aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* This port installs a 5.x binary, so depend on the compat5x port onarved2005-11-111-0/+4
* - Yield to a total SHAtification.sem2005-11-111-0/+1
* Add denyhosts 1.1.2, script to thwart ssh attacks.vanilla2005-11-118-0/+216
* Add SHA256 checksumlioux2005-11-113-0/+3
* Add CONFLICTS= ipsec-tools-[0-9]*.sumikawa2005-11-111-0/+2
* With portmgr hat on, reset maintainership of knu's ports since he haslinimon2005-11-119-9/+9
* - Add SHA256 to all ports submitter maintaingarga2005-11-113-0/+3
* - CATEGORY CHANGE: add "net" secondary categorygarga2005-11-1015-66/+93
* - Document p5-Mail-SpamAssassin vulnerabily (alread fixed in ports)sem2005-11-101-0/+66
* Update to 4.33mnag2005-11-106-362/+248
* Update to DAT 4624jeh2005-11-102-3/+3
* Update to DAT 4623jeh2005-11-102-3/+3
* - Respect non-standard LOCALBASEgarga2005-11-101-4/+3
* - Add SHA256garga2005-11-101-0/+1
* - Add SHA256 checksums.flz2005-11-091-0/+1
* Move instant messaging related ports to newly created net-im category:pav2005-11-094-10/+10
* Add SHA256mnag2005-11-093-0/+4
* Update to 4.33mnag2005-11-097-382/+217
* Fix order in rc script to prevent errorsmnag2005-11-093-7/+13
* Update to 2.2.6mnag2005-11-099-244/+96
* Fix FreeBSD-4.11 build problemcy2005-11-098-20/+60
* Fix LOCALBASE issue.skv2005-11-091-0/+1
* Update the recent gallery2 and webcalendar entries:remko2005-11-091-5/+14
* - use USB_BDB.ume2005-11-093-20/+10
* - Add SHA256garga2005-11-084-0/+5
* Add SHA256 checksums for my portsarved2005-11-082-0/+2
* Document qpopper -- multiple privilege escalation vulnerabilities.remko2005-11-081-0/+32
* Update to DAT 4622jeh2005-11-082-3/+3
* install missed components.html document.ume2005-11-072-3/+5
* - Update to 2.5ehaupt2005-11-073-9/+53
* - Update to 20051104garga2005-11-072-3/+3
* - Add missed </p> tag [1]sem2005-11-071-2/+3
* Update to DAT 4621jeh2005-11-062-3/+3
* Chase gpgme updateoliver2005-11-061-2/+2
* Update to 0.87.1mnag2005-11-053-20/+3
* Update to KDE 3.4.3 / KOffice 1.4.2lofi2005-11-052-4/+4
* Update gpgme to 1.0.3 and chase shared library version bump.lofi2005-11-057-114/+19
* Chase glib20 and libsoup shared library version.marcus2005-11-051-1/+7
* Bump PORTREVISION to chase the glib20 shared library update.marcus2005-11-0524-15/+24
* Presenting GNOME 2.12 for FreeBSD. The release is chock full of bug fixesmarcus2005-11-0518-136/+216
* Enables self-tests with WITH_JAILmnag2005-11-056-6/+192
* Change MAINTAINERship to perl@.nork2005-11-052-2/+2
* Add a bit more info from the PEAR advisory about the vulnerability tosimon2005-11-051-0/+4
* The two latest OpenVPN vulnerabilities were both only for 2.0 andsimon2005-11-051-2/+4
* Drop maintainerjesper2005-11-052-2/+2
* Add an entry for pear-PEAR arbitrary code execution vulnerability.thierry2005-11-051-0/+28
* Fix plist.sumikawa2005-11-042-1/+3
* - Update to 2.0.5garga2005-11-039-9/+66
* Update to 0.6.0mnag2005-11-033-13/+11
* Drop INSTALLS_SHLIB/LDCONFIG_DIRS: Local shlibs are dlopenedvs2005-11-031-2/+0
* Update to stunnel 4.14, which is mostly a bugfix release.roam2005-11-035-3/+39
* Update to DAT 4617jeh2005-11-032-3/+3
* make security/cyrus-sasl2-ldapdb buildable with OpenLDAP 2.3.ume2005-11-031-1/+10
* Correct skype entry to match the correct fixed port version number.simon2005-11-021-1/+2
* Upgrade to 20051102a.sumikawa2005-11-025-48/+18
* Update to 2.0.4mnag2005-11-029-78/+15
* Assign maintainership to original submitter of this port.linimon2005-11-021-1/+1
* Document two OpenVPN vulnerabilities.simon2005-11-021-0/+67
* As Peter Jeremy points out, the recent lynx vulnerability also concernsnaddy2005-11-021-0/+5
* Change maintainer's emailmnag2005-11-021-1/+1
* Update maintainer's emailmnag2005-11-022-4/+4
* - Update maintainer's email addresspav2005-11-022-4/+4
* Upgrade to latest version.vanilla2005-11-024-26/+4
* Fix fetchingarved2005-11-011-1/+1
* Add p5-Authen-SASL-Cyrus 0.12, XS SASL Authentication.skv2005-11-015-0/+51
* - Document skype vulnerabilitiessem2005-11-011-2/+75
* Update to 0.9.3lofi2005-11-012-3/+3
* - Document CVE-2005-3258:sem2005-11-011-0/+32
* Fix makeinfo problem under FreeBSD-6.0.cy2005-11-0112-40/+28
* Update to 4.13, which ought to fix the libc_r detection problem inroam2005-11-012-4/+5
* Makeinfo 4.8 problem.cy2005-11-014-16/+12
* - Update security/base to 1.2.1, which fixes a SQL injection issuesem2005-11-013-3/+4
* - Document a BASE Basic Analysis and Security Engine vulnerabilitysem2005-11-011-0/+29
* Let the IGNORE message make a bit more sense and change it from:erwin2005-11-012-2/+2
* Back out the accidentally committed white-space modification parts ofsimon2005-11-011-8900/+12898
* Update to DAT 4616jeh2005-11-012-3/+3
* - Update to 0.81garga2005-10-317-46/+93
* Add entry for "fetchmail -- fetchmailconf local password exposure",barner2005-10-311-0/+31
* Update to 20051030mnag2005-10-312-6/+6
* Update to 4.6.2mnag2005-10-313-6/+8
* Document lynx remote buffer overflow in NNTP header handling.naddy2005-10-311-12960/+8995
* Remove opensc-esteid. The functionality has been merged into thelinimon2005-10-315-111/+0
* - Update to 2.3.1clement2005-10-305-53/+35
* Relocate BROKEN conditional.cy2005-10-304-16/+16
* Fails to build on 4.11.cy2005-10-304-0/+8
* BROKEN on 7.0: Does not compilekris2005-10-291-1/+7
* Update to DAT 4615jeh2005-10-292-3/+3
* Reset maintainer, does not respond to mails for 19 days. Since a fewehaupt2005-10-291-1/+1
* - Unbreak: Update to 0.46agarga2005-10-292-5/+3
* chkproc sends a 25 signal to init causing a reboot after a 30s sleepgarga2005-10-281-0/+2
* BROKEN: Does not buildkris2005-10-284-0/+8
* - Fix a ruby vulnerabuility in the safe level settings.sem2005-10-281-0/+36
* Update to DAT 4614jeh2005-10-282-3/+3
* - Update to 0.46garga2005-10-272-3/+3
* - Fix WWW linegarga2005-10-271-3/+1
* Add an additional MASTER_SITE provided by maintainer to fix fetch.novel2005-10-271-1/+2
* Add more references to entry net-snmp -- remote DoS vulnerability.simon2005-10-271-0/+3
* Update to 0.6.2ehaupt2005-10-272-5/+4
* Make this port sysinstall friendly.cy2005-10-2712-57/+18
* Update to DAT 4613jeh2005-10-272-3/+3
* - Mark linux-firefox 1.0.7 as fixedsimon2005-10-261-5/+6
* Update to 5.2mnag2005-10-262-3/+3
* - Update to 1.3.7ehaupt2005-10-262-6/+18
* Add misc/compat5x to "openssl -- potential SSL 2.0 rollback".lesi2005-10-261-1/+8
* Cosmetic formatting change.cy2005-10-263-3/+3
* Adjust port to installl sudoers.conf.sample as a reference sample file.cy2005-10-2612-6/+84
* Update to 1.13skv2005-10-252-3/+3
* - fix build in jaildinoex2005-10-253-0/+6
* Fix broken port, capture missing file in pkg-plist.cy2005-10-256-6/+9
* Update to 4611jeh2005-10-252-3/+3
* Update to 0.2.10krion2005-10-242-3/+3
* Also mark xli as vulnerable to xloadimage -- buffer overflows in NIFFsimon2005-10-241-0/+5
* For entry libgadu -- multiple vulnerabilities:simon2005-10-241-2/+3
* - Update to 3.0.19ehaupt2005-10-232-8/+11
* New style bsd.java.mk.nork2005-10-231-1/+2
* For entry zope28 -- expose RestructuredText functionality to untrustedsimon2005-10-231-3/+5
* Add java_policy 1.4.2, which provides JCE(Java Cryptographynork2005-10-234-0/+55
* Update to liedentd 1.1, which is PREFIX-aware.wes2005-10-223-6/+4
* Add another reference to clamav -- arbitrary code execution and DoSsimon2005-10-221-0/+2
* - Mark the port IGNORE in addition to DEPRECATED: the port does not buildsergei2005-10-221-0/+1
* - Mark the port DEPRECATED with expiration in a month:sergei2005-10-211-0/+3
* Update to 4609jeh2005-10-212-3/+3
* Document x11/xloadimage buffer overflows in NIFF image title handling.naddy2005-10-201-0/+39
* - Fix build of openssl-beta on 6.0dinoex2005-10-201-1/+1
* Update to 1.1.0 release, add a couple of tunables to the Makefile,ade2005-10-203-7/+9
* update to dat 4608jeh2005-10-202-3/+3
* Rename all CAN-yyyy-nnnn to CVE-yyyy-nnnn, with the exception of textnectar2005-10-201-688/+688
* - Update to 0.6garga2005-10-192-5/+6
* . respect PREFIXehaupt2005-10-192-2/+6
* For entry: snort -- Back Orifice preprocessor buffer overflow vulnerability:simon2005-10-191-1/+2
* Make PREFIX-safelofi2005-10-191-3/+3
* - Document snort -- Back Orifice preprocessor buffer overflow vulnerability.simon2005-10-191-2/+50
* Update to 1.2.2arved2005-10-192-4/+3
* - Update to 2.4.3, which includes a fix for a potential buffer overflowsergei2005-10-192-6/+6
* - Update to 0.10garga2005-10-192-3/+3
* - Update to 0.9.0sergei2005-10-193-23/+48
* Update to 4607jeh2005-10-192-3/+3
* - Update to 0.9.0sergei2005-10-184-100/+29
* Update to 0.13.tobez2005-10-183-4/+5
* Update to 4606jeh2005-10-182-3/+3
* Add a check to see if WITH_MILTER is not set (and don't build milterlawrance2005-10-171-1/+1
* Add p5-GD-SecurityImage, a Perl5 module for creating CAPTCHA security imagesehaupt2005-10-175-0/+55
* Respect $PREFIXvs2005-10-161-0/+3
* Update to 0.2.9krion2005-10-163-7/+5
* Correct description.ade2005-10-161-1/+1
* - new option WITHOUT_OPENSSL_SSE2dinoex2005-10-161-0/+4
* - update stable to 0.9.7idinoex2005-10-164-32/+4
* - force 0.9.7 for FREEBSD 6.0 RELEASEdinoex2005-10-161-0/+8
* This now links dynamically to the dependencies since they now provide them.kris2005-10-151-3/+3
* - Document www/webcalendar vulnerability.sem2005-10-151-0/+23
* - Document www/gallery2 vulnerability.sem2005-10-151-0/+35
* Add security/libpreludedb:sergei2005-10-156-0/+149
* - Respect NOPORTDOCSsergei2005-10-153-10/+28
* Upgrade to DAT 4605jeh2005-10-152-3/+3
* - use new option namedinoex2005-10-141-1/+1
* Fix package list when use LIBUNRARmnag2005-10-143-40/+18
* - new option WITH_OPENSSL_STABLE=yesdinoex2005-10-141-10/+8
* - create slave port for openssl 0.9.7dinoex2005-10-142-0/+20
* - binary compatability patchdinoex2005-10-143-1/+29
* Update to DAT 4604jeh2005-10-142-3/+3
* - Update to 4.33ehaupt2005-10-139-289/+86
* Update to 0.03ehaupt2005-10-132-3/+3
* Remove pkg-message, the one in WRKDIR is used.edwin2005-10-132-6/+1
* New port: security/webfwlog Web-based firewall log analyzeredwin2005-10-137-0/+207
* Improve last couple of entries:simon2005-10-131-13/+17
* - Update to 1.2sem2005-10-133-3/+4
* BROKEN: Installs file outside of PREFIXkris2005-10-133-0/+6
* Update to DAT 4603jeh2005-10-132-3/+3
* Add entry for opensslmnag2005-10-121-3/+57
* Fix build on perl < 5.6skv2005-10-121-1/+8
* Add python as a secondary categorylioux2005-10-121-1/+1
* - update to 0.9.7g and 0.9.8adinoex2005-10-124-64/+8
* - Security Fix: CAN-2005-2969dinoex2005-10-123-2/+58
* Fix using of libunrar in OPTIONS variable.vsevolod2005-10-121-1/+1
* Fix a couple of problems on 64 bit platforms by importing 2.5:csjp2005-10-122-3/+3
* Add entry for phpmyadmin (PMASA-2005-4)mnag2005-10-121-0/+29
* Fix typo with range valuesmnag2005-10-121-1/+1
* Add entry from zope28mnag2005-10-121-0/+30
* Allow clamav to use rar 3 archives using archivers/libunrar.vsevolod2005-10-122-1/+3255
* - Update to 3.26.0 to fix fetching [1]erwin2005-10-123-12/+8
* Update to DAT 4602jeh2005-10-122-3/+3
* - Update to 0.6.6garga2005-10-125-36/+52
* - Update to 0.06 [1]erwin2005-10-122-10/+16
* Fix MASTER_SITE I botched in the previous commitvs2005-10-111-1/+1
* Update to DAT 4601jeh2005-10-112-3/+3
* Upgrade to 5.0edwin2005-10-114-29/+24
* Update to 0.6.2mnag2005-10-103-12/+21
* Update to DAT 4600jeh2005-10-102-3/+3
* Fix MASTER_SITES and use MAKE_ARGS instead of patch.vs2005-10-102-13/+2
* Reset bouncing maintainer address, remove stale mastersite.linimon2005-10-101-3/+2
* For libxine -- format string vulnerability entry:simon2005-10-101-5/+6
* Add gwee, a tool to exploit command execution vulnerabilities in web scripts.ehaupt2005-10-104-0/+42
* Add an entry for libxine format string vulnerability.nobutaka2005-10-101-0/+31
* Warren requested that this port be removed. I've just un-MAINTAINER-izedfenner2005-10-091-1/+1
* Mark older revisions linux_base-suse 9.3 as vulnerable to kdebase --simon2005-10-091-0/+5
* Remove WWW: None.fenner2005-10-091-1/+0
* - Fix handling of & sign, it need to be escaped for XML storagepav2005-10-093-1/+55
* - Set CONFLICTS with krb4 and krb5pav2005-10-091-2/+4
* - Set CONFLICTS with heimdal and krb5pav2005-10-091-2/+4
* - Set CONFLICTS with heimdal and krb4pav2005-10-094-4/+12
* - Fix pkg-plistlawrance2005-10-084-9/+12
* Update to 0.8.marcus2005-10-084-11/+11
* Update master sites.ehaupt2005-10-084-4/+0
* Update master sites.ehaupt2005-10-084-4/+0
* - Update to 2.4.1sergei2005-10-078-179/+58
* - Update to 0.9.0sergei2005-10-074-130/+124
* - Mark cfengine's arbitrary file overwriting vulnerability as fixed in 2.1.6_1sergei2005-10-071-0/+6
* Remove trailing backslash from MASTER_SITES which caused thefenner2005-10-071-2/+2
* Remove obsolete mastersites.linimon2005-10-071-6/+0
* Update to 20051006mnag2005-10-072-3/+3
* Update to 4.6.1mnag2005-10-074-5/+8
* Change MAINTAINER address for my ports.ehaupt2005-10-068-8/+8
* - Update to 1.6.39barner2005-10-063-11/+10
* Add an entry for UW-IMAP Mailbox Name Handling Remote Buffer Overflowthierry2005-10-061-0/+35
* Update to 0.7mnag2005-10-063-11/+9
* New portmnag2005-10-066-0/+92
* Add credit for recent ftp/weex incidentehaupt2005-10-051-1/+1
* - Update to 1.1 (minor bugfixes)sergei2005-10-052-6/+5
* [maintainer update] update security/pamtesteredwin2005-10-052-3/+3
* Update 1.8.1 --> 1.8.2cy2005-10-056-9/+9
* Update 1.4.1 --> 1.4.2cy2005-10-0516-132/+12
* Update to DAT 4596jeh2005-10-052-3/+3
* Update update_dat to use fetch and be a little more robust. Thanks tojeh2005-10-051-16/+14
* Update to 20051003mnag2005-10-042-25/+24
* rinetd >= 0.62_1 has no more vulnerabilitiesgarga2005-10-041-2/+5
* - bump SHLIB versiondinoex2005-10-041-2/+3
* Changelog:clsung2005-10-043-8/+5
* Update to 4595jeh2005-10-042-3/+3
* o Fix whitespace (to tab)mich2005-10-032-6/+6
* Add references to three squid entries.remko2005-10-031-5/+15
* Use the <freebsdpr> tag to markup a PR in weex -- remote format stringsimon2005-10-031-1/+1
* Document a format string vulnerability in ftp/weex.jylefort2005-10-031-0/+30
* Document picasm -- buffer overflow vulnerability.simon2005-10-021-0/+33
* - Fix MASTER_SITESdinoex2005-10-021-1/+2
* Add an URL to the entry of the japanese/uim.nobutaka2005-10-021-1/+1
* Document japanese/uim privilege escalation vulnerability.nobutaka2005-10-021-0/+31
* Document cfengine -- arbitrary file overwriting vulnerability.simon2005-10-011-0/+32
* Mark zsync <= 0.4.1 vulnerable to the zlib buffer overflow vulnerability.remko2005-10-011-0/+5
* Add more references to unace -- multiple vulnerabilities entry.simon2005-10-011-0/+3
* Add CVE name to an older ProZilla entry.simon2005-10-011-0/+2
* Reset maintainer who had turned in his commit bit some time back as he nolinimon2005-10-011-1/+1
* Update to DAT 4594jeh2005-10-012-3/+3
* Update to 1.12skv2005-10-012-3/+3
* - Use DOCSDIR, PORTDOCS and NOPORTDOCSgarga2005-09-302-18/+8
* With portmgr hat on, reset maintainer. There have been several maintainerlinimon2005-09-301-1/+1
* Update to 2.5.5mnag2005-09-302-17/+16
* Add more references for latest phpmyfaq entry.simon2005-09-301-0/+9
* - Add a note that new entries, per convention, should be added to thesimon2005-09-301-5/+11
* Document vulnerabilities in www/phpmyfaqvsevolod2005-09-291-0/+25
* Update to 4592jeh2005-09-292-3/+3