summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2005-11-03Fixed wrong use of WRKSRC.rillig9-32/+33
2005-11-03Fixed wrong use of WRKSRC.rillig16-61/+54
2005-11-03Removed redundant definition for WRKSRC. Changed one instance ofrillig2-47/+46
${WRKSRC}/.. to ${WRKDIR}. As this instance refers to a file that comes from an archive which is unpacked in ${WRKDIR}, this is aesthetically ok. While here, sorted the PLIST.
2005-11-03Fixed wrong use of WRKSRC.rillig39-139/+146
2005-11-03Fixed wrong use of WRKSRC.rillig17-71/+74
2005-11-03Fixed invalid use of WRKSRC.rillig5-20/+20
2005-11-03regen.rillig2-390/+888
2005-11-03Fixed wrong usage of WRKSRC.rillig3-15/+14
2005-11-03Fixed wrong use of WRKSRC.rillig7-25/+27
2005-11-03Fixed wrong usage of WRKSRC.rillig3-8/+9
2005-11-03Note openvmps 1.3nb1bouyer1-1/+2
2005-11-03Add patch to fix a format string vulnerability in vmps_log():bouyer3-2/+22
http://www.security.nnov.ru/Jdocument889.html Patch from me, reviewed by Adrian Portelli Bump pkgrevision.
2005-11-03Fixed wrong usage of WRKSRC.rillig6-19/+22
2005-11-03Do not declare a static function as non-static. This makes theminskim2-1/+14
package build with gcc-4.
2005-11-03Fixed wrong usage of WRKSRC.rillig10-37/+38
2005-11-03Fixed wrong use of WRKSRC.rillig4-19/+20
2005-11-03Profit has changed to versioned distfiles almost a year ago, so there'srillig3-17/+15
no need to keep DIST_SUBDIR. Also fixed the misuse of WRKSRC to define BUILD_DIRS.
2005-11-03Remove obsolete patchesadrianp2-57/+0
2005-11-03Fixes for CAN-2005-1111 and CAN-2005-1229adrianp16-94/+396
2005-11-03Fixed wrong usage of WRKSRC.rillig3-10/+10
2005-11-03Added the default value of CONFIGURE_DIRS. Rewrote the ``build'' phaserillig1-18/+35
description to have the same structure as the ``configure'' phase description.
2005-11-03Updated net/proftpd to 1.3.0rc3martti1-1/+2
2005-11-03Updated proftpd to 1.3.0rc3martti7-80/+34
A lot of changes and bug fixes, including fix for the following security problem: http://security.lss.hr/index.php?page=details&ID=LSS-2004-10-02
2005-11-03Documented the use of CONFIGURE_DIRS, as pkglint has got a new errorrillig1-27/+30
diagnostic that need this explanation.
2005-11-03Updated pkglint to 4.33.1.rillig3-29/+36
Fixed undefined behavior when reading a file that ends in a continuation line. Any use of ${WRKSRC}/.. is considered an error, as ${WRKSRC} is meant to point to the top of the build directories. A proper combination of WRKSRC, CONFIGURE_DIRS and BUILD_DIRS should be used instead. Sorted the makevars.map file and added SUBST_CLASSES.
2005-11-03Reformatted and improved the explanation of the directories.rillig1-15/+25
2005-11-03Add __INTERIX.tv1-1/+2
2005-11-03Add note about Interop X Server.tv1-2/+4
2005-11-03Use real bind resolver on Interix.tv1-0/+11
2005-11-03Use ${LINK.c} to link and make sure all FLAGS are heeded.tv1-2/+2
2005-11-03Force requiring IPv6 support. (--disable-ipv6 is nowhere near enough;tv1-1/+6
it still uses AF_INET6, sockaddr_in6, and getaddrinfo().)
2005-11-03Build fixes for Interix (socklen_t; <sys/time.h> for fd_set).tv3-1/+24
2005-11-03Added explanations for some of the directories used in the buildrillig1-1/+33
process. More will follow.
2005-11-03NOT_FOR_PLATFORM Interix.tv1-2/+2
2005-11-03Don't enable privsep on Interix, which has no SCM_RIGHTS support.tv1-2/+6
2005-11-03Fix PKG_OPTIONS_VAR in previous.tv2-4/+4
2005-11-03Force requiring IPv6 capability.tv1-5/+6
2005-11-03cg's autoconf tests never check headers, so adding HAVE_STDARG_H checktv2-1/+15
is somewhat nontrivial. To make this build on a gcc3 system without one of the functions in snprintf.c, also allow __STDC__ to be a flag indicating availability of <stdarg.h>.
2005-11-03Forgot distinfo in previous commit.tv1-1/+2
2005-11-03osfinger.c forgot to include <arpa/inet.h> for htons().tv2-1/+30
Use traditional recv loop over a stream socket rather than depending on MSG_WAITALL to be available. (Interix doesn't have MSG_WAITALL.)
2005-11-03Wrote an introduction and converted the itemize list of main targetsrillig1-55/+82
into sections. These sections are still very incomplete.
2005-11-03Require availability of IPv6.tv1-5/+6
2005-11-03Fix typo botch in previous.tv1-2/+2
2005-11-03Added __DragonFly__.rillig1-1/+2
2005-11-03Note www/libwww PKGREVISION bump: security fix.salo1-1/+2
2005-11-03Security fix for SA17119:salo3-3/+528
"A vulnerability was found in W3C Libwww, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to a boundary error in the "HTBoundary_put_block()" function when processing multipart MIME data. This may be exploited to cause an illegal memory access past the end of the input buffer via specially crafted multipart MIME data. Successful exploitation can potentially cause an application that uses Libwww to crash." http://secunia.com/advisories/17119/ https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159597 Bump PKGREVISION. Patch from RedHat.
2005-11-03This needs libgetopt for getopt_long(3).tv1-1/+2
2005-11-03Removed the trailing slash behind the last MASTER_SITE.rillig1-2/+2
2005-11-03Note net/openvpn security update.salo2-3/+3
2005-11-03Security update to version 2.0.5.salo3-9/+8
Changes: 2.0.5: ====== - Fixed bug in Linux get_default_gateway function introduced in 2.0.4, which would cause redirect-gateway on Linux clients to fail. - Restored easy-rsa/2.0 tree (backported from 2.1 beta series) which accidentally disappeared in 2.0.2 -> 2.0.4 transition. 2.0.4: ====== - Security fix -- Affects non-Windows OpenVPN clients of version 2.0 or higher which connect to a malicious or compromised server. A format string vulnerability in the foreign_option function in options.c could potentially allow a malicious or compromised server to execute arbitrary code on the client. Only non-Windows clients are affected. The vulnerability only exists if (a) the client's TLS negotiation with the server succeeds, (b) the server is malicious or has been compromised such that it is configured to push a maliciously crafted options string to the client, and (c) the client indicates its willingness to accept pushed options from the server by having "pull" or "client" in its configuration file (Credit: Vade79). CVE-2005-3393 - Security fix -- Potential DoS vulnerability on the server in TCP mode. If the TCP server accept() call returns an error status, the resulting exception handler may attempt to indirect through a NULL pointer, causing a segfault. Affects all OpenVPN 2.0 versions. CVE-2005-3409 - Fix attempt of assertion at multi.c:1586 (note that this precise line number will vary across different versions of OpenVPN). - Added ".PHONY: plugin" to Makefile.am to work around "make dist" issue. - Fixed double fork issue that occurs when --management-hold is used. - Moved TUN/TAP read/write log messages from --verb 8 to 6. - Warn when multiple clients having the same common name or username usurp each other when --duplicate-cn is not used. - Modified Windows and Linux versions of get_default_gateway to return the route with the smallest metric if multiple 0.0.0.0/0.0.0.0 entries are present. 2.0.3: ====== - openvpn_plugin_abort_v1 function wasn't being properly registered on Windows. - Fixed a bug where --mode server --proto tcp-server --cipher none operation could cause tunnel packet truncation.