Commit graph

7546 commits

Author SHA1 Message Date
Sam Lawrance
caa8001ecd Fix so the distfile can be manually fetched for package building
PR:		ports/84573
Submitted by:	Adi Pircalabu <apircalabu@bitdefender.com> (maintainer)
Approved by:	portmgr (krion)
2005-08-20 08:40:21 +00:00
Renato Botelho
0f64e52705 - Security update to version 2.0.1, fixing four denial of service bugs,
CAN-2005-2531, CAN-2005-2532, CAN-2005-2533, CAN-2005-2534
- Drop old init script and add a modern rcNG script in its place,
  requested by Matthias Grimm and Dirk Gouders (although the script below is
  one I, Matthias Andree, wrote). It can automatically load tun/tap drivers.
- move pkg-message to files/pkg-message.in, revise it, list it in SUB_FILES
  to expand ${PREFIX}.
- print pkg-message after installation from port
- switch to official "make check" as smoke-test, rather than wiring our own.
- prefer LZO2 in most situations, as OpenVPN will pick up LZO2 rather than
  LZO1 if both are installed.

PR:		ports/85109
Submitted by:	maintainer
Approved by:	portmgr (krion)
2005-08-19 18:48:34 +00:00
Remko Lodder
5dd48b46c5 Document four vulnerabilities in openvpn:
* openvpn -- multiple TCP clients connecting with the same certificate at the same time can crash the server
* openvpn -- denial of service: malicious authenticated &quot;tap&quot; client can deplete server virtual memory
* openvpn -- denial of service: undecryptable packet from authorized client can disconnect unrelated clients
* openvpn -- denial of service: client certificate validation can disconnect unrelated clients

Approved by:	portsmgr (blanket VuXML)
Submitted by:	Matthias Andree <matthias dot andree at gmx dot de>
2005-08-19 09:58:19 +00:00
Sergey Matveychuk
e69c4117d8 - Update to 0.6.1.
- Unbreak.

Approved by:	portmgr (krion)
2005-08-18 19:38:29 +00:00
James E. Housley
3438ac725b Update the MASTER_SITES. This is the only part of PR/84815 what was
approved for commit during the port freeze.

Submitted by:	Marcus Grando <marcus@corp.grupos.com.br>
Approved by:	portmgr (mcl)
2005-08-18 13:02:10 +00:00
Simon L. B. Nielsen
36ab3408aa Also mark phpAdsNew as affected by "pear-XML_RPC -- remote PHP code
injection vulnerability".

Approved by:	portmgr (blanket, VuXML)
2005-08-17 20:01:01 +00:00
Remko Lodder
b942a2a7c2 Add the fixed version so that people do not get a stale portaudit when the update is there.
Also fix some indentation that i overlooked.

Noticed by:		simon (both of the items)
Approved by:		portsmgr (blanket VuXML)
2005-08-17 19:46:39 +00:00
Remko Lodder
937ce6aba9 Document tor -- diffie-hellman handshake flaw.
Submitted by:		Michal Bartkowiak <michal at nonspace dot net>
Approved by:		portsmgr (blanket VuXML)
2005-08-17 19:34:44 +00:00
Simon L. B. Nielsen
b301e67e49 gpdf has been fixed for "xpdf -- disk fill DoS vulnerability", mark it
as such.

Approved by:	portmgr (blanket, VuXML)
2005-08-16 21:19:30 +00:00
Simon L. B. Nielsen
75172d796f Add eGroupWare to the list of packages affected by "pear-XML_RPC --
remote PHP code injection vulnerability".

Approved by:	portmgr (blanket, VuXML)
2005-08-16 20:56:54 +00:00
Simon L. B. Nielsen
59a6826b92 Document acroread -- plug-in buffer overflow vulnerability.
Approved by:	portmgr (blanket, VuXML)
2005-08-16 18:43:41 +00:00
Simon L. B. Nielsen
2836760398 Add phpmyfaq and drupal to the "pear-XML_RPC -- remote PHP code
injection vulnerability" entry since they contain an embedded version of
pear-XML_RPC.

Fix typo in body of the latest xpdf entry (note: no modified date bump
as this is a minor typo fix which does change <affects>).

Approved by:	portmgr (blanket, VuXML)
2005-08-15 20:38:54 +00:00
Simon L. B. Nielsen
a098192895 Document pear-XML_RPC -- remote PHP code injection vulnerability.
Submitted by:	hrs
Approved by:	portmgr (blanket, VuXML)
2005-08-15 13:20:30 +00:00
Simon L. B. Nielsen
782374f5c4 Document awstats -- arbitrary code execution vulnerability.
Approved by:	portmgr (blanket, VuXML)
2005-08-14 21:09:10 +00:00
Simon L. B. Nielsen
c1bc774e4b After further examination it turns out that gnugadu does not include
libgadu, at least not any in any current version, and from looking at
the gnugadu code there is no direct indication that this code should
actually be vulnerable to the other libgadu vulnerabilities. [1]

The gaim part of libgadu -- multiple vulnerabilities was fixed in
1.4.0_1. [2]

Polish translation clue:	pjd [1]
General clue by:		markus [2]
Not enough checking:		simon
Approved by:			portmgr (blanket, VuXML)
2005-08-12 16:38:54 +00:00
Simon L. B. Nielsen
41071473f7 Remove pl-gnugadu2 and kadu from being affected by libgadu -- multiple
vulnerabilities, since it turns out that they use libgadu from the ekg
port.

Approved by:	portmgr (blanket, VuXML)
2005-08-12 14:45:57 +00:00
Simon L. B. Nielsen
57454f0e97 Document libgadu -- multiple vulnerabilities.
Approved by:	portmgr (blanket, VuXML)
2005-08-12 14:21:10 +00:00
Simon L. B. Nielsen
da8382985a Document gaim -- AIM/ICQ away message buffer overflow and gaim --
AIM/ICQ non-UTF-8 filename crash.

Approved by:	portmgr (blanket, VuXML)
2005-08-12 11:26:44 +00:00
Simon L. B. Nielsen
7cc5d12599 Remove pdftohtml from the list of packages affected by xpdf -- disk
fill DoS vulnerability, since it includes xpdf 2, which should not be
affected.

Approved by:	portmgr (blanket, VuXML)
2005-08-12 10:42:13 +00:00
Simon L. B. Nielsen
2a2ea79881 Document xpdf -- disk fill DoS vulnerability.
Approved by:	portmgr (blanket, VuXML)
2005-08-11 22:18:53 +00:00
Simon L. B. Nielsen
4518fa7463 Mark apache 1.3.33_2 as fixed for apache -- http request smuggling.
Approved by:	portmgr (blanket, VuXML)
2005-08-11 12:40:51 +00:00
Cy Schubert
c7361bfd1f Fix ports/84648 (Interactive tripwire's database update does not work on 5.x).
PR:		ports/84648
Approved by:	portsmgr (marcus)
2005-08-11 03:05:00 +00:00
Cy Schubert
62f4aa1e6b Fix a fetch error.
Approved by:	portsmgr (marcus)
2005-08-11 00:04:53 +00:00
Cy Schubert
bd60fa6a1b Update twpol.txt to make it current with 5.X and beyond.
Approved by:	portsmgr (marcus)
2005-08-09 18:24:15 +00:00
Simon L. B. Nielsen
d20662bf31 Document gforge -- XSS and email flood vulnerabilities.
Approved by:	portmgr (blanket, VuXML)
2005-08-09 11:51:25 +00:00
Michael Nottebrock
30778bc36d Fix compilation on FreeBSD 6 or later in the WITH_PTH case.
Reported by: Ion-Mihai Tetcu <itetcu@people.tecnik93.com>
Approved by: portmgr (clement)
2005-08-08 19:23:48 +00:00
Simon L. B. Nielsen
befbd7cfa6 Document postnuke -- multiple vulnerabilities.
Approved by:	portmgr (blanket, VuXML)
2005-08-07 22:19:56 +00:00
Simon L. B. Nielsen
68bc305b6a Document mambo -- multiple vulnerabilities.
Approved by:	portmgr (blanket, VuXML)
2005-08-05 13:32:16 +00:00
Remko Lodder
fe4ad03a99 Correct the ranges for the IPSec advisory and the devfs advisory.
Also correct proper ranges for the zlib advisory.

Approved by:		portsmgr (blanket VuXML)
2005-08-05 10:34:41 +00:00
Remko Lodder
22fd9bb398 Document some recent FreeBSD advisories:
o devfs -- ruleset bypass.
o zlib -- buffer overflow vulnerability.
o ipsec -- Incorrect key usage in AES-XCBC-MAC.

Approved by:	portsmgr (blanket VuXML)
2005-08-05 10:21:39 +00:00
Remko Lodder
6b21656446 Add some more entries to the apache -- http smuggling vulnerability.
PR:		ports/84312
Submitted by:	Dmitry A Grigorovich <odip at bionet dot nsc dot ru>
Approved by:	portsmgr (blanket VuXML)
2005-08-04 15:56:53 +00:00
Joe Marcus Clarke
d9ab36fb8c Disable automatic tests on all versions of FreeBSD as they seem to fail in
a read-only port directory.  More investigation is needed.

Reported by:	GNOME Tinderbox
Approved by:	portmgr (implicit)
2005-08-04 04:07:38 +00:00
Joe Marcus Clarke
68bf3df3eb Disable the automatic tests on 4.X. They are known to fail.
Reported by:	pointyhat via kris
Approved by:	portmgr (implicit)
2005-08-03 22:08:09 +00:00
Simon L. B. Nielsen
379edd924d Document proftpd -- format string vulnerabilities.
Approved by:	portmgr (blanket, VuXML)
2005-08-03 17:14:16 +00:00
Simon L. B. Nielsen
fa7419cac1 Note that the fix for gnupg -- OpenPGP symmetric encryption
vulnerability in gnupg is not complete (see entry for details).

Discussed with:	nectar
Approved by:	portmgr (blanket, VuXML)
2005-08-03 16:54:47 +00:00
Simon L. B. Nielsen
79a8a98fa3 Mark p5-Crypt-OpenPGP, pgp, and pgpin as vulnerable to gnupg --
OpenPGP symmetric encryption vulnerability.

Reminded by:	nectar
Approved by:	portmgr (blanket, VuXML)
2005-08-03 11:58:12 +00:00
Simon L. B. Nielsen
e439b01dd9 Mark latest gdal version as fixed for all tiff vulnerabilities. 2005-08-01 18:38:11 +00:00
James E. Housley
7cc996ede3 UPdate to DAT 4547 2005-08-01 16:53:45 +00:00
Jun Kuriyama
4ae59b6f7d Fix build failure on 4.x.
Reported by:	"Sander Holthaus - Orange XL" <info@orangexl.com>
2005-08-01 11:17:24 +00:00
Niels Heinen
1e90f90311 Added nbsmtp format string vulnerability.
Approved by:	nectar (mentor)
2005-08-01 07:45:17 +00:00
Simon L. B. Nielsen
78b7cf7598 Mark latest the linux-tiff and pdflib ports safe from latest tiff
vulnerability.

Thanks to lawrance and netchild for fast fixes.
2005-07-31 23:39:50 +00:00
Michael Nottebrock
ecc191066f Update to KDE 3.4.2 / KOffice 1.4.1 2005-07-31 22:46:35 +00:00
Jun Kuriyama
2a9bde49bb Upgrade to 1.4.2.
PR:		ports/84289
Submitted by:	Vasil Dimov <vd@datamax.bg>
2005-07-31 22:31:11 +00:00
Joe Marcus Clarke
2c10cd6b80 Re-add IGNORE message for Alpha < 500035.
Reported by:	mjl on #freebsd-gnome
2005-07-31 21:49:47 +00:00
Thierry Thomas
e6b6ab8c0c Update to 2.0.8.
PR:		83960
Submitted by:	Babak Farrokhi <babak (at) farrokhi.net>
Approved by:	maintainer
2005-07-31 19:53:33 +00:00
Yen-Ming Lee
be396bcc0d - Update to 0.97
PR:		83639
Submitted by:	leeym
Approved by:	maintainer timeout
2005-07-31 17:19:47 +00:00
Simon L. B. Nielsen
609dafe78b Document sylpheed -- MIME-encoded file name buffer overflow
vulnerability.
2005-07-31 15:00:54 +00:00
Simon L. B. Nielsen
5d71ef8197 Document phpmyadmin -- cross site scripting vulnerability. 2005-07-31 13:50:20 +00:00
Simon L. B. Nielsen
053cdd10d9 Document gnupg -- OpenPGP symmetric encryption vulnerability.
Note: this is mainly a theoretical vulnerability.
2005-07-31 13:23:50 +00:00
Sergey Matveychuk
bb022ec8e2 - Look for libraries in LOCALBASE
PR:		ports/83455
Submitted by:	maintainer
2005-07-31 12:06:25 +00:00
Remko Lodder
c58dccb6b5 Bump entry date.
Forgotten by:	remko
Spotted by:	simon
2005-07-31 11:38:25 +00:00
Remko Lodder
1053ed30f3 Document vim -- vulnerabilities in modeline handling: glob, expand.
Discussed with:		nectar, simon
2005-07-31 11:31:52 +00:00
Sergey Matveychuk
984b7312f9 - Update to 20050730
PR:		ports/84360
Submitted by:	maintainer
2005-07-31 09:43:53 +00:00
Joe Marcus Clarke
ba00a2c341 * Update to 3.10 [1]
* Add a target for regression testing, and run that target automatically
  when building on the package build cluster [1]
* Cleanup some portlint nits

Submitted by:	mi [1]
2005-07-31 00:06:49 +00:00
Simon L. B. Nielsen
39a985e2b4 Document that ekg -- insecure temporary file creation was fixed in
1.6r2,1.

Noted by:	Michal Kalkowski
2005-07-30 22:20:27 +00:00
Oliver Lehmann
c149369e83 Just remove the user if BATCH is set in env, don't ask for users feedback.
PR:		84349
Submitted by:	Matthias Andree <matthias.andree@gmx.de>
2005-07-30 21:55:23 +00:00
Simon L. B. Nielsen
64a8f10e17 Add pdflib-perl, fractorama, gdal, iv, ivtools, ja-iv, ja-libimg,
paraview to recent libtiff vulnerabilities since they contain (and
compile) an embedded version of libtiff...
2005-07-30 20:20:52 +00:00
Simon L. B. Nielsen
8c91f8349c Change MAINTAINER address for ports maintained by the Security Team to
secteam@ instead of security@ to make it more clear that the ports are
not maintained by the freebsd-security@ mailing list.  Both addresses
go to the same people.
2005-07-30 19:13:10 +00:00
Simon L. B. Nielsen
819cb94b17 Document tiff -- buffer overflow vulnerability. 2005-07-30 15:48:06 +00:00
Simon L. B. Nielsen
80d009be80 - Misc. markup/whitespace fixes.
- Collapse a few package entries from the latest apache entry (still
  matches same package names, is just shorter markup-wise).
- Use standard topic style for jaberd entry.
- Fix entry date for jaberd entry.
2005-07-30 11:18:20 +00:00
Vsevolod Stakhov
c2cb81e45a Document jabberd vulnerabilities that were fixed by the latest update.
Approved by:	perky (mentor)
2005-07-30 10:00:41 +00:00
Simon L. B. Nielsen
b151450eb0 Be consistent and use the same title for the latest ethereal
vulnerabilities as used for previous entries.
2005-07-30 09:24:47 +00:00
Simon L. B. Nielsen
1c4842c911 Document opera -- image dragging vulnerability and opera -- download
dialog spoofing vulnerability.
2005-07-30 09:13:14 +00:00
Simon L. B. Nielsen
c5114fefb3 Document ethereal -- multiple vulnerabilities. 2005-07-30 08:26:06 +00:00
Volker Stolz
e79710b377 Fix build on amd64 with -fPIC
PR:		ports/84156
Submitted by:	Hirohisa Yamaguchi
Approved by:	maintainer

Note w.r.t. 4.x: The .depend-issue can be fixed through 'gmake'.
However, then it still needs a patch for a missing <sys/time.h>, and still
won't build with neither gcc-2.95, 3.4 or 4.0, so I didn't bother.
2005-07-29 17:18:17 +00:00
Renato Botelho
6f5b6a6666 Pass maintainership to last submitter
Approved by:	actual maintainer
2005-07-29 15:12:18 +00:00
Renato Botelho
ca4ca9f4f2 - Update to 0.1.0.12
PR:		ports/84281
Submitted by:	rik <freebsd-ports@rikrose.net> (maintainer)
2005-07-29 11:05:21 +00:00
Renato Botelho
b99c822452 - Fix pkg-plist and Unbreak the port
PR:		ports/84261
Submitted by:	Jean Milanez Melo <jmelo@freebsdbrasil.com.br>
Approved by:	maintainer timeout - BROKEN over to 4 months
2005-07-29 10:52:16 +00:00
James E. Housley
6b97e0c6cd * Update second master site
* Update to DAT 4545
2005-07-28 18:35:22 +00:00
Renato Botelho
5e3cc60a87 This package implements an algorithm for breaking the PkZip cipher that was
devised by Eli Biham and Paul Kocher.

This program applies a known plaintext attack to an encrypted file.
A known-plaintext-attack recovers a password using the encrypted file and
(part of) the unencrypted file.

Please note that cryptographers use the word 'plaintext' for any kind of
unencrypted data - not necessarily readable ASCII text.

Before you ask why somebody may want to know the password when he already knows
the plaintext think of the following situations:

 - Usually there's a large number of files in a ZIP-archive. Usually all these
   files are encrypted using the same password. So if you know one of the files,
   you can recover the password and decrypt the other files.
 - You need to know only a part of the plaintext (at least 13 bytes). Many files
   have commonly known headers, like DOS .EXE-files. Knowing a reasonably long
   header you can recover the password and decrypt the entire file.

WWW: http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html

PR:		ports/84192
Submitted by:	Emanuel Haupt <ehaupt@critical.ch>
2005-07-28 10:32:17 +00:00
Clement Laforet
f758062b43 - Fix apache 2.1 range for CAN-2005-2088 entry which prevents apache 2.0 from
upgrading.

Pointyhat to:	clement, remko
Reviewed by:	erwin
2005-07-28 08:51:43 +00:00
Joe Marcus Clarke
2a8578098e Update to 0.7.9. 2005-07-28 05:41:40 +00:00
Remko Lodder
086e9785f3 Mark apache+mod_ssl-1.3.33+2.8.22_1 as not vulnerable in the latest Apache entry. 2005-07-28 04:22:14 +00:00
James E. Housley
3065ae6d99 Patch MASTER_SITE since they seem to redirect to a second one sometimes 2005-07-27 18:03:37 +00:00
Sergey Matveychuk
fbc7c05ec6 - Fix startup script for milter
PR:		ports/84104
Submitted by:	maintainer
Reported by:	Erin Fortenberry <kahn@deadbbs.com>
2005-07-27 17:22:05 +00:00
Remko Lodder
7e01fa0b51 There must be an curse. s/il/li/.
Noticed by:	nectar
2005-07-27 17:21:35 +00:00
Remko Lodder
5199530afe Update my latest Apache entry to make clear that this only affects certain
installations (when Apache is used as a HTTP proxy in combination with some
web servers). I didn't make that clear in the first commit.

Requested by:		nectar
Discussed with:		clement
2005-07-27 17:01:45 +00:00
James E. Housley
48b6a4adce update to DAT 4544 2005-07-27 16:06:06 +00:00
Remko Lodder
fe0cc1d802 Document apache -- http request smuggling.
Requested by:	clement
Glanced at by:	clement
2005-07-27 15:57:54 +00:00
Ade Lovett
a07f614337 Add courierpasswd, a user authentication and password changing utility
for the courier imap/pop3 system.
2005-07-27 03:37:38 +00:00
Michael Johnson
2c943364b7 - Update to 1.7
PR:		ports/84149
Submitted by:	maintainer
2005-07-27 01:45:06 +00:00
Pav Lucistnik
e0a553e7f6 - Update to 1.2.8
PR:		ports/84074
Submitted by:	Andrej Zverev <az@inec.ru>
Approved by:	Keith J. Jones <kjones@realdigitalforensics.com> (maintainer)
2005-07-26 22:42:39 +00:00
Stefan Eßer
1f1c78dfb5 Fix URL of project web site.
Submitted by:	Dru Lavigne via Dan Langille
2005-07-26 20:10:31 +00:00
James E. Housley
0205b66d90 Update to DAT 4543 2005-07-26 19:57:05 +00:00
Renato Botelho
3ee5e28fa3 TLSWrap is a TLS/SSL FTP wrapper/proxy for UNIX and Windows, allowing you to
use your favourite FTP client with any TLS/SSL-enabled FTP server.

WWW: http://tlswrap.sunsite.dk/

PR:		ports/84028
Submitted by:	Daniel J. O'Connor <darius@dons.net.au>
Thanks to:	novel
2005-07-26 18:47:06 +00:00
Stefan Eßer
42df98b965 New port: Yersinia
Yersinia is a layer 2 vulnerability scanner with support for the
following protocols:

- Cisco Discovery Protocol (CDP)
- Dynamic Host Configuration Protocol (DHCP)
- Dynamic Trunking Protocol (DTP)
- Hot Standby Router Protocol (HSRP)
- IEEE 802.1q
- Spanning Tree Protocol (STP, RSTP)
- Virtual Trunking Protocol (VTP)
2005-07-26 17:13:00 +00:00
Renato Botelho
dd70311d11 BSDsfv is a flexible and highly compatible SFV checksum utility.
Features:

  - create SFV files, verify downloaded single files or whole releases
  - add banners to your SFV files
  - very flexible and compatible with all other SFV tools currently known,
    including SFVNIX compatibility mode concerning SFV files created
  - easy to console application
  - plug & play support for glFTPd and other demons including
    count-missing-files feature for race scripts

WWW: http://bsdsfv.sourceforge.net/

PR:		ports/84108
Submitted by:	Emanuel Haupt <ehaupt@critical.ch>
Approved by:	flz (mentor)
2005-07-26 17:10:11 +00:00
Renato Botelho
b69d7949c9 This utility creates .SFV (Simple File Verify) and .PAR (Parity Archive) data
files.

Features:

  * Recursive directories handling
  * Automatic checksum file naming ability in create mode
  * Meaningful and documented exit values for easy scripting
  * Wildcards for file names
  * Creation of PAR (Parity Archive) files
  * Create Multiple recovery sets if number of files in SFV greater than 255

WWW: http://pure-sfv.sourceforge.net/

PR:		ports/84127
Submitted by:	Emanuel Haupt <ehaupt@critical.ch>
Approved by:	flz (mentor)
2005-07-26 17:08:48 +00:00
Erwin Lansing
4667fefaa7 Set modified date in entry for previous commit.
Cluebat swung by:	simon
2005-07-26 13:32:39 +00:00
Erwin Lansing
3070ab2383 Note that the fd_set vulnerability in net/bld was fixed in 0.3.3
Prodded by:	garga
Glanced at by:	remko
2005-07-26 10:50:56 +00:00
Hiroki Sato
783a425a47 Document clamav -- multiple remote buffer overflows. 2005-07-25 15:57:46 +00:00
Sergey Matveychuk
4c26422d83 - Update to 0.86.2
PR:		ports/84038
Submitted by:	dawnshade <h-k@mail.ru>
Approved by:	maintainer
2005-07-25 13:43:33 +00:00
James E. Housley
6785cefc24 Update to 4541 2005-07-25 10:19:32 +00:00
Norikatsu Shigemura
0d841e0dd7 Don't overwrite installed aide.conf by using -f FILE
instead of -d FILE.

Damaged by:	ume
Wept by:	ume
Approved by:	maintainer slience
2005-07-23 22:53:23 +00:00
Jeremy Messenger
71ef1c8557 Update to 2.2.5.
PR:		ports/83927
Submitted by:	Udo Schweigert <udo.schweigert@siemens.com> (maintainer)
2005-07-23 22:19:00 +00:00
Oliver Lehmann
905f27b7d6 update to 0.57 2005-07-23 14:34:31 +00:00
Yen-Ming Lee
794af7b937 - update distinfo
(I compared the new distfile with the old one. The author didn't change
   anything, just repacked the distfile)

Noticed by:	kris
2005-07-23 10:55:33 +00:00
Simon L. B. Nielsen
820ff3497c - Document isc-dhcpd -- format string vulnerabilities (older
vulnerabilty). [1]
- Use standard title format for latest egroupware entry.

Reminded by:	Panagiotis Christias [1]
2005-07-23 09:30:01 +00:00
Kris Kennaway
0d8f47d8f7 This port is scheduled for deletion on 2005-09-22 if it is still broken
at that time and no PRs have been submitted to fix it.
2005-07-23 02:53:43 +00:00
Jun Kuriyama
e9ae1a90f5 Add entry for eGroupWare's recent vulnerabilities. 2005-07-23 02:03:37 +00:00
Simon Barner
632103ed79 Document denial of service attack in fetchmail 6.5.2.1.
Reported by:	Matthias Andree <matthias.andree@gmx.de>
Reviewed by:	simon
2005-07-22 09:44:32 +00:00
Vsevolod Stakhov
610a24dbac Update my email address.
Approved by:	perky (mentor)
2005-07-22 09:33:36 +00:00
Simon L. B. Nielsen
3d69e33260 Update phppgadmin entry to note that it was fixed in 3.5.4 and add a
few references while here anyway.

Prodded by:	Tobias Roth (I think :-) )
2005-07-21 21:13:45 +00:00
Renato Botelho
9bb745580f Change MASTERSITE from ~renato to ~garga because I change my account
here

Approved by:	flz (mentor)
2005-07-21 17:53:45 +00:00
Simon L. B. Nielsen
f1b860d9e5 Document dnrd -- remote buffer and stack overflow vulnerabilities. 2005-07-21 16:31:13 +00:00
Simon L. B. Nielsen
e2038fe047 Fix typo in last commit
Noticed by:	Matthias Andree <matthias.andree@gmx.de>
2005-07-21 13:38:26 +00:00
Simon L. B. Nielsen
f085ba4502 Add more references to latest fetchmail entry [1] and sort references
while here anyway.

Submitted by:	Matthias Andree <matthias.andree@gmx.de> [1]
2005-07-21 10:56:44 +00:00
Sergey Matveychuk
9615db4bd4 - Fix a bug in SHA256
PR:		ports/76289
Reported by:	Kenichi Morioka <morioka@openloop.co.jp>
Fixed by:	Vsevolod Stakhov <vsevolod@highsecure.ru> (maintainer)
2005-07-21 09:43:26 +00:00
Pav Lucistnik
83cb040fb2 - Update to 1.3.5
PR:		ports/83823
Submitted by:	Travis Poppe <tlp@liquidx.org>
2005-07-21 09:03:48 +00:00
Tom Rhodes
8eb060fe5c Document an issue with the LDAP backend provided by PowerDNS. 2005-07-21 08:43:12 +00:00
Kris Kennaway
fb53e3e217 BROKEN on !i386: Does not compile 2005-07-20 23:40:37 +00:00
Simon L. B. Nielsen
a23f66e331 Document fetchmail -- remote root/code injection from malicious POP3
server.

Submitted by:	Matthias Andree <matthias.andree@gmx.de>
2005-07-20 19:43:05 +00:00
Renato Botelho
172f2acbd8 Bridge betwean ClamAV antivirus software and Squid caching proxy.
Squidclam is a replacement for SquidClamAV-Redirector.py written
in C using libclamav and libcurl

Author:	squidclam@users.sourceforge.net
WWW:	http://sourceforge.net/projects/squidclam/

PR:		ports/82652
Submitted by:	Alexander Novitsky <alecn2002@yandex.ru>
Approved by:	flz (mentor)
2005-07-20 17:43:59 +00:00
Joe Marcus Clarke
dddd4bf3c5 s/freebsd.org/FreeBSD.org/
Reported by:	oliver
2005-07-20 17:19:48 +00:00
Pav Lucistnik
dea2c27d67 - Revive security/ruby-acl port and unbreak it
- Reset maintainership

PR:		ports/76917
Submitted by:	IWATSUKI Hiroyuki <don@na.rim.or.jp>
2005-07-20 12:28:42 +00:00
Pav Lucistnik
8cbc803ff7 - Fix plist and unbreak [1, 2]
- Clean up Makefile and update pkg-message handling

PR:		ports/81492 [1], ports/83128 [2]
Submitted by:	Boris B. Samorodov <bsam@ipt.ru>,
		Norikatsu Shigemura <n-shigemura@ensure.jp>
Approved by:	maintainer timeout (2 months)
2005-07-20 11:57:36 +00:00
Pav Lucistnik
4c16572c83 - Update to 2.0.8
PR:		ports/83679
Submitted by:	vadim@vk.crocodile.org <vadim@vk.crocodile.org> (maintainer)
2005-07-20 07:49:35 +00:00
Pav Lucistnik
2822182689 - Update to 2.0.8
PR:		ports/83678
Submitted by:	vadim@vk.crocodile.org <vadim@vk.crocodile.org> (maintainer)
2005-07-20 07:49:12 +00:00
Pav Lucistnik
0604419893 - Update to 1.1
PR:		ports/83741
Submitted by:	Marcus Grando <marcus@corp.grupos.com.br>
2005-07-19 19:23:22 +00:00
Roman Bogorodskiy
b64179da64 - Update to 0.3.1
- Update WWW and MASTER_SITES
- Now install examples too

PR:		83740
Submitted by:	Marcus Grando (maintainer)
2005-07-19 19:22:50 +00:00
James E. Housley
111c9d7641 Update to 4538 2005-07-19 16:15:50 +00:00
Pav Lucistnik
690e751982 - Update to 1.4.2
PR:		ports/83659
Submitted by:	Meno Abels <meno.abels@adviser.com> (maintainer)
2005-07-18 22:28:52 +00:00
Pav Lucistnik
2d0c1561fe - Use PLIST_FILES
- Add Author: to pkg-descr

PR:		ports/83683
Submitted by:	Andrej Zverev <az@inec.ru>
2005-07-18 22:19:46 +00:00
Michael Landin
4ccb5ee963 o add kdebase (kate) vulnarability.
Reviewed by:	simon
2005-07-18 20:07:26 +00:00
Pav Lucistnik
61f27f1460 - Update to 0.2.1
PR:		ports/83657
Submitted by:	Vsevolod Stakhov <vsevolod@highsecure.ru>
2005-07-18 19:00:19 +00:00
Pav Lucistnik
31d7fffbe5 - Update to 1.4
PR:		ports/83654
Submitted by:	Vsevolod Stakhov <vsevolod@highsecure.ru>
2005-07-18 18:59:33 +00:00
James E. Housley
5feb9d3bb3 Update to 4537 2005-07-18 17:28:33 +00:00
Pav Lucistnik
b22378f7b1 This module brings to Python programs the capability of evaluating password
strength. To achieve this noble aim it uses the well known cracklib toolkit,
hence the name.

PR:		ports/83603
Submitted by:	Vsevolod Stakhov <vsevolod@highsecure.ru>
2005-07-18 16:29:47 +00:00
Dirk Meyer
8e5bb0a052 - fix manpages 2005-07-18 11:35:53 +00:00
Simon L. B. Nielsen
28825cc36f Add CVE names to recent bugzilla entry. 2005-07-18 09:54:06 +00:00
Pav Lucistnik
3d19fa5eda - Update to 0.9.2
PR:		ports/80238
Submitted by:	Vasil Dimov <vd@datamax.bg>
Approved by:	maintainer timeout (3 months)
2005-07-18 08:14:57 +00:00
Adam Weinberger
586a9efe97 Make sure LATEST_LINK is unique from that of the calife-nondevel port. 2005-07-18 07:26:40 +00:00
Mark Linimon
adda42bec2 With portmgr hat on, reset eik's ports since he has been inactive for
several months (not responding to email).

Discussed among:	portmgr team
2005-07-18 03:49:55 +00:00
Yen-Ming Lee
b7847f5b55 - fix installation of start script on 4.x
PR:		83604
Submitted by:	Blaz Zupan <blaz@si.FreeBSD.org>
2005-07-17 21:42:11 +00:00
Joe Marcus Clarke
79ec2ec03a Fix alignment problems on non-i386 platforms. 2005-07-17 01:54:54 +00:00
Simon L. B. Nielsen
e47a7c39fe - Document firefox & mozilla -- multiple vulnerabilities.
- Minor style nit in drupal entry: Use port name (i.e. lower case) as
  first part of the title.
2005-07-16 14:38:04 +00:00
Oliver Lehmann
656815afa5 make it compile on 7
Noted by:	pointyhat via kris
2005-07-16 13:59:40 +00:00
Erwin Lansing
ede485957c Add an entry for the drupal vulnerabilities. 2005-07-16 11:29:43 +00:00
James E. Housley
ad1bdea4c7 Update to 4536 2005-07-15 22:34:29 +00:00
Niels Heinen
5bab4982a8 Fixed incorrect newsfetch and mnogosearch affected package versions
Approved by:	nectar (mentor)
2005-07-15 14:34:59 +00:00
Jeremy Messenger
e0becca596 Update to 2.3.1.
PR:		ports/83146
Submitted by:	Udo Schweigert <udo.schweigert@siemens.com> (maintainer)
2005-07-14 17:38:40 +00:00
James E. Housley
e889b39b47 Update to 4535 2005-07-14 16:05:27 +00:00
Pav Lucistnik
f6febd09e0 NewPKI is a PKI based on the OpenSSL low-level API, all the datas are handled
through a database, which provides a much more flexible PKI than with OpenSSL,
such as seeking a certificate with a search engine.

CA implementation.

PR:		ports/83387
Submitted by:	Vsevolod Stakhov <vsevolod@highsecure.ru>
2005-07-14 13:58:43 +00:00
Pav Lucistnik
64b73b6642 NewPKI is a PKI based on the OpenSSL low-level API, all the datas are handled
through a database, which provides a much more flexible PKI than with OpenSSL,
such as seeking a certificate with a search engine.

GUI client that uses wxWidgets.

PR:		ports/83386
Submitted by:	Vsevolod Stakhov <vsevolod@highsecure.ru>
2005-07-14 13:24:04 +00:00
Renato Botelho
cc323eeba5 Add PW_PASS option to compile with --enable-pass-save
PR:		82494
Submitted by:	Landon Fuller <landonf@threerings.net>
Reviewed by:	Matthias Andree <matthias.andree@gmx.de> (maintainer)
Approved by:	mantainer, flz (mentor)
2005-07-14 13:15:47 +00:00
Pav Lucistnik
c08970fbc3 NewPKI is a PKI based on the OpenSSL low-level API, all the datas are handled
through a database, which provides a much more flexible PKI than with OpenSSL,
such as seeking a certificate with a search engine.

PR:		ports/83385
Submitted by:	Vsevolod Stakhov <vsevolod@highsecure.ru>
2005-07-14 13:01:35 +00:00
Sam Lawrance
5553e04f1c Mark broken on 4.x
Approved by:	maintainer
2005-07-13 23:51:15 +00:00
Florent Thoumie
a7633f04ef - Update to 0.11.
PR:		ports/83401
Submitted by:	Marcus Grando <marcus@corp.grupos.com.br>
2005-07-13 21:39:43 +00:00
Florent Thoumie
9c86219ccc - Update to 0.9.
PR:		ports/83402
Submitted by:	Marcus Grando <marcus@corp.grupos.com.br>
2005-07-13 21:38:35 +00:00
James E. Housley
0d2c105a44 Update to 4534 2005-07-13 17:36:52 +00:00