sprintf() in insecure manner (may subject to buffer overflow, like xmindpath
in magicpoint).
If you really care, I can mark them BROKEN until they are confirmed to be safe.
also an overflow with ospf_monitor which may result in being able to corrupt
routing traffic (which I've reported to the developers)
According to the docs, gdc shouldn't be installed root:wheel and setuid,
but put into its own gdmaint group. This still doesn't prevent people in
that group from gaining root, though.
Submitted by: Brock Tellier <btellier@usa.net> (gdc bug)
Note that this port currently has no MAINTAINER, so will probably stay
broken until it either gets upgraded or fixed by someone who actually uses
it.
Submitted by: Brock Tellier <btellier@usa.net>
Submitted by: Anders Nordby <anders@fix.no>
NASL is a scripting language designed for the Nessus security scanner. Its
aim is to allow anyone to write a test for a given security hole in a few
minutes, to allow people to share their tests without having to worry
about their operating system, and to garantee everyone that a NASL script
can not do anything nasty except performing a given security test against
a given target.
NASL is not a powerful scripting language. Its purpose is to make scripts
that are security tests. So, do not expect to write a third generation web
server in this language, nor a file conversion utility. Use perl, python
or whatever scripting language to do this.
WWW: http://www.nessus.org/doc/nasl.html
Submitted by: maintainer
Update to 0.99.1, and disable nessus for compiling in -current.
Original patch submitted by the maintainer, and some fixes from me.
Submitted by: "Richard Seaman, Jr." <dick@tar.com>
Native FreeBSD port of the linuxthreads library
Includes added files and stuff you need to add to the rest of your system.
This is for -current I'm sure Richard's older version might be
a good place to start for a 3.x version.
* Added some more dev_t hacks for Alpha FreeBSD 4.0.
* Added support for IPv6 on BSD 4.x. The support hasn't yet been tested,
just compiled.
Submitted by: Vic Abell <abe@purdue.edu>
"login auth sufficient pam_ssh.so" to your /etc/pam.conf, and
users with a ~/.ssh/identity can login(1) with their SSH key :)
PR: 15158
Submitted by: Andrew J. Korty <ajk@waterspout.com>
Reviewed by: obrien