summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2006-09-05Update to 0.10; fixes PR pkg/34408. Changes:tv2-7/+6
0.10 Sat Mar 18 21:07:22 2004 - adapted behaviour to Digest
2006-09-05Update security/p5-IO-Socket-SSL from 0.998 to 0.999abs2-6/+6
- If SSL_cipher_list is not given it uses the openssl default instead of setting it to 'ALL:!LOW:!EXP' like before. The old value included ADH and this might be a bad idea, see BUGS why. Resolves PR pkg/34392 by Martin Wilke
2006-09-03Update to 1.2.3:wiz2-7/+6
Noteworthy changes in version 1.2.3 (2006-08-28) ------------------------------------------------ * Rewrote gcry_mpi_rshift to allow arbitrary shift counts. * Minor bug fixes.
2006-09-03Reset maintainer for people who lost their commit bit.wiz1-2/+2
2006-08-31Replaced GENERATE_PLIST with PLIST_SRC, as suggested by wiz.rillig2-5/+7
2006-08-31Fixed a few pkglint warnings.rillig2-7/+9
2006-08-31Fixed the PLISTs according to Krister's latest bulk build on NetBSD 3.0.rillig3-6/+7
Made the "perl" option work and tested all four option combinations.
2006-08-29If using the fake krb5-config then set KRB5_CONFIG to point at it. Fixesmarkd1-1/+5
build of imap-uw package with the kerberos option.
2006-08-29Update to 1.9.22.shannonjr4-33/+8
2006-08-28gnome-keyring cannot currently provide applications' paths under NetBSD sojmmv3-3/+26
be sure not to use them (NULL pointers) when showing information to the user. Fixes crashes when clicking on saved keyring items. Bump PKGREVISION to 2.
2006-08-28Redo LOCAL_CREDS support in a way that does not change the communicationjmmv4-135/+31
protocol (it's more likely to be accepted and is much easier on the code). Bump PKGREVISION to 3.
2006-08-27Implement support for LOCAL_CREDS socket credentials. Bump PKGREVISION to 2.jmmv4-3/+211
This fixes gnome-keyring under NetBSD which, AFAICT, didn't work at all. There are still some problems remaining in gnome-keyring-manager, but I think these are not related to this issue.
2006-08-27Also enable assembler files for NetBSD-*-sparc.jdc1-2/+3
Makes this package build on NetBSD/sparc.
2006-08-24Update to 0.9.6. Changes:shannonjr2-7/+6
- In case an IDMEF-Service object contain neither name or port attribute, set name to "unknown" in order to avoid IDMEF DTD validation issue. - Normalize analyzer(*).node.
2006-08-23Add master site entry for times when pkgsrc doesn't have the completelywiz5-10/+15
latest version.
2006-08-23Change CONF_FILES_PERMS from 0600 to 0644 because conf file must beshannonjr1-3/+3
accessible to prelude-manager running as non-root user. Bumped PKGREVISION.
2006-08-231) Added PLIST.perl for perl optionshannonjr2-1/+6
2) Bumped PKGREVISION
2006-08-23prelude-manager references two configuration directories relative toshannonjr1-5/+4
PKG_SYSCONFDIR: 1) prelude-manager and 2) prelude (install by libprelude). Consequently, PKG_SYSCONFSUBDIR can't be set to prelude-manager. Corrected and PKGREVISION bumped.
2006-08-231) Fixed problem where 64-bit minimums are set using 32-bit arithmeticshannonjr3-2/+37
2) PLIST correction
2006-08-23Fixed bug in 0.9.7 release that prevented filters from working.shannonjr4-9/+29
2006-08-23Fix HOMEPAGE.ghen1-2/+2
2006-08-22reduce previous patch - no functional change. Noted by phone@abs2-16/+6
2006-08-22Update p5-Crypt-SSLeay to 0.51nb7abs3-3/+36
For OpenSSL 0.9.8b SSLeay_add_all_algorithms() does not setup any algorithms, wheras SSL_library_init() does. The net result was that SSL_CTX_new() would return a NULL pointer causing a perl coredump in such cases as: my $request = HTTP::Request->new( "GET", 'https://<some_url>' ); my $ua = LWP::UserAgent->new; my $response = $ua->request($request); Tracking this down was an entire flaming evening and change of my life that I'm never going to get back, but at least my NetBSD-4 retail machines can now run NetBSD-4 built perl binaries again.
2006-08-21Update to 1.5badrianp2-6/+6
Changes include: 1.5a * A typo in an assert caused Honeyd to crash for most services. * The subsystem support did not correctly support getsockname for sockets coming via accept(). 1.5b * A crash when processing ARP packets. * Correct default action handling for UDP packets. * Fixed --without-python flag when using configure.
2006-08-18Rename authtest to pam_dbm-authtest to avoid a conflict with authtestadrianp4-4/+23
from the courier package.
2006-08-17Update to 0.9.7. Changes:shannonjr3-9/+19
- Use preludedb_delete_(alert|heartbeat)_from_list(). Require libpreludedb 0.9.9. Provide a deletion performance improvement of around 3000%. - Handle multiple listed source/target properly. Separate source/target in the message listing. - Make host command/Information link available from the Sensor listing. - Always take care of the "external_link_new_window" configuration parameter. - Make external command handling more generic. Allow to specify command line arguments. - Allow to define unlimited number of external commands rather than only a defined subset (fix #134). - Avoid toggling several popup at once in the HeartbeatListing. - Only provide lookup capability for known network address type (fix #76). - New address and node name lookup provided through prelude-ids.com service. - Link to new prelude-ids.com port lookup instead of broken portsdb database (fix #162). - Various bug fixes.
2006-08-17Update to 0.9.9. Changes:shannonjr2-6/+6
- Implement an idea from Lex van Roon <r3boot@r3blog.nl.eu.org> providing an alert/heartbeat deletion performance improvement in the order of 3000% (preludedb-admin already benefit from it, next Prewikka release will benefit from it too). - Fix --with-(perl|python|swig) detection path ordering. - Verbose error reporting on logfile opening error. - Various bug fixes.
2006-08-17Update to 0.9.10.1. Changes:shannonjr4-14/+13
- Fix checking for swig/perl/python when full path to the application is specified. - Fix OpenBSD getaddrinfo() AI_ADDRCONFIG issue (apply to some other system as well). - Fix workaround for system with broken libtool, that prevented the use of plugin (#168).
2006-08-16Update security/caff to 0.4.7tonio2-7/+7
From debian changelog: signing-party (0.4.7-1) unstable; urgency=low * gpg-mailkeys: use right content-type for attached key, thanks Wesley Landaker * gpgsigs: recognize rvk (revoker), found in ksp-dc6.txt.
2006-08-15update p5-Crypt-SSLeay to 0.51nb6 - p5-libwww now depends on usabs1-4/+2
2006-08-15Update security/p5-IO-Socket-SSL from 0.997 to 0.998.abs2-6/+6
v0.998 - declare socket as opened before calling fatal_ssl_error because the SSL_error_trap set up from HTTP::Daemon needs this - accept_SSL sets errors on $socket (the accepted socket) not $self (the listening socket if called from accept) so it can be queried from SSL_error_trap - note in BUGS section that IO::Socket::SSL is not thread-safe Note: The previous update from 0.97 broke all https:// URLs in p5-libwww, will address that in next commit (to p5-libwww)
2006-08-14Update msu to 1.08:abs2-6/+7
- call fchown on tty - Rename log() to log_msu() to avoid compiler warning - switch dist to .tbz from .tgz
2006-08-14I don't use this package anymore.rpaulo1-2/+2
2006-08-13Reset maintainer, email bounced with:wiz1-2/+2
host monkeybyte.org[69.16.221.13] said: 550-"The recipient cannot be verified. Please check all recipients of this 550 message to verify they are valid." (in reply to RCPT TO command)
2006-08-13+p5-String-Randomadrianp1-1/+2
2006-08-13String::Random is used to generate random strings. It was written toadrianp4-0/+26
make generating random passwords and such a little easier.
2006-08-13+p5-Crypt-PasswdMD5adrianp1-1/+2
2006-08-13The unix_md5_crypt() provides a crypt()-compatible interface to the ratheradrianp4-0/+25
new MD5-based crypt() function found in modern operating systems.
2006-08-11Make this package compile with gcc-4.taca3-3/+17
Bump PKGREVISION.
2006-08-09Security fix for SA21436:salo7-3/+254
"A security issue has been reported in Heimdal, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. The security issue is caused due to missing checks for whether the "setuid()" call has succeeded in the bundled rcp application. This may be exploited to perform certain actions with root privileges if the "setuid()" call fails due to e.g. resource limits." http://secunia.com/advisories/21436/ http://www.pdc.kth.se/heimdal/advisory/2006-08-08/ Bump PKGREVISION.
2006-08-09Security fixes for SA21402:salo9-3/+199
"A security issue has been reported in Kerberos, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. The security issue is caused due to missing checks for whether the "setuid()" call has succeeded in the bundled krshd and v4rcp applications. This can be exploited to disclose or manipulate the contents of arbitrary files or execute arbitrary code with root privileges if the "setuid()" call fails due to e.g. resource limits." http://secunia.com/advisories/21402/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3083 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3084 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-001-setuid.txt Bump PKGREVISION.
2006-08-09some apps (dovecot) need the SSLDIR rather than SSLCERTS & SSLKEYSabs1-10/+10
2006-08-07this actually uses both c and c++ - C is used for openssl testjdolecek1-2/+2
2006-08-05Update to 0.997:wiz2-6/+6
v0.997 - fix readline (e.g. getline,getlines,<>) so that it behaves regarding $/ like written in the $/ dokumentation. v0.996 - removed links and comments to inofficial release of Net::SSLeay, because there is a newer version already v0.995 - add support for Diffie Hellman Key Exchange. See parameter SSL_dh_file and SSL_dh. v0.994 - hide DEBUG statements and remove test to load Debug.pm because packets like Spamassisin cannot cope with it (at least the OpenBSD port) v0.993 - added SSL_cert and SSL_key parameter which do not take a file name like SSL_cert_file and SSL_key_file but an internal X509* resp. EVP_PKEY* value. Useful for dynamically created certificates and keys. - added test for sysread/syswrite behavior (which was changed in v0.991) v0.992 - _set_rw_error does $!||=EAGAIN only if error is one of SSL_WANT_READ|SSL_WANT_WRITE (patch from Mike Smith <mike at mailchannels dot com>) - Fix Makefile.PL to allow detectection of failures in PREREQ_PM (http://rt.cpan.org/Public/Bug/Display.html?id=20563, patch by alexchorny at gmail dot com) v0.991 - sysread and syswrite ar no longer the same as read and write, but can return already if only parts of the data are read or written (which is the usual semantic for sysread and syswrite) This should fix problems with HTTP::Daemon::SSL v0.99 - just upgrade Version number because I've screwed up upload of v0.98 to cpan v0.98 - Maintainer changed to <Steffen_Ullrich at genua dot de> - Better support for nonblocking sockets: . exports $SSL_ERROR which contains the latest error from the openssl library. Exports constants SSL_WANT_READ and SSL_WANT_WRITE es special errors which will be set if openssl wants to write or read during nonblocking connects, accepts, reads or writes. . accept,accept_SSL,connect and connect_SSL don't block anymore if the socket is nonblocking. Instead $! will be set from the underlying IO::Socket::INET connect or accept if it failed there (usually EAGAIN or EINPROGRESS) or if the underlying openssl needs to read or write $! will be set to EAGAIN and $SSL_ERROR will be set to SSL_WANT_READ or SSL_WANT_WRITE . syswrite returns undef and sets $!,$SSL_ERROR if it fails to write instead of returning 0. - Bugfixes (http://rt.cpan.org/Public/Bug/Display.html?id=Bugid) . Bug 18439: fileno 0 should be valid . Bug 15001: sysread interpretes buffer "0" as "" - peer_certifcate returns X509 struct string if no field for extraction was specified - get_peer_certificate returns the certificate instead of the IO::Socket::SSL object
2006-08-05Bump to nb6adrianp1-2/+2
2006-08-05Fix for SA21310/CVE-2006-3123adrianp2-4/+22
Patch via. Debian
2006-08-05Add an HTTP download location too, as a fallback for when FTP downloads are ↵dsainty1-2/+3
awkward.
2006-08-03When using idea option, change license from fee-based-commercial-usegdt1-2/+6
to idea-license, and also set RESTRICTED and NO_*_CDROM. (Note that this doesn't change what happens if the idea option is unused.)
2006-08-02update to 1.4.5drochner4-21/+8
security update, recommended by gnupg.org (fixes CVE-2006-3746) changes: * More DSA2 tweaks. * Fixed a problem uploading certain keys to the smart card. * Fixed 2 more possible memory allocation attacks. * Added Norwegian translation.
2006-07-31Bump default dependency so dependent packages get shared cvm libs.schmonz1-2/+2