Commit graph

22597 commits

Author SHA1 Message Date
Sunpoet Po-Chuan Hsieh
ac2b78c837 - Update to 0.23.0
- Add LICENSE_FILE
- Relax USES=python

Changes:	https://gitlab.com/m2crypto/m2crypto/commits/master
2016-02-01 19:48:24 +00:00
Kurt Jaeger
5d8f953a50 security/govpn: 5.3 -> 5.4
- Added optional time synchronization requirement.
  It will add timestamps in handshake PRP authentication, disallowing to
  repeat captured packet and get reply from the server, making it visible
  to DPI.

PR:		206799
Submitted by:	Sergey Matveev <stargrave@stargrave.org> (maintainer)
2016-02-01 17:15:42 +00:00
Philippe Audeoud
344f075e95 - Update to 2.023 2016-02-01 11:05:15 +00:00
Kubilay Kocak
6b457d2423 [NEW] security/stud: Scalable TLS Unwrapping Daemon
stud is a network proxy that terminates TLS/SSL connections
and forwards the unencrypted traffic to some backend. It's
designed to handle 10s of thousands of connections
efficiently on multicore machines.

WWW: https://github.com/bumptech/stud

PR:		206134
Submitted by:	Franz Bettag <franz bett ag>
2016-02-01 11:02:50 +00:00
Renato Botelho
9d2e434521 Add a new option to conditionalize xconv installation
xconv is the only piece of xinetd written in perl, removing it from package
also removes perl dependency.

Add a new option, on by default to don't change current behavior, to select
to install or not xconv.

While here, re-generate patches using `make makepatch` to silence portlint

PR:		205661
Approved by:	maintainer timeout (> 30 days)
Obtained from:	pfSense
Sponsored by:	Rubicon Communications (Netgate)
2016-02-01 09:48:34 +00:00
Jan Beich
33f8830af4 Document recent Mozilla vulnerabilities
PR:		206637
Submitted by:	Christoph Moench-Tegeder <cmt@burggraben.net>
2016-02-01 07:37:58 +00:00
Jason Unovitch
7ea9a2a315 Document multiple vulnerabilities in gdcm
PR:		206590
Reported by:	Sevan Janiyan <venture37@geeklan.co.uk>
Security:	CVE-2015-8396
Security:	CVE-2015-8397
Security:	https://vuxml.FreeBSD.org/freebsd/e00d8b94-c88a-11e5-b5fe-002590263bf5.html
2016-02-01 02:42:39 +00:00
Bernard Spil
5d89c27838 security/libressl-devel: Update to 2.3.2
- Update to version 2.3.2 [1]
  - Remove patches (upstreamed)
  - Bump shlib versions
  - Fix plist issues
  - Remove CA root cert that is installed by default

Changes:

  ftp://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.3.2-relnotes.txt [1]

Reviewed by:	koobs (mentor), feld (mentor), miwi (portmgr)
Approved by:	koobs (mentor), miwi (portmgr)
Differential Revision:	D5116
2016-01-31 11:51:36 +00:00
Bernard Spil
42e5a17c26 security/libressl: Update to 2.2.6
- Update to version 2.2.6 [1]
  - Remove CA root cert that is installed by default

Changes:

  ftp://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.6-relnotes.txt [1]

Reviewed by:	koobs (mentor), feld (mentor)
Approved by:	(mentor)
Differential Revision:	D5115
2016-01-31 11:48:37 +00:00
Martin Wilke
74c871d192 - Fix x11/linux-c6-xorg-libs entry as fixed
- Also fix modify date

Reported by: Terry Kennedy <TERRY@glaver.org>
2016-01-31 10:00:14 +00:00
John Marino
e3c03edf7f security/clamav: document ncurses requirement (USES+=ncurses)
approved by:	infrastructure blanket
2016-01-31 00:18:49 +00:00
Martin Wilke
7fba849953 - Mark linux-c6* entys as fixed 2016-01-30 18:42:17 +00:00
Martin Wilke
a234e43dd7 Welcome Centos 6.7
- Upgrade all linux-c6- to CentOS 6.7
- Cleanups

PR:                     205846
Submitted by:           xmj
In Collaboration with:  allanjude, netchild, xmj
Exp-run:                antoine
Sponsored by:           Perceivon Hosting Inc.
Differential Revision:  D3428

We'd like to thanks for all the feedback and comments.
2016-01-30 18:30:40 +00:00
Bernard Spil
3f6d62331d ftp/curl: Fix vuxml version check
Reviewed by:	Erandir, miwi (ports-secteam)
Approved by:	miwi (ports-secteam)
2016-01-30 16:53:28 +00:00
Kevin Lo
05ff349f83 On FreeBSD, using TIOCSCTTY ioctl to get a controlling tty.
Approved by:	maintainer timeout (13 months)
2016-01-30 14:24:38 +00:00
Mark Felder
f2ef35906c vuxml: fix version range for nginx which has a PORTEPOCH 2016-01-30 05:37:11 +00:00
Mark Felder
c5067ba715 Document www/nginx vulnerabilities
Security:	CVE-2016-0742
Security:	CVE-2016-0746
Security:	CVE-2016-0747
2016-01-30 05:29:48 +00:00
Mark Felder
27a5824106 Document www/typo3 and www/typo3-lts vulnerabilities
PR:		206723
2016-01-29 16:53:05 +00:00
Mark Felder
e0cb37b0bf vuxml: Fix owncloud discovery date 2016-01-29 16:44:04 +00:00
Mark Felder
8dd7b0b099 Document www/nghttp2 vulnerability
PR:		206727
Security:	CVE-2015-8659
2016-01-29 16:43:37 +00:00
Mark Felder
40cdeef1cf vuxml: Fix openssl entry so make validate doesn't throw errors 2016-01-29 16:36:38 +00:00
Mark Felder
c5f0c8952f Document www/owncloud vulnerabilities
PR:		206724
Security:	CVE-2016-1498
Security:	CVE-2016-1499
Security:	CVE-2016-1500
2016-01-29 16:35:58 +00:00
Mark Felder
a85bbd824a vuxml: radicale entry needs python prefixes for packagename
PR:		206717
2016-01-29 15:38:48 +00:00
Mark Felder
b3d9d6ce68 Document www/radicale vulnerabilities
Security:	CVE-2015-8747
Security:	CVE-2015-8748
2016-01-29 15:33:37 +00:00
TAKATSU Tomonari
babe15d122 - Add new port: security/R-cran-openssl
Bindings to OpenSSL libssl and libcrypto, plus custom SSH pubkey
  parsers. Supports RSA, DSA and NIST curves P-256, P-384 and P-521.
  Cryptographic signatures can either be created and verified manually
  or via x509 certificates. AES block cipher is used in CBC mode for
  symmetric encryption; RSA for asymmetric (public key) encryption.
  High-level envelope functions combine RSA and AES for encrypting
  arbitrary sized data. Other utilities include key generators, hash
  functions (md5, sha1, sha256, etc), base64 encoder, a secure random
  number generator, and 'bignum' math methods for manually performing
  crypto calculations on large multibyte integers.

  WWW: https://cran.r-project.org/web/packages/openssl/
2016-01-29 06:54:50 +00:00
Ryan Steinmetz
2f33da66f0 - Update to 5.30 2016-01-29 03:50:56 +00:00
Alexey Dokuchaev
4e72a17178 - Do not #include <unistd.h> twice in the same file
- Regenerate patches with `make makepatch' while here
2016-01-29 03:45:54 +00:00
Ryan Steinmetz
598942f232 - Update to 1.9.18 2016-01-29 03:38:31 +00:00
Ryan Steinmetz
04b38584d4 - Update to 1.1.1 2016-01-29 03:25:40 +00:00
Ryan Steinmetz
1b25a05a25 - Update to 4.2 2016-01-29 03:11:35 +00:00
Matthew Seaman
82df3af0e1 Add 9 security advisories for phpMyAdmin:
[Security] Multiple full path disclosure vulnerabilities, see PMASA-2016-1
 [Security] Unsafe generation of CSRF token, see PMASA-2016-2
 [Security] Multiple XSS vulnerabilities, see PMASA-2016-3
 [Security] Insecure password generation in JavaScript, see PMASA-2016-4
 [Security] Unsafe comparison of CSRF token, see PMASA-2016-5
 [Security] Multiple full path disclosure vulnerabilities, see PMASA-2016-6
 [Security] XSS vulnerability in normalization page, see PMASA-2016-7
 [Security] Full path disclosure vulnerability in SQL parser, see PMASA-2016-8
 [Security] XSS vulnerability in SQL editor, see PMASA-2016-9
2016-01-28 22:45:10 +00:00
Raphael Kubo da Costa
9027a8a6a4 Update to 1.96b.
And pass maintainership to submitter.

PR:		206601
Submitted by:	Tobias Kortkamp <t@tobik.me>
2016-01-28 22:30:20 +00:00
David Thiel
669580ca87 vuxml for prosody CVE-2016-0756.
PR:		206707
Submitted by: Anton Shestakov
2016-01-28 21:00:55 +00:00
Dirk Meyer
f2a695b69f - add new manpages
Submitted by:	olli hauer
2016-01-28 17:35:21 +00:00
Dirk Meyer
6a256e8bb1 - report OpenSSL 1.0.2e vulnerability
MFH:		2016Q1
2016-01-28 15:20:11 +00:00
Dirk Meyer
f02e202d6f - Security update:
- add LICENSE_FILE
MFH:		2016Q1
Security: CVE-2015-3197
Security: CVE-2016-0701
2016-01-28 15:09:46 +00:00
Bernard Spil
80d5cd1ff5 security/vuxml: Document cURL vulnerability
Reviewed by:	feld (ports-secteam, mentor), koobs (mentor)
Approved by:	feld (ports-secteam, mentor)
Security:	CVE-2016-0755
Security:	https://vuxml.FreeBSD.org/freebsd/8b27f1bc-c509-11e5-a95f-b499baebfeaf.html
Differential Revision:	D5091
2016-01-27 16:01:39 +00:00
Johan van Selst
3b258bb9d0 Add patch to fix build on ARM v6
Submitted by:	mmel
2016-01-27 10:54:07 +00:00
Vanilla I. Shu
2391e23090 Update to 0.027. 2016-01-27 09:43:13 +00:00
Jimmy Olgeni
5d44d73cfc Upgrade security/elixir-comeonin to version 2.1.0. 2016-01-26 09:24:49 +00:00
Jason Unovitch
a12511e942 Document Wordpress cross site scripting vulnerability
Security:	CVE-2016-1564
Security:	https://vuxml.FreeBSD.org/freebsd/fb754341-c3e2-11e5-b5fe-002590263bf5.html
2016-01-26 04:18:34 +00:00
Jason Unovitch
a26a5ffbc4 Document recent privoxy security vulnerabilities
While here, catch up on the prior release's advisories for completeness

PR:		206504
Security:	CVE-2016-1982
Security:	CVE-2016-1983
Security:	https://vuxml.FreeBSD.org/freebsd/a763a0e7-c3d9-11e5-b5fe-002590263bf5.html
2016-01-26 03:13:31 +00:00
Jason Unovitch
520d892ade Document potential privilege escalation via symlink misconfiguration in sudo
PR:		206592
Reported by:	Sevan Janiyan <venture37@geeklan.co.uk>
Security:	CVE-2015-5602
Security:	https://vuxml.FreeBSD.org/freebsd/2e8cdd36-c3cc-11e5-b5fe-002590263bf5.html
2016-01-26 01:36:25 +00:00
Raphael Kubo da Costa
d97c4d4c85 Remove BROKEN_FreeBSD_8 from all remaining ports.
FreeBSD 8 is no longer supported.
2016-01-25 20:23:57 +00:00
Bartek Rutkowski
0f780865ea security/govpn: update 5.2 -> 5.3
PR:		206487
Submitted by:	Sergey Matveev <stargrave@stargrave.org> (maintainer)
2016-01-25 10:16:30 +00:00
Antoine Brodin
807a69248f Fix use as a regular user 2016-01-25 06:25:26 +00:00
Jimmy Olgeni
994c73c7b1 Upgrade security/elixir-comeonin to version 2.0.3. 2016-01-24 23:23:30 +00:00
Antoine Brodin
57d626d74f Update to 0.20 2016-01-24 20:36:39 +00:00
Kurt Jaeger
64bf37dd0e security/slurpie: change use of _offset to ftell
- canonize patches, while there

PR:		205230
Submitted by:	jhb
2016-01-24 14:27:14 +00:00
TAKATSU Tomonari
85dae1f11e - Update to 0.6.9 2016-01-24 10:48:02 +00:00