summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2010-03-27Pullup ticket #3065 - requested by tacatron12-199/+125
openssl: security update Revisions pulled up: - security/openssl/Makefile 1.144-1.1.146 - security/openssl/PLIST.common 1.17 - security/openssl/distinfo 1.72-1.73 - security/openssl/patches/patch-aa 1.23 - security/openssl/patches/patch-ac 1.38 - security/openssl/patches/patch-af 1.24 - security/openssl/patches/patch-ax delete - security/openssl/patches/patch-ay delete - security/openssl/patches/patch-az delete - security/openssl/patches/patch-ba delete - security/openssl/patches/patch-bb delete - security/openssl/patches/patch-bc 1.1 --- Module Name: pkgsrc Committed By: taca Date: Fri Feb 26 03:15:14 UTC 2010 Modified Files: pkgsrc/security/openssl: Makefile distinfo pkgsrc/security/openssl/patches: patch-aa patch-ac patch-af Removed Files: pkgsrc/security/openssl/patches: patch-ax patch-ay patch-az patch-ba patch-bb Log Message: Update openssl to 0.9.8m. The OpenSSL project team is pleased to announce the release of version 0.9.8m of our open source toolkit for SSL/TLS. This new OpenSSL version is a security and bugfix release which implements RFC5746 to address renegotiation vulnerabilities mentioned in CVE-2009-3555. For a complete list of changes, please see http://www.openssl.org/source/exp/CHANGES. --- Module Name: pkgsrc Committed By: taca Date: Mon Mar 1 08:15:40 UTC 2010 Modified Files: pkgsrc/security/openssl: Makefile PLIST.common Log Message: Fix broken PLIST. (I wonder why "make print-PLIST" generated wrong result before...") Bump PKGREVISION. --- Module Name: pkgsrc Committed By: taca Date: Fri Mar 26 00:20:49 UTC 2010 Modified Files: pkgsrc/security/openssl: Makefile distinfo Added Files: pkgsrc/security/openssl/patches: patch-bc Log Message: Add a patch for Fix for CVE-2010-0740, DoS problem. http://www.openssl.org/news/secadv_20100324.txt Bump PKGREVISION.
2010-02-26Pullup ticket 3024 - requested by tacaspz2-10/+8
security update Revisions pulled up: - pkgsrc/security/sudo/Makefile 1.119 - pkgsrc/security/sudo/distinfo 1.61 -------------------------------------------------------------------- Module Name: pkgsrc Committed By: taca Date: Fri Feb 26 01:08:38 UTC 2010 Modified Files: pkgsrc/security/sudo: Makefile distinfo Log Message: Update sudo package to 1.7.2p4. Major changes between version 1.7.2p3 and 1.7.2p4: * Fix a bug that could allow users with permission to run sudoedit to run arbitrary commands. Major changes between version 1.7.2p2 and 1.7.2p3: * Fix printing of entries with multiple host entries on a single line. * Fix use after free when sending error messages via email. * Use setrlimit64(), if available, instead of setrlimit() when setting AIX resource limits since rlim_t is 32bits. * Fix size arg when realloc()ing include stack. * Avoid a duplicate fclose() of the sudoers file. To generate a diff of this commit: cvs rdiff -u -r1.118 -r1.119 pkgsrc/security/sudo/Makefile cvs rdiff -u -r1.60 -r1.61 pkgsrc/security/sudo/distinfo ------------------------------------------------------------------ Module Name: pkgsrc Committed By: zafer Date: Tue Feb 9 00:05:48 UTC 2010 Modified Files: pkgsrc/security/sudo: Makefile Log Message: update master_sites To generate a diff of this commit: cvs rdiff -u -r1.117 -r1.118 pkgsrc/security/sudo/Makefile
2010-02-15Pullup ticket 3004 - requested by tacaspz1-3/+14
security fix Revisions pulled up: - pkgsrc/security/f-prot-antivirus6-ms-bin/Makefile 1.2 ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: taca Date: Sun Feb 14 10:56:32 UTC 2010 Modified Files: pkgsrc/security/f-prot-antivirus6-ms-bin: Makefile Log Message: It was missing to replace user in scan-mail.pl. Add FPROT_GROUP and FPROT_USER to proper handling that user. Bump PKGREVISION. To generate a diff of this commit: cvs rdiff -u -r1.1.1.1 -r1.2 \ pkgsrc/security/f-prot-antivirus6-ms-bin/Makefile
2010-01-24Pullup ticket #2967 - requested by tacatron3-2/+48
openssl: security patch Revisions pulled up: - security/openssl/Makefile 1.143 - security/openssl/distinfo 1.71 - security/openssl/patches/patch-bb 1.1 --- Module Name: pkgsrc Committed By: taca Date: Fri Jan 22 03:35:10 UTC 2010 Modified Files: pkgsrc/security/openssl: Makefile distinfo Added Files: pkgsrc/security/openssl/patches: patch-bb Log Message: Add a patch from OpenSSL's repositroy to deal with CVE-2009-4355. Bump PKGREVISION.
2010-01-16Pullup ticket 2959 - requested by tronspz1-1/+7
build fix for Solaris Revisions pulled up: - pkgsrc/security/opencdk/Makefile 1.32 ------------------------------------------------------------------------- Module Name: pkgsrc Committed By: tron Date: Sat Jan 16 11:23:04 UTC 2010 Modified Files: pkgsrc/security/opencdk: Makefile Log Message: Fix build under Solaris. To generate a diff of this commit: cvs rdiff -u -r1.31 -r1.32 pkgsrc/security/opencdk/Makefile
2010-01-15Update openssl package to 0.9.8l, fixing security problem.taca5-29/+28
Approved by agc@. Changes between 0.9.8k and 0.9.8l [5 Nov 2009] *) Disable renegotiation completely - this fixes a severe security problem (CVE-2009-3555) at the cost of breaking all renegotiation. Renegotiation can be re-enabled by setting SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION in s3->flags at run-time. This is really not recommended unless you know what you're doing. [Ben Laurie]
2010-01-09streamlined syntax, using ${SETENV} instead of env.schwarz1-2/+2
2010-01-04Expose the gpg binary gpgme is build against and use that in security/gpa.joerg2-2/+14
2010-01-03improved CC and CFLAGS supportschwarz4-13/+33
2010-01-02Needs pod2man.joerg1-2/+4
2009-12-28Moderate the wording slightly.he1-1/+1
OK'ed by agc@
2009-12-27polkit-explicit-grant-helper and polkit-grant-helper should alsoabs1-2/+6
be setgid polkit (apparently). Bump pkgrevision
2009-12-25Fixes and improvement for Interixobache4-10/+17
* Not only interix-3, but also treat all interix release, allow to build on SUA. * Gave up randomized image base, use 0x5e000000, as in mk/platform/Interix.mk. It is workaround of PR 42369. * Use -D_REENTRANT flags for threads. * replace -Wl,soname= linker flags with -Wl,h, for Interix
2009-12-21Not MAKE_JOBS_SAFE.joerg1-1/+2
2009-12-21Mark as broken: as conflicts with its own dependencyjoerg1-1/+3
2009-12-20Update security/sudo pacakge to 1.7.2p2.taca5-42/+35
Major changes between sudo 1.7.2p1 and 1.7.2p2: * Fixed a a bug where the negation operator in a Cmnd_List was not being honored. * Sudo no longer produces a parse error when #includedir references a directory that contains no valid filenames. * The sudo.man.pl and sudoers.man.pl files are now included in the distribution for people who wish to regenerate the man pages. * Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos. * When authenticating via PAM, set PAM_RUSER and PAM_RHOST early so they can be used during authentication.
2009-12-18put back the (non-default) "idea" option which got lost a while agodrochner7-7/+127
2009-12-18kill the "idea" option -- gnupg2 uses libgcrypt which used to havedrochner4-28/+22
an "idea" option, but that was removed more than a year ago when it got updated from 1.2 to 1.4 The patch was was used on gnupg2 in the "idea" case was just a four-line memory initialization fix, there is no point in LICENSE restrictions due to this, so I've pulled it in as regular patch so that it doesn't get lost for the case someone fixes idea support in libgcrypt (which isn't hard).
2009-12-18Remove removal of the hack which was needed for libtool 1.x.hasso2-21/+1
From Rumko <rumcic at gmail.com> via private mail.
2009-12-16don't install the gpg-zip.1 manpage, avoids CONFLICT with gnupg1,drochner4-5/+18
noticed by OBATA Akio per mail to pkgsrc-users. This makes most sense to me since gnupg2 doesn't install a gpg-zip intentionally. Since possible clients of gpg-zip should have a dependency on gnupg1, we can't take over easily. Once we are sure that gnupg2 can fully replace gnupg1, we might consider to install eg symlinks gpg->gpg2 etc and make gnupg1 obsolete, but this needs careful testing.
2009-12-16Add checksum for idea patch.wiz1-1/+4
2009-12-15Recursive bump for libltdljoerg25-48/+48
2009-12-15make s/mime support, which implies use of gnupg2, default,drochner1-2/+3
bump PKGREVISION
2009-12-15update to 2.0.13drochner7-39/+73
changes: many fixes and improvements reviewed by John R. Shannon pkgsrc notes: -since S/MIME support is the biggest difference in functionality over gnupg1, enable it per default -- my tests (with the s/mime plugin of claws-mail) worked -left the build against a private libassuan with GNU-pth support alone for now, just updated libassuan to 1.0.5. We might build pkgsrc/libassuan against pkgsrc/pth at some point, but this needs to be checked for side effects. (As this pkg doesn't export a library which might propagate the pth dependency, the possibility of pthread-pth conflicts should be limited. Other uses of libassuan need to be checked.)
2009-12-15update to 0.7.6drochner3-39/+6
changes: misc improvements reviewed by John R. Shannon
2009-12-15update to 1.0.3drochner6-32/+85
changes: * New option --url for the LOOKUP command and dirmngr-client. * The LOOKUP command does now also consults the local cache. New option --cache-only for it and --local for dirmngr-client. * Port to Windows completed. * Improved certificate chain construction. * Support loading of PEM encoded CRLs via HTTP. * Client based trust anchors are now supported. * Configured certificates with the suffix ".der" are now also used. * Libgcrypt 1.4 is now required. reviewed by John R. Shannon pkgsrc notes: I've left the build against a private libassuan with GNU-pth support alone for now, just updated libassuan to 1.0.5. We might build pkgsrc/libassuan against pkgsrc/pth at some point, but this needs to be checked for side effects. (As this pkg doesn't export a library which might propagate the pth dependency, the possibility of pthread-pth conflicts should be limited. Other uses of libassuan need to be checked.) Beiing here, support DESTDIR.
2009-12-15update to 1.0.7drochner2-6/+6
changes: -misc fixes and improvements -Support DSA -Support SHA-{384,512} based signature generation reviewed by John R. Shannon
2009-12-15minor fixes for gnupg2 support:drochner1-1/+3
-don't pull in gnupg2's "gpgconf" if both gnupg1 and gnupg2 are installed but we are building against gnupg1, this caused a build failure -fix a selftest to work with gnupg2
2009-12-15remove obsolete "hal" dependency, ride on recent updatedrochner1-9/+1
2009-12-15Update to 2.28.2:wiz3-7/+8
Changes in version 2.28.2 are: * Add license to reference documentation. * Sent output of g_printerr to syslog. * No error when can't unlock login keyring. * Fix assertion when comparing attributes. * Fix freeing of unallocated memory in test. * Don't barf on certificates with unsupported algorithm. * Fix some memory leaks.
2009-12-15Update to 0.61, set LICENSE to public-domain (see below).wiz2-8/+7
[Changes for 0.61] * Added "=encoding utf8" to POD to fix author name display. No functional changes. [Changes for 0.60] * LICENSING CHANGE: This compilation and all individual files in it are now under the nullary CC0 1.0 Universal terms: To the extent possible under law, 唐鳳 has waived all copyright and related or neighboring rights to Module-Signature. * Updated Module::Install to 0.91, prompted by Florian Ragwitz.
2009-12-15Update to 0.42, set LICENSE (still depend on gpg1 for now).wiz4-58/+8
0.42 Wed Sep 30 23:20:58 JST 2009 * Support for GPG2 0.41_01 Fri Sep 25 02:56:33 JST 2009 * Beginnings of support for GPG2 0.40_04 Tue Apr 21 19:50:12 JST 2009 * Use Any::Moose instead of Moose for Mouse celerity (Sartak) 0.40_1 Sat Nov 15 12:35:59 EST 2008 * [rt.cpan.org #40963] Replace Class::MethodMaker with Moose (Chris Prather)
2009-12-15Update to 1.4.5:wiz2-8/+7
Noteworthy changes in version 1.4.5 (2009-12-11) ------------------------------------------------ * Fixed minor memory leak in DSA key generation. * No more switching to FIPS mode if /proc/version is not readable. * Fixed a sigill during Padlock detection on old CPUs. * Fixed a hang on some W2000 machines. * Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3; SHA-256 went up by 25%.
2009-12-15Update netpgp to version 20091210.agc2-6/+6
Apart from infrastructure changes, there are the following functional ones: + Update to version 1.99.14/20091210 + provide a new netpgp_match_list_keys(3) function to perform a regular-expression based search of all the keys in the keyring. If no pattern is specified to match, then all keys are returned. + provide a new netpgp_set_homedir(3) function, and use it to set the home directory from the library, rather than individually in all the programs which use the library + provide a new netpgp_incvar(3) function which will add a constant increment (which may be negative) to the value of an internal variable. This is primarily used for the verbosity level within the library, and is again a movement of the function into the library from the individual programs which use the library + move to the specification of an ssh key file by internal variable, rather than the directory holding an ssh key file + autoconf infrastructure changes + take a hammer to the _GNU_SOURCE definitions problems + don't rely on strnlen(3) being present everywhere + add rudimentary support for ssh keys + add a netpgp library function - netpgp_get_key(3) - to print a specific key + add functionality to call this function in netpgpkeys(1) + add test for netpgp_get_key + add a verbose switch to the tst script + add netpgp functions to expose the memory signing and verification functions - netpgp_sign_memory(3) and netpgp_verify_memory(3) + coalesced signing and verification ops file functions
2009-12-14Add and enable seccureagc1-1/+2
2009-12-14Initial import of seccure-0.4 into the Packages Collection.agc5-0/+84
The seccure toolset implements a selection of asymmetric algorithms based on elliptic curve cryptography (ECC). In particular it offers public key encryption / decryption, signature generation / verification and key establishment. ECC schemes offer a much better key size to security ratio than classical systems (RSA, DSA). Keys are short enough to make direct specification of keys on the command line possible (sometimes this is more convenient than the management of PGP-like key rings). seccure builds on this feature and therefore is the tool of choice whenever lightweight asymmetric cryptography -- independent of key servers, revocation certificates, the Web of Trust or even configuration files -- is required.
2009-12-13Remove unused file.wiz1-15/+0
2009-12-13Added support for DESTDIR.martti3-2/+30
2009-12-11Add and enable pam_ssh_agent_authagc1-1/+2
2009-12-11- LICENSE is gnu-gpl-v2heinz3-11/+29
- Added DESTDIR support. All permission settings were kept as before. - TEMPDIR is now changeable in the Makefile (see patch-ab).
2009-12-11Initial import of pam_ssh_agent_auth version 0.9.1 into the packagesagc7-0/+80
collection - kudos to Jan Schaumann for pointing it out. PAM module which permits authentication for arbitrary services via ssh-agent. Written with sudo in mind, but like any auth PAM module, can be used for for many purposes.
2009-12-10+PKG_DESTDIR_SUPPORT= user-destdirabs1-3/+4
2009-12-10PKG_DESTDIR_SUPPORT=user-destdirabs5-23/+29
2009-12-09* add --enable-install=${BINOWN} to CONFIGURE_ARGS for user-destdir supportobache2-12/+33
and "root" user-less platforms. * replace one bash script shbang (for safe side, may bone shell is sufficient). * fix PLIST for PR 40993. add missing entries and back plist vars replaced for Darwin-apple excessively. Bump PKGREVISION.
2009-12-09* user-destdir readyobache1-3/+6
* should not to set SUBST_CLASSES, add instead to avoid overwrite. * need to runtime dependency on gettext command, Bump PKGREVISION.
2009-12-09* user-destdir readyobache1-3/+3
* no need to hard build depend on bison in pkgsrc, USE_TOOLS+=bison instead.
2009-12-09Should not add to USE_LANGUAGES, set instead.obache1-3/+3
Should not set to USE_TOOLS, add instead.
2009-12-09Avoid to conflict with stdout/stderr in stdio.h.obache2-1/+66
2009-12-09user-destdir ready.obache1-1/+3
2009-12-08Use DIST_SUBDIR since distfiles changed.taca2-5/+6
No other functional change at all.