summaryrefslogtreecommitdiff
path: root/security (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Add new port: security/py-critsDan Langille2015-05-226-0/+1050
| | | | | | | | | | | | | CRITs is a web-based tool which combines an analytic engine with a cyber threat database that not only serves as a repository for attack data and malware, but also provides analysts with a powerful platform for conducting malware analyses, correlating malware, and for targeting data. These analyses and correlations can also be saved and exploited within CRITs. CRITs employs a simple but very useful hierarchy to structure cyber threat information. This structure gives analysts the power to 'pivot' on metadata to discover previously unknown related content. Approved by: mat (mentor)
* Record some minor PostgreSQL sercurity problems.Palle Girgensohn2015-05-221-0/+53
| | | | | | | | "This update fixes three security vulnerabilities reported in PostgreSQL over the past few months. Nether of these issues is seen as particularly urgent. However, users should examine them in case their installations are vulnerable." URL: http://www.postgresql.org/about/news/1587/
* Fix plist when LIBDANE is defined (PORTREVISION not bumpedXin LI2015-05-221-2/+2
| | | | | | | | because package wouldn't be successful in the case). Pointy hat to: delphij Reported by: sunpoet MFH: 2015Q2
* Update to 3.3.15.Xin LI2015-05-223-33/+113
| | | | | PR: 198875 Approved by: maintainer
* Use new DES_ methods instead of the long deprecated des_ methods.Xin LI2015-05-222-3/+47
| | | | | PR: 198366 Submitted by: Bernard Spil <spil.oss gmail com>
* Pass full path to the vuln.xml file to extra-validation.py. Without this,Xin LI2015-05-222-2/+6
| | | | | | | if .OBJDIR differs from .CURDIR, the validation would fail. PR: 193923 Reported by: jbeich
* - Add LICENSESunpoet Po-Chuan Hsieh2015-05-211-3/+4
| | | | | - Sort RUN_DEPENDS - Remove contiguous blank lines
* - Update to 0.79Sunpoet Po-Chuan Hsieh2015-05-212-3/+3
| | | | Changes: http://search.cpan.org/dist/Module-Signature/Changes
* Properly register info pageAntoine Brodin2015-05-212-1/+2
| | | | | PR: 199975 Approved by: maintainer timeout (2 weeks)
* Properly register info pageAntoine Brodin2015-05-212-1/+2
| | | | | PR: 199980 Approved by: maintainer timeout (2 weeks)
* - Update to 0.8.0Dmitry Marakasov2015-05-215-29/+26
| | | | | PR: 200307 Submitted by: tkato432@yahoo.com
* Update to 2.2.2.Bryan Drewery2015-05-212-5/+7
| | | | | | | | | | | Changes: - Default KEY_SIZE to 2048 bits - Default the signing hash to SHA256 rather than SHA1 and MD5 - vars cleanups - pkitool cleanups - pkitool -days fix for https://community.openvpn.net/openvpn/ticket/198 Approved by: 2 year old fix for SHA1->SHA256.
* Fix patchingAntoine Brodin2015-05-201-1/+1
| | | | | Reported by: pkg-fallout MFH: 2015Q2
* Document CVE-2015-3306 proftpd mod_copy unauthenticated copying of filesXin LI2015-05-201-0/+29
| | | | vulnerability.
* Fix spelling of "certification authority"Benjamin Kaduk2015-05-201-1/+1
| | | | Approved by: portmgr (bapt), bapt (ports committer)
* - Drop @dirrm* from plistDmitry Marakasov2015-05-201-1/+0
| | | | Approved by: portmgr blanket
* - Drop @dirrm* from plistDmitry Marakasov2015-05-201-1/+0
| | | | Approved by: portmgr blanket
* Add patch to force port to link against qt4, as the port MakefileGuido Falsi2015-05-192-0/+71
| | | | | | | | | | | | | | | clearly states. Otherwise this software unconditionally checks for the presence of qt5 and link against that breaking a depending port and linking against unregistered dependencies. This is just a quick fix, to avoid core dumps in deskutils/owncloud. I'll post a more proper update to this port later. Reported by: Tobias Berner <tcberner at gmail.com>, Marko Cupac <marko.cupac at mimar.rs> Approved by: "Just Fix It" blanket
* Document vulnerability in security/ipsec-tools.Brad Davis2015-05-191-0/+26
| | | | | PR: 200334 Approved by: bdrewery (mentor)
* Document new vulnerabilities in www/chromium < 43.0.2357.65Rene Ladan2015-05-191-0/+84
| | | | Obtained from: http://googlechromereleases.blogspot.nl/2015/05/stable-channel-update_19.html
* Update ipsec-tools with a patch from NetBSD to fix a memory leak.Brad Davis2015-05-192-0/+15
| | | | | | | PR: 200334 (reported in) Submitted by: brd Approved by: bdrewery (mentor, portmgr) MFH: 2015Q2
* Upgrade to 2.1.4 (bugfixes since 2.1.2).Jun Kuriyama2015-05-192-5/+5
|
* Document ClamAV multiple vulnerabilities.Xin LI2015-05-191-0/+47
|
* remove uneeded 'cd'Vanilla I. Shu2015-05-191-1/+0
| | | | Submitted by: adamw@
* Add tmux-cssh 20150518, clusterSSH features using tmux, but not X11.Vanilla I. Shu2015-05-194-0/+35
| | | | | PR: 200313 Submitted by: jrm@ftfl.ca
* - Drop @dirrm* from plistDmitry Marakasov2015-05-191-2/+0
| | | | Approved by: portmgr blanket
* - Drop @dirrm* from plistDmitry Marakasov2015-05-191-1/+0
| | | | Approved by: portmgr blanket
* Add references to security/pinentry-tty.Jimmy Olgeni2015-05-182-0/+2
|
* security/pinentry:Max Brazhnikov2015-05-183-3/+23
| | | | | - Update to 0.9.2 - Add optional support for libsecret and enable it for GTK frontend
* - Update to 0.28.0Dmitry Marakasov2015-05-185-35/+70
| | | | | | | | | - Add IGNORE if LibreSSL is installed. This port uses low level functions of OpenSSL, and big work of the upstream is ahead to support LibreSSL. This version of OpenXPKI still does not have full support of LibreSSL. - Allow non-root user to build and stage so library. PR: 199179 Submitted by: spil.oss@gmail.com Patch by: svysh.fbsd@gmail.com (maintainer)
* - Drop @dirrm* from plistDmitry Marakasov2015-05-181-1/+0
| | | | Approved by: portmgr blanket
* - Update to 0.28.0Dmitry Marakasov2015-05-182-6/+6
| | | | | | | Changes: https://github.com/openxpki/openxpki/commits/master PR: 200229 Submitted by: svysh.fbsd@gmail.com
* Replace most occurences of github.com in MASTER_SITES with USE_GITHUB usage.Mathieu Arnold2015-05-188-14/+18
| | | | | With hat: portmgr Sponsored by: Absolight
* New port: security/hitch:Ryan Steinmetz2015-05-188-0/+217
| | | | | | | | hitch is a network proxy that terminates TLS/SSL connections and forwards the unencrypted traffic to some backend. It's designed to handle 10s of thousands of connections efficiently on multicore machines. WWW: https://github.com/varnish/hitch/
* security/py-libnacl: Update to 1.4.2Kubilay Kocak2015-05-182-3/+3
| | | | | | | | | | | - Update to 1.4.2 Changes: * https://libnacl.readthedocs.org/en/latest/topics/releases/index.html PR: 200233 Submitted by: Jason Unovitch <jason.unovitch gmail com>
* - Drop @dirrm* from plistDmitry Marakasov2015-05-182-5/+3
| | | | | | - Add LICENSE Approved by: portmgr blanket
* security/vuxml: Add CVE-2015-3900 entry for devel/ruby-gemsMichael Moll2015-05-171-0/+42
| | | | | | | PR: 200264 Differential Revision: https://reviews.freebsd.org/D2572 Approved by: mat (mentor) Security: CVE-2015-3900
* Add patch to support syslog in verbose modeMark Felder2015-05-172-1/+28
| | | | | | | This was previously a patch in the FreeBSD ports tree and was sent upstream but did not make it into 1.6.0 Submitted by: gregp@n0qds.org
* Document qemu "VENOM" vulnerability - CVE-2015-3456Juergen Lock2015-05-171-0/+44
| | | | | | | | PR: 200255 PR: 200256 PR: 200257 Submitted by: venture37@geeklan.co.uk Security: http://vuxml.FreeBSD.org/freebsd/2780e442-fc59-11e4-b18b-6805ca1d3bb1.html
* Update the Linphone stack: belle-sip 1.4.1, libbzrtp 1.0.2, ortp 0.24.2,Tijl Coosemans2015-05-162-4/+3
| | | | mediastreamer 2.11.2, linphone 3.8.2
* - fix build for armv8Dirk Meyer2015-05-161-3/+7
| | | | | PR: 200121 Submitted by: Mikael Urankar
* - update to 1.0.25Dirk Meyer2015-05-162-6/+4
| | | | | PR: 200116 Submitted by: Bas Vermin
* Add security/keepass, the official KeePass client.Adam Weinberger2015-05-166-0/+88
| | | | | | | | | | | | | | | | | | KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish). This is the official KeePass application, which was originally only available for Windows, but has now been re-written with .Net and able to be run on BSD, Linux and Mac OS X with Mono. WWW: http://keepass.info/ PR: 200062 Submitted by: Ben Woods
* Avoid a potential read overflow. This was not deemed a security issue byBryan Drewery2015-05-162-1/+18
| | | | | | | | | upstream; it was fixed upstream comprehensively a few weeks ago in 77199d6ec8986d470487e66f8ea8f4cf43d2e20c. PR: 200241 Patch by: Hanno Böck <hanno@hboeck.de> Obtained from: http://www.openwall.com/lists/oss-security/2015/05/16/3
* Use my FreeBSD address as MAINTAINERJohan van Selst2015-05-161-1/+1
|
* Document Quassel IRC vulnerability CVE-2015-3427Max Brazhnikov2015-05-161-0/+28
|
* - Fix an error in apg(1) and apgd(8) man pagesMatthew Seaman2015-05-165-23/+29
| | | | | | - Regenerate patches Submitted by: jgh
* - Update ocaml-ssl to 0.4.7, now from GithubJohan van Selst2015-05-162-7/+9
| | | | - Adopt port
* Reset 14 ocaml ports maintained by Jaap Boender per his requestJohn Marino2015-05-162-2/+2
| | | | | | | | | | | | | "I don't use FreeBSD very much anymore, so I'm not really the best person to fix this. (As a corollary, if anyone wants to take over maintainership of any or all of the ports, I'm still listed as maintainer of, they are most welcome to.)" Given that Jaap hasn't submitted or handled any PRs since before staging, I think it will be more effective to just reset all the ports and let people pick up the ones they like. Thanks for your past support, Jaap! PR: 199845
* Correct entry for apache-openoffice-* / libreoffice CVE-2015-1774 soDon Lewis2015-05-151-1/+3
| | | | | | that apache-openoffice-4.1.1_9 is not incorrectly flagged as vulnerable. Approved by: mat (mentor, implicit)