aboutsummaryrefslogtreecommitdiff
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* - Update to 2.023Philippe Audeoud2016-02-012-3/+3
| | | | Notes: svn path=/head/; revision=407705
* [NEW] security/stud: Scalable TLS Unwrapping DaemonKubilay Kocak2016-02-014-0/+40
| | | | | | | | | | | | | | | stud is a network proxy that terminates TLS/SSL connections and forwards the unencrypted traffic to some backend. It's designed to handle 10s of thousands of connections efficiently on multicore machines. WWW: https://github.com/bumptech/stud PR: 206134 Submitted by: Franz Bettag <franz bett ag> Notes: svn path=/head/; revision=407704
* Add a new option to conditionalize xconv installationRenato Botelho2016-02-015-13/+17
| | | | | | | | | | | | | | | | | | xconv is the only piece of xinetd written in perl, removing it from package also removes perl dependency. Add a new option, on by default to don't change current behavior, to select to install or not xconv. While here, re-generate patches using `make makepatch` to silence portlint PR: 205661 Approved by: maintainer timeout (> 30 days) Obtained from: pfSense Sponsored by: Rubicon Communications (Netgate) Notes: svn path=/head/; revision=407691
* Document recent Mozilla vulnerabilitiesJan Beich2016-02-011-0/+79
| | | | | | | | PR: 206637 Submitted by: Christoph Moench-Tegeder <cmt@burggraben.net> Notes: svn path=/head/; revision=407689
* Document multiple vulnerabilities in gdcmJason Unovitch2016-02-011-0/+35
| | | | | | | | | | | PR: 206590 Reported by: Sevan Janiyan <venture37@geeklan.co.uk> Security: CVE-2015-8396 Security: CVE-2015-8397 Security: https://vuxml.FreeBSD.org/freebsd/e00d8b94-c88a-11e5-b5fe-002590263bf5.html Notes: svn path=/head/; revision=407678
* security/libressl-devel: Update to 2.3.2Bernard Spil2016-01-315-109/+31
| | | | | | | | | | | | | | | | | | | - Update to version 2.3.2 [1] - Remove patches (upstreamed) - Bump shlib versions - Fix plist issues - Remove CA root cert that is installed by default Changes: ftp://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.3.2-relnotes.txt [1] Reviewed by: koobs (mentor), feld (mentor), miwi (portmgr) Approved by: koobs (mentor), miwi (portmgr) Differential Revision: D5116 Notes: svn path=/head/; revision=407614
* security/libressl: Update to 2.2.6Bernard Spil2016-01-313-5/+6
| | | | | | | | | | | | | | | | - Update to version 2.2.6 [1] - Remove CA root cert that is installed by default Changes: ftp://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.6-relnotes.txt [1] Reviewed by: koobs (mentor), feld (mentor) Approved by: (mentor) Differential Revision: D5115 Notes: svn path=/head/; revision=407612
* - Fix x11/linux-c6-xorg-libs entry as fixedMartin Wilke2016-01-311-2/+2
| | | | | | | | | - Also fix modify date Reported by: Terry Kennedy <TERRY@glaver.org> Notes: svn path=/head/; revision=407604
* security/clamav: document ncurses requirement (USES+=ncurses)John Marino2016-01-311-1/+1
| | | | | | | approved by: infrastructure blanket Notes: svn path=/head/; revision=407563
* - Mark linux-c6* entys as fixedMartin Wilke2016-01-301-5/+6
| | | | Notes: svn path=/head/; revision=407538
* Welcome Centos 6.7Martin Wilke2016-01-3024-106/+112
| | | | | | | | | | | | | | | | | - Upgrade all linux-c6- to CentOS 6.7 - Cleanups PR: 205846 Submitted by: xmj In Collaboration with: allanjude, netchild, xmj Exp-run: antoine Sponsored by: Perceivon Hosting Inc. Differential Revision: D3428 We'd like to thanks for all the feedback and comments. Notes: svn path=/head/; revision=407537
* ftp/curl: Fix vuxml version checkBernard Spil2016-01-301-2/+2
| | | | | | | | Reviewed by: Erandir, miwi (ports-secteam) Approved by: miwi (ports-secteam) Notes: svn path=/head/; revision=407535
* On FreeBSD, using TIOCSCTTY ioctl to get a controlling tty.Kevin Lo2016-01-301-8/+21
| | | | | | | Approved by: maintainer timeout (13 months) Notes: svn path=/head/; revision=407527
* vuxml: fix version range for nginx which has a PORTEPOCHMark Felder2016-01-301-1/+1
| | | | Notes: svn path=/head/; revision=407513
* Document www/nginx vulnerabilitiesMark Felder2016-01-301-0/+35
| | | | | | | | | Security: CVE-2016-0742 Security: CVE-2016-0746 Security: CVE-2016-0747 Notes: svn path=/head/; revision=407508
* Document www/typo3 and www/typo3-lts vulnerabilitiesMark Felder2016-01-291-0/+36
| | | | | | | PR: 206723 Notes: svn path=/head/; revision=407487
* vuxml: Fix owncloud discovery dateMark Felder2016-01-291-1/+1
| | | | Notes: svn path=/head/; revision=407486
* Document www/nghttp2 vulnerabilityMark Felder2016-01-291-0/+28
| | | | | | | | PR: 206727 Security: CVE-2015-8659 Notes: svn path=/head/; revision=407485
* vuxml: Fix openssl entry so `make validate` doesn't throw errorsMark Felder2016-01-291-36/+36
| | | | Notes: svn path=/head/; revision=407484
* Document www/owncloud vulnerabilitiesMark Felder2016-01-291-0/+38
| | | | | | | | | | PR: 206724 Security: CVE-2016-1498 Security: CVE-2016-1499 Security: CVE-2016-1500 Notes: svn path=/head/; revision=407483
* vuxml: radicale entry needs python prefixes for packagenameMark Felder2016-01-291-1/+4
| | | | | | | PR: 206717 Notes: svn path=/head/; revision=407475
* Document www/radicale vulnerabilitiesMark Felder2016-01-291-0/+29
| | | | | | | | Security: CVE-2015-8747 Security: CVE-2015-8748 Notes: svn path=/head/; revision=407472
* - Add new port: security/R-cran-opensslTAKATSU Tomonari2016-01-295-0/+44
| | | | | | | | | | | | | | | | | | Bindings to OpenSSL libssl and libcrypto, plus custom SSH pubkey parsers. Supports RSA, DSA and NIST curves P-256, P-384 and P-521. Cryptographic signatures can either be created and verified manually or via x509 certificates. AES block cipher is used in CBC mode for symmetric encryption; RSA for asymmetric (public key) encryption. High-level envelope functions combine RSA and AES for encrypting arbitrary sized data. Other utilities include key generators, hash functions (md5, sha1, sha256, etc), base64 encoder, a secure random number generator, and 'bignum' math methods for manually performing crypto calculations on large multibyte integers. WWW: https://cran.r-project.org/web/packages/openssl/ Notes: svn path=/head/; revision=407455
* - Update to 5.30Ryan Steinmetz2016-01-292-3/+3
| | | | Notes: svn path=/head/; revision=407450
* - Do not #include <unistd.h> twice in the same fileAlexey Dokuchaev2016-01-293-13/+3
| | | | | | | - Regenerate patches with `make makepatch' while here Notes: svn path=/head/; revision=407448
* - Update to 1.9.18Ryan Steinmetz2016-01-292-3/+3
| | | | Notes: svn path=/head/; revision=407447
* - Update to 1.1.1Ryan Steinmetz2016-01-293-189/+3
| | | | Notes: svn path=/head/; revision=407443
* - Update to 4.2Ryan Steinmetz2016-01-292-8/+7
| | | | Notes: svn path=/head/; revision=407440
* Add 9 security advisories for phpMyAdmin:Matthew Seaman2016-01-281-0/+295
| | | | | | | | | | | | | | | [Security] Multiple full path disclosure vulnerabilities, see PMASA-2016-1 [Security] Unsafe generation of CSRF token, see PMASA-2016-2 [Security] Multiple XSS vulnerabilities, see PMASA-2016-3 [Security] Insecure password generation in JavaScript, see PMASA-2016-4 [Security] Unsafe comparison of CSRF token, see PMASA-2016-5 [Security] Multiple full path disclosure vulnerabilities, see PMASA-2016-6 [Security] XSS vulnerability in normalization page, see PMASA-2016-7 [Security] Full path disclosure vulnerability in SQL parser, see PMASA-2016-8 [Security] XSS vulnerability in SQL editor, see PMASA-2016-9 Notes: svn path=/head/; revision=407433
* Update to 1.96b.Raphael Kubo da Costa2016-01-282-11/+9
| | | | | | | | | | And pass maintainership to submitter. PR: 206601 Submitted by: Tobias Kortkamp <t@tobik.me> Notes: svn path=/head/; revision=407430
* vuxml for prosody CVE-2016-0756.David Thiel2016-01-281-0/+28
| | | | | | | | PR: 206707 Submitted by: Anton Shestakov Notes: svn path=/head/; revision=407422
* - add new manpagesDirk Meyer2016-01-282-4/+9
| | | | | | | Submitted by: olli hauer Notes: svn path=/head/; revision=407415
* - report OpenSSL 1.0.2e vulnerabilityDirk Meyer2016-01-281-0/+53
| | | | | | | MFH: 2016Q1 Notes: svn path=/head/; revision=407412
* - Security update:Dirk Meyer2016-01-282-12/+14
| | | | | | | | | | - add LICENSE_FILE MFH: 2016Q1 Security: CVE-2015-3197 Security: CVE-2016-0701 Notes: svn path=/head/; revision=407411
* security/vuxml: Document cURL vulnerabilityBernard Spil2016-01-271-0/+30
| | | | | | | | | | | Reviewed by: feld (ports-secteam, mentor), koobs (mentor) Approved by: feld (ports-secteam, mentor) Security: CVE-2016-0755 Security: https://vuxml.FreeBSD.org/freebsd/8b27f1bc-c509-11e5-a95f-b499baebfeaf.html Differential Revision: D5091 Notes: svn path=/head/; revision=407365
* Add patch to fix build on ARM v6Johan van Selst2016-01-273-4/+26
| | | | | | | Submitted by: mmel Notes: svn path=/head/; revision=407353
* Update to 0.027.Vanilla I. Shu2016-01-272-3/+3
| | | | Notes: svn path=/head/; revision=407346
* Upgrade security/elixir-comeonin to version 2.1.0.Jimmy Olgeni2016-01-262-3/+3
| | | | Notes: svn path=/head/; revision=407267
* Document Wordpress cross site scripting vulnerabilityJason Unovitch2016-01-261-0/+40
| | | | | | | | Security: CVE-2016-1564 Security: https://vuxml.FreeBSD.org/freebsd/fb754341-c3e2-11e5-b5fe-002590263bf5.html Notes: svn path=/head/; revision=407261
* Document recent privoxy security vulnerabilitiesJason Unovitch2016-01-261-0/+149
| | | | | | | | | | | | While here, catch up on the prior release's advisories for completeness PR: 206504 Security: CVE-2016-1982 Security: CVE-2016-1983 Security: https://vuxml.FreeBSD.org/freebsd/a763a0e7-c3d9-11e5-b5fe-002590263bf5.html Notes: svn path=/head/; revision=407256
* Document potential privilege escalation via symlink misconfiguration in sudoJason Unovitch2016-01-261-0/+32
| | | | | | | | | | PR: 206592 Reported by: Sevan Janiyan <venture37@geeklan.co.uk> Security: CVE-2015-5602 Security: https://vuxml.FreeBSD.org/freebsd/2e8cdd36-c3cc-11e5-b5fe-002590263bf5.html Notes: svn path=/head/; revision=407251
* Remove BROKEN_FreeBSD_8 from all remaining ports.Raphael Kubo da Costa2016-01-251-1/+0
| | | | | | | FreeBSD 8 is no longer supported. Notes: svn path=/head/; revision=407239
* security/govpn: update 5.2 -> 5.3Bartek Rutkowski2016-01-252-3/+3
| | | | | | | | PR: 206487 Submitted by: Sergey Matveev <stargrave@stargrave.org> (maintainer) Notes: svn path=/head/; revision=407202
* Fix use as a regular userAntoine Brodin2016-01-251-0/+4
| | | | Notes: svn path=/head/; revision=407191
* Upgrade security/elixir-comeonin to version 2.0.3.Jimmy Olgeni2016-01-242-3/+3
| | | | Notes: svn path=/head/; revision=407185
* Update to 0.20Antoine Brodin2016-01-242-5/+6
| | | | Notes: svn path=/head/; revision=407179
* security/slurpie: change use of _offset to ftellKurt Jaeger2016-01-246-10/+18
| | | | | | | | | | - canonize patches, while there PR: 205230 Submitted by: jhb Notes: svn path=/head/; revision=407127
* - Update to 0.6.9TAKATSU Tomonari2016-01-242-3/+3
| | | | Notes: svn path=/head/; revision=407096
* Update to 1.4.0Antoine Brodin2016-01-244-16/+9
| | | | | | | Announce: http://blog.kiddaland.net/2016/01/sprinkling-morning-dew-and-summer.html Notes: svn path=/head/; revision=407090
* Update to 20160108Antoine Brodin2016-01-242-4/+6
| | | | Notes: svn path=/head/; revision=407089