summaryrefslogtreecommitdiffstats
path: root/security/portaudit/database/auditfile.txt
diff options
context:
space:
mode:
Diffstat (limited to 'security/portaudit/database/auditfile.txt')
-rw-r--r--security/portaudit/database/auditfile.txt27
1 files changed, 27 insertions, 0 deletions
diff --git a/security/portaudit/database/auditfile.txt b/security/portaudit/database/auditfile.txt
new file mode 100644
index 0000000..89a325b
--- /dev/null
+++ b/security/portaudit/database/auditfile.txt
@@ -0,0 +1,27 @@
+#
+# auditfile.txt - FreeBSD ports vulnerabilities database
+#
+# $FreeBSD$
+#
+# MAINTAINER=ports@FreeBSD.org
+#
+# Each entry consists of a single line containing the following three
+# fields in the order named, separated with the pipe (`|') character:
+#
+# Package: A pattern that matches the name of the vulnurable
+# package, see `man -M /usr/local/man pkg_info'.
+# Reference: An URL where an advisory can be found
+# Reason: The type of vulnurability found
+#
+# Keep this list sorted in the chronological order. New entries must
+# be added at the end, old entries shouldn't be removed; this should
+# document *all* known package vulnerabilities.
+#
+# This file does not have any designated maintainer, so feel free to
+# commit to it yourself. However, it is generally a good idea to
+# notify the maintainer of the affected package(s)
+#
+
+gnupg<1.2.3_4|http://lists.gnupg.org/pipermail/gnupg-devel/2003-November/020570.html|ElGamal signing keys compromised
+rsync<2.5.7|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0962|Buffer overflow in server
+gaim<0.75_2|http://security.e-matters.de/advisories/012004.txt|12 vulnerabilities that allow remote compromise
OpenPOWER on IntegriCloud