aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Update to 0.6.1tota2013-01-232-4/+3
* Bump PORTREVISION after DESKTOP_ENTRIES updatemakc2013-01-232-2/+2
* Document vulnerabilities in www/chromium < 24.0.1312.56rene2013-01-231-0/+37
* - Update DESKTOP_ENTRIES:makc2013-01-232-5/+5
* Update to 2.0.2 release.ale2013-01-222-5/+5
* Update 1.10.3 --> 1.11cy2013-01-227-108/+44
* - Update to 1.2culot2013-01-213-18/+58
* - update www/drupal6 to 6.28flo2013-01-211-0/+31
* - Convert to new option frameworksbz2013-01-212-19/+18
* - Update to 5.81ashish2013-01-212-4/+4
* - When installing from port, do not tamper with permissions of other filesmandree2013-01-201-5/+5
* Update to 5.81.tobez2013-01-182-3/+3
* - Assign back to the poolculot2013-01-181-1/+1
* - Fix NOPORTDOCS regression [1], by installing to DESTDIR= and then installin...mandree2013-01-182-69/+31
* - Update Nettle to 2.6johans2013-01-183-11/+11
* VuXML: add newly-allocated CVE for SQUID-2012:1rea2013-01-171-0/+1
* VuXML: document buffer overflow in ettercap (CVE-2013-0722)rea2013-01-171-0/+32
* VuXML: document recent security manager bypass in Java 7.xrea2013-01-171-0/+91
* - Updated to 2.7 (ChangeLog: http://www.ossec.net/?p=577)glarkin2013-01-1710-60/+66
* Update to 1.8.6.p4.wxs2013-01-162-14/+5
* update to 0.2.4.9-alphabf2013-01-162-8/+4
* Properly limit the match for PHP 5.3.x and 5.2.x versions.delphij2013-01-161-2/+2
* Apply version ranges of php53 and php52 to php5 as well.delphij2013-01-161-1/+3
* - Use DOC instead of NOPORTDOCSehaupt2013-01-157-38/+38
* - update to 7.4.2rm2013-01-142-3/+3
* - connect easy-rsa (lost in r310340)ohauer2013-01-141-0/+1
* - Fix build for FreeBSD-7.4ohauer2013-01-142-1/+17
* Add a new security/easy-rsa package that contains the bits that gotmandree2013-01-145-4/+61
* Update to 20130113garga2013-01-142-3/+3
* OpenVPN changes, upgrades and fixes:mandree2013-01-1219-97/+478
* - drop PKGNAMEPREFIX (it's an app, not library)rm2013-01-122-1/+41
* - Fix discovery date on nagios vulnerability (CVE-2012-6096)zi2013-01-111-1/+1
* www/squid3x: upgrade to 3.1.23 and 3.2.6rea2013-01-111-3/+4
* - Document vulnerability in net-mgmt/nagios (CVE-2012-6096)zi2013-01-111-0/+28
* Document vulnerabilities in www/chromium < 24.0.1312.52rene2013-01-111-0/+100
* Update Horde Groupware to 5.0.3:mm2013-01-112-3/+3
* Horde maintenance update to following new versions:mm2013-01-108-12/+12
* Update to 1.52.tobez2013-01-102-3/+3
* Assign maintainership to Craig Leres.kevlo2013-01-101-1/+1
* - update firefox, thunderbird, linux-firefox and linux-thunderbird to 17.0.2flo2013-01-103-10/+134
* - Change MAINTAINER addresstabthorpe2013-01-105-25/+9
* Fix <topic> style: common dash style, remove softvare versionssem2013-01-091-14/+14
* - Convert to new option frameworksbz2013-01-092-12/+7
* Convert vanhu@ ports to new options frameworkbapt2013-01-091-38/+36
* - Update rubygem-rails to 3.2.11swills2013-01-091-0/+91
* Update to 20130108garga2013-01-092-3/+3
* - Properly copy namespace attributes/resolve make validate issueszi2013-01-091-18/+5
* Don't search lib32 on FreeBSD/i386.ume2013-01-083-0/+3
* Document Jenkins 2013-01-04 Security Advisorylwhsu2013-01-081-0/+39
* - update security/rubygem-net-ssh to 2.2.2,2 [1]jgh2013-01-082-9/+11
* Update to 3.0.9.lx2013-01-082-4/+3
* - Update to 5.0.1tota2013-01-075-84/+106
* - Update to 1.3zi2013-01-072-8/+7
* VuXML: extend entry for MoinMoin vulnerabilities fixed in 1.9.6rea2013-01-071-11/+30
* - update nmap to version 6.25ohauer2013-01-076-13/+161
* Document Django 2012-12-10 vulnerabiltylwhsu2013-01-071-0/+74
* If security/krb5 is installed and OPENLDAP option is enabled, itume2013-01-071-2/+8
* Use proper krb5-config when using HEIMDAL in ports.ume2013-01-072-17/+33
* VuXML: fix r309982rea2013-01-061-3/+3
* VuXML for MoinMoin issues: add CVE referencesrea2013-01-061-0/+4
* Bump PORTREVISION, to get the ports rebuilt with ${CC}.mandree2013-01-061-1/+1
* - Convert to Options NG. Renames GTK option to GTK2 for consistency.mandree2013-01-061-10/+11
* - Convert to OptionsNGmandree2013-01-062-23/+24
* Update to 3.14.1.with.ckbi.1.93flo2013-01-064-10/+13
* When building with security/krb5 (specifying KRB5_HOME), makeume2013-01-062-0/+2
* Update SKS to 1.1.4johans2013-01-054-19/+19
* update lang/sbcl to 1.1.3 and adjust dependent portsbf2013-01-051-5/+2
* Freetype 2.4.8 vulnerabilities were already documented.crees2013-01-051-22/+2
* Mark moinmoin vulnerablecrees2013-01-051-0/+83
* - update to 6.25rm2013-01-053-6/+11
* update the R base ports to 2.15.2 and adjust dependent portsbf2013-01-052-0/+2
* Bump copyright to 2013.erwin2013-01-041-1/+1
* Add correct version numbers to the recent asterisk entryflo2013-01-041-2/+2
* - update net/asterisk to 1.8.19.1flo2013-01-041-0/+38
* Note charybdis and ircd-ratbox vulnerabilitiescrees2013-01-021-0/+32
* Disable PIE on ia64. This was causing a run-time failure.wxs2013-01-021-0/+4
* Convert to optionsngbapt2012-12-311-4/+4
* Remove useless LICENSE_FILEbapt2012-12-312-2/+1
* - enclose email in header into proper bracketsrm2012-12-311-1/+1
* - update to 7.4.1rm2012-12-314-18/+12
* Separate entries for Puppet 2.6 and 2.7.anders2012-12-311-2/+35
* update to 0.2.4.7-alpha; remove some stale mirrorsbf2012-12-313-7/+4
* - Update to version 2.3.1pawel2012-12-316-19/+18
* Add OTRS vulnerabilitiescs2012-12-311-0/+91
* - Back to poolbeat2012-12-301-1/+1
* - Deprecate QT3, KDE3 and unmaintained ports depending on them. QT 3.3.8beat2012-12-301-0/+3
* VuXML entries for Tomcat: split into three distinct onesrea2012-12-301-15/+73
* - Reassign to the heap at maintainer's requesttabthorpe2012-12-291-6/+2
* Update to 4.01. Note that the ~/.csshrc file is deprecated for the ~/.cluster...lx2012-12-293-13/+29
* VuXML: add entry for DoS in Squid's cachemgr.cgirea2012-12-291-0/+35
* Mark cyrus-sasl2 as MAKE_JOBS_SAFE.ume2012-12-273-0/+6
* - Fix with NOPORTDOCS=yes [1,2]kuriyama2012-12-272-38/+33
* - Fix build on more recent current.kuriyama2012-12-271-3/+7
* Update CyaSSL to 2.4.6johans2012-12-273-7/+8
* Add upstream commit to define size_t in sasl.h.ume2012-12-262-1/+24
* - Update to 0.5.0ak2012-12-252-3/+4
* - Update to 2.03 [1]ak2012-12-253-20/+9
* - Update to 2.3_rc2beech2012-12-232-4/+3
* use USE_CSTD instead of manually setting CFLAGSoliver2012-12-211-2/+2
* - Upgrade to 1.4.13 (minor bugfixes).kuriyama2012-12-214-33/+29
* rifiuti2 is a rewrite of rifiuti, a great tool from Foundstone folkspawel2012-12-214-0/+51
* Update Zope to 2.13.19 along with required dependencies:rm2012-12-202-8/+3
* - Update MASTER_SITES.araujo2012-12-202-20/+39
* - Update MASTER_SITES and WWW line.araujo2012-12-201-17/+24
* - Update The Glorious Glasgow Haskell Compiler to version 7.4.2pgj2012-12-2064-247/+139
* - Update to 2.4.0johans2012-12-203-58/+58
* - xnmap.1 manpage is not installledpawel2012-12-203-32/+45
* fix clang buildoliver2012-12-201-0/+1
* Chase icu, graphite2 and libexttextcat bumpbapt2012-12-191-0/+1
* Update to 201250 snapshotjpaetzel2012-12-192-3/+3
* Remove invalid entrybdrewery2012-12-191-22/+0
* - add entry for opera 12.11dinoex2012-12-191-0/+56
* - Update to 2.8.22sbz2012-12-183-13/+17
* Drop support for perl 5.8.tobez2012-12-181-12/+3
* Update to 1.51.tobez2012-12-182-3/+3
* Update to 0.70.tobez2012-12-182-4/+3
* Update to 2.32.tobez2012-12-182-3/+3
* Minor enhancements:wxs2012-12-185-5/+57
* Update to 1.6.2.wxs2012-12-185-27/+30
* This PAM service module allows PAM-enabled applications to check ifpawel2012-12-174-0/+31
* - Fix WWW linegarga2012-12-172-14/+14
* Update to 5.80.tobez2012-12-172-3/+3
* Ops, change logic as it shoud beaz2012-12-171-2/+1
* Cleanup supporting perl version 5.8 and 5.10,az2012-12-178-63/+8
* Convert miwi's ports to new Options frameworkbapt2012-12-175-91/+76
* Convert to new options frameworkbapt2012-12-171-16/+10
* Rename package names for horde3 ports to horde3-*mm2012-12-161-1/+1
* - Set default perl version for ports which currently usingaz2012-12-166-6/+4
* update sbcl to 1.1.2 and maxima to 5.29.1; adjust dependent portsbf2012-12-161-1/+1
* Bump ports affected by security/libprelude updatepawel2012-12-162-11/+5
* Update Prelude-IDS ports to 1.0.1 releasepawel2012-12-1615-164/+191
* - Use OPTIONS_RADIO and OPTIONS_GROUP.ume2012-12-161-27/+20
* - Update to 2.4.1zi2012-12-158-87/+44
* - Update to 2.10bzi2012-12-157-30/+43
* - introduce a USE_FUSE macroflo2012-12-141-5/+3
* Fix typo.delphij2012-12-141-1/+1
* - add url block in references for 1657a3e6-4585-11e2-a396-10bf48230856jgh2012-12-141-0/+1
* Update linux-f10-flashpulgin11 to 11.2r202.258 to address multipledelphij2012-12-141-0/+28
* - Chase graphics/ImageMagick updatebdrewery2012-12-141-6/+2
* Update maintainer address.wxs2012-12-132-11/+1
* - Update to 4.5.0beech2012-12-132-3/+3
* Fix FreeBSD 8.X compile issue discussed in aide mailing listcy2012-12-133-0/+27
* Remove the header for ports I created.wxs2012-12-132-10/+0
* Update horde4 packages and applications to horde5mm2012-12-1212-29/+44
* Horde Blowfish Encryption Librarymm2012-12-124-0/+40
* Rename old horde applications to horde3- prefixmm2012-12-125-2/+2
* Document vulnerabilities in www/chromium < 23.0.1271.97rene2012-12-121-0/+43
* - Update to 1.81jadawin2012-12-122-3/+3
* Commit the patch that was forgotten when myume2012-12-112-1/+14
* Update PCRE to 8.32mm2012-12-1113-13/+19
* Update cyrus-sasl2 to 2.1.26.ume2012-12-1013-148/+29
* Decommissioning java 1.5 (EOLed since October 2009):bapt2012-12-105-20/+8
* Update to 1.4.21arved2012-12-102-3/+3
* - Fix build with clangbeech2012-12-103-41/+28
* - Convert Makefile headers to new styleak2012-12-102-8/+8
* Revert Chris Petrik's ports to the pool. Thank you for all your work so far,...eadler2012-12-103-3/+3
* Upgrade to 4.43tj2012-12-093-3/+5
* - Update MASTER_SITESbeech2012-12-082-11/+19
* - Reset MAINTAINER on ports with addresses that have unrecoverable bounces.zi2012-12-071-1/+1
* Add missing patch.kevlo2012-12-061-0/+14
* - Fix recent vulnerability entry for www/tomcat[67]zi2012-12-061-1/+1
* - Update mirror site for HPN patchbdrewery2012-12-061-1/+1
* - Document recent vulnerabilities in www/tomcat6 and www/tomcat7zi2012-12-061-0/+43
* - update to 1.10, trim historical headerjgh2012-12-063-24/+21
* Update to 0.13.0 release.ale2012-12-055-36/+78
* Update to the latest patch level from ISC:erwin2012-12-051-0/+42
* - Update to 2.33sunpoet2012-12-052-8/+4
* - Reset MAINTAINER due to unrecoverable bouncezi2012-12-051-1/+1
* - Update to 2.9.4zi2012-12-053-5/+8
* - Update to 1.80jadawin2012-12-042-3/+3
* - update to 1.3.4rm2012-12-042-10/+6
* Add URL for recent bogofilter heap vuln', CVE-2012-5468, aka. vuln vid=mandree2012-12-041-0/+1
* - revert PORTDOCS change from r308105 - it made this port not DOCS-saferm2012-12-042-8/+1
* Update bogofilter to new upstream release 1.2.3.mandree2012-12-041-0/+25
* - set explicit value for StartupNotify in DESKTOP_ENTRIESrm2012-12-031-1/+1
* Update to 2.1.kevlo2012-12-033-9/+43
* - Update to 1.4.3sbz2012-12-032-4/+3
* - pass maintainership to submitterrm2012-12-024-16/+26
* - update to 1.11rm2012-12-026-48/+90
* - fix wording of "RUN_DEPENDS"rm2012-12-023-4/+4
* - correct displaying of pkg-messagerm2012-12-023-10/+8
* - Update to version 6.01sperber2012-12-013-156/+138
* - Update to version 3.3sperber2012-12-014-52/+97
* Fix compilation with clang on headbapt2012-11-301-13/+2
* Document vulnerabilities in www/chromium < 23.0.1271.95rene2012-11-301-0/+30
* The Volatility Framework is a completely open collection of tools, implementedsbz2012-11-305-0/+695
* www/yahoo-uiohauer2012-11-301-2/+2
* Supplemental plugins for Harlan Carvey's RegRipper.pawel2012-11-305-0/+276
* RegRipper is an open source tool, written in Perl, for extracting/parsingpawel2012-11-304-0/+41
* - Update to 0.46culot2012-11-302-10/+5
* Fix date in yahoo-ui entry.wxs2012-11-281-1/+2
* 2012-11-28 editors/glimmer: Depends on the expired gtkglarea through py-gtkbapt2012-11-2818-680/+0
* Update to 2.0.3.rakuco2012-11-2820-555/+68
* - document www/yahoo-ui security issue and mark port forbidden [1]ohauer2012-11-281-1/+38
* Describe new vulnerabilities in www/chromium < 23.0.1271.91rene2012-11-271-0/+42
* - Update to 0.6.0tota2012-11-273-10/+5
* - Update to 1.2.3jase2012-11-275-33/+38
* Update to 5.74.tobez2012-11-262-3/+3
* Update to 1.5.3 release.ale2012-11-262-10/+5
* - Update backports patch to 20121114flo2012-11-251-7/+2
* Add entries for the following advisories:wxs2012-11-251-0/+91
* - Update to 0.8.7.1swills2012-11-244-16/+37
* - Remove hardcoded dependency on security/gpg. Instead, add OPTIONS to allowjase2012-11-231-2/+18
* - opera -- execution of arbitrary codedinoex2012-11-231-0/+34
* update to 0.2.4.6-alphabf2012-11-222-8/+11
* Update to 3.0.8, unbreak with utmpx.lx2012-11-223-4/+19
* Document new vulnerability in www/lighttpd 1.4.31mm2012-11-211-0/+32
* - Update firefox and thunderbird to 17.0flo2012-11-211-0/+119
* update to 0.2.3.25bf2012-11-204-39/+73
* Update to 20121120garga2012-11-202-3/+3
* - Update to 0.14culot2012-11-192-8/+7
* - Update to 2.31culot2012-11-192-8/+4
* - Update to 0.22culot2012-11-192-9/+4
* horde4 update:mm2012-11-194-6/+6
* - Fix copy and paste error in latest weechat entryjase2012-11-181-1/+2
* - Document new vulnerability in irc/weechat and irc/weechat-develjase2012-11-181-0/+33
* - Update to 1.3.4zi2012-11-182-3/+3
* - Update to 1.77jadawin2012-11-162-8/+4
* * Fix build against libcli 0.9.6tj2012-11-162-1/+27
* Add CONFLICTS.mandree2012-11-161-0/+2
* - Update to 1.9.0sbz2012-11-163-4/+7
* - bugzilla security updates to version(s)ohauer2012-11-151-0/+57
* - Update to version 2.1.5pawel2012-11-143-50/+67
* - Update recent weechat entry (e02c572f-2af0-11e2-bb44-003067b2972c)jase2012-11-141-1/+4
* Document vulnerabilities in two typo3 components.rene2012-11-131-0/+38
* Update pkg-descr to current project statepawel2012-11-131-10/+9
* Mark IGNORE on ${OSVERSION} >= 1000024 where the script got added to the baseehaupt2012-11-121-6/+8
* Fix typo.madpilot2012-11-121-1/+1
* - Update to 2.7.1madpilot2012-11-121-0/+27
* - Update MASTER_SITES and WWW: linepawel2012-11-114-29/+37
* - Add LICENSEpawel2012-11-113-25/+26
* - Add LICENSEpawel2012-11-116-94/+15
* - Add LICENSEpawel2012-11-112-13/+11
* - Improve latest ruby entry slightlyswills2012-11-101-2/+2
* - Modify recent e02c572f-2af0-11e2-bb44-003067b2972c entryjase2012-11-101-5/+8
* Apply an upstream patch that fixes a security holeeadler2012-11-101-0/+30
* - Update lang/ruby19 to 1.9.3p327swills2012-11-101-0/+35
* - clarification that ASF reported issue for:jgh2012-11-101-2/+4
* - document tomcat vulnerabilitiesjgh2012-11-101-0/+76
* - Update to 0.4.3bdrewery2012-11-103-7/+10
* Update latest version and document security issueseadler2012-11-091-0/+32
* - fix MASTER_SITESgahr2012-11-081-1/+1
* - Update to 1.2.0jhale2012-11-083-10/+6
* - fix mtree by avoiding to install a .in CMake configure filegahr2012-11-081-0/+4
* Document new vulnerabilities in www/chromium < 23.0.1271.64rene2012-11-071-0/+66
* Update to 4.42.tj2012-11-072-4/+3
* Document opera vulnerabilitiescrees2012-11-071-0/+42
* pev is a multiplatform PE analysis toolkit thatlippe2012-11-078-0/+114
* Pass maintainership to Jr Aquino <tanawts@gmail.com>.rakuco2012-11-061-6/+2
* Unbreak package build by registering PORTDOCS if we're installing docs.adamw2012-11-061-2/+1