aboutsummaryrefslogtreecommitdiffstats
path: root/UPDATING
diff options
context:
space:
mode:
Diffstat (limited to 'UPDATING')
-rw-r--r--UPDATING5
1 files changed, 5 insertions, 0 deletions
diff --git a/UPDATING b/UPDATING
index 6efe12226381..833aaf4e4693 100644
--- a/UPDATING
+++ b/UPDATING
@@ -24,6 +24,11 @@ you update your ports collection, before attempting any port upgrades.
on security/sshguard which only provided hosts/TCP Wrappers blocking,
but there is no replacement at this time.
+ I would also like to document that sshguard no longer accepts the -e
+ argument which allowed external scripts to run when sshguard finds a
+ match. As a result the null backend can no longer be used to create
+ custom blocking functionality; it only serves as a detection backend.
+
If the removed backends return due to user demand they will be added
as slave ports for consistency. I apologize for any inconvenience and
lack of notice on the deprecation of these features.
0800'>2015-08-191-0/+73 * Document irc/unreal denial of servicefeld2015-08-191-0/+29 * Document graphics/jasper vulnerabilityfeld2015-08-191-0/+30 * Document freexl multiple vulnerabilities. One is still awaiting CVE assignment.feld2015-08-191-0/+66 * rt was assigned a CVEfeld2015-08-191-0/+2 * ansible was assigned a CVEfeld2015-08-191-0/+2 * gnutls was assigned a CVEfeld2015-08-191-0/+2 * - Update to OpenSSH 7.0p1bdrewery2015-08-185-115/+56 * Update to snapshot 20150817bdrewery2015-08-183-31/+33 * security/keepass: update 2.29 -> 2.30junovitch2015-08-182-3/+3 * Document mod_jk vulnerabilityfeld2015-08-181-0/+32 * Remove UNIQUENAME and LATEST_LINK.mat2015-08-1710-14/+0 * Document two QEMU related xen-tools security advisoriesjunovitch2015-08-171-0/+65 * Document PHP security issues impacting the lang/php5* ports (Core/SPL)junovitch2015-08-171-0/+77 * - Fix shebangsamdmi32015-08-171-0/+4 * Update to 2.13.nobutaka2015-08-173-4/+4 * Add more signature (locally verified).kuriyama2015-08-171-2/+2 * - Upgrade to 2.3gblach2015-08-172-4/+4 * - Update to 1.9.0amdmi32015-08-162-10/+8 * - Add NO_ARCHsunpoet2015-08-162-1/+2 * - Add NO_ARCHsunpoet2015-08-162-1/+2 * - Add NO_ARCHsunpoet2015-08-162-1/+2 * - Remove qt4-linguist dependency; add qt4-network instead.vg2015-08-161-3/+4 * Update to 1.86b.delphij2015-08-152-3/+3 * security/afl: cannonicalize MAINTAINERpgollucci2015-08-151-1/+1 * Update MASTER_SITES to fix fetching problem due to abnormal version numberfeld2015-08-151-1/+1 * Document MediaWiki multiple security vulnerabilitiesjunovitch2015-08-151-0/+45 * - Update to 3.3.17.1feld2015-08-153-4/+4 * Sync libvpx check for CVE-2015-448[56] with r394231jbeich2015-08-151-2/+2 * Document freeradius3 vulnerabilityfeld2015-08-151-0/+28 * Document gnutls vulnerabilitiesfeld2015-08-151-0/+65 * security/nss: update legacy ckbi suffix to the one used in 3.19.1jbeich2015-08-141-1/+1 * security/{,ca_root_}nss: update to 3.19.3jbeich2015-08-144-7/+7 * Update to 2.8.1garga2015-08-142-4/+3 * Update to 1.4.24arved2015-08-142-3/+3 * - Remove RG linksunpoet2015-08-142-2/+0 * - Update to 1.4.1sunpoet2015-08-143-15/+4 * - Update to 1.0.0sunpoet2015-08-142-3/+3 * - Add PORTSCOUTsunpoet2015-08-141-0/+2 * - Update to 1.1.0sunpoet2015-08-143-23/+10 * - Remove MASTER_SITE_SUBDIRsunpoet2015-08-141-1/+0 * - Switch to USES=autoreconfamdmi32015-08-131-3/+2 * Document Froxlor database password information disclosure vulnerabilityjunovitch2015-08-131-0/+40 * Document two XSS vulnerabilities in rt40, rt42.matthew2015-08-131-0/+40 * Document py-foolscap vulnerabilityfeld2015-08-131-0/+32 * Make libvpx-1.3.0 vulnerable by moving MFSA 2014-77 into separate entryjbeich2015-08-121-4/+65 * Document newest flash vulnabilities.kwm2015-08-121-0/+92 * - Upgrade to 2.1.7 (minor fixes).kuriyama2015-08-125-53/+10 * Update to version 1.17.1pawel2015-08-122-4/+4 * Oops, mark bundled libvpx v1.4.0 in firefox as vulnerable againjbeich2015-08-121-0/+9 * Move libvpx vulnerability into its own entryjbeich2015-08-121-5/+33 * Document recent mozilla vulnerabilitiesjbeich2015-08-121-0/+110 * - Switch to USES=autoreconfamdmi32015-08-121-2/+1 * - Switch to USES=autoreconfamdmi32015-08-121-2/+1 * - Add NO_ARCHamdmi32015-08-121-0/+1 * - Switch to USES=autoreconfamdmi32015-08-121-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Drop @dirrm* from plistamdmi32015-08-112-38/+0 * - Drop @dirrm* from plistamdmi32015-08-111-0/+15 * - Drop @dirrm* from plistamdmi32015-08-111-1/+0 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * - Switch to USES=autoreconfamdmi32015-08-111-2/+1 * Document an already fixxed vulnerability in lighttpd 1.4.35 or older.madpilot2015-08-101-0/+29 * Document PCRE heap overflow vulnerability in '(?|' situationsjunovitch2015-08-101-0/+34 * Adds -fPIC to CFLAGS_aarch64 to a number of ports that already have itandrew2015-08-101-0/+1 * security/rubygem-omniauth-saml: create portswills2015-08-105-0/+39 * security/rubygem-ruby-saml: create portswills2015-08-104-0/+26 * security/rubygem-devise-two-factor: create portswills2015-08-105-0/+44 * secrutiy/rubygem-attr_encrypted: create portswills2015-08-104-0/+27 * security/rubygem-encryptor: create portswills2015-08-104-0/+25 * Re-commit ofnetchild2015-08-1033-13/+314 * Mention all CVEs that are fixed in 4.2.4. The release notes only mentionedflo2015-08-101-0/+6 * Update to signing-party 2.1 (bugfix release)johans2015-08-092-4/+3 * - editors/lazarus update to 1.4.2acm2015-08-092-2/+2 * Document recent mozilla vulnerabilitiesjbeich2015-08-071-0/+35 * Document wordpress vulnerabilitiesflo2015-08-071-0/+36 * Revert pkg-plist OPENSSL_SHLIBVER additionbrnrd2015-08-072-8/+3 * security/libressl: Update to 2.2.2brnrd2015-08-074-18/+27 * Add two security issues for subversion.lev2015-08-061-0/+35 * security/kpcli: update 2.8 -> 3.0robak2015-08-062-3/+8 * security/p5-Crypt-PWSafe3: new portrobak2015-08-065-0/+48 * Document Elasticsearch directory traversal attack and remote code executionjunovitch2015-08-061-0/+61 * The FreeBSD GNOME team proudly presents GNOME 3.16 for FreeBSD.kwm2015-08-0618-80/+331 * Bugfix upgrade to new upstream release 2.3.8.mandree2015-08-062-4/+3 * Part 2 of adding USE_GNOME=intltool to ports that require it.kwm2015-08-051-1/+1 * - Strip libraryamdmi32015-08-051-1/+2 * - Don't use / in sed regexps to allow paths, unbreaking cross-buildsamdmi32015-08-051-3/+3 * security/py-fail2ban: update 0.9.2 -> 0.9.3robak2015-08-043-4/+8 * Document xen-tools QEMU heap overflow flaw with certain ATAPI commandsjunovitch2015-08-041-0/+32 * - Drop @dirrm* from plistamdmi32015-08-041-1/+0 * - Add LICENSEamdmi32015-08-041-1/+5 * Correct version range for libidn entryjunovitch2015-08-031-1/+2 * Horde package update:mm2015-08-036-9/+9 * Part 1 of adding USE_GNOME=intltool to ports that require it.kwm2015-08-037-7/+7 * By default libtool replaces -export-symbols <file> with -retain-symbols-filetijl2015-08-0218-14/+18 * security/sshguard: update to 1.6.1feld2015-08-025-51/+4 * - Drop @dirrm* from plistamdmi32015-08-011-1/+0 * - Add NO_ARCHamdmi32015-08-012-1/+1 * - Add NO_ARCHamdmi32015-08-012-1/+1 * - Drop @dirrm* from plistamdmi32015-08-011-1/+0 * Document older net-snmp DoS vulnerabilityfeld2015-08-011-0/+35 * - Update to 1.2.1sunpoet2015-08-012-3/+3 * - Update to 3.0.0sunpoet2015-08-012-3/+3 * Document net-snmp vulnerabilityfeld2015-07-311-0/+30 * security/vault: fix typo in Makefileswills2015-07-311-1/+2 * Fix dependencyantoine2015-07-311-1/+1 * Reflect Chicken 4.10.0 RC2 as the minimum version with the CVE-2015-4556 fixjunovitch2015-07-311-2/+3 * - Drop @dirrm* from plistamdmi32015-07-311-1/+0 * - Drop @dirrm* from plistamdmi32015-07-311-1/+0 * - Drop @dirrm* from plistamdmi32015-07-311-1/+0 * - Drop @dirrm* from plistamdmi32015-07-311-1/+0 * - Drop @dirrm* from plistamdmi32015-07-311-2/+0 * - Drop @dirrm* from plistamdmi32015-07-311-11/+0 * Set path to krb5-config properly.jkim2015-07-311-10/+9 * Convert to USES=gssapi.jkim2015-07-312-0/+32 * - Drop @dirrm* from plistamdmi32015-07-301-1/+0 * Update to new upstream bug-fix release 0.65mandree2015-07-302-3/+3 * - Drop @dirrm* from plistamdmi32015-07-302-4/+2 * - Fix installation from non-rootamdmi32015-07-301-0/+13 * Switch default python_CMD used by shebangfix to ${PYTHON_CMD} for portsantoine2015-07-301-1/+0 * - Add LICENSEamdmi32015-07-292-1/+3 * - Add LICENSEamdmi32015-07-292-1/+3 * - Drop @dirrm* from plistamdmi32015-07-291-1/+0 * - Add NO_ARCHamdmi32015-07-292-1/+1 * - Drop @dirrm* from plistamdmi32015-07-291-1/+0 * - Drop @dirrm* from plistamdmi32015-07-292-1/+1 * - Fix shebangsamdmi32015-07-291-1/+3 * - Fix shebangsamdmi32015-07-291-1/+3 * Document bind CVEfeld2015-07-291-0/+43 * Update to 1.2.14feld2015-07-292-15/+18 * Upgrade to version 1.1.0.olgeni2015-07-282-3/+3 * - Drop @dirrm* from plistamdmi32015-07-281-1/+0 * - Update to 3.3.16bdrewery2015-07-283-4/+4 * Add upstream fix to address CVE-2015-5600 for MaxAuthTries bypass.bdrewery2015-07-282-1/+53 * Document OpenSSH CVE-2015-5600 for MaxAuthTries bypassbdrewery2015-07-281-0/+28 * Fix accidental revert of PermitRootLogin default to NO.bdrewery2015-07-282-1/+10 * Update to snapshot 20150727bdrewery2015-07-283-16/+16 * - Update to 6.9p1bdrewery2015-07-2811-189/+54 * Bring over ETCDIR and libedit updates from main portbdrewery2015-07-282-8/+8 * - Fix fetch, againamdmi32015-07-271-1/+2 * Document logstash SSL/TLS security vulnerability (FREAK attack)feld2015-07-271-0/+33 * Version 2.0.0 of SoftHSM has been released. More updates and bug fixes can be...erwin2015-07-272-3/+3 * security/py-paramiko: 1.14.0 -> 1.15.2pi2015-07-274-8/+9 * security/sshguard-nullfeld2015-07-266-4/+18 * Unbreak INDEX, reverting r392921antoine2015-07-2633-314/+13 * 64 bit linuxulator support (not activated by default):netchild2015-07-2633-13/+314 * Update to 1.3.0antoine2015-07-264-28/+19 * Update to 20150708antoine2015-07-262-12/+5 * New port: security/py-artifactsantoine2015-07-264-0/+29 * Document new vulnerabilities in www/chromium < 44.0.2403.89rene2015-07-251-0/+101 * Use new USES=libeditbdrewery2015-07-251-0/+1 * Document shibboleth DoSfeld2015-07-251-0/+48 * Adjust wordpress range -- www/wordpress has PORTEPOCHfeld2015-07-241-0/+3 * Update Wordpress entry to add CVEsfeld2015-07-241-0/+3 * The new shibboleth will refuse to accept -u when it wasgirgen2015-07-242-8/+9 * - Update to 2.9.7.5zi2015-07-243-9/+16 * Document wordpress XSSfeld2015-07-241-0/+34 * Document libidn out-of-bounds read issue with invalid UTF-8 inputfeld2015-07-231-0/+29 * Document buffer overflow vulnerabilities in SoXfeld2015-07-231-0/+58 * Shibboleth SP software crashes on well-formed but invalid XML.girgen2015-07-238