Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 11 Mar 2012 21:32:58 +0000 (UTC)
From:      "Simon L. Nielsen" <simon@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/ports-mgmt/portaudit Makefile pkg-plist ports/ports-mgmt/portaudit/files portaudit-cmd.sh
Message-ID:  <201203112132.q2BLWwTZ074498@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
simon       2012-03-11 21:32:58 UTC

  FreeBSD ports repository

  Modified files:
    ports-mgmt/portaudit Makefile pkg-plist 
    ports-mgmt/portaudit/files portaudit-cmd.sh 
  Log:
  Portaudit 0.6.0:
  
  Fix remote code execution which can occur with a specially crafted
  audit file.  The attacker would need to get the portaudit(1) to
  download the bad audit database, e.g. by performing a man in the
  middle attack.
  
  Add signature verification of the portaudit database.  The public key
  is for the database generated for portaudit.FreeBSD.org is included
  in the distribution.
  
  Submitted by:   Michael Gmelin <freebsd@grem.de>
  Reported by:    Michael Gmelin <freebsd@grem.de>, Joerg Scheinert
  Security:       Remote code execution
  Security:       http://vuxml.FreeBSD.org/6d329b64-6bbb-11e1-9166-001e4f0fb9b1.html
  Feature safe:   yes
  With hat:       so
  
  Revision  Changes    Path
  1.30      +2 -1      ports/ports-mgmt/portaudit/Makefile
  1.20      +69 -10    ports/ports-mgmt/portaudit/files/portaudit-cmd.sh
  1.6       +1 -0      ports/ports-mgmt/portaudit/pkg-plist



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201203112132.q2BLWwTZ074498>