aboutsummaryrefslogtreecommitdiff
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* security/tailscale: Update to 1.18.1Mikael Urankar2021-11-262-6/+6
| | | | Changes: https://github.com/tailscale/tailscale/releases/tag/v1.18.1
* security/john: belatedly update JtR to version 1.9.0-jumbo-1Alexey Dokuchaev2021-11-2620-1221/+570
| | | | | | | | | | | | | | | | | | | | | | | | | Despite what Solar Designer had said earlier, community enhancements were not offered as separate patch, so the top comment about JUMBO option still stands. Because supported SIMD features are detected during configure, force SSE2 for x86 packages as reasonable default which most modern CPUs should support these days. Ideally we should probably do several build rounds and produce binaries targeting different SIMD features (e.g. like Arch Linux is doing this), but that's the task for another day. Actualize the lists of binaries and symlinks (some programs had become standalone, others had been converted to scripts offered as extras). Drop BROKEN_mips64: it was added in r425682 five years ago for a different version, since then similar breakage for aarch64 had been fixed, and looking at the configure script, mips64 should be supported (even if it's really not, that particular error message is no longer accurate per grepping the sources). Adjust LICENSE (GPLv2 or later) and fix the build with OpenCL support. PR: 247229, 254922
* */*: Remove redundant '-*' from CONFLICTS definitionsStefan Eßer2021-11-2517-37/+37
| | | | | | | | | The conflict checks compare the patterns first against the package names without version (as reported by "pkg query "%n"), then - if there was no match - agsinst the full package names including the version (as reported by "pkg query "%n-%v"). Approved by: portmgr (blanket)
* security/hashcat: update to version 6.2.5Stefan Eßer2021-11-253-4/+22
|
* security/lynis: Update to 3.0.6Lars Engels2021-11-252-4/+4
| | | | MFH: 2021Q4
* security/vuxml: Mark java/bouncycastle as vulnerable where applicableMateusz Piotrowski2021-11-253-2/+14
| | | | | | | | Some of the reported java/bouncycastle15 security issues affect the legacy port of java/bouncycastle as well. Update vuxml.xml accordingly. Sponsored by: Modirum MDPay Sponsored by: Klara, Inc.
* security/vuxml: Document cookie prefix spoofing in rubygem-cgiYasuhiro Kimura2021-11-241-0/+56
|
* security/vuxml: Document buffer overrun in rubygem-cgiYasuhiro Kimura2021-11-241-0/+44
|
* security/vuxml: Update affecting packages of ↵Yasuhiro Kimura2021-11-241-0/+19
| | | | | | 6916ea94-4628-11ec-bbe2-0800270512f4 This vulnerability also affects ruby ports.
* security/*: Deprecate and mark ports BROKEN that are dead upstream and/or ↵Daniel Engberg2021-11-2483-0/+250
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | abandonware security/afl - Migrate to security/afl++ security/amap - Abandoned upstream, last release 10+ years ago security/amavis-stats - Upstream is dead and last release was back in 2005 security/arirang - Abandoned (website also refers to Ruby 1.9) and a 9+ year old webserver security scanner isn't useful today security/axTLS - Very outdated and abandoned, current version in tree was released in 2013 and last by upstream in 2019 security/base - Broken with PHP 7+, forked here https://github.com/NathanGibbs3/BASE/ security/bruteforceblocker - Abandonware, please consider using security/sshguard security/cfs - Deprecated upstream, reference: https://www.bayofrum.net/cgi-bin/fossil/cfs/index security/cisco-torch - Unfetchable, dead upstream security/cp2fwb - Used with deprecated software Firewall Builder security/dcetest - Targets deprecated protocol by Microsoft in favour of .NET security/doscan - Abandonware, last release in 2014. Please consider using security/masscan or sysutils/pnscan security/find-zlib - Deprecated, no longer relevant security/govpn - Deprecated upstream, reference: http://www.govpn.info/ security/gputty - Unfetchable, dead upstream security/gwee - Last release 15+ years ago, abandonware and dead upstream security/hackbot - Abandonware, last release in 2003. Please consider using security/nmap or security/rustscan security/hashcat-legacy - Unsupported upstream, please consider using security/hashcat security/hlfl - Abandonware, last release in 2003 security/ike - Abandonware, last release in 2013 and IKEv1 is considered to be insecure security/integrit - Abandonware, last release in 2003 security/ipfilter2dshield - Abandonware, no word of it on upstream web site security/ipfw2dshield - Abandonware, no word of it on upstream web site security/isakmpd - 15+ years old and broken on multiple versions security/kripp - Abandonware, upstream returns 404 and last release was back in 2007 security/l0phtcrack - Obsolete, Microsoft LANMAN and NT password hashes are deprecated security/l5 - Abandonware, broken on amd64 for 10+ years security/gringotts - Abandonware, upstream dead and last release in 2009 security/libgringotts - Abandonware, upstream dead and last release in 2008 security/libprelude - Very outdated, current version in tree was released back in 2015 and upstream is still active security/libpreludedb - Very outdated, current version in tree was released back in 2015 and upstream is still active security/libpwstor - Abandonware, last release in 2008 security/manipulate_data - Abandonware, unsupported upstream security/matrixssl - Abandonware, dead upstream security/monkeysphere - Abandonware, dead upstream security/mussh - Abandonware, last release in 2011 please consider using security/teleport security/outguess - Abandonware, dead upstream and last release in 2001 security/pbnj - Abandonware, last release in 2006 and reported broken upstream in 2017 upstream security/phpsecinfo - Abandonware, last release in 2006 security/pktsuckers - Abandonware, last release from somewhere around 1999 security/ppars - Abandonware, no word of it on upstream web site security/pscan - Abandonware, last release in 2000 security/pxytest - Abandonware, last release around 2003, dead upsteam and unfetchable security/radamsa - Abandonware, last release in 2017 and marked as BROKEN in late 2020 security/razorback-* - Abandonware, last release in 2012 and listed as alpha quality by upstream security/retranslator - Deprecated upstream (EOL) security/scanssh - Abandonware, last release in 2005. Please consider using security/nmap or security/rustscan security/shimmer - Abandonware, last release in 2008 security/shttpscanner - Abandonware, last release in 2006 security/sha - Obsolete, we have tools in base security/slurpie - Abandonware, last release around 2000 and dead upstream security/slush - Obsolete, listed as alpha quality, last release around 2000 and dead upstream security/smtpscan - Abandonware, last release in 2003 and dead upstream. Please consider using nmap security/spybye - Abandonware, last release in 2008 and no upstream development security/sslsniffer - Abandonware, last release in 2001. Please consider using security/sslsplit or security/sslproxy security/sslwrap - Abandonware, marked BROKEN on 12+ in 2019 security/strobe - Abandonware, last release around 2000 and dead upstream. Please consider using security/nmap or security/rustscan security/stud - Abandonware, marked BROKEN on 12+ in 2019 security/symbion-sslproxy - Abandonware, last release in 2009 and inactive upstream security/tlswrap - Abandonware, last release in 2007 and dead upstream security/trinokiller - Abandonware, dead upstream security/tripwire-131 - Deprecated, please consider using security/tripwire instead security/unicornscan - Very outdated and abandoned, current version in tree was released in 2004 and last release by upstream in Aug 2013. Please consider using security/nmap or security/rustscan security/vinetto - Obsolete, targets deprecated Windows operating systems such as XP and 2003 Server security/vnccrack - Very outdated and abandoned, last release in 2008. Upstream is at 2.1 while version in ports is 1.0.0 security/webscarab - Deprecated by upstream in 2014 security/zebedee - Abandonware, last release in 2005 and runtime issues reported upstream Approved by: tberner (mentor), lbartoletti (mentor), portmgr (rene, tcberner), cy (port maintainer), egypcio (port maintainer), bofh (port maintainer), port maintainer(s) timeout (2+ weeks) Differential Revision: https://reviews.freebsd.org/D32880
* security/solana: Update 1.8.2 -> 1.8.5Yuri Victorovich2021-11-232-16/+25
| | | | Reported by: portscout
* */*: Remove redundant '-[0-9]*' from CONFLICTS_INSTALLStefan Eßer2021-11-2318-32/+22
| | | | | | | | | The conflict checks compare the patterns first against the package names without version (as reported by "pkg query "%n"), then - if there was no match - agsinst the full package names including the version (as reported by "pkg query "%n-%v"). Approved by: portmgr (blanket)
* www/openssl: Fix detection of ARM CPU featuresBernard Spil2021-11-233-2/+57
| | | | | | | | | | Upstream: * https://github.com/openssl/openssl/pull/17082 * https://github.com/openssl/openssl/pull/17085 PR: 259937 Submitted by: allanjude Differential Revision: https://reviews.freebsd.org/D33061
* security/acmed: update to 0.18.0Greg V2021-11-233-376/+252
| | | | | | Changes: https://github.com/breard-r/acmed/blob/v0.18.0/CHANGELOG.md PR: 259999 (Lucky 9s)
* security/vuxml: Document vulnerability in Matrix SynapseEvilham2021-11-231-0/+42
| | | | | | | PR: 259994 Reported by: Sascha Biberhofer <ports at skyforge dot at> Security: 27aa2253-4c72-11ec-b6b9-e86a64caca56 Security: CVE-2021-41281
* security/libretls: update to 3.4.1Baptiste Daroussin2021-11-233-6/+6
| | | | Bump revision on consumers
* security/py-vpn-slice: New portJose G. Juanino2021-11-235-0/+41
| | | | | | | | | Customized VPN split-tunnel. vpnc-script replacement for easy and secure split-tunnel VPN setup. PR: 259831 Approved by: philip (mentor) Differential Revision: https://reviews.freebsd.org/D33074
* security/pulledpork: Take maintainershipMarco Beishuizen2021-11-231-1/+1
| | | | PR: 259547
* security/qtkeychain: Update to 0.13.2Gleb Popov2021-11-222-4/+4
| | | | Reported by: portscout!
* security/gnupg: fix table / enum mismatchAdriaan de Groot2021-11-223-4/+15
| | | | | | | | | | | | | | PR259775 reports that (auto)configuration behaves weirdly. This is caused by a mismatch between an enum in the code and a table that expects to match the enum values. When BUILD_WITH_TPM2D is off (the default; I have not looked if it can even be turned on in ports) one table entry is Patch also submitted upstream. PR: 259775 Reported by: O. Hartmann MFH: 2021Q3
* security/py-pysaml2: Update to 7.1.0Po-Chuan Hsieh2021-11-212-6/+12
| | | | Changes: https://github.com/IdentityPython/pysaml2/releases
* security/py-asyncssh: Update to 2.8.1Po-Chuan Hsieh2021-11-212-4/+4
| | | | Changes: https://github.com/ronf/asyncssh/blob/master/docs/changes.rst
* security/wolfssh: Update to 1.4.8Po-Chuan Hsieh2021-11-214-18/+6
| | | | | | - Strip shared library Changes: https://github.com/wolfSSL/wolfssh/releases
* security/openssl-devel: Fix detection of ARM CPU featuresBernard Spil2021-11-202-1/+66
| | | | | | | | | | Upstream: * https://github.com/openssl/openssl/pull/17082 * https://github.com/openssl/openssl/pull/17084 PR: 259937 Submitted by: allanjude Differential Revision: https://reviews.freebsd.org/D33062
* security/hexl: Update 1.2.1 -> 1.2.3Yuri Victorovich2021-11-203-9/+10
| | | | Reported by: portscout
* security/clamav: Revert changes introduced in ↵Rodrigo Osorio2021-11-191-1/+0
| | | | d97161a97818bef47e66ab362f444cd1201c87fd
* net-mgmt/smokeping: Fix patches filepathRodrigo Osorio2021-11-191-0/+1
| | | | | PR: 259891 Reported by: shaun <freebsd@shaunc.com>
* security/tailscale: Update to 1.18.0Mikael Urankar2021-11-192-6/+6
| | | | Changes: https://github.com/tailscale/tailscale/releases/tag/v1.18.0
* security/vuxml: Document archivers/advancecomp vulnerabilitiesRobert Clausecker2021-11-191-0/+33
| | | | PR: 259534
* security/step-certificates: Update to 0.18.0Markus Wipp2021-11-182-7/+7
| | | | | | Changelog: https://github.com/smallstep/certificates/releases/tag/v0.18.0 PR: 259919
* security/step-cli: Update to 0.18.0Markus Wipp2021-11-182-28/+22
| | | | | | Changelog: https://github.com/smallstep/cli/releases/tag/v0.18.0 PR: 259918
* security/fizz: Update 2021.11.08.00 -> 2021.11.15.00Yuri Victorovich2021-11-182-4/+4
|
* security/seal: Update to 3.7.2Li-Wen Hsu2021-11-182-4/+4
|
* security/gnupg{,1}: Transfer maintainership to adridgAdam Weinberger2021-11-182-2/+2
|
* security/snort3: Update to 3.1.17.0Dan Langille2021-11-172-4/+4
| | | | | | re: https://github.com/snort3/snort3/releases/tag/3.1.17.0 Approved by: maintainer (via private email)
* security/gopass: Update to 1.13.0Nuno Teixeira2021-11-172-31/+31
| | | | ChangeLog: https://github.com/gopasspw/gopass/blob/master/CHANGELOG.md
* security/metasploit: Update to 6.1.12Marco Beishuizen2021-11-172-67/+62
| | | | | | | | | | | | While I'm here, * Switch to DISTVERSION * Pet portclippy * Re-format Makefile with portfmt Changes: https://github.com/rapid7/metasploit-framework/commits/6.1.12 PR: 259550 Approved by: maintainer
* security/vuxml: document www/chromium < 96.0.4664.45Rene Ladan2021-11-161-0/+90
| | | | Obtained from: https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
* */*: Bump PORTREVISION on *-sbcl ports after lang/sbcl upgrade.Kirill Ponomarev2021-11-161-1/+1
|
* */lxqt*: Update WWWLi-Wen Hsu2021-11-162-2/+2
|
* security/openvpn{,-devel}: Update WWWLi-Wen Hsu2021-11-152-2/+2
| | | | | for security/openvpn-devel: Approved by: Gert Doering (maintainer)
* security/vuxml: Document denial of service vunlerability in rubygem-dateYasuhiro Kimura2021-11-151-0/+32
|
* USES=emacs: Chase package name changesJoseph Mingrone2021-11-151-1/+1
| | | | | PR: 259259 Differential Revision: https://reviews.freebsd.org/D32613
* security/vuxml: Mark roundcube vuln in quarterlyBernard Spil2021-11-151-0/+26
|
* security/p5-Mcrypt: Fix link issue and miscellaneous cleanupTatsuki Makino2021-11-153-6/+10
| | | | | | | | | | | | * Fix issue that Mcrypt.so is linked with libltdl.so if the port is build under the environment where devel/libltdl is installed * Add TIMESTAMP to distinfo * Switch to DISTVERSION * Regenerate pkg-plist with `make makeplist` * Pet portlint and portclippy PR: 259210 MFH: 2021Q4
* [NEW] security/snowflake-tor: Pluggable Transport using WebRTC inspired by ↵Vinícius Zavam2021-11-147-0/+295
| | | | | | | | | | | | | | Flashproxy Snowflake is a system to defeat internet censorship. People who are censored can use Snowflake to access the internet. Their connection goes through Snowflake proxies, which are run by volunteers. For more detailed information about how Snowflake works see our documentation wiki. WWW: https://snowflake.torproject.org/ Sponsored by: TorBSD Diversity Project (TDP) Sponsored by: The Tor Project
* security/fizz: Update 2021.11.01.00 -> 2021.11.08.00Yuri Victorovich2021-11-142-4/+4
|
* KDE: Update KDE Frameworks to 5.88.0Tobias C. Berner2021-11-141-3/+3
| | | | | | | | | | | | | | | | | | | | Saturday, 13 November 2021 KDE today announces the release of KDE Frameworks 5.88.0. KDE Frameworks are 83 addon libraries to Qt which provide a wide variety of commonly needed functionality in mature, peer reviewed and well tested libraries with friendly licensing terms. For an introduction see the KDE Frameworks release announcement. This release is part of a series of planned monthly releases making improvements available to developers in a quick and predictable manner. Full changelog: https://kde.org/announcements/frameworks/5/5.88.0/ Exp-run by: antoine PR: 259817
* security/libtasn1: update to 4.18.0Roman Bogorodskiy2021-11-144-10/+36
|
* security/govpn: Mark broken on aarch64.Mikael Urankar2021-11-131-0/+2
|