aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Fix typo in vuxml topicfeld2016-10-111-2/+2
* - update to 1.0.29dinoex2016-10-112-5/+5
* Document FreeBSD-SA-16:31.libarchivefeld2016-10-101-0/+33
* Document FreeBSD-SA-16:30.portsnapfeld2016-10-101-0/+35
* Document FreeBSD SA-16:29.bspatchfeld2016-10-101-0/+36
* Add FreeBSD SA info to recent BIND vulnerabilityfeld2016-10-101-0/+6
* Add FreeBSD SA info to recent OpenSSL vulnerabilityfeld2016-10-101-0/+6
* Thank you Uffe for your past work on FreeBSD ports! Hope you'll find timebsam2016-10-101-1/+1
* Update to 0.23.adamw2016-10-092-4/+5
* Update to 0.08 (which just improves the Makefile.PL), and stripadamw2016-10-092-4/+7
* devel/nspr, security/nss: drop version from SONAMEjbeich2016-10-0910-42/+14
* security/nss: update to 3.27.1 and define licensejbeich2016-10-094-8/+11
* Update to 4.12.31antoine2016-10-092-5/+6
* Update to 1.1.19antoine2016-10-092-4/+4
* New port: security/rubygem-rex-exploitationantoine2016-10-094-0/+30
* Update to 2.0.4antoine2016-10-092-4/+4
* Update to 2.0.4antoine2016-10-092-6/+4
* Update to 0.1.1antoine2016-10-092-4/+4
* Update to 0.1.66antoine2016-10-092-4/+4
* Document code execution vulnerability in mkvtoolnix < 9.4.1riggs2016-10-091-0/+27
* security/ca_root_nss: adjust pkg-plist to address leftover directorymarino2016-10-091-0/+1
* - Update to 0.81wen2016-10-092-4/+4
* security/acme-client: Bump port-revisionbrnrd2016-10-091-0/+1
* security/acme-client: Add STATIC optionbrnrd2016-10-082-2/+22
* Update the libXfixes version. The old version was still affected by thekwm2016-10-081-1/+2
* security/acme-client: Fixes for periodic scriptbrnrd2016-10-081-10/+10
* - set PORTSCOUT to ignoredinoex2016-10-081-0/+1
* security/xmlsec1: Fix build with LibreSSLbrnrd2016-10-082-2/+33
* - move DOCS and make them an optiondinoex2016-10-084-12/+26
* - use DATADIRdinoex2016-10-081-3/+3
* Document X.org client libraries insufficient validation of data fromkwm2016-10-081-0/+71
* security/openssl: Fix ldconfig issuebrnrd2016-10-071-1/+1
* Update to 0.2.21tj2016-10-072-4/+6
* - Bump portrevision for previous changeamdmi32016-10-061-1/+1
* - Bring back license installationamdmi32016-10-061-1/+7
* - Update to 2.4damdmi32016-10-062-19/+9
* Add math/gmp to LIB_DEPENDSjrm2016-10-051-1/+2
* security/arirant: remove USE_LIBRUBYswills2016-10-051-1/+3
* security/lynis:lme2016-10-053-4/+26
* security/openssl: Mark MAKE_JOBS_UNSAFEbrnrd2016-10-051-0/+2
* Add new port security/kdbx-viewerwoodsb022016-10-044-0/+49
* Update to version 1.0pawel2016-10-032-4/+4
* security/xmlsec1: unbreak on 9.xjbeich2016-10-031-0/+10
* security/openssl-devel: Align with security/opensslbrnrd2016-10-022-3007/+3001
* Update to 4.12.29antoine2016-10-022-6/+6
* Update to 1.1.16antoine2016-10-022-4/+4
* security/openssl: Modernize portbrnrd2016-10-022-1663/+1608
* Update to version 5.9p6pawel2016-10-012-6/+5
* Deprecate ports broken for more than 6 monthsantoine2016-10-012-0/+4
* - Mark broken: download link is no longer validamdmi32016-10-011-0/+2
* Chase php 5.5 expiration dateantoine2016-10-011-0/+3
* Remove expired ports:rene2016-10-0137-2137/+0
* Let USES=localbase add -L${LOCALBASE}/lib to LIBS instead of LDFLAGS.tijl2016-10-011-1/+1
* Add linux-c6-openssl to recent OpenSSL vulnerabilities.tijl2016-09-301-1/+5
* Update to 1.0.1e-48.el6_8.3.tijl2016-09-303-15/+15
* - update to 7.30ohauer2016-09-307-147/+14
* security/rubygem-doorkeeper: Remove Rails 3 optiontz2016-09-291-10/+1
* Record its need for OpenSSL, and do a first step into making it buildmat2016-09-291-1/+2
* - Reset maintainer to ports@wen2016-09-291-1/+1
* Update to 4.12.28antoine2016-09-292-4/+5
* New port: security/rubygem-rex-encoderantoine2016-09-294-0/+29
* Update to 0.1.6antoine2016-09-292-4/+4
* Add bind9-devel to the latest BIND9 vuln.mat2016-09-281-0/+4
* security/nss: update to 3.27jbeich2016-09-288-36/+36
* Document BIND remote DoS vulnerability.delphij2016-09-281-0/+39
* - Document the security vulnerability in py-django, py-django18 and py-django19.wen2016-09-281-0/+34
* security/libressl-devel: Update to 2.5.0brnrd2016-09-283-34/+13
* security/vuxml: Update recent OpenSSL vuln (add LibreSSL)brnrd2016-09-281-0/+9
* security/libressl: Update to 2.4.3brnrd2016-09-282-4/+4
* - Update to 1.0.11vsevolod2016-09-283-5/+5
* Update to 0.4.2 release.ale2016-09-273-7/+6
* - Update to 0.8wen2016-09-272-5/+6
* security/openssl-devel: Update to 1.1.0bbrnrd2016-09-263-5/+6
* security/openssl: Update to 1.0.2jbrnrd2016-09-262-12/+12
* security/vuxml: Add 2016-09-26 OpenSSL entriesbrnrd2016-09-261-0/+34
* - Add LICENSEamdmi32016-09-262-9/+8
* security/nss: unbreak build on armv6jbeich2016-09-261-1/+4
* - add missing man pages to pkg-plist (fix package building)ohauer2016-09-251-2/+6
* security/openssl: Take maintainershipbrnrd2016-09-251-1/+1
* security/munge: UNBREAK and Update version 0.5.11=>0.5.12bofh2016-09-255-15/+51
* devel/openssl: change CONFLICTS to CONFLICTS_INSTALLmarino2016-09-241-3/+3
* - Update devel/icu to 57.1.tijl2016-09-241-0/+1
* - add option ASM for OPNsensedinoex2016-09-241-2/+7
* Update email address to jrm@FreeBSD.org for ports that I maintainjrm2016-09-241-1/+1
* This uses OpenSSL, use openssl from ports if available.mat2016-09-231-2/+3
* Document affected FreeBSD versions for recent OpenSSL vulnerabilitiesfeld2016-09-231-0/+9
* security/openssl: Update to 1.0.2ibrnrd2016-09-236-291/+12
* security/openssl-devel: Revert to PORTVERSIONbrnrd2016-09-231-3/+1
* lang/php56: Update from 5.6.25 to 5.6.26tz2016-09-234-4/+0
* - Update py-scrypt to 0.8.0cpm2016-09-232-3/+4
* - Add LICENSE_FILEamdmi32016-09-231-1/+2
* security/openssl-devel: Bump portrevisionbrnrd2016-09-221-0/+1
* security/openssl-devel: Update to 1.1.0abrnrd2016-09-223-5/+9
* Remove extra / invalid CVE entry for OpenSSLfeld2016-09-221-1/+0
* Update range of vulnerable irssi versionsfeld2016-09-221-2/+2
* security/vuxml: Add new OpenSSL 1.0.2 and 1.1.0 vulnerabilitiesbrnrd2016-09-221-0/+57
* Document that chinese/irssi is vulnerable as wellfeld2016-09-221-0/+2
* Document irssi vulnerabilitiesfeld2016-09-221-0/+28
* lang/php70: Update from 7.0.10 to 7.0.11tz2016-09-214-4/+0
* - Fix build when a previous version is insalled and ssl from ports is usedantoine2016-09-212-2/+13
* - Update to 2.038jadawin2016-09-212-4/+4
* Update security/sudo to 1.8.18garga2016-09-213-4/+5
* Python 3 version of security/py-libnacl.philip2016-09-212-0/+9
* Allow overriding the Python version.philip2016-09-211-1/+1
* Update plaso to 1.5.0antoine2016-09-213-21/+15
* Update to 20160918antoine2016-09-213-35/+13
* Document recent Firefox vulnerabilitiesjbeich2016-09-211-0/+86
* New port: security/py-dfwinregantoine2016-09-214-0/+36
* New port: security/py-dfdatetimeantoine2016-09-214-0/+32
* Update to 20160918antoine2016-09-212-4/+4
* Update to 2.4.3jhale2016-09-203-4/+5
* Increase the length of the password.marcus2016-09-192-3/+6
* security/vuxml: Fix curl version rangesbrnrd2016-09-181-2/+1
* security/snort2pfcd: Update to 0.7woodsb022016-09-184-15/+8
* Mark as broken on mips64 and sparc64.linimon2016-09-181-0/+2
* Mark as broken on mips64 and sparc64.linimon2016-09-181-0/+2
* - Update to 0.25wen2016-09-182-3/+4
* - Update to 5.96wen2016-09-182-3/+4
* security/dehydrated: minor fixesrobak2016-09-183-3/+4
* security/revealrk: 1.1.2 -> 1.2.1pi2016-09-183-16/+4
* Complete the adoption of options helpers, remove old cruft,adamw2016-09-172-26/+20
* Update 1.13.6 --> 1.13.7cy2016-09-172-4/+4
* Update to 4.12.26antoine2016-09-172-8/+13
* New port: security/rubygem-rex-sslscanantoine2016-09-174-0/+27
* New port: security/rubygem-rex-socketantoine2016-09-174-0/+27
* New port: security/rubygem-rex-rop_builderantoine2016-09-174-0/+30
* New port: security/rubygem-rex-nopantoine2016-09-174-0/+29
* New port: security/rubygem-rex-bin_toolsantoine2016-09-174-0/+42
* New port: security/rubygem-rex-coreantoine2016-09-174-0/+26
* security/zenmap: Update to 7.25 BETA2 and use security/nmap as MASTERDIRwoodsb022016-09-173-34/+21
* security/amap: Update to 5.4woodsb022016-09-174-16/+23
* Document new vulnerabilities in www/chromium < 53.0.2785.113rene2016-09-171-0/+47
* Document CVE 2016-6662: zero-day remote vulnerability in mysql portsriggs2016-09-171-0/+30
* security/libp11: Mark IGNORE if SSL_DEFAULT matchs libresslmarino2016-09-161-3/+8
* security/openscep: Mark IGNORE if SSL_DEFAULT matches libresslmarino2016-09-161-5/+10
* Mark BROKEN: wrong build dependsantoine2016-09-161-0/+2
* ftp.openssl.org is being taken out.mat2016-09-162-2/+0
* Document security problems in dropbearmatthew2016-09-151-0/+42
* Unmark broken on powerpc64swills2016-09-155-10/+0
* Release some of my ports back to the heapmarino2016-09-151-1/+1
* GOOGLE_CODE has gone away.mat2016-09-1415-5/+27
* Update to version 2.2.1pawel2016-09-142-4/+4
* Update 1.14.3 --> 1.14.4.cy2016-09-142-4/+4
* security/vuxml: Document www/h2o vulnerabilitybrnrd2016-09-141-0/+26
* ftp/curl: Document integer overflow vulnbrnrd2016-09-141-0/+35
* - Update to 0.13amdmi32016-09-142-5/+6
* security/dehydrated: Rename from letsencrypt.shbrnrd2016-09-1410-77/+102
* Add vulnerabilities for www/chromium < 53.0.2785.92rene2016-09-141-0/+93
* security/proxytunnel: Fix all SSL configuration, fix no SSLv3 (LibreSSL)marino2016-09-142-0/+30
* Belatedly add vulnerabilities for www/chromium < 52.0.2743.116rene2016-09-141-0/+53
* - This port are no longer used or cared for.nemysis2016-09-141-1/+1
* security/openssl_tpm_engine: Document SSL requirement, IGNORE LIbreSSLmarino2016-09-141-4/+10
* security/hydra: Configure for any SSL base and IGNORE LibreSSLmarino2016-09-141-1/+9
* LibreSSL checks: Check for libressl-devel option toomarino2016-09-132-3/+3
* security/ncrack: Update to 0.5woodsb022016-09-132-5/+7
* Update to 0.040.vanilla2016-09-132-4/+4
* security/amap: Fix hardermarino2016-09-132-6/+22
* Document MySQL root code execution vulnerability.delphij2016-09-131-0/+69
* security/p5-openxpki: IGNORE for libressl-devel as well as libresslmarino2016-09-131-1/+1
* securty/bro: Modernize options, remove Ports SSL option, support LibreSSLmarino2016-09-133-81/+59
* security/amap: configure SSL base properlymarino2016-09-131-3/+6
* security/opencryptoki: Fix build with LIbreSSL (old DES functions)marino2016-09-132-2/+63
* Update to WolfSSL 3.9.8johans2016-09-133-5/+7
* Fix build.gjb2016-09-131-1/+1
* Document WolfSSL vulnerabilities (< 3.6.8)johans2016-09-131-0/+50
* security/strongswan: Fix build with LibreSSLmarino2016-09-131-0/+11
* security/xca: Fix build with LibreSSLmarino2016-09-132-2/+13
* - unroll for loopdinoex2016-09-131-4/+4
* security/starttls: Add support for any SSL basemarino2016-09-131-2/+2
* security/openconnect; Fix build with LibreSSLmarino2016-09-122-0/+45
* security/heimdal: Fix build when EGD is not available (e.g. LibreSSL)marino2016-09-123-2/+30
* security/distcache: Configure SSL base, fix build on LibreSSLmarino2016-09-126-30/+29
* security/john: Handle SLL libraries without SHA0 (e.g. LibreSSL)marino2016-09-123-2/+40
* security/rcracki_mt: Document SSL req't, honor flags, fix build with LibreSSLmarino2016-09-122-3/+123
* security/govpn: Update to 6.0swills2016-09-123-5/+6
* security/stunnel: Support building with LibreSSLmarino2016-09-127-2/+184
* security/broccoli: Document SSL requirement and handle no SSLv3 (LibreSSL)marino2016-09-122-1/+16
* Upgrade shibboleth-sp 2.6 and its tool chaingirgen2016-09-129-20/+26
* - Add LICENSEamdmi32016-09-121-2/+7
* - Add LICENSEamdmi32016-09-121-0/+3
* security/wpa_supplicant: Add support for LibreSSLmarino2016-09-122-3/+70
* - Add LICENSEamdmi32016-09-121-12/+6
* - Honor SSL_DEFAULTantoine2016-09-111-1/+1
* Honor SSL_DEFAULTantoine2016-09-111-0/+2
* security/vnccrack: Document SSL requirement and set its flagsmarino2016-09-111-2/+3
* security/tcpcrypt: Document SSL requirement and set its flagsmarino2016-09-111-1/+3
* seurity/stegdetect: Document SSL requirement and set its flagsmarino2016-09-111-1/+3
* security/py-scrypt: Document SSL requirement and define its flagsmarino2016-09-111-1/+3
* security/pvk: Document SSL requirement and honor its flagsmarino2016-09-111-0/+7
* security/pks: Document SSL requirement and configure SSL base correctlymarino2016-09-111-3/+5
* security/tlswrap: Add SSL flags and base configurationmarino2016-09-111-3/+5
* security/titus; Add SSL flags and fix tab alignmentmarino2016-09-111-6/+6
* security/symbion-sslproxy: Add SSL flagsmarino2016-09-111-2/+3
* security/sslsniffer: Add SSL flagsmarino2016-09-111-2/+3
* security/signify: Remove unnecessary -lcrypto linkagemarino2016-09-111-1/+2
* security/ratproxy: Add SSL flags and honor themmarino2016-09-111-3/+5
* security/pev: Add SSL flagsmarino2016-09-111-3/+3
* security/pecl-crypto: Add SSL flagsmarino2016-09-111-2/+3
* security/pam_ssh_agent_auth: Document SSL requirement and configure itmarino2016-09-111-2/+3
* security/pam_ocra: Fix SSL handling especially wrt FreeBSD 9marino2016-09-111-10/+8
* security/pad: Add SSL flags and honor themmarino2016-09-111-2/+8
* security/openca-tools-forked: Configure SSL base properlymarino2016-09-111-2/+3
* security/ocaml-ssl: Add SSL flagsmarino2016-09-111-2/+5
* security/netpgp: Document SSL requirement and support ports SSL librariesmarino2016-09-111-5/+8
* security/ncrack: Add SSL flagsmarino2016-09-111-2/+3
* security/munge: Document SSL requirementmarino2016-09-111-1/+1
* lang/luasec: Add SLL flags and fix builds on LibreSSLmarino2016-09-112-3/+13
* security/libpwstor: Document SSL requirementmarino2016-09-111-1/+1
* security/kc: Document SSL requirementmarino2016-09-111-1/+1
* security/ike-scan: Document SSL requirementmarino2016-09-111-0/+1
* security/gwee: Add SSL flagsmarino2016-09-111-4/+3
* security/erlang-p1tls: Add SSL flagsmarino2016-09-111-2/+5
* security/d0_blind_id: Add SSL flagsmarino2016-09-111-2/+3
* security/arirang: Add SSL flagsmarino2016-09-111-2/+3
* Update to 2.6gblach2016-09-112-4/+4
* Update to upstream version 0.3.0riggs2016-09-114-19/+30
* security/yafic: Document SSL requirement, convert to optionsmarino2016-09-101-9/+14
* security/trousers: Set CFLAGS and LDFLAGS for SSL supportmarino2016-09-101-0/+2
* security/p5-Crypt-OpenSSL-ECDSA: USES+=ssl, Set CFLAGS accordinglymarino2016-09-101-1/+2
* Most commonly used build systems support silent builds, when theyamdmi32016-09-103-3/+1
* - Update to 1.4.2amdmi32016-09-102-37/+12
* Add entry for GNUTLS-SA-2016-3.tijl2016-09-091-0/+27
* Update to 3.4.15.tijl2016-09-093-5/+5
* document mozilla vulnerabilities (<48, <45.3esr)cmt2016-09-091-0/+127
* security/p5-Crypt-OpenSSL-EC: USES+=ssl, Set CFLAGS accordinglymarino2016-09-091-1/+2
* Document asterisk vulnerabilities.madpilot2016-09-091-0/+75
* security/p5-Crypt-SSLeay: Set CFLAGS to support USES+=sslmarino2016-09-091-2/+2
* Update to 3.5.0antoine2016-09-093-14/+10
* Update to 3.5.0antoine2016-09-094-9/+11
* - Add LICENSEamdmi32016-09-092-44/+28
* - Fix command in pkg-messageamdmi32016-09-082-4/+4
* Change security/tor{,-devel} to only have a build dependency on opensslmat2016-09-082-2/+10
* security/openssl-devel: Fix EC option on DragonflyBSDbrnrd2016-09-081-4/+5
* Horde package update:mm2016-09-084-7/+8
* security/rubygem-bcrypt: rip out unused crypt_r implementationswills2016-09-082-0/+26
* - Don't return an error on package installation when spmd.pwd doesn't exist.tijl2016-09-082-7/+6
* Add a port of Cardpeek, a graphical (GTK+ 3.0) tool to read the contents ofdanfe2016-09-084-0/+48
* - In Uses/linux.mk use the loop variable directly when appending totijl2016-09-074-4/+4
* - Update to 0.2.9.2-alpha [1]amdmi32016-09-072-32/+9
* - Update to 0.2.8.7 [1]amdmi32016-09-072-32/+9
* security/zeronet: 0.3.7 -> 0.4.0pi2016-09-073-7/+16
* - Add linux-*-tiff information to existing tiff vulnerabilities.tijl2016-09-071-27/+32
* Take maintainershipgarga2016-09-071-1/+1
* Document vulnerability in irc/inspircdfeld2016-09-061-0/+28
* Add CVE-2016-7123 for resolved mailman CSRF.mandree2016-09-061-0/+39
* - Correct typo in previous commitzi2016-09-062-3/+2
* - Remove reference to nonexistent filezi2016-09-062-4/+3
* Fix the version range for a linux-c6-nss vulnerability.tijl2016-09-061-1/+6
* Update to nss-softokn 3.14.3-23.3.el6_8.tijl2016-09-065-33/+33
* - Replace Mk/bsd.linux-apps.mk and Mk/bsd.linux-rpm.mk withtijl2016-09-0622-101/+68