Date: Sun, 11 Mar 2012 21:32:58 +0000 (UTC) From: "Simon L. Nielsen" <simon@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/ports-mgmt/portaudit Makefile pkg-plist ports/ports-mgmt/portaudit/files portaudit-cmd.sh Message-ID: <201203112132.q2BLWwTZ074498@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
simon 2012-03-11 21:32:58 UTC
FreeBSD ports repository
Modified files:
ports-mgmt/portaudit Makefile pkg-plist
ports-mgmt/portaudit/files portaudit-cmd.sh
Log:
Portaudit 0.6.0:
Fix remote code execution which can occur with a specially crafted
audit file. The attacker would need to get the portaudit(1) to
download the bad audit database, e.g. by performing a man in the
middle attack.
Add signature verification of the portaudit database. The public key
is for the database generated for portaudit.FreeBSD.org is included
in the distribution.
Submitted by: Michael Gmelin <freebsd@grem.de>
Reported by: Michael Gmelin <freebsd@grem.de>, Joerg Scheinert
Security: Remote code execution
Security: http://vuxml.FreeBSD.org/6d329b64-6bbb-11e1-9166-001e4f0fb9b1.html
Feature safe: yes
With hat: so
Revision Changes Path
1.30 +2 -1 ports/ports-mgmt/portaudit/Makefile
1.20 +69 -10 ports/ports-mgmt/portaudit/files/portaudit-cmd.sh
1.6 +1 -0 ports/ports-mgmt/portaudit/pkg-plist
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201203112132.q2BLWwTZ074498>
