aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Adjust for usage of new MASTER_SITE_SAMBAtimur2012-10-221-1/+1
* Document multiple wireshark vulnerabilities.wxs2012-10-221-0/+50
* Update to 4.4.0.rakuco2012-10-212-4/+4
* Make works with perl5.16sumikawa2012-10-212-1/+19
* - Add upstream patch to fix CPU consumption and termination bugjhale2012-10-202-6/+14
* - Update MASTER_SITESjhale2012-10-201-11/+7
* - drop maintainershipdinoex2012-10-191-1/+1
* - drop maintainershipdinoex2012-10-191-1/+1
* - clarify end-user impact for 57652765-18aa-11e2-8382-00a0d181e71djgh2012-10-181-11/+4
* - document xlockmore issue, 57652765-18aa-11e2-8382-00a0d181e71d, CVE-2012-4524jgh2012-10-181-0/+37
* - Converted a remaining conditional to OptionsNGglarkin2012-10-181-1/+1
* - Updated to 1.3.15glarkin2012-10-183-31/+29
* - Update to 2.3.15sem2012-10-182-4/+5
* - xinetd vulnerabilitysem2012-10-181-0/+33
* sha3 wrapper (keccak) for Python. The package is a wrapper around therm2012-10-175-0/+57
* - Updated ZF advisory to include similar XEE vulnerabilityglarkin2012-10-161-4/+12
* - Document Zend Framework XXE injection vulnerabilityglarkin2012-10-161-0/+35
* - Add missing dependency on perlkevlo2012-10-161-9/+4
* Update the distinfo as upstream has changed.eadler2012-10-161-2/+2
* - Make as BROKEN: missing prerequisitesbeat2012-10-161-0/+2
* Add the CVE for the gitolite vuln.eadler2012-10-161-0/+1
* - Actually commit the VuXML entryswills2012-10-161-0/+33
* disable SQLite support for the time being (no child port exists)oliver2012-10-151-1/+2
* Document the latest security vulnerabilities for phpMyAdmin.matthew2012-10-151-0/+36
* - Add in additional package names for recent bind vulnerabilityzi2012-10-141-0/+16
* update to 0.65.0oliver2012-10-144-31/+44
* - Update to 0.4.4tota2012-10-142-7/+4
* - Fix mistakenly expanded variable substitutiongabor2012-10-141-1/+1
* - Let amavisd_ram respect tmpfs [1]gabor2012-10-143-11/+4
* Convert to OptionsNGeadler2012-10-141-35/+32
* - cleanup commentsdinoex2012-10-135-25/+0
* Update to 1.4.20arved2012-10-132-3/+6
* - As pulledpork/barnyard are required for most installations, depend on these...zi2012-10-131-2/+13
* - Update to 1.10jhale2012-10-127-242/+76
* - Update to 20120831 snapshot [1]bdrewery2012-10-122-9/+4
* - Update to latest snapshot [1]bdrewery2012-10-124-15/+10
* - Properly install symlinks for auth-pam and down-root plugins [1]bdrewery2012-10-123-9/+6
* - update to 16.0.1flo2012-10-121-9/+18
* Update to 2.0.0 release:ale2012-10-113-8/+94
* If OPIE option is on we can not pass --with-pam in CONFIGURE_ARGS. Make itwxs2012-10-112-16/+8
* Document a new vulnerability in www/chromium < 22.0.1229.94rene2012-10-111-0/+27
* - Update firefox-esr, thunderbird-esr, linux-firefox and linux-thunderbird to...flo2012-10-115-5/+124
* - Remove SITE_PERL from *_DEPENDS (final part)az2012-10-111-4/+2
* - Update to 2.0.3jhale2012-10-102-14/+7
* - Take maintainershipjhale2012-10-101-2/+1
* Upgrade to the latest BIND patch level:erwin2012-10-101-0/+38
* - Update to 1.3.2zi2012-10-104-6/+58
* - Add additional MASTER_SITES for pkcs header files.zi2012-10-101-1/+2
* - Update to 4.54zi2012-10-102-3/+3
* Force numerous ports that fail to build with clang over to instead alwayslinimon2012-10-101-0/+1
* - Fix Makefile headersbz2012-10-091-1/+1
* - Update MASTER_SITESsbz2012-10-091-9/+5
* Add a few casts to initializer of int array when the constant is greaterdelphij2012-10-092-5/+21
* Document new vulnerabilities in www/chromium < 22.0.1229.92rene2012-10-091-0/+40
* Throw my ports back in the pool, and make my intentions clear for thedougb2012-10-084-9/+6
* - Fix logic problemsbz2012-10-081-1/+1
* - Convert to new option frameworksbz2012-10-082-33/+19
* - Fix typojhale2012-10-081-1/+1
* - Update to 0.4.5 [1]jhale2012-10-083-11/+23
* Restore option descriptions to what the maintainer actually put in the PRdougb2012-10-081-0/+5
* silence reinplace command from last commitdougb2012-10-081-1/+1
* - Convert to new options frameworksbz2012-10-071-13/+11
* Work around a problem on stable/[89] with libotr generating andougb2012-10-072-4/+9
* use libtommath as default math library as it used to be before conversion tobapt2012-10-071-0/+1
* Convert to OptionsNGeadler2012-10-071-17/+12
* Trim the headers in the ports I maintain.eadler2012-10-061-5/+0
* Change headers of all ports maintained by me to new formatgarga2012-10-057-35/+6
* - Updated to 1.3.0glarkin2012-10-052-6/+6
* - Make GMP OPTION'aljgh2012-10-054-13/+68
* Convert to new options frameworkbapt2012-10-048-91/+52
* - fix runtime when devel/subversion and/or devel/pysvn is installed [1]rm2012-10-042-9/+19
* - correct the range in last entry (le/lt typo)rm2012-10-031-1/+1
* - update to 2.8.10rm2012-10-031-0/+36
* - Update to 1.8.0sbz2012-10-034-16/+11
* - Update to 20121001 snapshotjlaffaye2012-10-033-12/+81
* - set maintainer to ruby@jgh2012-10-031-5/+1
* - Fix typos (LICENSE is correct form inside bsd.licenses.mk).az2012-10-031-1/+1
* - Fix header to proper formatbdrewery2012-10-012-2/+2
* - pass maintainership to new volonteerrm2012-09-302-12/+4
* - Reassign to the heap due to mail bouncestabthorpe2012-09-301-6/+2
* - Update to 201237 snapshot [1]bdrewery2012-09-294-31/+43
* - Update to 2.3-beta1 [1]bdrewery2012-09-296-132/+68
* Fix type in headedbapt2012-09-281-1/+1
* Mark nvidia-driver-173.14.35_1 as not vulnerable.danfe2012-09-281-1/+1
* Fix the temporary workaround by passing the appropriate flag inwxs2012-09-271-9/+3
* Fix build on i386 by disabling hardening measures. This is a temporarywxs2012-09-271-2/+10
* Document vulnerabilities in www/chromium < 22.0.1229.79rene2012-09-271-0/+96
* - Chase www/smarty -> www/smarty2 renameglarkin2012-09-271-2/+2
* - Document remote code execution in ePerl (all versions)glarkin2012-09-261-0/+36
* - Update to 5.72culot2012-09-262-8/+7
* Enable the Berkley DB backend by default.zeising2012-09-261-2/+2
* - Update to 2.15culot2012-09-262-8/+7
* - Update MASTER_SITES and WWW linkculot2012-09-262-8/+8
* Convert to OptionsNGbapt2012-09-261-14/+11
* Update to 1.8.6p3wxs2012-09-263-3/+8
* - Documented PNG file DoS vulnerability in ImageMagick and GraphicsMagickglarkin2012-09-261-0/+49
* - Reassign to the heap at maintainer's requesttabthorpe2012-09-252-12/+4
* - Update to v12.09.12 releaseale2012-09-247-40/+67
* - Adjust "Created by" tag to include more complete submitter's informationdanfe2012-09-231-3/+3
* - Fix spelling in docs: normally I'd submit this change upstream, butmatthew2012-09-235-16/+33
* Update vuxml to indicate which versions are vulnerable.eadler2012-09-231-1/+3
* Deprecate a bunch a ports with no more public distfiles (thanks ehaupt's dist...bapt2012-09-219-0/+27
* Add a sourceforge mirrorbapt2012-09-211-6/+3
* - Update php52 backports patch to 20120911bdrewery2012-09-201-2/+86
* - CVE-2012-2688 was addressed by php52-5.2.17_10bdrewery2012-09-201-1/+2
* Update to 0.12.6 release.ale2012-09-192-8/+3
* Upgrade to the latest BIND patch level:dougb2012-09-191-0/+47
* - Add missing dependency on bisonkevlo2012-09-181-2/+3
* Update to 20120917garga2012-09-182-3/+3
* Update to 0.97.6garga2012-09-182-4/+3
* Document Jenkins Security Advisory 2012-09-17lwhsu2012-09-181-0/+41
* Point shebang in a perl script to ${PERL} in order to solve a build problem ifehaupt2012-09-161-0/+1
* include newly 'awarded' CVEeadler2012-09-161-0/+1
* Add vuxml for older versions of multimedia/vlc .nox2012-09-161-0/+30
* Tell the world about the recent bacula vulneadler2012-09-151-0/+31
* - chase textproc/nltk update (upstream switched to setuptools)rm2012-09-141-1/+2
* - Update to 2.16jadawin2012-09-132-3/+3
* - Update MAINTAINER to my new FreeBSD.org addressjhale2012-09-132-2/+2
* update security/tor to 0.2.2.39 and security/tor-devel to 0.2.3.22-rcbf2012-09-134-6/+6
* - Update to 0.10.22.6 which fixes two security issuesswills2012-09-131-0/+50
* update lang/sbcl to 1.0.58 and switch to the new options format;bf2012-09-131-1/+1
* Update to 2.0; with some help from rm@kevlo2012-09-123-201/+250
* Update NVIDIA arbitrary memory access vulnerability with CVE-2012-4225.danfe2012-09-121-2/+16
* Update Plone to 4.2.1.rm2012-09-127-23/+14
* - Update entry for net/freeradius2 to reflect local patch to address cve-2012...zi2012-09-111-1/+2
* VuXML: document remote code execution in freeRADIUSrea2012-09-111-0/+47
* www/moinmoin: fix CVE-2012-4404, wrong processing of group ACLsrea2012-09-111-1/+2
* - Move libxul 1.9.2 to www/libxul19beat2012-09-111-2/+2
* Update to 0.14.novel2012-09-112-3/+3
* - Add Emacs 24 to IGNORE listebeat2012-09-101-2/+2
* - Use OPTIONSngehaupt2012-09-101-15/+13
* update to 0.2.3.21-rcbf2012-09-092-3/+3
* Welcome back Chris Petrik <c.petrik.sosa@gmail.com>eadler2012-09-091-1/+1
* - Update to 0.13swills2012-09-093-5/+4
* - Remove dependency on p5-Devel-Mallinfoswills2012-09-091-1/+3
* - Update to 1.09swills2012-09-082-4/+3
* Update libotr and pidgin-otr to 4.0.0dougb2012-09-086-28/+24
* Hook security/libotr3 up, and move ports that depend on the old versiondougb2012-09-084-15/+10
* Mark as broken on sparc64.linimon2012-09-081-1/+7
* Copy libotr to libotr3 so that ports that still rely on the old,dougb2012-09-084-0/+81
* Add vim specific modeline to help users write correct vuxmleadler2012-09-081-0/+1
* Document the vulnerability that led to emacs 24.2rakuco2012-09-081-0/+40
* - Update firefox to 15.0.1flo2012-09-082-9/+15
* Add a sanity check to ensure vuxml is actually installed prior to performingeadler2012-09-081-0/+5
* - Update to 3.4.2 [1] [2] [3]swills2012-09-081-0/+29
* Mark as broken on powerpc only on -current. This will unblock gnome,linimon2012-09-081-0/+3
* Update to 20120906garga2012-09-072-3/+3
* VuXML: add <modified> tag for Wireshark's entry for CVE-2012-3548rea2012-09-061-0/+1
* - Update to 4.07zi2012-09-062-3/+3
* - Update to 1.3.1zi2012-09-062-4/+3
* - Add in workaround for compatibility with libhtp >= 0.3zi2012-09-062-0/+12
* Change the wireshark version for the DRDA fix.marcus2012-09-061-4/+4
* Remove useless metadata from ports I created.des2012-09-051-5/+0
* Update 0.13.1 --> 0.15.1cy2012-09-052-4/+3
* - Update to 0.23culot2012-09-052-3/+3
* VuXML: document XSS in MoinMoin before 1.9.4 via RST parserrea2012-09-051-0/+32
* VuXML: document wrong group ACL processing in MoinMoinrea2012-09-051-0/+44
* PHP 5.x: document header splitting vulnerabilityrea2012-09-051-0/+43
* Modify fetchmail vuln' URLs to established site.mandree2012-09-051-23/+24
* Chase Emacs updatesashish2012-09-052-2/+2
* security/squidclamav: fix DoS and XSS vulnerabilitiesrea2012-09-044-1/+198
* Mark as broken on powerpc and sparc64 (and, presumably, ia64).linimon2012-09-042-1/+11
* - Add patch to fix getsubopt() parsingjohans2012-09-022-7/+257
* Inform the community about a recent bitcoin DoS vuln.eadler2012-09-021-0/+26
* - update bugzilla bugzilla3 and bugzilla42ohauer2012-09-021-0/+50
* VuXML: document CVE-2012-3534, DoS via large number of connectionsrea2012-09-021-0/+31
* vuxml matches on PKGNAME, not on the port directory.eadler2012-09-021-5/+2
* Add "modified" tag to the Java 7 entryrea2012-09-021-0/+1
* - Update www/mediawiki to 1.19.2wen2012-09-011-0/+67
* VuXML: update Java 7 entry with Oracle-provided detailsrea2012-09-011-2/+3
* Tidy up paragraph formatting (it passed "make validate" before).mandree2012-08-311-10/+8
* VuXML: document CVE-2012-3548, DoS in Wiresharkrea2012-08-311-0/+45
* Document vulnerabilities in www/chromium < 21.0.1180.89rene2012-08-311-0/+47
* - Update net/asterisk to 1.8.15.1flo2012-08-311-1/+37
* Update to 1.11skreuzer2012-08-312-3/+3
* - update firefox and thunderbird to 15.0flo2012-08-308-26/+159
* - Update to 1.5.20jase2012-08-301-0/+34
* VuXML: document CVE-2012-4681, security manager bypass in Java 7.xrea2012-08-301-0/+49
* Add a vuln' entry for fetchmail's CVE-2011-3389 vulnerability.mandree2012-08-301-1/+35
* - Fix duplicated flagssbz2012-08-292-1/+1
* - Update to 0.04swills2012-08-282-3/+3
* Update fetchmail to 6.3.21_1, fixing CVE-2012-3482.mandree2012-08-281-1/+2
* - fix commentdinoex2012-08-271-1/+1
* VuXML entry c906e0a4-efa6-11e1-8fbf-001b77d09812: fix port epochrea2012-08-271-1/+1
* VuXML: document XSS in RoundCube Web-mail applicationrea2012-08-271-0/+29
* - Update to 0.121930swills2012-08-272-3/+3
* news/inn: fix plaintext command injection, CVE-2012-3523rea2012-08-271-1/+1
* update security/tor to 0.2.2.38 and security/tor-devel to 0.2.3.20-rcbf2012-08-264-9/+7
* - Document Calligra input validation failure.avilla2012-08-261-0/+40
* - Document that CVE-2012-3386 only affects automake >= 1.5.0bdrewery2012-08-261-2/+2
* VuXML: document cross-site scripting in SquidClamavrea2012-08-251-0/+32
* VuXML: document DoS in SquidGuardrea2012-08-251-0/+35
* - Properly define deprecated functions to remove warnings in othernovel2012-08-253-4/+21
* VuXML: document INN plaintext command injection vulnerabilityrea2012-08-251-0/+33
* - Reset maintainer due to mail bouncestabthorpe2012-08-241-1/+1
* Update to 1.12.5 release.ale2012-08-232-3/+3
* Upgrade to 4.41.tj2012-08-233-5/+9
* VuXML: document CVE-2012-3525 in jabberd 2.xrea2012-08-231-0/+33
* VuXML: fix whitespace in my previous rssh entryrea2012-08-231-2/+1
* VuXML: document rssh vulnerabilities fixed in version 2.3.3rea2012-08-231-0/+35
* Fix problem introduced in r302141. The directory for the unpacked sourcedougb2012-08-222-2/+6
* rssh: document arbitrary code execution, CVE-2012-3478rea2012-08-221-0/+33
* - Mark BROKEN: does not configurebeat2012-08-221-0/+2
* Update to v1.2.3.hrs2012-08-202-3/+3
* Put libotr entry back. I added the cited URL to the references.wxs2012-08-201-0/+39
* Remove the improperly formatted libotr entry. Someone with more knowledgedougb2012-08-201-38/+0
* - remove www/apache20 and devel/apr0ohauer2012-08-184-5/+6
* 14 August 2012 libotr version 3.2.1 releaseddougb2012-08-183-12/+49
* Document OpenTTD DoS.wxs2012-08-181-0/+27
* Document multiple wireshark vulnerabilities.wxs2012-08-181-0/+87
* The PostgreSQL Global Development Group today released security updates for a...jgh2012-08-181-0/+46
* Update to 1.8.5p3wxs2012-08-182-3/+3
* - dictionary.rfc2869 was missed from installation.az2012-08-172-0/+3
* Document the latest phpMyAdmin vulnerability PMSA-2012-4matthew2012-08-171-0/+37
* Update to 20120815garga2012-08-162-3/+3
* - Update www/typo3 to 4.7.4 [1]bdrewery2012-08-161-0/+50
* - Reassign nork@ ports to the heaptabthorpe2012-08-165-5/+5
* - Drop automatic dependency detection [1]novel2012-08-151-9/+13
* Document CVE-2012-3482 for fetchmail, one DoS and one information disclosuremandree2012-08-151-0/+31
* - Reassign ports to the heap due to a mail bouncetabthorpe2012-08-154-4/+4
* - Update to 0.3.0sbz2012-08-144-32/+37
* - Update security/gpa to 0.9.3 bugfix releasescheidell2012-08-142-9/+13
* Belatedly add an entry for the recent IcedTea-Web updates.jkim2012-08-141-0/+49
* Import Zope 2.13.16 and update this release required dependencies:rm2012-08-142-5/+5
* Revert previous tty patch until matured.kuriyama2012-08-132-37/+1
* - Update to 1.6.1wen2012-08-122-4/+4
* Document libcloud MITM vuln.novel2012-08-121-0/+31
* Fix post r302141: The files in USE_RC_SUBR are already included in SUB_FILESdougb2012-08-111-3/+1
* Document the latest phpmyadmin security problem.matthew2012-08-111-0/+28
* - Document vulnerabilities in www/chromium 20.0.1132.57 and 21.0.1180.60.rene2012-08-101-0/+110
* Document two vulnerabilities in www/chromium < 21.0.1180.75 related to therene2012-08-101-0/+32
* - Update rails and friends to 3.2.8swills2012-08-101-0/+45
* - Update to 2.9.3.1zi2012-08-102-5/+3
* Secunia Advisory SA38292, ISS X-Force sudosh-replay-bo (55903), replay() func...cy2012-08-101-0/+2
* Document old sudosh buffer overflow.wxs2012-08-091-0/+36
* Fix up whitespace in 10f38033-e006-11e1-9304-000000000000.wxs2012-08-071-9/+12
* - Disable live tests (without prompt)sunpoet2012-08-071-1/+5
* - Document FreeBSD-SA-12:05.bindzi2012-08-071-0/+35
* Document CVE-2012-3386 for devel/automakebdrewery2012-08-071-0/+35
* - Update to 0.64sunpoet2012-08-072-5/+4
* - Copy ruby-hmac to rubygem-hmac for use with ports that depend on the gemswills2012-08-064-0/+35
* Fix what looks like a copy-paste-o that originated in the same script:dougb2012-08-062-2/+4
* Move the rc.d scripts of the form *.sh.in to *.indougb2012-08-0665-47/+53
* When installing in the base, USE_RCORDER does the right thing withoutdougb2012-08-061-10/+2
* - Convert to OptionsNG.kuriyama2012-08-054-60/+112
* Add py-passlib 1.6, python password hashing framework supporting over 30miwi2012-08-056-0/+263
* - Update to 1.0.0miwi2012-08-052-3/+3
* - update to 1.0.19dinoex2012-08-042-3/+3
* Remove unecessary OPTIONS_DEFAULT definitions added on r301957garga2012-08-044-4/+0
* Fix typos and make small modifications in COMMENT (according to Porter'scs2012-08-038-8/+8