aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Welcome Mate Desktop 1.8bapt2014-09-1014-546/+0
* Document new vulnerabilities in www/chromium < 37.0.2062.120rene2014-09-101-0/+33
* Update nss to 3.17bapt2014-09-092-8/+10
* net/libnet10 expired, set the 12 dependent ports to expire 30 SEP 2014marino2014-09-092-0/+6
* Mozilla upgrades:bapt2014-09-092-3/+4
* - Update to 1.998jadawin2014-09-082-4/+3
* - Update to 0.21.0.1culot2014-09-082-6/+4
* - Update to 0.21.0.1culot2014-09-084-6/+22
* Let USES=libtool also delete links to .la files (and links to links to...)tijl2014-09-082-3/+1
* Allow staging as a regular userantoine2014-09-081-0/+1
* Allow staging as a regular userantoine2014-09-081-0/+1
* Allow staging as a regular userantoine2014-09-081-0/+1
* Allow staging as a regular userantoine2014-09-081-1/+2
* Remove three unstaged security/prelude-* portsmarino2014-09-0821-481/+0
* security/barnyard2: Remove PRELUDE optionmarino2014-09-081-4/+2
* Stage security/distcache; Apache24 optionally depends on itmarino2014-09-083-27/+32
* */courier-authlib*:tijl2014-09-0812-233/+102
* Allow staging as a regular userantoine2014-09-071-2/+2
* . Fix LICENSE specification (BSD -> BSD3CLAUSE)glewis2014-09-071-1/+1
* security/hydra: Switch Firebird client options from 2.1 => 2.5marino2014-09-071-1/+1
* Update to 2.1.0.7antoine2014-09-062-3/+3
* Webshag is a multi-threaded, multi-platform web server audit tool. Written incs2014-09-066-0/+211
* https has been the default for www.keltia.net for more than a year.roberto2014-09-061-1/+1
* security/umit: fix build since sphinx updatewg2014-09-061-0/+1
* Update to Calife 3.0.4: support for %group synatx in addition to @grouproberto2014-09-062-3/+5
* Radamsa is a generic test case generator for robustness testing, aka a fuzzer.cs2014-09-065-0/+51
* security/cracklib:tijl2014-09-068-17/+17
* Add USES=libtool and INSTALL_TARGET=install-striptijl2014-09-061-6/+6
* Remove IGNORE -- port should work fine nowcs2014-09-061-2/+1
* Update to 20140828cs2014-09-063-44/+68
* Add USES=libtool and INSTALL_TARGET=install-striptijl2014-09-062-3/+3
* Document trafficserver vulnerabilitytijl2014-09-051-0/+31
* - Update to 6.47, announce message:nemysis2014-09-052-7/+5
* Change INSTALL_DATA to install with mode 644antoine2014-09-052-3/+4
* security/libgcrypt: fix build with GCC on 8.x/amd64, 2nd attemptpi2014-09-051-3/+2
* Import PHP 5.6 branch!ale2014-09-046-0/+54
* Fix permissions (@group/@mode) handlingmartymac2014-09-042-7/+4
* - update vid f927e06c-1109-11e4-b090-20cf30e32f6dohauer2014-09-041-6/+12
* Update to 20140824cs2014-09-046-290/+30
* - Update to 0.9.5jhale2014-09-032-5/+5
* - Update to 2.1.2jhale2014-09-033-17/+17
* Upgrade to 0.9.4. bump PORTREVISION due shared library incr.vanilla2014-09-031-1/+1
* Remove pkg_install only bitsbapt2014-09-031-4/+0
* security/libgcrypt: fix build without assembler on 8.x/amd64pi2014-09-032-5/+18
* Update to 1.3.1cs2014-09-032-6/+5
* Mark brokencs2014-09-031-0/+1
* Remove non staged ports without pending PR from s*bapt2014-09-0275-2699/+0
* Support stagingcs2014-09-022-9/+15
* Reading up on it a bit more, there are some differences betweenadamw2014-09-021-1/+1
* Deprecate as upstream has abandoned it for security/py-potrcs2014-09-021-0/+2
* Add security/p5-Crypt-Tea_JS.adamw2014-09-026-0/+58
* Fix build on 8 and 9.adamw2014-09-021-2/+2
* Remove support for pkg_installbapt2014-09-012-10/+0
* lang/guile:tijl2014-08-311-1/+1
* security/umit: support stagewg2014-08-312-47/+58
* security/orthrus: support stagewg2014-08-312-20/+25
* security/libpreludedb: support stagewg2014-08-312-91/+59
* security/kedpm: support stagewg2014-08-313-89/+16
* security/rubygem-omniauth: correct dependencyswills2014-08-311-1/+1
* security/rubygem-omniauth: update to 1.2.2swills2014-08-312-3/+3
* security/rubygem-net-ssh27: limit portscout to proper versionsswills2014-08-311-1/+1
* security/rubygem-net-scp11: limit portscout to proper versionsswills2014-08-311-1/+1
* dns/libidn:tijl2014-08-315-4/+5
* Fix build on amd64 on 8 and 9.adamw2014-08-312-3/+21
* Fix build on branches which do not have com_right_r() in libcom_err.hrs2014-08-314-1/+43
* - Add LICENSE.hrs2014-08-308-191/+186
* Update to 1.0.4antoine2014-08-302-9/+7
* Switch to USES=python and autoplistantoine2014-08-302-47/+2
* - Update LICENSE [1]sunpoet2014-08-302-42/+3
* - Add missing OPTIONS_DEFINEsunpoet2014-08-302-28/+20
* - Update to 0.24olivierd2014-08-302-6/+5
* - Convert my own Python ports to USES= pythonolivierd2014-08-301-3/+2
* Convert a few ports to USES=pythonantoine2014-08-304-12/+8
* Modernize pythonbapt2014-08-291-3/+2
* Modernize pythonbapt2014-08-291-3/+2
* devel/libunistring:tijl2014-08-291-1/+1
* security/libssh2:tijl2014-08-292-12/+19
* Remove bad usage of BROKENantoine2014-08-291-1/+1
* dns/c-ares:tijl2014-08-281-1/+1
* - Fix plist issuesvsevolod2014-08-282-1/+3
* - Update libsodium to 0.7.0vsevolod2014-08-273-16/+22
* Update signing-party to 1.1.9johans2014-08-272-4/+3
* Reset maintainership, the maintainer has no time for itbapt2014-08-271-1/+1
* security/rubygem-net-scp11: tell portscout to ignoreswills2014-08-271-0/+2
* security/rubygem-net-ssh27: tell portscout to ignore thisswills2014-08-271-0/+2
* Remove some duplicate lines from plist (or duplicate plist)antoine2014-08-271-4/+3
* Document new vulnerabilities in www/chromium < 37.0.2062.94rene2014-08-271-0/+58
* security/rubygem-bcrypt-ruby: fix missing dependencyswills2014-08-261-1/+2
* security/rubygem-bcrypt: add rubygem-bcrypt portswills2014-08-264-0/+24
* - Fix missing library problems when the linker enforces explicit linkingtijl2014-08-265-5/+11
* Update to 20140824antoine2014-08-262-3/+3
* - Fix configure with the EXE option enabledpgj2014-08-261-1/+3
* security/rubygem-net-ssh: update to 2.9.1swills2014-08-262-3/+3
* Update to 4.1.novel2014-08-263-4/+4
* Update to 1.10.8madpilot2014-08-262-4/+4
* security/rubygem-net-scp: update to 1.2.1swills2014-08-262-3/+3
* - Drop USE_AUTOTOOLS=libtool, not usedamdmi32014-08-251-1/+1
* - Merge in workaround from 191002zi2014-08-253-12/+36
* security/py-cryptography: Update to 0.5.4, Modernizekoobs2014-08-252-8/+9
* security/rubygem-bcrypt-ruby: update to 3.1.5swills2014-08-252-3/+3
* Add security/fprintd.adamw2014-08-258-0/+175
* Update to 0.9.14.1cs2014-08-252-3/+3
* 2014-08-24 security/pam_abl: Newer version requires large number of hacks, no...antoine2014-08-2417-681/+0
* Add devel/liballium and security/obfsclient.adamw2014-08-234-0/+51
* security/xzid: suppress broken and unnecesary missing target checkmarino2014-08-231-0/+1
* - update to 6.4.7ohauer2014-08-233-36/+36
* security/suricata: Update to 2.0.3, Modernizekoobs2014-08-234-46/+122
* Remove double slash to pass check-plistantoine2014-08-231-1/+1
* - Update to 2014.65ak2014-08-222-3/+3
* New port: security/p5-Crypt-RHash:zi2014-08-226-0/+50
* - Switch dns/unbound to USES=libtool, drop .la filesamdmi32014-08-222-1/+2
* Fix up missed or botched PORTREVISION bumps from r365599.mandree2014-08-221-1/+1
* Berkeley DB cleanup, remove versions 4.0 ... 4.7.mandree2014-08-2210-13/+57
* - Document buffer overrun in sysutils/filezi2014-08-221-0/+25
* Add missing <package> taglwhsu2014-08-221-0/+1
* Document Django 2014-08-20 vulnerabiltylwhsu2014-08-221-0/+80
* security/libprelude: Take MAINTAINER'ship, STAGE & Modernizekoobs2014-08-218-58/+48
* security/tinyca: Reset maintainermarino2014-08-211-1/+1
* Security/denyhosts: Limit to python 2.x and reset maintainermarino2014-08-211-3/+2
* Stage security/cvm and assign maintainership to submittermarino2014-08-214-32/+37
* Stage.adamw2014-08-212-21/+5
* Stage.adamw2014-08-212-19/+4
* Update to 20140818antoine2014-08-212-6/+6
* security/razorback-officeCat: Chase json-c update (Unbreak)marino2014-08-213-3/+27
* security/razorback-swfScanner: Chase json-c update (Unbreak)marino2014-08-213-2/+26
* security/razorback-pdfFox: Chase json-c update (Unbreak)marino2014-08-213-2/+26
* security/razorback-fsWalk: Chase json-c update (Unbreak)marino2014-08-213-1/+26
* security/razorback-fsMonitor: Chase json-c update (Unbreak)marino2014-08-213-0/+25
* security/razorback-dispatcher: Chase json-c update (Unbreak)marino2014-08-213-1/+25
* security/razorback-fileInject: Chase json-c update (Unbreak)marino2014-08-213-3/+27
* security/razorback-archiveInflate: Chase json-c update (Unbreak)marino2014-08-213-2/+26
* security/razorback-scriptNugget: Chase json-c update (Unbreak)marino2014-08-213-2/+26
* security/razorback-yaraNugget: Chase json-c update (Unbreak)marino2014-08-213-1/+25
* security/razorback-syslogNugget: Chase json-c update (Unbreak)marino2014-08-213-2/+26
* security/razorback-clamavNugget: Chase json-c update (Unbreak)marino2014-08-213-2/+25
* security/razorback-virusTotal: Chase json-c update (Unbreak)marino2014-08-214-2/+36
* security/razorback-masterNugget: Chase json-c update (Unbreak)marino2014-08-212-1/+15
* Fix build, broken in the json-c 0.12 upgrade. Given the nature of the errors ...adamw2014-08-204-22/+39
* - Update to 0.5zi2014-08-203-5/+7
* Fix more missing -lintltijl2014-08-201-9/+17
* 2014-08-20 deskutils/horde3-hermes: EOL in April 2012antoine2014-08-2012-466/+0
* Remove deletion of LC_MESSAGES directories that are owned by devel/gettextgrembo2014-08-202-8/+0
* many ruby/rubygem ports: death of rubyforge.orgswills2014-08-199-7/+13
* security/strongswan: Upgrade version 5.1.3 => 5.2.0marino2014-08-196-140/+124
* Add missing libintl linktijl2014-08-191-3/+11
* Upgrade to 0.4.15.thierry2014-08-192-3/+3
* Record PHP 5.3 vulnerabilitiesflo2014-08-191-0/+41
* Convert most NO_INSTALL_MANPAGES to USES=imake:nomanantoine2014-08-193-6/+2
* - Switch devel/liboop to USES=libtool, drop .la filesamdmi32014-08-191-0/+1
* - Move RESETPREFIX to default PLIST_SUBbdrewery2014-08-194-6/+1
* - Update to upstream release 3.11.0riggs2014-08-185-103/+37
* Mark BROKEN: Unfetchableantoine2014-08-181-0/+2
* Document the latest phpMyAdmin security advisories.matthew2014-08-181-0/+44
* - Update to 2.0.5.vsevolod2014-08-172-3/+3
* [NEW] security/py-cpe: Common Platform Enumeration (CPE) for Pythonkoobs2014-08-174-0/+37
* remove 3 ports: security/sguid-(client|sensor|server)marino2014-08-1740-1983/+0
* Add new port security/sguil (version 0.9.0)marino2014-08-1729-0/+1140
* Fix build on -current.adamw2014-08-171-0/+3
* - Abbreviate MASTER_SITESjhale2014-08-171-3/+3
* security/libfprint: Upgrade version 0.4.0 => 0.5.1marino2014-08-165-5/+38
* Upgrade OpenEXR and ilmbase to 2.2.0.mandree2014-08-163-0/+3
* Update to upstream revision 1614tijl2014-08-166-499/+185
* - Convert PYTHON_FEATURES to USE_PYTHON (which was landed several hours ago)sunpoet2014-08-151-1/+1
* - Use USES=pythonsunpoet2014-08-151-3/+2
* security/bro: Add su flags so pkg initialization worksmarino2014-08-152-12/+6
* - Upgrade to 2.0.26 (minor fixes).kuriyama2014-08-152-6/+5
* Remove DEPRECATED. People are working on this port.cs2014-08-151-2/+0
* - remove workaround for amd64dinoex2014-08-152-2/+2
* security/p5-openxpki: update to 0.20.0.1wg2014-08-144-25/+21
* security/openca-tools-forked: Tools to deal with SCEP and PKCS7 messageswg2014-08-145-0/+36
* Update 1.12.1 --> 1.12.2.cy2014-08-143-22/+13
* Revert r359770:antoine2014-08-132-3/+4
* Horde 3 has been EOLed in April 2012mm2014-08-131-0/+3
* Document new vulnerabilities in www/chromium < 36.0.1985.143rene2014-08-131-0/+36
* - unbreakcs2014-08-132-10/+63
* Update to 1.2.4.kwm2014-08-123-25/+11
* security/p5-openxpki-client-html-mason: deprecatewg2014-08-121-0/+3
* security/p5-openxpki-i18n: update to 0.20.0.1wg2014-08-123-16/+8
* security/stoken: Software Token for UNIX compatible with RSA SecurIDwg2014-08-125-0/+62
* Stage security/pks and pass maintainership to submittermarino2014-08-126-44/+202
* - fix package name s/subversion18/subversion/ohauer2014-08-121-1/+1
* - INSERT URL HEREzi2014-08-121-1/+1
* - document serf CVE-2014-3504ohauer2014-08-121-0/+36
* - document subversion CVE-2014-3522, CVE-2014-3528ohauer2014-08-121-0/+44
* Bump PORTREVISION on all ports that depend on net/GeoIP foradamw2014-08-123-1/+3
* Remove expired port:rene2014-08-125-75/+0
* - new options SSL2 SSL3dinoex2014-08-111-2/+16
* - Update The Glorious Glasgow Haskell Compiler to version 7.8.3pgj2014-08-1197-218/+501
* Update to 2.3cs2014-08-1111-129/+74
* Replace some dependencies on libtool with USES=libtool:build or atijl2014-08-111-3/+1
* Fix typo.osa2014-08-101-1/+1
* Document nginx vulnerability.osa2014-08-101-0/+31
* Convert the Python framework bits to USES=python.mva2014-08-091-1/+0
* security/pwman: 0.4.0 -> 0.4.4pi2014-08-093-12/+14
* Update to 2.4antoine2014-08-094-11/+10
* Build shared library and simplify DOCS optiontijl2014-08-093-62/+33
* - Update to 5.03zi2014-08-092-3/+3
* security/zxid: Upgrade version 1.05 => 1.18marino2014-08-088-126/+78
* - Update to 2.0.4.vsevolod2014-08-072-3/+3
* security/p5-Crypt-SMIME: fix dependency to LOCALBASEpi2014-08-071-1/+2
* Update to 1.01i.delphij2014-08-073-12/+13
* Document OpenSSL multiple vulnerabilities.delphij2014-08-071-0/+76
* security/p5-Crypt-SMIME: fix build dependspi2014-08-071-0/+6
* security/p5-GnuPG-Interface: fix BUILD/RUN dependspi2014-08-071-0/+2
* - Update to 2.34sunpoet2014-08-072-3/+3
* security/p5-openxpki-i18n: update to 0.19.0.1wg2014-08-073-6/+6
* security/p5-openxpki: update to 0.19.0.1wg2014-08-074-25/+24
* Update pgpdump to 0.29johans2014-08-062-3/+3
* Remove USE_GNOME=ltverhack because USES=libtool already handles thattijl2014-08-061-1/+1
* Mark the critical warning as an error, and bump PORTREVISION,mandree2014-08-061-1/+3
* Remove reference to my_init and my_fini. These functions were causinghrs2014-08-062-7/+13
* In some straightforward situations, protect examples behind PORTEXAMPLES,adamw2014-08-064-7/+7
* Bump PORTREVISION on more ports that depend on libgcrypt after the updatetijl2014-08-0615-14/+15
* security/p5-Crypt-SMIME: 0.13 -> 0.14pi2014-08-052-8/+3
* security/p5-openxpki-i18n: update to 0.14.0.1wg2014-08-054-27/+30
* Remove deprecated p5-openxpki ports:wg2014-08-0514-302/+0
* Un-hardcode gccadamw2014-08-051-1/+4
* - Switch to USES=libtoolamdmi32014-08-051-1/+2
* - Switch to USES=libtoolamdmi32014-08-051-1/+2
* - Add CPE supportjhale2014-08-041-1/+3
* Update to 3.16.3bapt2014-08-046-50/+10
* Document CVE-2014-4607 in net/krfb.rakuco2014-08-041-0/+32
* - rename patch filesdinoex2014-08-032-0/+0
* security/p5-openxpki-deployment: mark as deprecatedwg2014-08-031-1/+4
* security/p5-openxpki-client-scep: mark as deprecatedwg2014-08-031-0/+4
* security/p5-openxpki-client: mark as deprecatedwg2014-08-031-0/+4
* security/p5-openxpki-client-html-mason: update to 0.14.0.1wg2014-08-035-85/+76
* security/p5-openxpki: update to 0.14.0.1wg2014-08-036-408/+589
* Mark broken.mandree2014-08-031-0/+5
* security/tinyca: 0.7.5 -> 0.7.6, new distsitepi2014-08-035-12/+253
* Make sure that -export-dynamic is passed to the linker.mandree2014-08-032-3/+6
* Enable WITH_DEBUG=yes.mandree2014-08-031-2/+4
* devel/security: re-add .la filepi2014-08-032-3/+3
* - Document net/samba4* vulnerability: CVE-2014-3560zi2014-08-021-0/+33
* - Add LICENSEsunpoet2014-08-021-2/+4
* - Update to 1.5.1jhale2014-08-023-5/+5
* - Document vulnerability in security/gpgme (CVE-2014-3564)jhale2014-08-021-0/+27
* - Use USES=twistedsunpoet2014-08-021-4/+2
* Add CPEcs2014-08-012-2/+4
* security/libgcrypt: avoid non-portable use of assembler instruction on amd64pi2014-08-011-0/+2
* Update to 20140727antoine2014-08-012-4/+6
* Stage and unbreak by adding missing headers and removing the MD2 code.adamw2014-08-019-26/+58
* Document x11/kdelibs4 vulnerabilityrakuco2014-07-311-0/+30
* - Add LICENSEsunpoet2014-07-313-17/+20
* - Add LICENSEsunpoet2014-07-313-10/+13
* tor -- traffic confirmation attackcs2014-07-311-0/+36
* security/p5-Crypt-SMIME: fix lib and build dependspi2014-07-311-0/+5
* Specify the libkrb5 abi version, otherwise, LIB_DEPEDNS finds it from base, andmat2014-07-301-1/+1
* security/cryptopp: Add patch from pkgsrcmarino2014-07-302-1/+30
* security/libgcrypt: 1.5.3_3 -> 1.6.1pi2014-07-3030-203/+207