aboutsummaryrefslogtreecommitdiff
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* - Update tor to 1.1.20 (former development branch)Johan van Selst2006-08-039-74/+170
| | | | | | | | | | | | - Submitter becomes new maintainer (approved by old maintainer) - Use rc.subr PR: 98373 Submitted by: Peter Thoenen Approved by: flz (mentor) Notes: svn path=/head/; revision=169545
* Mark DEPRECATED, as free license keys are no longer availableMarius Strobl2006-08-031-0/+3
| | | | | | | | | | | | | | since September 2005, with an EXPIRATION_DATE of 2006-08-31, as all free license keys that still might be in use should have expired by then. If anyone is actually using this port with a commercial license key, feel free to adopt this port. Otherwise this port will be deleted after the above EXPIRATION_DATE. Approved by: netchild Notes: svn path=/head/; revision=169544
* Update drupal to 4.6.9 to fix yet another XSS vulnerability.Brooks Davis2006-08-021-0/+27
| | | | | | | Security: vuxml vid c905298c-2274-11db-896e-000ae42e9b93 Notes: svn path=/head/; revision=169501
* Add p5-Crypt-OICQ, cryptographic algorithm used by OICQ protocol.Rong-En Fan2006-08-025-0/+41
| | | | | | | This is for chinese/oicq. Notes: svn path=/head/; revision=169489
* - ignore OpenSSL 0.9.7* on CUREENT >= 700019Dirk Meyer2006-08-021-1/+18
| | | | | | | - break out if shared lib version in port is less than base Notes: svn path=/head/; revision=169431
* Add recent gnupg issue.Jun Kuriyama2006-08-021-0/+28
| | | | Notes: svn path=/head/; revision=169423
* - Upgrade to 1.4.5.Jun Kuriyama2006-08-026-14/+26
| | | | | | | | | | | | (fixes 2 more possible memory allocation attacks). - Enable OPTIONS [1]. Security: http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html PR: ports/93540 [1] Submitted by: Pawel Wieleba <P.Wieleba@iem.pw.edu.pl> [1] Notes: svn path=/head/; revision=169422
* Add pecl-tcpwrap 1.0, a PECL extension which provides tcpwrappersCheng-Lung Sung2006-08-014-0/+33
| | | | | | | | | | binding. PR: ports/101136 Submitted by: chinsan <chinsan.tw at gmail.com> Notes: svn path=/head/; revision=169347
* Add httprint 301, web server fingerprinting tool.Rong-En Fan2006-08-015-0/+89
| | | | | | | | PR: ports/101004 Submitted by: Yonatan <onatan at gmail.com> Notes: svn path=/head/; revision=169341
* New port: security/gpassJose Alonso Cardenas Marquez2006-08-015-0/+75
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | The GNOME Password Manager - GPass for short - is a simple application, written for the GNOME 2 desktop, that lets you manage a collection of passwords. The password collection is stored in an encrypted file, protected by a master-password. GPass is released under the GNU GPL2 licence. Features: * Clean and easy-to-use user interface. * Quick-search facility. * Username and password may easily be copied to the clipboard. * Encryption is done using the OpenSSL cryptographics library. * The built-in password generator helps you generate secure passwords. * You can launch a website and the associated username/passwords direct from GPass Author: Kouji TAKAO <kouji -at- netlab.jp> WWW: http://projects.netlab.jp/gpass/ PR: ports/100845 Submitted by: ports_at_c0decafe.net <ports at c0decafe.net> Approved by: garga (mentor) Notes: svn path=/head/; revision=169322
* Fix typo in UNZOO optionErwin Lansing2006-08-011-2/+2
| | | | | | | | PR: 101129 Submitted by: gabor (maintainer) Notes: svn path=/head/; revision=169313
* Update to 1.1.2Ade Lovett2006-08-015-10/+30
| | | | | | | | | | Submitter (author) taking over maintainership from myself PR: 100916 Submitted by: andrew@arda.homeunix.net Notes: svn path=/head/; revision=169308
* - Update to latest release (0.1.1.23)Cheng-Lung Sung2006-08-012-5/+4
| | | | | | | | PR: ports/101131 Submitted by: maintainer (Peter Thoenen) Notes: svn path=/head/; revision=169289
* A new port, security/metasploit-devel is coming to town.Ion-Mihai Tetcu2006-08-012-0/+6
| | | | | | | | | | | | | | | It will be based on Ruby instead of perl, have a different license, and some utilities (msfconsole, msfencode...) will conflict with the current metasploit package. This update comes to preempt the conflicts and to clarify the pkg-descr. Bump PORTREVISION. PR: ports/101090 Submitted by: Yonatan (maintianer) Notes: svn path=/head/; revision=169276
* - Update to 0.10Roman Bogorodskiy2006-07-313-17/+8
| | | | | | | | | | - Pass maintainership to submitter PR: 101112 Submitted by: chinsan <chinsan.tw@gmail.com> Notes: svn path=/head/; revision=169237
* - Fix a bug when using LMTP transferErwin Lansing2006-07-312-11/+74
| | | | | | | | | | - Make some archiver support optionally PR: 101071 Submitted by: gabor (maintainer) Notes: svn path=/head/; revision=169189
* - update to 0.55Cheng-Lung Sung2006-07-312-5/+4
| | | | Notes: svn path=/head/; revision=169163
* - Provide additional mirrors where neededAndrew Pantyukhin2006-07-302-9/+2
| | | | | | | | - Convert to "magic" master sites - Various minor portlint-prodded fixes Notes: svn path=/head/; revision=169159
* Add isnprober 1.02, penTest tool for TCP Initial Sequence NumbersRong-En Fan2006-07-304-0/+43
| | | | | | | | | | research. PR: ports/101005 Submitted by: Yonatan <onatan at gmail.com> Notes: svn path=/head/; revision=169140
* We are not affected by: CAN-2005-0018 in theRemko Lodder2006-07-301-1/+1
| | | | | | | | | | f2c entry (43cb40b3-c8c2-11da-a672-000e0c2e438a). We do not have the shellscript, and it is not installed. Reported by: thierry Notes: svn path=/head/; revision=169133
* Unbreak latest ruby entry by adding missing </lt>.Simon L. B. Nielsen2006-07-301-1/+1
| | | | Notes: svn path=/head/; revision=169131
* Run make tidy to clean up some style issues.Simon L. B. Nielsen2006-07-301-159/+104
| | | | Notes: svn path=/head/; revision=169130
* Only sort on entry date, not modified date. It simply causes too muchSimon L. B. Nielsen2006-07-301-1/+1
| | | | | | | | repo churn with little value to resort all entries which have been modified. Notes: svn path=/head/; revision=169128
* - The last vulnerabilities was fixed in ruby18 portSergey Matveychuk2006-07-301-1/+2
| | | | Notes: svn path=/head/; revision=169117
* - Update to 1.2.2Martin Wilke2006-07-292-5/+4
| | | | | | | | | PR: ports/101002 Submitted by: miwi Approved by: krion (mentor), maintainer Notes: svn path=/head/; revision=169093
* OK, I misunderstood Simon with this one. The <gt>1.8.*</gt> entryRemko Lodder2006-07-291-0/+1
| | | | | | | | | should have stayed and I interpreted that wrong. Pointyhat: remko Notes: svn path=/head/; revision=169090
* - Add NAT keepalive capability as per RFC 3947Martin Wilke2006-07-292-1/+49
| | | | | | | | | | | - Bump PORTREVISION PR: ports/100814 Submitted by: Daniel Roethlisberger <daniel(at)roe.ch> Approved by: krion (mentor), maintainer Notes: svn path=/head/; revision=169083
* Fix my previous version commit. The two entries matched twice when youRemko Lodder2006-07-291-2/+1
| | | | | | | | | have ruby installed. You learn something new everyday... Noticed/discussed with: simon Notes: svn path=/head/; revision=169082
* - Update to 1.2.6Martin Wilke2006-07-292-6/+5
| | | | | | | | | | | | - Remove snort from depends [1] PR: ports/100783 Submitted by: Linh Pham <question+fbsdports(at)closedsrc.org> Kian Mohageri <kian.mohageri(at)gmail.com> [1] Approved by: krion (mentor) Notes: svn path=/head/; revision=169069
* Mark all 1.6 and 1.8 versions as vulnerable, we do not have a fixRemko Lodder2006-07-291-2/+2
| | | | | | | | | | | yet and are unable to tell what the naming scheme will be with those patches. We can narrow down the scope later, we should not do so before we know the mentioned scheme. Triggered by: sem Notes: svn path=/head/; revision=169054
* Add a BID to the latest vuxml entry.Remko Lodder2006-07-291-28/+16
| | | | | | | Some minor changes to the markup of the entry. Notes: svn path=/head/; revision=169052
* - Document Ruby vulnerability. [1]Shaun Amott2006-07-291-1/+53
| | | | | | | | | - Fix URL in previous mutt entry while here. Reported by: Joel Hatton via freebsd-ports [1] Notes: svn path=/head/; revision=169048
* Add linux-thunderbird to mozilla -- multiple vulnerabilities entry.Simon L. B. Nielsen2006-07-291-1/+2
| | | | | | | Prodded by: sat Notes: svn path=/head/; revision=169041
* - Added post-extract on Makefiles.units. It remove the svn directories fromJose Alonso Cardenas Marquez2006-07-292-0/+2
| | | | | | | | | | | | | | some fpc ports. - Added PORTREVISION for each port - Fixed pkg-plist on fpc-gtk2 and fpc-gtk ports - Fixed the gtk, glib and gdk libraries linking for fpc-gtk - Removed obsolete patches from fpc-gtk. Now it's using ${REINPLACE_CMD} - Removed post-extract from fpc-fcl. I just added it to makefiles.units file Approved by: garga (mentor) Notes: svn path=/head/; revision=169024
* Document apache -- mod_rewrite ldap buffer overflow vulnerability.Simon L. B. Nielsen2006-07-281-0/+99
| | | | | | | | Thanks to remko for doing initial list of apache package names in an earlier VuXML entry. Notes: svn path=/head/; revision=169002
* - Update to 0.5Jose Alonso Cardenas Marquez2006-07-282-4/+4
| | | | | | | Approved by: garga (mentor) Notes: svn path=/head/; revision=168991
* - Fix MASTER_SITESAndrew Pantyukhin2006-07-281-1/+1
| | | | | | | Pointy hat to: garga Notes: svn path=/head/; revision=168960
* 1 - build and install lib/openvpn-down-root.so plugin (see --plugin option inIon-Mihai Tetcu2006-07-2812-9/+165
| | | | | | | | | | | | | | | | | | | | the man page) and README.openvpn-down-root 2 - match rc.d filename as printed post install in pkg-message to actual file name on newer systems (which use openvpn rather than openvpn.sh) Reported by: Jean-Baptiste Quenot (Bcc'd) The maintainer wishes to thank Jean-Baptiste for his report and patience. 3 - add a pkg-req script to prevent installation of 6.1 packages on older machines, which is a frequent source of "rc.d script doesn't work" complaints. Added file(s): - files/pkg-req.in PR: ports/100917 Submitted by: Matthias Andree (maintainer) Notes: svn path=/head/; revision=168953
* - Updating the Osiris integrity checking system to 4.2.1. This version includesIon-Mihai Tetcu2006-07-283-72/+5
| | | | | | | | | | | | the format string exploit fixes that were also in the patch in 4.2.0_1 (hence removed). - Also updating master site to the new official one. PR: ports/100952 Submitted by: David Thiel (maintainer) Notes: svn path=/head/; revision=168945
* fix option textMichael Haro2006-07-281-1/+1
| | | | | | | Reported by: Nick Fishman <kwlogical@bellsouth.net> Notes: svn path=/head/; revision=168939
* Fix error in latest mozilla entry which marked all firefox version asSimon L. B. Nielsen2006-07-271-1/+2
| | | | | | | | | vulnerable. Reported by: Craig Leres Notes: svn path=/head/; revision=168910
* Fix typo in previous commit.Shaun Amott2006-07-271-1/+1
| | | | Notes: svn path=/head/; revision=168909
* - Fix build on 64-bit machines.Shaun Amott2006-07-273-8/+19
| | | | | | | | | | | | - Mark IGNORE on !i386, due to a run-time issue. - Use DATADIR macro in pkg-plist while here. PR: ports/99949 Submitted by: shaun (me) Approved by: Maintainer timeout (19 days) Notes: svn path=/head/; revision=168908
* Document mozilla -- multiple vulnerabilities.Simon L. B. Nielsen2006-07-271-0/+99
| | | | | | | | Note I assume that linux-firefox-devel 3.0.a2006.07.26 is fixed, I haven't actually checked (way to many issues to check for). Notes: svn path=/head/; revision=168881
* Fix build on 4.xRenato Botelho2006-07-272-4/+10
| | | | | | | Submitted by: Robin Gruyters <r.gruyters@yirdis.nl> (maintainer) by email Notes: svn path=/head/; revision=168873
* (c) Rong-En Fan's, http://rafan.infor.org/patch/sshit.diffRong-En Fan2006-07-272-0/+40
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In the code, the author uses two level hash, and IPC::Shareable will create a share memory for those anonymouse object (the second level hash). Those share memory will not be removed when sshit exists or when the rule is removed. Running sshit for a period of time, the number of share memory and semaphore will reach the limit for one process, then sshit.pl can not get more share memory, thus it quits. The only solution is to manually remove all share memory and semaphore. This is somehow the limitation of using IPC::Shareable. To workaround this problem. The patch will removes associated firewall rules when syslogd closes the fd [1], and use IPC::Shareable->clean_up to remove all shm/sem created by this process. I also set 'destroy' to 1 so the shm tied to %list can be removed. The second hunk is to fix a typo for ipfw2. Due to this typo, ip in ipfw2's table cat not be removed. That means once blocked, the client is blocked until reboot or admin cleanup the table. [1] if any log files are rotated, newsyslog sends a HUP to syslogd, syslogd will close *all* current open fd and reopen them. At that time, the sshit.pl's stdin will be closed, thus the main program will exit. PR: ports/100726 Submitted by: Alex Samorukov <samm at os2.kiev.ua> Approved by: Jui-Nan Eric Lin <jnlin at csie.NCTU.edu.tw> (maintainer) Obtained from: rafan Notes: svn path=/head/; revision=168871
* Add courieruserinfo 1.1.2, user account information retrieval utility.Cheng-Lung Sung2006-07-276-0/+101
| | | | | | | | PR: ports/100900 Submitted by: Andrew St. Jean <andrew at arda.homeunix.net> Notes: svn path=/head/; revision=168861
* - Update to release 1.1.2Cheng-Lung Sung2006-07-274-6/+76
| | | | | | | | | | | - Port now installs some extra documentation into ${DOCSDIR}. - Added pkg-message and pkg-plist to port. PR: ports/100897 Submitted by: maintainer (andrew_AT_arda dot homeunix) Notes: svn path=/head/; revision=168856
* - Update to 0.9.10.1Renato Botelho2006-07-262-4/+8
| | | | | | | | | | - Mark it as BROKEN on 4.x. Maintainer will alert authors to fix it. PR: ports/100854 Submitted by: Robin Gruyters <r.gruyters@yirdis.nl> (maintainer) Notes: svn path=/head/; revision=168807
* Patching osiris in response to CVE-2006-3120.Ion-Mihai Tetcu2006-07-262-1/+68
| | | | | | | | | | | | | | "Ulf Harnhammar and Max Vozeler from the Debian Security Audit Project have found several format string security bugs in osiris, a network-wide system integrity monitor control interface. A remote attacker could exploit them and cause a denial of service or execute arbitrary code." PR: ports/100793 Submitted by: David Thiel (maintainer) Security: CVE-2006-3120 Notes: svn path=/head/; revision=168787