add eGroupWare to the list of packages affected by "pear-XML_RPC --simon2005-08-171-0/+6
| | | | | | remote PHP code injection vulnerability". Approved by: portmgr (blanket, VuXML)
* Document acroread -- plug-in buffer overflow vulnerability.simon2005-08-171-0/+42
| | | | Approved by: portmgr (blanket, VuXML)
* Add phpmyfaq and drupal to the "pear-XML_RPC -- remote PHP codesimon2005-08-161-1/+15
| | | | | | | | | | injection vulnerability" entry since they contain an embedded version of pear-XML_RPC. Fix typo in body of the latest xpdf entry (note: no modified date bump as this is a minor typo fix which does change <affects>). Approved by: portmgr (blanket, VuXML)
* Document pear-XML_RPC -- remote PHP code injection vulnerability.simon2005-08-151-0/+36
| | | | | Submitted by: hrs Approved by: portmgr (blanket, VuXML)
* Document awstats -- arbitrary code execution vulnerability.simon2005-08-151-0/+45
| | | | Approved by: portmgr (blanket, VuXML)
* After further examination it turns out that gnugadu does not includesimon2005-08-131-2/+1
| | | | | | | | | | | | | | libgadu, at least not any in any current version, and from looking at the gnugadu code there is no direct indication that this code should actually be vulnerable to the other libgadu vulnerabilities. [1] The gaim part of libgadu -- multiple vulnerabilities was fixed in 1.4.0_1. [2] Polish translation clue: pjd [1] General clue by: markus [2] Not enough checking: simon Approved by: portmgr (blanket, VuXML)
* Remove pl-gnugadu2 and kadu from being affected by libgadu -- multiplesimon2005-08-121-5/+0
| | | | | | | vulnerabilities, since it turns out that they use libgadu from the ekg port. Approved by: portmgr (blanket, VuXML)
* Document libgadu -- multiple vulnerabilities.simon2005-08-121-0/+78
| | | | Approved by: portmgr (blanket, VuXML)
* Document gaim -- AIM/ICQ away message buffer overflow and gaim --simon2005-08-121-0/+65
| | | | | | AIM/ICQ non-UTF-8 filename crash. Approved by: portmgr (blanket, VuXML)
* Remove pdftohtml from the list of packages affected by xpdf -- disksimon2005-08-121-4/+0
| | | | | | | fill DoS vulnerability, since it includes xpdf 2, which should not be affected. Approved by: portmgr (blanket, VuXML)
* Document xpdf -- disk fill DoS vulnerability.simon2005-08-121-0/+45
| | | | Approved by: portmgr (blanket, VuXML)
* Mark apache 1.3.33_2 as fixed for apache -- http request smuggling.simon2005-08-111-2/+3
| | | | Approved by: portmgr (blanket, VuXML)
* Fix ports/84648 (Interactive tripwire's database update does not work on 5.x).cy2005-08-112-1/+15
| | | | | PR: ports/84648 Approved by: portsmgr (marcus)
* Fix a fetch error.cy2005-08-111-1/+2
| | | | Approved by: portsmgr (marcus)
* Update twpol.txt to make it current with 5.X and beyond.cy2005-08-103-1/+13
| | | | Approved by: portsmgr (marcus)
* Document gforge -- XSS and email flood vulnerabilities.simon2005-08-091-0/+46
| | | | Approved by: portmgr (blanket, VuXML)
* Fix compilation on FreeBSD 6 or later in the WITH_PTH case.lofi2005-08-092-3/+117
| | | | | Reported by: Ion-Mihai Tetcu <itetcu@people.tecnik93.com> Approved by: portmgr (clement)
* Document postnuke -- multiple vulnerabilities.simon2005-08-081-0/+47
| | | | Approved by: portmgr (blanket, VuXML)
* Document mambo -- multiple vulnerabilities.simon2005-08-051-0/+41
| | | | Approved by: portmgr (blanket, VuXML)
* Correct the ranges for the IPSec advisory and the devfs advisory.remko2005-08-051-3/+3
| | | | | | Also correct proper ranges for the zlib advisory. Approved by: portsmgr (blanket VuXML)
* Document some recent FreeBSD advisories:remko2005-08-051-0/+105
| | | | | | | | o devfs -- ruleset bypass. o zlib -- buffer overflow vulnerability. o ipsec -- Incorrect key usage in AES-XCBC-MAC. Approved by: portsmgr (blanket VuXML)
* Add some more entries to the apache -- http smuggling vulnerability.remko2005-08-041-2/+14
| | | | | | PR: ports/84312 Submitted by: Dmitry A Grigorovich <odip at bionet dot nsc dot ru> Approved by: portsmgr (blanket VuXML)
* Disable automatic tests on all versions of FreeBSD as they seem to fail inmarcus2005-08-041-4/+4
| | | | | | | a read-only port directory. More investigation is needed. Reported by: GNOME Tinderbox Approved by: portmgr (implicit)
* Disable the automatic tests on 4.X. They are known to fail.marcus2005-08-041-1/+1
| | | | | Reported by: pointyhat via kris Approved by: portmgr (implicit)
* Document proftpd -- format string vulnerabilities.simon2005-08-041-0/+37
| | | | Approved by: portmgr (blanket, VuXML)
* Note that the fix for gnupg -- OpenPGP symmetric encryptionsimon2005-08-041-0/+9
| | | | | | | vulnerability in gnupg is not complete (see entry for details). Discussed with: nectar Approved by: portmgr (blanket, VuXML)
* Mark p5-Crypt-OpenPGP, pgp, and pgpin as vulnerable to gnupg --simon2005-08-031-0/+7
| | | | | | | OpenPGP symmetric encryption vulnerability. Reminded by: nectar Approved by: portmgr (blanket, VuXML)
* Mark latest gdal version as fixed for all tiff vulnerabilities.simon2005-08-021-9/+24
|
* UPdate to DAT 4547jeh2005-08-022-3/+3
|
* Fix build failure on 4.x.kuriyama2005-08-012-0/+8
| | | | Reported by: "Sander Holthaus - Orange XL" <info@orangexl.com>
* Added nbsmtp format string vulnerability.niels2005-08-011-0/+28
| | | | Approved by: nectar (mentor)
* Mark latest the linux-tiff and pdflib ports safe from latest tiffsimon2005-08-011-1/+8
| | | | | | vulnerability. Thanks to lawrance and netchild for fast fixes.
* Update to KDE 3.4.2 / KOffice 1.4.1lofi2005-08-012-4/+4
|
* Upgrade to 1.4.2.kuriyama2005-08-014-12/+10
| | | | | PR: ports/84289 Submitted by: Vasil Dimov <vd@datamax.bg>
* Re-add IGNORE message for Alpha < 500035.marcus2005-08-011-0/+4
| | | | Reported by: mjl on #freebsd-gnome
* Update to 2.0.8.thierry2005-08-012-3/+3
| | | | | | PR: 83960 Submitted by: Babak Farrokhi <babak (at) farrokhi.net> Approved by: maintainer
* - Update to 0.97leeym2005-08-012-3/+3
| | | | | | PR: 83639 Submitted by: leeym Approved by: maintainer timeout
* Document sylpheed -- MIME-encoded file name buffer overflowsimon2005-07-311-0/+31
| | | | vulnerability.
* Document phpmyadmin -- cross site scripting vulnerability.simon2005-07-311-0/+30
|
* Document gnupg -- OpenPGP symmetric encryption vulnerability.simon2005-07-311-0/+37
| | | | Note: this is mainly a theoretical vulnerability.
* - Look for libraries in LOCALBASEsem2005-07-311-0/+1
| | | | | PR: ports/83455 Submitted by: maintainer
* Bump entry date.remko2005-07-311-1/+1
| | | | | Forgotten by: remko Spotted by: simon
* Document vim -- vulnerabilities in modeline handling: glob, expand.remko2005-07-311-0/+36
| | | | Discussed with: nectar, simon
* - Update to 20050730sem2005-07-312-3/+3
| | | | | PR: ports/84360 Submitted by: maintainer
* * Update to 3.10 [1]marcus2005-07-3110-30/+916
| | | | | | | | * Add a target for regression testing, and run that target automatically when building on the package build cluster [1] * Cleanup some portlint nits Submitted by: mi [1]
* Document that ekg -- insecure temporary file creation was fixed insimon2005-07-311-1/+2
| | | | | | 1.6r2,1. Noted by: Michal Kalkowski
* Just remove the user if BATCH is set in env, don't ask for users feedback.oliver2005-07-311-1/+1
| | | | | PR: 84349 Submitted by: Matthias Andree <matthias.andree@gmx.de>
* Add pdflib-perl, fractorama, gdal, iv, ivtools, ja-iv, ja-libimg,simon2005-07-311-3/+56
| | | | | paraview to recent libtiff vulnerabilities since they contain (and compile) an embedded version of libtiff...
* Change MAINTAINER address for ports maintained by the Security Team tosimon2005-07-313-3/+3
| | | | | | secteam@ instead of security@ to make it more clear that the ports are not maintained by the freebsd-security@ mailing list. Both addresses go to the same people.
* Document tiff -- buffer overflow vulnerability.simon2005-07-301-0/+39
|
* - Misc. markup/whitespace fixes.simon2005-07-301-39/+23
| | | | | | | - Collapse a few package entries from the latest apache entry (still matches same package names, is just shorter markup-wise). - Use standard topic style for jaberd entry. - Fix entry date for jaberd entry.
* Document jabberd vulnerabilities that were fixed by the latest update.vsevolod2005-07-301-0/+37
| | | | Approved by: perky (mentor)
* Be consistent and use the same title for the latest etherealsimon2005-07-301-1/+1
| | | | vulnerabilities as used for previous entries.
* Document opera -- image dragging vulnerability and opera -- downloadsimon2005-07-301-0/+78
| | | | dialog spoofing vulnerability.
* Document ethereal -- multiple vulnerabilities.simon2005-07-301-0/+71
|
* Fix build on amd64 with -fPICvs2005-07-301-0/+4
| | | | | | | | | | PR: ports/84156 Submitted by: Hirohisa Yamaguchi Approved by: maintainer Note w.r.t. 4.x: The .depend-issue can be fixed through 'gmake'. However, then it still needs a patch for a missing <sys/time.h>, and still won't build with neither gcc-2.95, 3.4 or 4.0, so I didn't bother.
* Pass maintainership to last submittergarga2005-07-291-1/+1
| | | | Approved by: actual maintainer
* - Update to 0.1.0.12garga2005-07-296-6/+8
| | | | | PR: ports/84281 Submitted by: rik <freebsd-ports@rikrose.net> (maintainer)
* - Fix pkg-plist and Unbreak the portgarga2005-07-292-4/+10
| | | | | | PR: ports/84261 Submitted by: Jean Milanez Melo <jmelo@freebsdbrasil.com.br> Approved by: maintainer timeout - BROKEN over to 4 months
* * Update second master sitejeh2005-07-292-4/+4
| | | | * Update to DAT 4545
* This package implements an algorithm for breaking the PkZip cipher that wasgarga2005-07-284-0/+77
| | | | | | | | | | | | | | | | | | | | | | | | | | devised by Eli Biham and Paul Kocher. This program applies a known plaintext attack to an encrypted file. A known-plaintext-attack recovers a password using the encrypted file and (part of) the unencrypted file. Please note that cryptographers use the word 'plaintext' for any kind of unencrypted data - not necessarily readable ASCII text. Before you ask why somebody may want to know the password when he already knows the plaintext think of the following situations: - Usually there's a large number of files in a ZIP-archive. Usually all these files are encrypted using the same password. So if you know one of the files, you can recover the password and decrypt the other files. - You need to know only a part of the plaintext (at least 13 bytes). Many files have commonly known headers, like DOS .EXE-files. Knowing a reasonably long header you can recover the password and decrypt the entire file. WWW: http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html PR: ports/84192 Submitted by: Emanuel Haupt <ehaupt@critical.ch>
* - Fix apache 2.1 range for CAN-2005-2088 entry which prevents apache 2.0 fromclement2005-07-281-1/+4
| | | | | | | upgrading. Pointyhat to: clement, remko Reviewed by: erwin
* Update to 0.7.9.marcus2005-07-284-12/+16
|
* Mark apache+mod_ssl-1.3.33+2.8.22_1 as not vulnerable in the latest Apache ↵remko2005-07-281-1/+2
| | | | entry.
* Patch MASTER_SITE since they seem to redirect to a second one sometimesjeh2005-07-281-1/+2
|
* - Fix startup script for miltersem2005-07-282-2/+3
| | | | | | PR: ports/84104 Submitted by: maintainer Reported by: Erin Fortenberry <kahn@deadbbs.com>
* There must be an curse. s/il/li/.remko2005-07-281-7/+7
| | | | Noticed by: nectar
* Update my latest Apache entry to make clear that this only affects certainremko2005-07-281-1/+12
| | | | | | | | installations (when Apache is used as a HTTP proxy in combination with some web servers). I didn't make that clear in the first commit. Requested by: nectar Discussed with: clement
* update to DAT 4544jeh2005-07-282-3/+3
|
* Document apache -- http request smuggling.remko2005-07-271-0/+64
| | | | | Requested by: clement Glanced at by: clement
* Add courierpasswd, a user authentication and password changing utilityade2005-07-275-0/+56
| | | | for the courier imap/pop3 system.
* - Update to 1.7ahze2005-07-272-3/+3
| | | | | PR: ports/84149 Submitted by: maintainer
* - Update to 1.2.8pav2005-07-273-15/+6
| | | | | | PR: ports/84074 Submitted by: Andrej Zverev <az@inec.ru> Approved by: Keith J. Jones <kjones@realdigitalforensics.com> (maintainer)
* Fix URL of project web site.se2005-07-271-1/+1
| | | | Submitted by: Dru Lavigne via Dan Langille
* Update to DAT 4543jeh2005-07-272-3/+3
|
* TLSWrap is a TLS/SSL FTP wrapper/proxy for UNIX and Windows, allowing you togarga2005-07-274-0/+49
| | | | | | | | | | use your favourite FTP client with any TLS/SSL-enabled FTP server. WWW: http://tlswrap.sunsite.dk/ PR: ports/84028 Submitted by: Daniel J. O'Connor <darius@dons.net.au> Thanks to: novel
* New port: Yersiniase2005-07-278-0/+386
| | | | | | | | | | | | | Yersinia is a layer 2 vulnerability scanner with support for the following protocols: - Cisco Discovery Protocol (CDP) - Dynamic Host Configuration Protocol (DHCP) - Dynamic Trunking Protocol (DTP) - Hot Standby Router Protocol (HSRP) - IEEE 802.1q - Spanning Tree Protocol (STP, RSTP) - Virtual Trunking Protocol (VTP)
* BSDsfv is a flexible and highly compatible SFV checksum utility.garga2005-07-274-0/+52
| | | | | | | | | | | | | | | | | | Features: - create SFV files, verify downloaded single files or whole releases - add banners to your SFV files - very flexible and compatible with all other SFV tools currently known, including SFVNIX compatibility mode concerning SFV files created - easy to console application - plug & play support for glFTPd and other demons including count-missing-files feature for race scripts WWW: http://bsdsfv.sourceforge.net/ PR: ports/84108 Submitted by: Emanuel Haupt <ehaupt@critical.ch> Approved by: flz (mentor)
* This utility creates .SFV (Simple File Verify) and .PAR (Parity Archive) datagarga2005-07-274-0/+56
| | | | | | | | | | | | | | | | | | | files. Features: * Recursive directories handling * Automatic checksum file naming ability in create mode * Meaningful and documented exit values for easy scripting * Wildcards for file names * Creation of PAR (Parity Archive) files * Create Multiple recovery sets if number of files in SFV greater than 255 WWW: http://pure-sfv.sourceforge.net/ PR: ports/84127 Submitted by: Emanuel Haupt <ehaupt@critical.ch> Approved by: flz (mentor)
* Set modified date in entry for previous commit.erwin2005-07-261-0/+1
| | | | Cluebat swung by: simon
* Note that the fd_set vulnerability in net/bld was fixed in 0.3.3erwin2005-07-261-1/+4
| | | | | Prodded by: garga Glanced at by: remko
* Document clamav -- multiple remote buffer overflows.hrs2005-07-251-0/+46
|
* - Update to 0.86.2sem2005-07-252-3/+3
| | | | | | PR: ports/84038 Submitted by: dawnshade <h-k@mail.ru> Approved by: maintainer
* Update to 4541jeh2005-07-252-3/+3
|
* Don't overwrite installed aide.conf by using -f FILEnork2005-07-241-1/+1
| | | | | | | | instead of -d FILE. Damaged by: ume Wept by: ume Approved by: maintainer slience
* Update to 2.2.5.mezz2005-07-249-1081/+95
| | | | | PR: ports/83927 Submitted by: Udo Schweigert <udo.schweigert@siemens.com> (maintainer)
* update to 0.57oliver2005-07-234-31/+63
|
* - update distinfoleeym2005-07-231-2/+2
| | | | | | | (I compared the new distfile with the old one. The author didn't change anything, just repacked the distfile) Noticed by: kris
* - Document isc-dhcpd -- format string vulnerabilities (oldersimon2005-07-231-1/+37
| | | | | | | vulnerabilty). [1] - Use standard title format for latest egroupware entry. Reminded by: Panagiotis Christias [1]
* This port is scheduled for deletion on 2005-09-22 if it is still brokenkris2005-07-231-0/+2
| | | | at that time and no PRs have been submitted to fix it.
* Add entry for eGroupWare's recent vulnerabilities.kuriyama2005-07-231-0/+31
|
* Document denial of service attack in fetchmail 6.5.2.1.barner2005-07-221-0/+30
| | | | | Reported by: Matthias Andree <matthias.andree@gmx.de> Reviewed by: simon
* Update my email address.vsevolod2005-07-227-7/+7
| | | | Approved by: perky (mentor)
* Update phppgadmin entry to note that it was fixed in 3.5.4 and add asimon2005-07-221-1/+4
| | | | | | few references while here anyway. Prodded by: Tobias Roth (I think :-) )
* Change MASTERSITE from ~renato to ~garga because I change my accountgarga2005-07-221-1/+1
| | | | | | here Approved by: flz (mentor)
* Document dnrd -- remote buffer and stack overflow vulnerabilities.simon2005-07-221-0/+33
|
* Fix typo in last commitsimon2005-07-211-1/+1
| | | | Noticed by: Matthias Andree <matthias.andree@gmx.de>
* Add more references to latest fetchmail entry [1] and sort referencessimon2005-07-211-1/+4
| | | | | | while here anyway. Submitted by: Matthias Andree <matthias.andree@gmx.de> [1]
* - Fix a bug in SHA256sem2005-07-212-0/+12
| | | | | | PR: ports/76289 Reported by: Kenichi Morioka <morioka@openloop.co.jp> Fixed by: Vsevolod Stakhov <vsevolod@highsecure.ru> (maintainer)
* - Update to 1.3.5pav2005-07-215-44/+10
| | | | | PR: ports/83823 Submitted by: Travis Poppe <tlp@liquidx.org>
* Document an issue with the LDAP backend provided by PowerDNS.trhodes2005-07-211-0/+30
|
* BROKEN on !i386: Does not compilekris2005-07-211-0/+4
|
* Document fetchmail -- remote root/code injection from malicious POP3simon2005-07-211-0/+28
| | | | | | server. Submitted by: Matthias Andree <matthias.andree@gmx.de>
* Bridge betwean ClamAV antivirus software and Squid caching proxy.garga2005-07-216-0/+129
| | | | | | | | | | | | Squidclam is a replacement for SquidClamAV-Redirector.py written in C using libclamav and libcurl Author: squidclam@users.sourceforge.net WWW: http://sourceforge.net/projects/squidclam/ PR: ports/82652 Submitted by: Alexander Novitsky <alecn2002@yandex.ru> Approved by: flz (mentor)
* s/freebsd.org/FreeBSD.org/marcus2005-07-211-1/+1
| | | | Reported by: oliver
* - Revive security/ruby-acl port and unbreak itpav2005-07-206-0/+82
| | | | | | | - Reset maintainership PR: ports/76917 Submitted by: IWATSUKI Hiroyuki <don@na.rim.or.jp>
* - Fix plist and unbreak [1, 2]pav2005-07-204-17/+20
| | | | | | | | | - Clean up Makefile and update pkg-message handling PR: ports/81492 [1], ports/83128 [2] Submitted by: Boris B. Samorodov <bsam@ipt.ru>, Norikatsu Shigemura <n-shigemura@ensure.jp> Approved by: maintainer timeout (2 months)
* - Update to 2.0.8pav2005-07-209-6/+12
| | | | | PR: ports/83679 Submitted by: vadim@vk.crocodile.org <vadim@vk.crocodile.org> (maintainer)
* - Update to 2.0.8pav2005-07-209-9/+12
| | | | | PR: ports/83678 Submitted by: vadim@vk.crocodile.org <vadim@vk.crocodile.org> (maintainer)
* - Update to 1.1pav2005-07-203-4/+7
| | | | | PR: ports/83741 Submitted by: Marcus Grando <marcus@corp.grupos.com.br>
* - Update to 0.3.1novel2005-07-204-6/+15
| | | | | | | | - Update WWW and MASTER_SITES - Now install examples too PR: 83740 Submitted by: Marcus Grando (maintainer)
* Update to 4538jeh2005-07-202-3/+3
|
* - Update to 1.4.2pav2005-07-192-4/+4
| | | | | PR: ports/83659 Submitted by: Meno Abels <meno.abels@adviser.com> (maintainer)
* - Use PLIST_FILESpav2005-07-193-2/+4
| | | | | | | - Add Author: to pkg-descr PR: ports/83683 Submitted by: Andrej Zverev <az@inec.ru>
* o add kdebase (kate) vulnarability.mich2005-07-191-0/+33
| | | | Reviewed by: simon
* - Update to 0.2.1pav2005-07-192-4/+4
| | | | | PR: ports/83657 Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
* - Update to 1.4pav2005-07-192-11/+8
| | | | | PR: ports/83654 Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
* Update to 4537jeh2005-07-192-3/+3
|
* This module brings to Python programs the capability of evaluating passwordpav2005-07-195-0/+58
| | | | | | | | strength. To achieve this noble aim it uses the well known cracklib toolkit, hence the name. PR: ports/83603 Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
* - fix manpagesdinoex2005-07-181-2/+0
|
* Add CVE names to recent bugzilla entry.simon2005-07-181-0/+3
|
* - Update to 0.9.2pav2005-07-183-3/+23
| | | | | | PR: ports/80238 Submitted by: Vasil Dimov <vd@datamax.bg> Approved by: maintainer timeout (3 months)
* Make sure LATEST_LINK is unique from that of the calife-nondevel port.adamw2005-07-181-0/+2
|
* With portmgr hat on, reset eik's ports since he has been inactive forlinimon2005-07-182-2/+2
| | | | | | several months (not responding to email). Discussed among: portmgr team
* - fix installation of start script on 4.xleeym2005-07-181-0/+5
| | | | | PR: 83604 Submitted by: Blaz Zupan <blaz@si.FreeBSD.org>
* Fix alignment problems on non-i386 platforms.marcus2005-07-176-58/+56
|
* - Document firefox & mozilla -- multiple vulnerabilities.simon2005-07-161-1/+126
| | | | | - Minor style nit in drupal entry: Use port name (i.e. lower case) as first part of the title.
* make it compile on 7oliver2005-07-161-2/+2
| | | | Noted by: pointyhat via kris
* Add an entry for the drupal vulnerabilities.erwin2005-07-161-0/+27
|
* Update to 4536jeh2005-07-162-3/+3
|
* Fixed incorrect newsfetch and mnogosearch affected package versionsniels2005-07-151-2/+2
| | | | Approved by: nectar (mentor)
* Update to 2.3.1.mezz2005-07-1510-4014/+385
| | | | | PR: ports/83146 Submitted by: Udo Schweigert <udo.schweigert@siemens.com> (maintainer)
* Update to 4535jeh2005-07-152-3/+3
|
* NewPKI is a PKI based on the OpenSSL low-level API, all the datas are handledpav2005-07-147-0/+100
| | | | | | | | | | through a database, which provides a much more flexible PKI than with OpenSSL, such as seeking a certificate with a search engine. CA implementation. PR: ports/83387 Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
* NewPKI is a PKI based on the OpenSSL low-level API, all the datas are handledpav2005-07-145-0/+126
| | | | | | | | | | through a database, which provides a much more flexible PKI than with OpenSSL, such as seeking a certificate with a search engine. GUI client that uses wxWidgets. PR: ports/83386 Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
* Add PW_PASS option to compile with --enable-pass-savegarga2005-07-143-3/+27
| | | | | | | PR: 82494 Submitted by: Landon Fuller <landonf@threerings.net> Reviewed by: Matthias Andree <matthias.andree@gmx.de> (maintainer) Approved by: mantainer, flz (mentor)
* NewPKI is a PKI based on the OpenSSL low-level API, all the datas are handledpav2005-07-147-0/+147
| | | | | | | | through a database, which provides a much more flexible PKI than with OpenSSL, such as seeking a certificate with a search engine. PR: ports/83385 Submitted by: Vsevolod Stakhov <vsevolod@highsecure.ru>
* Mark broken on 4.xlawrance2005-07-141-1/+7
| | | | Approved by: maintainer
* - Update to 0.11.flz2005-07-142-4/+4
| | | | | PR: ports/83401 Submitted by: Marcus Grando <marcus@corp.grupos.com.br>
* - Update to 0.9.flz2005-07-142-6/+3
| | | | | PR: ports/83402 Submitted by: Marcus Grando <marcus@corp.grupos.com.br>
* Update to 4534jeh2005-07-142-3/+3
|
* Update to stunnel 4.11, which is deemed a stable release.roam2005-07-134-70/+11
| | | | | | | | | Remove our local patches for ucontext/pthread/fork model choice, since this is handled by a configure argument now. Note that ucontext is not supported on FreeBSD versions less than 5.0. PR: 83245 (mostly) Submitted by: Vasil Dimov <vd@datamax.bg>
* Markup fixed version of net-snmp problem.kuriyama2005-07-131-1/+2
|
* Fix:cy2005-07-1312-0/+120
| | | | | | - MIT KRB5 Security Advisory 2005-002: Buffer overflow, heap corruption in KDC - MIT KRB5 Security Advisory 2005-003: Double free in krb5_recvauth
* - Let configure know that we have fnmatch.h (fixes some fnmatch-usingjylefort2005-07-132-9/+9
| | | | | | | | | | | C++ ports, since the fnmatch.h which was uselessly installed by heimdal did not wrap the fnmatch() declaration in extern C {}) [1] - Fix the packing list on 4.x [1] PR: ports/80366 Submitted by: Joan Picanyol i Puig <lists-freebsd-gnats@biaix.org> Approved by: maintainer timeout (76 days)
* Update to DAT 4533jeh2005-07-132-3/+3
|