svn commit: r560474 - in head/security/openvas: . files

Jose Alonso Cardenas Marquez acm at FreeBSD.org
Wed Jan 6 08:46:30 UTC 2021


Author: acm
Date: Wed Jan  6 08:46:26 2021
New Revision: 560474
URL: https://svnweb.freebsd.org/changeset/ports/560474

Log:
  - New port: security/openvas
  
  This is the Open Vulnerability Assessment Scanner (OpenVAS) of the Greenbone
  Vulnerability Management (GVM) Solution.
  
  It is used for the Greenbone Security Manager appliances and is a full-featured
  scan engine that executes a continuously updated and extended feed of Network
  Vulnerability Tests (NVTs).
  
  WWW: https://github.com/greenbone/openvas

Added:
  head/security/openvas/
  head/security/openvas/Makefile   (contents, props changed)
  head/security/openvas/distinfo   (contents, props changed)
  head/security/openvas/files/
  head/security/openvas/files/patch-CMakeLists.txt   (contents, props changed)
  head/security/openvas/files/patch-misc_ftp_funcs.c   (contents, props changed)
  head/security/openvas/files/patch-misc_network.c   (contents, props changed)
  head/security/openvas/files/patch-nasl_CMakeLists.txt   (contents, props changed)
  head/security/openvas/files/patch-nasl_capture_packet.h   (contents, props changed)
  head/security/openvas/files/patch-nasl_nasl_builtin_find_service.c   (contents, props changed)
  head/security/openvas/files/patch-nasl_nasl_builtin_openvas_tcp_scanner.c   (contents, props changed)
  head/security/openvas/files/patch-nasl_nasl_builtin_synscan.c   (contents, props changed)
  head/security/openvas/files/patch-nasl_nasl_host.c   (contents, props changed)
  head/security/openvas/files/patch-nasl_nasl_init.c   (contents, props changed)
  head/security/openvas/files/patch-nasl_nasl_packet_forgery.c   (contents, props changed)
  head/security/openvas/files/patch-nasl_nasl_packet_forgery_v6.c   (contents, props changed)
  head/security/openvas/files/patch-nasl_nasl_socket.c   (contents, props changed)
  head/security/openvas/files/patch-src_CMakeLists.txt   (contents, props changed)
  head/security/openvas/files/patch-src_pluginscheduler.c   (contents, props changed)
  head/security/openvas/files/patch-tools_greenbone-nvt-sync.in   (contents, props changed)
  head/security/openvas/pkg-descr   (contents, props changed)
  head/security/openvas/pkg-plist   (contents, props changed)

Added: head/security/openvas/Makefile
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/Makefile	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,38 @@
+# $FreeBSD$
+
+PORTNAME=	openvas
+DISTVERSION=	20.8.0
+DISTVERSIONPREFIX=	v
+CATEGORIES=	security
+
+MAINTAINER=	acm at FreeBSD.org
+COMMENT=	Open vulnerability assessment scanner
+
+LICENSE=	GPLv2+
+
+BUILD_DEPENDS=	flex:textproc/flex
+LIB_DEPENDS=	libgvm_base.so:security/gvm-libs \
+		libgcrypt.so:security/libgcrypt \
+		libpcap.so.1:net/libpcap \
+		libksba.so:security/libksba \
+		libgpgme.so:security/gpgme \
+		libssh.so:security/libssh \
+		libgnutls.so:security/gnutls \
+		libnetsnmp.so:net-mgmt/net-snmp
+RUN_DEPENDS=	redis-server:databases/redis \
+		snmpget:net-mgmt/net-snmp \
+		rsync:net/rsync \
+		${PYTHON_PKGNAMEPREFIX}impacket>=0:net/py-impacket@${PY_FLAVOR}
+USE_GITHUB=	yes
+GH_ACCOUNT=	greenbone
+
+USES=		bison cmake gnome pkgconfig python:3.5+
+USE_GNOME=	glib20
+
+USERS=		gvm
+GROUPS=		${USERS}
+
+post-install:
+	@${MKDIR} ${STAGEDIR}/var/run/ospd
+
+.include <bsd.port.mk>

Added: head/security/openvas/distinfo
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/distinfo	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,3 @@
+TIMESTAMP = 1609452424
+SHA256 (greenbone-openvas-v20.8.0_GH0.tar.gz) = fe0e03d59012bf93614f76afc40d783aa5be4d8879bbe418dddc9745a4d19ccb
+SIZE (greenbone-openvas-v20.8.0_GH0.tar.gz) = 423880

Added: head/security/openvas/files/patch-CMakeLists.txt
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-CMakeLists.txt	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,38 @@
+--- CMakeLists.txt	2020-08-11 07:00:25.000000000 -0500
++++ CMakeLists.txt	2021-01-04 19:19:49.997745000 -0500
+@@ -148,7 +148,7 @@
+ endif (NOT LIBDIR)
+ 
+ if (NOT LOCALSTATEDIR)
+-  set (LOCALSTATEDIR "${CMAKE_INSTALL_PREFIX}/var")
++  set (LOCALSTATEDIR "/var")
+ endif (NOT LOCALSTATEDIR)
+ 
+ if (NOT DATADIR)
+@@ -156,7 +156,7 @@
+ endif (NOT DATADIR)
+ 
+ if (NOT OPENVAS_RUN_DIR)
+-  set (OPENVAS_RUN_DIR "${LOCALSTATEDIR}/run")
++  set (OPENVAS_RUN_DIR "${LOCALSTATEDIR}/run/gvm")
+ endif (NOT OPENVAS_RUN_DIR)
+ 
+ if (NOT OPENVAS_FEED_LOCK_PATH)
+@@ -204,7 +204,7 @@
+ configure_file (doc/openvas.8.in doc/openvas.8 @ONLY)
+ configure_file (VERSION.in VERSION @ONLY)
+ configure_file (tools/greenbone-nvt-sync.in tools/greenbone-nvt-sync @ONLY)
+-configure_file (src/openvas_log_conf.cmake_in src/openvas_log.conf)
++configure_file (src/openvas_log_conf.cmake_in src/openvas_log.conf.sample)
+ 
+ ## Testing
+ 
+@@ -219,7 +219,7 @@
+   set (COVERAGE_FLAGS "--coverage")
+ endif (ENABLE_COVERAGE)
+ 
+-set (HARDENING_FLAGS            "-Wformat -Wformat-security -D_FORTIFY_SOURCE=2 -fstack-protector")
++set (HARDENING_FLAGS            "-Wformat -Wformat-security")
+ set (LINKER_HARDENING_FLAGS     "-Wl,-z,relro -Wl,-z,now")
+ # The "-D_FILE_OFFSET_BITS=64 -DLARGEFILE_SOURCE=1" is necessary for GPGME!
+ set (GPGME_C_FLAGS              "-D_FILE_OFFSET_BITS=64 -DLARGEFILE_SOURCE=1")

Added: head/security/openvas/files/patch-misc_ftp_funcs.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-misc_ftp_funcs.c	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,11 @@
+--- misc/ftp_funcs.c	2020-12-31 17:13:13.381267000 -0500
++++ misc/ftp_funcs.c	2020-12-31 17:15:17.095282000 -0500
+@@ -20,6 +20,8 @@
+ 
+ #include "network.h"
+ 
++#include <sys/types.h>
++#include <sys/socket.h>
+ #include <netinet/in.h>
+ #include <stdio.h>
+ #include <stdlib.h>

Added: head/security/openvas/files/patch-misc_network.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-misc_network.c	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,10 @@
+--- misc/network.c	2020-12-31 17:15:39.790259000 -0500
++++ misc/network.c	2020-12-31 17:16:09.182113000 -0500
+@@ -44,6 +44,7 @@
+ #include <string.h>
+ #include <sys/time.h> /* for gettimeofday */
+ #include <sys/types.h>
++#include <sys/socket.h>
+ #include <unistd.h>
+ 
+ #ifdef __FreeBSD__

Added: head/security/openvas/files/patch-nasl_CMakeLists.txt
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-nasl_CMakeLists.txt	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,28 @@
+--- nasl/CMakeLists.txt	2020-12-31 21:48:33.070235000 -0500
++++ nasl/CMakeLists.txt	2020-12-31 21:49:07.420166000 -0500
+@@ -86,6 +86,11 @@
+ 
+ message (STATUS "Looking for pcap...")
+ find_library (PCAP pcap)
++if (PCAP)
++  execute_process (COMMAND pkgconf libpcap --libs
++    OUTPUT_VARIABLE PCAP_LDFLAGS
++    OUTPUT_STRIP_TRAILING_WHITESPACE)
++endif (PCAP)
+ 
+ find_library (GPGME gpgme)
+ message (STATUS "Looking for gpgme... ${GPGME}")
+@@ -227,11 +232,11 @@
+ 
+ # Link the openvas-nasl executable
+ add_executable (openvas-nasl nasl.c)
+-target_link_libraries (openvas-nasl openvas_nasl_shared openvas_misc_shared ${GNUTLS_LDFLAGS} ${LIBSSH_LDFLAGS})
++target_link_libraries (openvas-nasl openvas_nasl_shared openvas_misc_shared ${GNUTLS_LDFLAGS} ${LIBSSH_LDFLAGS} ${PCAP_LDFLAGS})
+ 
+ # Link the openvas-nasl-lint executable
+ add_executable (openvas-nasl-lint nasl-lint.c)
+-target_link_libraries (openvas-nasl-lint openvas_nasl_shared openvas_misc_shared ${GLIB_LDFLAGS} ${GIO_LDFLAGS})
++target_link_libraries (openvas-nasl-lint openvas_nasl_shared openvas_misc_shared ${GLIB_LDFLAGS} ${GIO_LDFLAGS} ${PCAP_LDFLAGS})
+ 
+ ## Install
+ 

Added: head/security/openvas/files/patch-nasl_capture_packet.h
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-nasl_capture_packet.h	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,10 @@
+--- nasl/capture_packet.h	2020-12-31 17:18:54.965710000 -0500
++++ nasl/capture_packet.h	2020-12-31 17:18:25.229452000 -0500
+@@ -19,6 +19,7 @@
+ #ifndef CAPTURE_PACKET_H
+ #define CAPTURE_PACKET_H
+ 
++#include <sys/types.h>
+ #include <netinet/in.h>
+ #include <netinet/ip6.h>
+ 

Added: head/security/openvas/files/patch-nasl_nasl_builtin_find_service.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-nasl_nasl_builtin_find_service.c	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,10 @@
+--- nasl/nasl_builtin_find_service.c	2020-12-31 21:25:42.383545000 -0500
++++ nasl/nasl_builtin_find_service.c	2020-12-31 21:26:14.781948000 -0500
+@@ -34,6 +34,7 @@
+ #include <string.h>    /* for strstr() */
+ #include <sys/time.h>  /* for gettimeofday() */
+ #include <sys/types.h> /* for waitpid() */
++#include <sys/socket.h>
+ #include <sys/wait.h>  /* for waitpid() */
+ #include <unistd.h>    /* for usleep() */
+ 

Added: head/security/openvas/files/patch-nasl_nasl_builtin_openvas_tcp_scanner.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-nasl_nasl_builtin_openvas_tcp_scanner.c	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,11 @@
+--- nasl/nasl_builtin_openvas_tcp_scanner.c	2020-12-31 17:19:06.511436000 -0500
++++ nasl/nasl_builtin_openvas_tcp_scanner.c	2020-12-31 17:20:31.824455000 -0500
+@@ -428,7 +428,7 @@
+               bzero (&sa6, sizeof (sa6));
+               if (IN6_IS_ADDR_V4MAPPED (pia))
+                 {
+-                  sa.sin_addr.s_addr = pia->s6_addr32[3];
++                  sa.sin_addr.s_addr = pia->s6_addr[12];
+                   sa.sin_family = AF_INET;
+                   sa.sin_port = htons (port);
+                   len = sizeof (struct sockaddr_in);

Added: head/security/openvas/files/patch-nasl_nasl_builtin_synscan.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-nasl_nasl_builtin_synscan.c	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,29 @@
+--- nasl/nasl_builtin_synscan.c	2020-08-11 07:00:25.000000000 -0500
++++ nasl/nasl_builtin_synscan.c	2021-01-04 17:11:12.118080000 -0500
+@@ -36,6 +36,8 @@
+ #include <arpa/inet.h> /* for AF_INET */
+ #include <gvm/base/logging.h>
+ #include <gvm/base/prefs.h> /* for prefs_get */
++#include <sys/types.h>
++#include <sys/socket.h>
+ #include <netinet/ip.h>
+ #include <netinet/tcp.h> /* for TH_SYN */
+ #include <stdlib.h>      /* for rand() */
+@@ -699,7 +701,7 @@
+   if (IN6_IS_ADDR_V4MAPPED (dst6))
+     {
+       family = AF_INET;
+-      dst.s_addr = dst6->s6_addr32[3];
++      dst.s_addr = dst6->s6_addr[12];
+       soc = rawsocket (AF_INET);
+     }
+   else
+@@ -787,7 +789,7 @@
+   struct in_addr *dst;
+   struct in_addr inaddr;
+ 
+-  inaddr.s_addr = dst6->s6_addr32[3];
++  inaddr.s_addr = dst6->s6_addr[12];
+   dst = &inaddr;
+ 
+   if (islocalhost (dst))

Added: head/security/openvas/files/patch-nasl_nasl_host.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-nasl_nasl_host.c	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,11 @@
+--- nasl/nasl_host.c	2021-01-04 17:21:14.150833000 -0500
++++ nasl/nasl_host.c	2021-01-04 17:21:49.587410000 -0500
+@@ -38,6 +38,8 @@
+ #include "nasl_tree.h"
+ #include "nasl_var.h"
+ 
++#include <sys/types.h>
++#include <sys/socket.h>
+ #include <arpa/inet.h> /* for inet_aton */
+ #include <gvm/base/networking.h>
+ #include <gvm/util/kb.h>

Added: head/security/openvas/files/patch-nasl_nasl_init.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-nasl_nasl_init.c	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,11 @@
+--- nasl/nasl_init.c	2020-12-31 17:24:31.913454000 -0500
++++ nasl/nasl_init.c	2020-12-31 17:25:42.418759000 -0500
+@@ -38,6 +38,8 @@
+ 
+ #include <stdlib.h> /* for getenv.  */
+ #include <string.h> /* for memset */
++#include <sys/types.h>
++#include <sys/socket.h>
+ /* to e.g. favour BSD, but also for IPPROTO_TCP and TH_FIN */
+ #include "nasl_raw.h"
+ #include "nasl_scanner_glue.h"

Added: head/security/openvas/files/patch-nasl_nasl_packet_forgery.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-nasl_nasl_packet_forgery.c	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,65 @@
+--- nasl/nasl_packet_forgery.c	2020-08-11 07:00:25.000000000 -0500
++++ nasl/nasl_packet_forgery.c	2021-01-04 17:38:44.560650000 -0500
+@@ -33,6 +33,8 @@
+ #include "nasl_tree.h"
+ #include "nasl_var.h"
+ 
++#include <sys/types.h>
++#include <sys/socket.h>
+ #include <arpa/inet.h> /* for inet_aton */
+ #include <ctype.h>     /* for isprint */
+ #include <errno.h>     /* for errno */
+@@ -136,7 +138,7 @@
+   if (s != NULL)
+     inet_aton (s, &pkt->ip_dst);
+   else
+-    pkt->ip_dst.s_addr = dst_addr->s6_addr32[3];
++    memcpy(&pkt->ip_dst.s_addr, &dst_addr->s6_addr[12], 4);
+ 
+   if (data != NULL)
+     {
+@@ -1283,7 +1285,7 @@
+ 
+   if (dst == NULL || (IN6_IS_ADDR_V4MAPPED (dst) != 1))
+     return NULL;
+-  inaddr.s_addr = dst->s6_addr32[3];
++  memcpy(&inaddr.s_addr, &dst->s6_addr[12], 4);
+   for (i = 0; i < sizeof (sports) / sizeof (int); i++)
+     {
+       if (sports[i] == 0)
+@@ -1301,7 +1303,7 @@
+     port = plug_get_host_open_port (script_infos);
+ 
+   if (islocalhost (&inaddr) > 0)
+-    src.s_addr = dst->s6_addr32[3];
++    memcpy(&src.s_addr, &dst->s6_addr[12], 4);
+   else
+     {
+       bzero (&src, sizeof (src));
+@@ -1411,7 +1413,7 @@
+ 
+   if (dstip == NULL || (IN6_IS_ADDR_V4MAPPED (dstip) != 1))
+     return NULL;
+-  inaddr.s_addr = dstip->s6_addr32[3];
++  memcpy(&inaddr.s_addr, &dstip->s6_addr[12], 4);
+   soc = socket (AF_INET, SOCK_RAW, IPPROTO_RAW);
+   if (soc < 0)
+     return NULL;
+@@ -1540,7 +1542,7 @@
+         {
+           struct in_addr src;
+           bzero (&src, sizeof (src));
+-          inaddr.s_addr = dst->s6_addr32[3];
++  	  memcpy(&inaddr.s_addr, &dst->s6_addr[12], 4);
+           interface = routethrough (&inaddr, &src);
+         }
+       else
+@@ -1680,7 +1682,7 @@
+         {
+           struct in_addr src;
+           bzero (&src, sizeof (src));
+-          inaddr.s_addr = dst->s6_addr32[3];
++	  memcpy(&inaddr.s_addr, &dst->s6_addr[12], 4);
+           interface = routethrough (&inaddr, &src);
+         }
+       else

Added: head/security/openvas/files/patch-nasl_nasl_packet_forgery_v6.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-nasl_nasl_packet_forgery_v6.c	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,21 @@
+--- nasl/nasl_packet_forgery_v6.c	2020-08-11 07:00:25.000000000 -0500
++++ nasl/nasl_packet_forgery_v6.c	2021-01-04 17:39:47.104902000 -0500
+@@ -36,6 +36,8 @@
+  * 09/02/2010 Preeti Subramanian <spreeti at secpod.com>
+  */
+ 
++#include <sys/types.h>
++#include <sys/socket.h>
+ #include <arpa/inet.h> /* for inet_aton */
+ #include <ctype.h>     /* for isprint */
+ #include <pcap.h>      /* for PCAP_ERRBUF_SIZE */
+@@ -44,9 +46,7 @@
+ #include <sys/param.h>
+ #include <sys/time.h> /* for gettimeofday */
+ #include <unistd.h>   /* for close */
+-#ifdef __FreeBSD__
+ #include <netinet/in.h>
+-#endif
+ 
+ #include "../misc/bpf_share.h"    /* for bpf_open_live */
+ #include "../misc/pcap_openvas.h" /* for routethrough */

Added: head/security/openvas/files/patch-nasl_nasl_socket.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-nasl_nasl_socket.c	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,29 @@
+--- nasl/nasl_socket.c	2020-12-31 17:33:40.663863000 -0500
++++ nasl/nasl_socket.c	2020-12-31 17:36:11.693013000 -0500
+@@ -51,6 +51,8 @@
+ #include <stdlib.h>              /* for atoi() */
+ #include <string.h>              /* for bzero */
+ #include <sys/time.h>
++#include <sys/types.h>
++#include <sys/socket.h>
+ #include <unistd.h> /* for close */
+ 
+ #ifndef EADDRNOTAVAIL
+@@ -311,7 +313,7 @@
+   if (IN6_IS_ADDR_V4MAPPED (p))
+     {
+       bzero (&daddr, sizeof (daddr));
+-      daddr.sin_addr.s_addr = p->s6_addr32[3];
++      daddr.sin_addr.s_addr = p->s6_addr[12];
+       daddr.sin_family = AF_INET;
+       daddr.sin_port = htons (dport);
+       unblock_socket (sock);
+@@ -546,7 +548,7 @@
+   if (IN6_IS_ADDR_V4MAPPED (ia))
+     {
+       bzero (&soca, sizeof (soca));
+-      soca.sin_addr.s_addr = ia->s6_addr32[3];
++      soca.sin_addr.s_addr = ia->s6_addr[12];
+       soca.sin_port = htons (port);
+       soca.sin_family = AF_INET;
+ 

Added: head/security/openvas/files/patch-src_CMakeLists.txt
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-src_CMakeLists.txt	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,13 @@
+--- src/CMakeLists.txt	2020-08-11 07:00:25.000000000 -0500
++++ src/CMakeLists.txt	2021-01-04 19:20:27.629700000 -0500
+@@ -228,8 +228,8 @@
+          PERMISSIONS OWNER_EXECUTE OWNER_READ OWNER_WRITE
+          GROUP_READ GROUP_EXECUTE WORLD_READ WORLD_EXECUTE)
+ 
+-install (FILES ${CMAKE_BINARY_DIR}/src/openvas_log.conf
+-         DESTINATION ${OPENVAS_SYSCONF_DIR})
++install (FILES ${CMAKE_BINARY_DIR}/src/openvas_log.conf.sample
++         DESTINATION "${OPENVAS_SYSCONF_DIR}")
+ 
+ install (FILES ${CMAKE_BINARY_DIR}/tools/greenbone-nvt-sync
+          DESTINATION ${BINDIR}

Added: head/security/openvas/files/patch-src_pluginscheduler.c
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-src_pluginscheduler.c	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,29 @@
+--- src/pluginscheduler.c	2020-08-11 07:00:25.000000000 -0500
++++ src/pluginscheduler.c	2021-01-04 18:10:12.943469000 -0500
+@@ -33,7 +33,7 @@
+ #include <glib.h>
+ #include <gvm/base/prefs.h>     /* for prefs_get() */
+ #include <gvm/util/nvticache.h> /* for nvticache_t */
+-#include <malloc.h>
++#include <stdlib.h>
+ #include <string.h> /* for strcmp() */
+ 
+ #undef G_LOG_DOMAIN
+@@ -325,7 +325,7 @@
+       plugins_scheduler_free (ret);
+       return NULL;
+     }
+-  malloc_trim (0);
++//  malloc_trim (0);
+   return ret;
+ }
+ 
+@@ -427,7 +427,7 @@
+           element = element->next;
+         }
+     }
+-  malloc_trim (0);
++//  malloc_trim (0);
+ }
+ 
+ struct scheduler_plugin *

Added: head/security/openvas/files/patch-tools_greenbone-nvt-sync.in
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/files/patch-tools_greenbone-nvt-sync.in	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,37 @@
+--- tools/greenbone-nvt-sync.in	2020-08-11 07:00:25.000000000 -0500
++++ tools/greenbone-nvt-sync.in	2021-01-02 02:45:37.863324000 -0500
+@@ -87,10 +87,10 @@
+ LOG_CMD="logger -t $SCRIPT_NAME"
+ 
+ check_logger () {
+-  logger --socket-error=on -p daemon.info -t $SCRIPT_NAME "Checking logger" --no-act 1>/dev/null 2>&1
++  logger -p daemon.info -t $SCRIPT_NAME "Checking logger"  1>/dev/null 2>&1
+   if [ $? -gt 0 ]
+   then
+-    LOG_CMD="logger --socket-error=off -s -t $SCRIPT_NAME"
++    LOG_CMD="logger -s -t $SCRIPT_NAME"
+     $LOG_CMD -p daemon.warning "The log facility is not working as expected. All messages will be written to the standard error stream."
+   fi
+ }
+@@ -428,7 +428,7 @@
+         log_err "rsync failed, aborting synchronization."
+         exit 1
+       fi
+-      eval "cd \"$NVT_DIR\" ; md5sum -c --status \"$NVT_DIR/md5sums\""
++      eval "cd \"$NVT_DIR\" ; xargs -n 2 md5 -c < \"$NVT_DIR/md5sums\" > /dev/null"
+       if [ $? -ne 0 ]  ; then
+         if [ -n "$retried" ]
+         then
+@@ -462,10 +462,10 @@
+ 
+ do_self_test ()
+ {
+-  MD5SUM_AVAIL=`command -v md5sum`
++  MD5SUM_AVAIL=`command -v md5`
+   if [ $? -ne 0 ] ; then
+     SELFTEST_FAIL=1
+-    stderr_write "The md5sum binary could not be found."
++    stderr_write "The md5 binary could not be found."
+   fi
+ 
+   RSYNC_AVAIL=`command -v rsync`

Added: head/security/openvas/pkg-descr
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/pkg-descr	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,8 @@
+This is the Open Vulnerability Assessment Scanner (OpenVAS) of the Greenbone 
+Vulnerability Management (GVM) Solution.
+
+It is used for the Greenbone Security Manager appliances and is a full-featured
+scan engine that executes a continuously updated and extended feed of Network 
+Vulnerability Tests (NVTs).
+
+WWW: https://github.com/greenbone/openvas

Added: head/security/openvas/pkg-plist
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/openvas/pkg-plist	Wed Jan  6 08:46:26 2021	(r560474)
@@ -0,0 +1,23 @@
+bin/greenbone-nvt-sync
+bin/openvas-nasl
+bin/openvas-nasl-lint
+ at sample %%ETCDIR%%/openvas_log.conf.sample
+lib/libopenvas_misc.so
+lib/libopenvas_misc.so.20
+lib/libopenvas_misc.so.20.8.0
+lib/libopenvas_nasl.so
+lib/libopenvas_nasl.so.20
+lib/libopenvas_nasl.so.20.8.0
+sbin/openvas
+share/man/man1/openvas-nasl-lint.1.gz
+share/man/man1/openvas-nasl.1.gz
+share/man/man8/greenbone-nvt-sync.8.gz
+share/man/man8/openvas.8.gz
+ at dir %%ETCDIR%%/gnupg
+ at dir %%DATADIR%%
+ at dir(gvm,gvm,750) /var/lib/openvas/gnupg
+ at dir(gvm,gvm,750) /var/lib/openvas/plugins
+ at dir(gvm,gvm,750) /var/lib/openvas
+ at dir(gvm,gvm,750) /var/log/gvm
+ at dir(gvm,gvm,750) /var/run/ospd
+


More information about the svn-ports-head mailing list