Commit Graph

1699 Commits

Author SHA1 Message Date
aanriot
a591ee969f - update to 2.2.7 .
- bump SHARED_LIBS .
- get ride of bogus elements outside of base.
- spacing and cleanup.

inputs and ok sturm@
2006-06-01 05:16:32 +00:00
steven
969b570c17 update to 0.22 (bugfixes)
from jasper (maintainer)
2006-06-01 04:36:41 +00:00
sturm
b1ed785f57 remove ftp.erisiandiscord.de from MASTER_SITES, it is dead 2006-05-31 01:41:55 +00:00
avsm
c55ad0e001 update to cryptokit-1.3, fixes a zlib infinite recursion 2006-05-28 15:45:07 +00:00
grunk
c83f6ef40b update to p5-Net-SSLeay 1.30, ok sturm@ 2006-05-24 19:06:55 +00:00
steven
6592ca7418 update to 5.37, requested by jasper (maintainer) 2006-05-21 12:32:52 +00:00
robert
1351922e5d bump PKGNAME due to the change of the pear dependencies; 2006-05-09 14:16:50 +00:00
aanriot
d2abd65b28 - use ${INSTALL_*} macros.
- don't strip binaries by default.
- bump PKGNAME.

"much better" alek@
2006-05-08 07:27:04 +00:00
steven
d495fc4e19 update to 2.10; from maintainer jasper 2006-05-07 21:24:37 +00:00
steven
c3d30453d2 +p5-GSSAPI 2006-05-07 13:34:45 +00:00
steven
b1fd9f88d4 import p5-GSSAPI 0.21
This module gives access to the routines of the GSSAPI library.

joint work with Jasper Lievisse Adriaanse.
feedback and ok sturm@
2006-05-07 13:33:40 +00:00
aanriot
766ca9e60d - update to 3.1.1 .
- DESCR tweak.
- COMMENT tweak by Michael Knudsen.
- add PKG_ARCH (spotted by alek).

ok alek@
2006-05-05 11:30:46 +00:00
aanriot
91ecf6c19e A buffer overflow vulnerability has been discovered in the
implementation of split() function in NASL, leading to consume a large
amount of CPU and memory resources before crashing. A solution is to
check for zero-length sep parameters.

CVE-2006-2093;
from ubuntu linux;
ok sturm@
2006-05-04 22:40:24 +00:00
aanriot
0e8af14039 update to 2.0.6 .
from Rui Reis <rui@rui.cx>, new maintainer;
ok jolan@
2006-05-03 07:17:44 +00:00
aanriot
aeca7c0e92 make swatch work with perl 5.8.8 and Getopt::Long rev 1.8 .
"looks ok" steven@
2006-05-02 21:28:26 +00:00
mbalmer
6613921f8d Update to ClamAV 0.88.2
This release improves virus detection and fixes zip handling on 64-bit
architectures.

SECURITY
This release fixes a possible security problem in freshclam.
See http://www.clamav.net/security/0.88.2.html for a full security report.
2006-04-30 06:38:25 +00:00
espie
d3568255ff update, okay maintainer. 2006-04-23 17:18:13 +00:00
aanriot
2ccf94b408 - use the same directory for the key as mentionned in MESSAGE.
- bump PKGNAME.

ok jakob@
2006-04-20 16:01:52 +00:00
espie
fa662d9872 update to 2.0.12, move documentation to version independent directories,
bump libraries for safety.
2006-04-17 14:46:08 +00:00
aanriot
7e39f310c0 - maintenance update to 2.2.6 (bugfixes).
- honor flags (spotted by naddy).

ok naddy@
2006-04-16 19:12:40 +00:00
naddy
4b5e55c206 bump PKGNAME after MAINTAINER address change 2006-04-14 22:20:08 +00:00
bernd
edebdd2694 - Update to gnupg-1.4.3
- Add ldap FLAVOR
- Describe the FLAVORs in pkg/DESCR

ok steven@
2006-04-12 09:55:24 +00:00
jakob
f787dd661f update MAINTAINER email adress; from gerardo santana 2006-04-10 05:43:47 +00:00
mbalmer
e348c49c9a Update to ClamAV 0.88.1. 2006-04-06 06:20:16 +00:00
jakob
57417add32 stunnel 4.15 2006-03-23 15:49:53 +00:00
steven
7cff876547 SECURITY update to Crypt::CBC 2.17
Versions of this module prior to 2.17 were incorrectly
using 8 byte IVs when generating the old-style RandomIV style header
(as opposed to the new-style random salt header). This affects data
encrypted using the Rijndael algorithm, which has a 16 byte blocksize,
and is a significant security issue.

The bug has been corrected in versions 2.17 and higher by making it
impossible to use 16-byte block ciphers with RandomIV headers. You may
still read legacy encrypted data by explicitly passing the
-insecure_legacy_decrypt option to Crypt::CBC->new().
2006-03-19 16:03:27 +00:00
steven
771e8d8886 security update to gnupg-1.4.2.2
from gnupg.org:
Signature verification of non-detached signatures may give a positive
result but when extracting the signed data, this data may be prepended
or appended with extra data not covered by the signature.  Thus it is
possible for an attacker to take any signed message and inject extra
arbitrary data.
2006-03-10 20:57:50 +00:00
sturm
e234467e13 give up MAINTAINER, I don't use these anymore 2006-03-04 15:10:30 +00:00
steven
04c4c5f7e5 security update to 1.4.2.1
The security issue is caused due to "gpgv" exiting with a return code
of 0 even if the detached signature file did not carry any signature.
This may result in certain scripts that use "gpgv" to conclude that
the signature is correctly verified.

More info: http://secunia.com/advisories/18845/

ok bernd@ pvalchev@
2006-02-22 12:30:52 +00:00
sturm
dd946eb48e use calloc() to not core dump with malloc.conf -> J
from Ray Lai <ray at cyth.net>
2006-02-15 06:34:04 +00:00
david
4041514197 sort SUBDIR list; ok sturm@ 2006-02-12 16:24:50 +00:00
steven
49598b070f fix WANTLIB 2006-02-10 23:15:11 +00:00
aanriot
b8ac92a800 - regen PLIST to clean and add a few missing plugins.
- bump PKGNAME.
2006-02-09 11:19:08 +00:00
steven
a5d6531ec7 don't build with -O3. 2006-02-08 07:52:56 +00:00
pvalchev
f4f9ecbd87 remove confusing for gcc2 ^M per naddy's patch for www/cssed 2006-02-07 21:37:21 +00:00
bernd
bcee2da2fc Since we have swap encryption on OpenBSD, only warn about insecure
memory if swap encryption is disabled. (It's enabled by default.)

This supersedes pkg/MESSAGE.

Regen patches with update-patches while I'm here. Bump PKGNAME.

idea and ok espie@
2006-02-06 21:57:56 +00:00
sturm
ab083a36eb fix build on sparc
noticed and tested by pval
2006-02-06 06:43:48 +00:00
steven
095093c9f7 fix MASTER_SITES 2006-02-05 11:09:46 +00:00
steven
6b01e98402 fix MASTER_SITES and HOMEPAGE, bump PKGNAME 2006-02-05 11:00:55 +00:00
steven
10ba61d79e add working master site 2006-02-05 10:56:21 +00:00
steven
c4971c1a0f add working master site 2006-02-05 10:50:44 +00:00
steven
dcf1f43947 fix HOMEPAGE and derived MASTER_SITES, bump PKGNAME 2006-02-05 10:48:57 +00:00
steven
07befc477c - remove unneeded MODGNU_SHARED_LIBS and related patches
- use correct ${SYSCONFDIR} in man page, fix from Antoine Jacoutot
2006-02-02 22:23:28 +00:00
jakob
292ced1cf8 fix broken kerberos support 2006-02-02 18:41:20 +00:00
aanriot
89f4f2002f - better DESCR.
- fix MASTER_SITES.
- bump PKGNAME.
2006-01-28 21:19:28 +00:00
sturm
6e71731402 fix packaging issue after update, no need to bump 2006-01-28 15:59:06 +00:00
alek
e23f2939cc Enable _fastmath module
ok ish@
2006-01-23 08:52:55 +00:00
sturm
2bed0118ca don't fall back to an insecure entropy source
from ubuntu via Alexander Bluhm <bluhm at genua.de>
2006-01-21 18:02:56 +00:00
jakob
19c629d0c8 dante v1.1.19 2006-01-21 11:14:44 +00:00
steven
c25c3c1fbe fix WANTLIB after gtk+2 downgrade, add USE_X11 2006-01-20 20:47:25 +00:00