Commit Graph

1785 Commits

Author SHA1 Message Date
mbalmer
c1909e4a9e security update to 0.88.4
ok pvalchev
2006-08-15 18:48:22 +00:00
sturm
65e2fcd425 don't use broken homegrown socketpair() implementation
reported by mayonez at ssnet.xim.pl
2006-08-09 18:44:08 +00:00
bernd
f557a7e653 Security update to gnupg-1.4.5. (CVE-2006-3746)
This fixes a denial of service vulnerability.

For more information see:
http://secunia.com/advisories/21297/
http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html

okay espie@
2006-08-07 19:59:20 +00:00
espie
49a9142c53 new lib specs 2006-08-03 23:55:10 +00:00
espie
444cc3c520 new lib specs 2006-08-03 23:28:11 +00:00
grunk
6f4aca1e2c update to p5-IO-Socket-SSL 0.996
ok jasper@ sturm@
2006-08-02 16:56:36 +00:00
jasper
6cc5ab7fa0 update p5-Digest-SHA to 5.42
ok steven
2006-07-30 12:54:11 +00:00
aanriot
207408d87a update to 0.9.10.2 . 2006-07-29 13:06:18 +00:00
sturm
85ac1ae19b clean up MESSAGE/UNMESSAGE and mention startup code here, it's going
to be removed from rc.local

synchronously mount /crypt as suggested in pr 3567, this way I can move
even files bigger than a few KB into the crypted directory.
2006-07-28 20:15:39 +00:00
aanriot
513e3c6f1f - maintenance update to 0.9.6 .
- use pre-install target instead of pre-build .
2006-07-27 17:06:25 +00:00
grunk
1e4a8c56bb update to p5-IO-Socket-SSL 0.994
ok jasper@ sturm@
2006-07-26 19:34:05 +00:00
aanriot
12d311af20 update to 0.9.10.1 (bugfixes). 0.9.10 has been skipped because of issues
with the shipped getaddrinfo.h and gnulib.
2006-07-26 07:12:11 +00:00
aanriot
1cd7dd46a4 zap 0-byte file. 2006-07-26 07:10:04 +00:00
aanriot
40b65a0142 - make the instructions less specific to postgresql.
- move the database creation instructions to the correct place.
- regen patches.
- bump PKGNAMEs.

"looks ok" alek@
2006-07-26 07:07:16 +00:00
steven
a1a32f1041 fix homepages and a few master sites 2006-07-19 16:07:22 +00:00
espie
fc99b3a219 mandir tweak to ensure build 2006-07-17 19:30:30 +00:00
sturm
cb7a5defb6 update to john 1.7.0.2
remove the no_mmx FLAVOR

from maintainer cathcart@
2006-07-16 18:17:25 +00:00
aanriot
b4be7685e5 - install new rules with @sample now.
- bump PKGNAME .
2006-07-16 00:41:24 +00:00
msf
b3da8c812d update to 0.74 based on work from jasper 2006-07-14 18:59:51 +00:00
steven
19ffa02a67 homepage and master site moved; bump PKGNAME 2006-07-13 17:22:23 +00:00
steven
1eb405cac6 homepage and master site moved; bump PKGNAME 2006-07-13 17:14:21 +00:00
bernd
044eebec20 Update to gnupg-1.4.4.
ok reinhard@ (MAINTAINER), "looks good" steven@
2006-07-13 13:11:28 +00:00
steven
86c8e9c060 fix master sites 2006-07-11 15:28:24 +00:00
aanriot
6feac2f5e8 update to 0.9.6 (bugfixes + changes regarding the rulesets). 2006-07-10 14:34:23 +00:00
aanriot
4d477b6d87 update to 0.9.8.1 (bugfixes). 2006-07-05 12:06:45 +00:00
aanriot
9c6f73271f - update to 0.9.5 . 2006-07-01 10:45:04 +00:00
aanriot
4ddeab9177 - update to 0.9.8 .
help & ok alek@
2006-07-01 10:44:22 +00:00
aanriot
7506aa87e3 - update to 0.9.9 .
ok alek@
2006-07-01 10:42:08 +00:00
steven
61dcc6f006 fix default config file path, and install man page.
inspired by diff from Alexander Hall <alexander at hakan.beard.se>
2006-06-29 17:26:15 +00:00
aanriot
15ad362480 add prelude . 2006-06-26 18:10:05 +00:00
aanriot
824597b7b1 Prelude is an opensource Hybrid IDS framework, which is able to use
different sensors like snort or nepenthes, log files from hostapd etc.

work mostly done before and during c2k6;
initially discussed with reyk@ and sturm@ , help and inputs msf@ alek@;
ok alek@
2006-06-26 18:04:24 +00:00
bernd
2cfe636d68 Security update! Fixes an integer overflow. (CVE-2006-3082)
Detailed information: http://secunia.com/advisories/20783/

Diff from gnupg CVS.

ok sturm@
2006-06-23 11:35:36 +00:00
jasper
91c42a365c update HOMEPAGE and bump PKGNAME.
from john danks <john.danks at gmail.com>
ok bernd@
2006-06-20 12:59:12 +00:00
jasper
af3a835bd1 Update p5-Digest-SHA to 5.41 and update my e-mail address while there.
ok steven@
2006-06-16 16:56:56 +00:00
bernd
c3e1e3a89e Fix WANTLIB after gtk+2 upgrade. 2006-06-13 13:19:08 +00:00
alek
92e91b4ac4 Bump PKGNAMEs after recent python switch 2006-06-03 09:19:52 +00:00
aanriot
a591ee969f - update to 2.2.7 .
- bump SHARED_LIBS .
- get ride of bogus elements outside of base.
- spacing and cleanup.

inputs and ok sturm@
2006-06-01 05:16:32 +00:00
steven
969b570c17 update to 0.22 (bugfixes)
from jasper (maintainer)
2006-06-01 04:36:41 +00:00
sturm
b1ed785f57 remove ftp.erisiandiscord.de from MASTER_SITES, it is dead 2006-05-31 01:41:55 +00:00
avsm
c55ad0e001 update to cryptokit-1.3, fixes a zlib infinite recursion 2006-05-28 15:45:07 +00:00
grunk
c83f6ef40b update to p5-Net-SSLeay 1.30, ok sturm@ 2006-05-24 19:06:55 +00:00
steven
6592ca7418 update to 5.37, requested by jasper (maintainer) 2006-05-21 12:32:52 +00:00
robert
1351922e5d bump PKGNAME due to the change of the pear dependencies; 2006-05-09 14:16:50 +00:00
aanriot
d2abd65b28 - use ${INSTALL_*} macros.
- don't strip binaries by default.
- bump PKGNAME.

"much better" alek@
2006-05-08 07:27:04 +00:00
steven
d495fc4e19 update to 2.10; from maintainer jasper 2006-05-07 21:24:37 +00:00
steven
c3d30453d2 +p5-GSSAPI 2006-05-07 13:34:45 +00:00
steven
b1fd9f88d4 import p5-GSSAPI 0.21
This module gives access to the routines of the GSSAPI library.

joint work with Jasper Lievisse Adriaanse.
feedback and ok sturm@
2006-05-07 13:33:40 +00:00
aanriot
766ca9e60d - update to 3.1.1 .
- DESCR tweak.
- COMMENT tweak by Michael Knudsen.
- add PKG_ARCH (spotted by alek).

ok alek@
2006-05-05 11:30:46 +00:00
aanriot
91ecf6c19e A buffer overflow vulnerability has been discovered in the
implementation of split() function in NASL, leading to consume a large
amount of CPU and memory resources before crashing. A solution is to
check for zero-length sep parameters.

CVE-2006-2093;
from ubuntu linux;
ok sturm@
2006-05-04 22:40:24 +00:00
aanriot
0e8af14039 update to 2.0.6 .
from Rui Reis <rui@rui.cx>, new maintainer;
ok jolan@
2006-05-03 07:17:44 +00:00
aanriot
aeca7c0e92 make swatch work with perl 5.8.8 and Getopt::Long rev 1.8 .
"looks ok" steven@
2006-05-02 21:28:26 +00:00
mbalmer
6613921f8d Update to ClamAV 0.88.2
This release improves virus detection and fixes zip handling on 64-bit
architectures.

SECURITY
This release fixes a possible security problem in freshclam.
See http://www.clamav.net/security/0.88.2.html for a full security report.
2006-04-30 06:38:25 +00:00
espie
d3568255ff update, okay maintainer. 2006-04-23 17:18:13 +00:00
aanriot
2ccf94b408 - use the same directory for the key as mentionned in MESSAGE.
- bump PKGNAME.

ok jakob@
2006-04-20 16:01:52 +00:00
espie
fa662d9872 update to 2.0.12, move documentation to version independent directories,
bump libraries for safety.
2006-04-17 14:46:08 +00:00
aanriot
7e39f310c0 - maintenance update to 2.2.6 (bugfixes).
- honor flags (spotted by naddy).

ok naddy@
2006-04-16 19:12:40 +00:00
naddy
4b5e55c206 bump PKGNAME after MAINTAINER address change 2006-04-14 22:20:08 +00:00
bernd
edebdd2694 - Update to gnupg-1.4.3
- Add ldap FLAVOR
- Describe the FLAVORs in pkg/DESCR

ok steven@
2006-04-12 09:55:24 +00:00
jakob
f787dd661f update MAINTAINER email adress; from gerardo santana 2006-04-10 05:43:47 +00:00
mbalmer
e348c49c9a Update to ClamAV 0.88.1. 2006-04-06 06:20:16 +00:00
jakob
57417add32 stunnel 4.15 2006-03-23 15:49:53 +00:00
steven
7cff876547 SECURITY update to Crypt::CBC 2.17
Versions of this module prior to 2.17 were incorrectly
using 8 byte IVs when generating the old-style RandomIV style header
(as opposed to the new-style random salt header). This affects data
encrypted using the Rijndael algorithm, which has a 16 byte blocksize,
and is a significant security issue.

The bug has been corrected in versions 2.17 and higher by making it
impossible to use 16-byte block ciphers with RandomIV headers. You may
still read legacy encrypted data by explicitly passing the
-insecure_legacy_decrypt option to Crypt::CBC->new().
2006-03-19 16:03:27 +00:00
steven
771e8d8886 security update to gnupg-1.4.2.2
from gnupg.org:
Signature verification of non-detached signatures may give a positive
result but when extracting the signed data, this data may be prepended
or appended with extra data not covered by the signature.  Thus it is
possible for an attacker to take any signed message and inject extra
arbitrary data.
2006-03-10 20:57:50 +00:00
sturm
e234467e13 give up MAINTAINER, I don't use these anymore 2006-03-04 15:10:30 +00:00
steven
04c4c5f7e5 security update to 1.4.2.1
The security issue is caused due to "gpgv" exiting with a return code
of 0 even if the detached signature file did not carry any signature.
This may result in certain scripts that use "gpgv" to conclude that
the signature is correctly verified.

More info: http://secunia.com/advisories/18845/

ok bernd@ pvalchev@
2006-02-22 12:30:52 +00:00
sturm
dd946eb48e use calloc() to not core dump with malloc.conf -> J
from Ray Lai <ray at cyth.net>
2006-02-15 06:34:04 +00:00
david
4041514197 sort SUBDIR list; ok sturm@ 2006-02-12 16:24:50 +00:00
steven
49598b070f fix WANTLIB 2006-02-10 23:15:11 +00:00
aanriot
b8ac92a800 - regen PLIST to clean and add a few missing plugins.
- bump PKGNAME.
2006-02-09 11:19:08 +00:00
steven
a5d6531ec7 don't build with -O3. 2006-02-08 07:52:56 +00:00
pvalchev
f4f9ecbd87 remove confusing for gcc2 ^M per naddy's patch for www/cssed 2006-02-07 21:37:21 +00:00
bernd
bcee2da2fc Since we have swap encryption on OpenBSD, only warn about insecure
memory if swap encryption is disabled. (It's enabled by default.)

This supersedes pkg/MESSAGE.

Regen patches with update-patches while I'm here. Bump PKGNAME.

idea and ok espie@
2006-02-06 21:57:56 +00:00
sturm
ab083a36eb fix build on sparc
noticed and tested by pval
2006-02-06 06:43:48 +00:00
steven
095093c9f7 fix MASTER_SITES 2006-02-05 11:09:46 +00:00
steven
6b01e98402 fix MASTER_SITES and HOMEPAGE, bump PKGNAME 2006-02-05 11:00:55 +00:00
steven
10ba61d79e add working master site 2006-02-05 10:56:21 +00:00
steven
c4971c1a0f add working master site 2006-02-05 10:50:44 +00:00
steven
dcf1f43947 fix HOMEPAGE and derived MASTER_SITES, bump PKGNAME 2006-02-05 10:48:57 +00:00
steven
07befc477c - remove unneeded MODGNU_SHARED_LIBS and related patches
- use correct ${SYSCONFDIR} in man page, fix from Antoine Jacoutot
2006-02-02 22:23:28 +00:00
jakob
292ced1cf8 fix broken kerberos support 2006-02-02 18:41:20 +00:00
aanriot
89f4f2002f - better DESCR.
- fix MASTER_SITES.
- bump PKGNAME.
2006-01-28 21:19:28 +00:00
sturm
6e71731402 fix packaging issue after update, no need to bump 2006-01-28 15:59:06 +00:00
alek
e23f2939cc Enable _fastmath module
ok ish@
2006-01-23 08:52:55 +00:00
sturm
2bed0118ca don't fall back to an insecure entropy source
from ubuntu via Alexander Bluhm <bluhm at genua.de>
2006-01-21 18:02:56 +00:00
jakob
19c629d0c8 dante v1.1.19 2006-01-21 11:14:44 +00:00
steven
c25c3c1fbe fix WANTLIB after gtk+2 downgrade, add USE_X11 2006-01-20 20:47:25 +00:00
espie
1bc12d3ef6 bump package name since the plugin dir was changed. 2006-01-16 16:35:36 +00:00
espie
25e2f4b0ff remaining shared libs bumps for C++ libs 2006-01-14 11:46:15 +00:00
steven
71992dafda update to 2.09, PKG_ARCH=*
remove tom@ from maintainer per his request
update from new maintainer Jasper Lievisse Adriaanse <jasper at nedbsd.nl>
2006-01-14 10:05:10 +00:00
steven
f174a0b0f6 update to 2.15. from Jasper Lievisse Adriaanse
PKG_ARCH=* while here
2006-01-12 13:12:42 +00:00
steven
cd732c7b80 update to 2.05 2006-01-12 08:39:56 +00:00
steven
d38a901ab6 update to 2.10
from Jasper Lievisse Adriaanse
2006-01-12 08:36:21 +00:00
mbalmer
5816a0c096 Update to ClamAV 0.88.
SECURITY:  A possible heap overflow in the UPX code has been fixed.
The security of the UPX, FSG and Petite modules has been improved, too.
2006-01-10 09:26:28 +00:00
alek
a4172630d6 - Add pkgconfig to BUILD_DEPENDS
- Disable hot plugging in config file
- Bump PKGNAME
- Remove MODGNU_SHARED_LIBS while here

from Douglas Santos <dsantos@hydroxyl.org> (MAINTAINER)
2006-01-08 13:33:22 +00:00
cathcart
7c872f8aff Update to 1.6.40
Take Maintainership

ok sturm
2006-01-06 04:26:09 +00:00
espie
d7ba83cfb3 remove libtool dep 2006-01-05 22:31:23 +00:00
pvalchev
ef3ab8fb6d gcc2 fixes 2006-01-04 02:03:46 +00:00
espie
c8f333709e unbreak 2006-01-03 09:07:26 +00:00
espie
872158486a fix plugins path after recent qt3 update 2006-01-02 17:00:16 +00:00
sturm
eab9d4d544 SHARED_LIBS 2005-12-28 22:52:30 +00:00