aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Update to v11.05.20 release.ale2011-05-276-10/+32
* - Update to 0.4.wxs2011-05-274-27/+35
* - Update to v0.009brix2011-05-272-4/+5
* - Update to v2.006brix2011-05-272-5/+5
* Increase the size and verbosity of the comment that the versions used inbrooks2011-05-261-1/+5
* Document drupal6 multiple vulnerabilities.wxs2011-05-261-0/+35
* - Fix self test with Perl 5.14 [1]sunpoet2011-05-261-4/+12
* Bump PORTREVISION of all ports dependent on lang/ghc as duringashish2011-05-262-0/+2
* Document Erlang R14B02 ssh library vulnerability (cryptographicallyolgeni2011-05-261-0/+32
* Document latest www/chromium vulnerabilities.rene2011-05-261-2/+17
* - Cleanup Part 1miwi2011-05-251-34/+35
* - Document the last unbound vulnerabilitysem2011-05-251-0/+29
* - Update to 1.21jadawin2011-05-253-6/+3
* - Update to 1.3culot2011-05-252-4/+4
* - revert last change of apr-* entryohauer2011-05-251-7/+10
* - use apr-* and add <gt></gt> entries for all apr0/apr1 issuesohauer2011-05-251-11/+8
* -Fix install directory namingbeech2011-05-251-0/+3
* Update the mod_pubcookie entry with an ap20 prefix. The port has alwasybrooks2011-05-251-1/+1
* Dicewaregen is simple perl script that generated Diceware dictionaries, thatjadawin2011-05-244-0/+43
* Unbreak VuXML web build by changing "ap*-" to "ap-" in package name forsimon2011-05-241-1/+1
* Fix build.delphij2011-05-241-1/+1
* Partially address several years of neglect of pubcookie. Indicate thebrooks2011-05-241-0/+66
* - add entry for ViewVC < 1.1.11ohauer2011-05-241-7/+62
* Update to 10.3r181.14 .nox2011-05-241-0/+52
* The Horde_Auth package provides a common interface into thebeech2011-05-246-0/+84
* - Update to 1.5wxs2011-05-243-10/+15
* - Update to 1.5.wxs2011-05-233-4/+31
* Document Opera Frameset unload code injection vulnerability.mandree2011-05-231-0/+28
* Document pure-ftpd multiple vulnerabilities prior to 1.0.32.delphij2011-05-231-0/+30
* Update to 1.8.1p2wxs2011-05-232-5/+5
* - Upgrade to 0.02.ashish2011-05-212-4/+3
* - Upgrade to 5.62.ashish2011-05-212-3/+3
* - Update to 0.50.ashish2011-05-212-4/+3
* - Update to 0.9culot2011-05-204-15/+7
* Add missing USE_NCURSESmakc2011-05-201-0/+1
* - update to 1.0.14dinoex2011-05-202-4/+3
* - s/CONF_FILES/CLAM_CONF_FILES/ to avoid a conflict in the future with newgarga2011-05-192-6/+6
* Add pam_google_authenticator 20110519, PAM module for two-steplwhsu2011-05-194-0/+36
* - Add patch to properly escape paths and passwords in shell calls.stefan2011-05-183-1/+117
* - Cleaning MD5 in perl@'s portsjadawin2011-05-1749-49/+0
* Fix plistjohans2011-05-172-0/+3
* - Update to 5.62culot2011-05-172-3/+3
* Update KDE Software Compilation ports to 4.6.3makc2011-05-178-14/+126
* - add patch to barnyard2 to allow build with postgresql and tclohauer2011-05-1610-2173/+213
* Update gsasl to 1.6.1johans2011-05-152-4/+3
* Update xmlsec to 1.2.18johans2011-05-152-3/+3
* Remove painful examples of foo="", with particular prejudice againstdougb2011-05-156-11/+12
* Remove check for 6.x. It's EoL. Forgot to do this in the previous commit.wxs2011-05-151-4/+0
* Update to 1.88bwxs2011-05-152-4/+3
* -Restore maintainership to submitterbeech2011-05-151-1/+1
* - add OPTION tcl (default off) to allow sguil* ports build against barnyard2ohauer2011-05-151-1/+8
* - update to version 0.6.1ohauer2011-05-152-3/+3
* mail/exim: document CVE-2011-1764 and CVE-2011-1407rea2011-05-151-0/+46
* Update to 2.6.1arved2011-05-142-7/+7
* - document Apache APR DoS vulnerabilitiesohauer2011-05-141-0/+30
* - Document www/zend-framework (potential SQL injection when using PDO_MySQL)glarkin2011-05-131-0/+29
* Add an AUDIT option, which is off by default for now. I will turn it onwxs2011-05-131-1/+6
* - Update to 1.43jadawin2011-05-132-3/+3
* Document mediawiki multiple vulnerabilities.wxs2011-05-131-0/+29
* Document CVE-2011-1799 and CVE-2011-1800 for www/chromiumrene2011-05-131-2/+10
* Incorporate changes recommended by the tidy target. While here, properlywxs2011-05-131-8/+4
* Update 4.2.1 --> 4.2.2. This is a bugfix release.cy2011-05-123-4/+5
* Add archive master site, in the case when a new pam_krb5 is released and thiscy2011-05-121-1/+2
* Update 4.3 --> 4.4cy2011-05-122-4/+3
* - update tinc to build with lzo2dinoex2011-05-122-2/+2
* Remove support for lzo-1.mandree2011-05-111-8/+0
* Update 4.2.0 --> 4.2.1. This is a bugfix release.cy2011-05-113-4/+7
* - Disable the new bufferevents code by default in tor-devel,bf2011-05-103-8/+13
* Fix build on AMD64. Debugging information caused failure on pointyhat duecy2011-05-091-2/+10
* Document CVE-2011-1720: Postfix memory corruption error.sahil2011-05-091-0/+38
* - Please welcome GHC 7.0.3ashish2011-05-096-50/+12
* - update tor-devel to 0.2.3.1-alphabf2011-05-087-227/+37
* Update to 2.8.4.lx2011-05-062-3/+3
* Update libevent2 to 2.0.11mm2011-05-051-0/+1
* - Update to 1.008culot2011-05-052-8/+23
* - Add p5-String-MkPasswdsunpoet2011-05-055-0/+38
* - Update to 1.2.1decke2011-05-052-4/+3
* - Update to 201118dhn2011-05-053-3/+4
* - Update to 1.40jadawin2011-05-042-3/+3
* Update to 2.2.0. Add LICENSE (GPLv2). Add a local mirror of the distfile (filemandree2011-05-043-4/+8
* Update 4.1.3 --> 4.2.0.cy2011-05-035-33/+137
* Libfwbuilder has been merged into fwbuilder 4.2.0.cy2011-05-035-269/+0
* Libfwbuilder has been merged into fwbuilder.cy2011-05-031-1/+0
* Add rubygem-net-ssh-multi 1.0.1, SSH connection multiplexing library forstas2011-05-034-0/+30
* - Update to 2.1.4.stas2011-05-032-4/+4
* - Mark BROKEN on 9-CURRENT: fails to configurepav2011-05-021-0/+4
* Remove unmaintained expired ports from securitybapt2011-05-02137-6018/+0
* Update to 0.2.2.25-alphabf2011-05-012-3/+3
* Document www/chromium vulnerabilities fixed in version 11.0.696.57rene2011-04-301-2/+84
* No longer interesteddes2011-04-301-1/+1
* Fix broken PKGORIGINskreuzer2011-04-291-1/+1
* - Update to 1.5 [1]culot2011-04-292-7/+10
* - Update to 4.5.1 [1]culot2011-04-295-113/+36
* Document mozilla -- multiple vulnerabilitiesflo2011-04-291-0/+59
* - add a patch to fix a use-after-freebapt2011-04-292-0/+23
* - Reset maintainer due to email bouncestabthorpe2011-04-291-1/+1
* - update to 2.02:bapt2011-04-283-3/+5
* - Update nettle to 2.1 release [1]johans2011-04-283-10/+14
* arpCounterattack is a program for detecting and remedying "ARP attacks." Itskreuzer2011-04-287-0/+111
* - over to new volunteerbapt2011-04-271-1/+1
* By Maintainer's request, toss these ports back into the pooldougb2011-04-274-4/+4
* Update to 0.03skreuzer2011-04-272-4/+3
* - Update to 3.6.0sunpoet2011-04-273-7/+14
* Add the wanted version on package depends or it won't work as expectedbapt2011-04-241-2/+7
* Update to 3.9.nobutaka2011-04-232-3/+3
* Update to 1.15.1martymac2011-04-222-4/+3
* Chase libp11 library and bump PORTREVISION.ale2011-04-222-3/+4
* Update to 0.2.8 release.ale2011-04-223-7/+9
* - document recent asterisk vulnerabilitiesflo2011-04-221-1/+49
* - fix crash due to a null pointer dereferenceohauer2011-04-212-0/+13
* - Update MASTER_SITESskreuzer2011-04-213-4/+3
* - Install sample configuration filesbz2011-04-202-0/+11
* - Add missing dependency on devel/p5-TimeDateashish2011-04-202-3/+3
* - update 0.67bapt2011-04-192-11/+5
* Remove unmaintained port that depends on expired security/newpki-lib:rene2011-04-195-119/+0
* Remove most expired ports:rene2011-04-1924-797/+0
* Document VideoLAN-SA-1103. Heap corruption in MP4 demultiplexer in VLC.jsa2011-04-181-0/+26
* Update to 10.2r159.1 .nox2011-04-181-0/+48
* Update to 1.8.1p1.wxs2011-04-174-33/+7
* Document multiple vulnerabilities in RT www/rt36 and www/rt38flo2011-04-171-0/+38
* Update to 3.8.nobutaka2011-04-162-3/+3
* Update to 0.52.nobutaka2011-04-163-8/+12
* Hand over to a new maintainer.shaun2011-04-161-1/+1
* - Don't overwrite/remove config files on package installation/uninstallswills2011-04-163-23/+40
* Document www/chromium vulnerabilitiesrene2011-04-151-2/+10
* Unbreak file format:simon2011-04-151-5/+5
* Add the following for security/krb5:cy2011-04-151-0/+157
* Document a root exploit via rogue hostname in xrdb.kwm2011-04-141-0/+32
* Apply patch for MITKRB5-SA-2011-004, kadmind invalid pointer free()cy2011-04-142-2/+4
* - Forget to add SNORTSAM patchset to distinfo,dhn2011-04-131-0/+2
* - Update to 1.2.8sbz2011-04-132-4/+10
* Limit affected mupdf version to <0.8bapt2011-04-131-1/+1
* Update to 0.2.2.24-alphabf2011-04-132-5/+3
* Upgrade to a later snapshot, to allow build with newer BDB versions.mandree2011-04-135-24/+151
* Remove expired ports:rene2011-04-137-93/+0
* Document "otrs" - several XSS attacks possible.skv2011-04-131-0/+32
* Fix typoerwin2011-04-121-1/+1
* - Fix OPTIONS processing in previous commitsunpoet2011-04-121-2/+3
* Update to 1.1 release.ale2011-04-122-3/+3
* Optimize C_GetAttributeValues: remove not needed call.ale2011-04-122-3/+32
* - Update to 2.9.0.5dhn2011-04-124-129/+4
* - Add google mirrormiwi2011-04-121-1/+4
* Fix a typo in pkg-install. Should use -m and not -M for install(1).wxs2011-04-121-1/+1
* The install process checks the validity of sudoers before installingwxs2011-04-122-1/+19
* Revert the removal of sudoers.d. It is a POLA violation. While here removewxs2011-04-124-17/+11
* We don't install a sudoers.d, remove that from the default sudoers file.wxs2011-04-112-2/+11
* Add a new macro to deal with conflict between ncurses from base and ncurses f...bapt2011-04-111-2/+3
* Document isc-dhcp41-client and isc-dhcp31-client vulnerabilities.wxs2011-04-111-0/+34
* - Mark broken with Ruby 1.9swills2011-04-115-5/+25
* CMAKE_BUILD_TYPE is set in bsd.cmake.mk now, remove it from Makefilesmakc2011-04-101-4/+0
* Update to 1.8.1. There are a lot of behind-the-scenes changes in this port,wxs2011-04-106-38/+48
* - Update to 0.21.1lwhsu2011-04-092-6/+4
* Add CVE entry for recent tinyproxy vulnerability.wxs2011-04-091-0/+1
* Bump PORTREVISION.cy2011-04-091-1/+1
* Adjust krb5-config when $KRB5_HOME is specified. This will allow applicationscy2011-04-091-4/+6
* - tinyproxypav2011-04-081-0/+23
* - update to 0.14.3dinoex2011-04-082-3/+3
* The FreeBSD KDE Team is pleased to announce April updates for KDEavilla2011-04-074-6/+4
* pkcs11-gateway is a software that allows you to use a Linux 32-bit PKCS#11ale2011-04-064-0/+50
* pkcs11-dump is a small utility to dump PKCS#11 token contents.ale2011-04-065-0/+73
* - Bump portrevisions on all ocaml libraries, as it appears that compiledstas2011-04-063-2/+3
* - mark port broken barnyard is gone and port does not build with barnyard2ohauer2011-04-051-1/+3
* - make snort and suricata optionalohauer2011-04-051-5/+13
* - remove expired port security/barnyardohauer2011-04-0513-254/+0
* Garbage collect expired portsrene2011-04-059-238/+0
* - Update to 0.2.1dhn2011-04-043-8/+9
* - Update maintainer mail adressdhn2011-04-032-2/+1
* - Update maintainer's address [1]culot2011-04-032-2/+1
* Update to xmlsec 1.2.17johans2011-04-033-5/+4
* Document two quagga DoS vulnerabilitiessem2011-04-021-0/+33
* - update to version 0.6.0ohauer2011-03-303-8/+3
* Add a missing </p>.kwm2011-03-291-1/+1
* Document gdm privilege escalation vulnerabilitykwm2011-03-291-0/+32
* - Depend on newer libarchive (and fix plist) on 7.x and 8.0.avilla2011-03-292-2/+4
* Update libksba to 1.2.0, and update dependent ports.dougb2011-03-286-10/+18
* - Update to RC2dhn2011-03-273-3/+4
* Document vulnerabilities before Chromium 10.0.648.204rene2011-03-271-2/+22
* - update to 1.7bapt2011-03-262-5/+9
* - update to 2.01bapt2011-03-263-4/+10
* - update to 0.02bapt2011-03-263-5/+8
* Add entries for php5-exif and php5-zip before 5.3.6 release.ale2011-03-251-0/+57
* The FreeBSD KDE Team is pleased to announce KDE SC 4.6.1 and KDE PIMavilla2011-03-256-870/+52
* Apply patch for MITKRB5-SA-2011-003, KDC vulnerable to double-free whency2011-03-252-2/+5
* Update to 10.2r153.nox2011-03-251-0/+44
* - Document mozilla -- update to HTTPS certificate blacklistbeat2011-03-241-0/+46
* - update to 0.8.0flo2011-03-244-85/+78
* - Update MASTER_SITES/WWWdhn2011-03-243-6/+2
* - Update to 1.0dhn2011-03-245-41/+22
* - Update MASTER_SITES/WWWdhn2011-03-243-6/+2
* - Update to 4.31dhn2011-03-243-5/+15
* - Add LICENSE knob(s)mm2011-03-237-1/+18
* - Update to 2.26sunpoet2011-03-232-7/+4
* Update to 2.8.3a.lx2011-03-232-9/+9
* Update to latest snapshot.jpaetzel2011-03-222-3/+3
* Update to 2.09_20110125sbz2011-03-221-1/+1
* - Update to 2.09sbz2011-03-222-5/+5
* - Update to 0.43clsung2011-03-213-5/+7
* Join the party, remove MD5 from the last of my portsdougb2011-03-212-4/+0
* Bump PORTREVISION for ports linking to default libmysqlclient.ale2011-03-197-4/+7
* - Readd p5-IP-Anonymous port in a correct directorypav2011-03-191-1/+1
* Document CVE-2011-0411: Postfix "STARTTLS" Plaintextsahil2011-03-191-0/+38
* - Add create-cert 2.0sunpoet2011-03-194-0/+36
* Update my MAINTAINER address to sbz at FreeBSD.org.sbz2011-03-1815-15/+15
* - Fix INDEXmiwi2011-03-181-1/+1
* - Documented integer overflow in hiawatha web serverglarkin2011-03-181-0/+32
* - Add missing RUN_DEPSmiwi2011-03-182-2/+5
* Get weak or strong random data from pluggable sourcesmiwi2011-03-175-0/+69
* - Mark ports that have been broken for six month or more, or never compiled onpav2011-03-174-23/+18
* Document asterisk multiple vulnerabilities.delphij2011-03-171-0/+39
* Update to 0.2.2.23-alphabf2011-03-152-5/+4
* Mark chromium-9.0.597.107 and chromium-10.0.648.127 as vulnerable.rene2011-03-151-2/+57
* - Cleanup a bitmiwi2011-03-151-1/+1
* - Add correct infos to the avahi issusmiwi2011-03-151-5/+9
* Fix date in avahi entry.kwm2011-03-151-1/+1
* Add avahi denial of services attack.kwm2011-03-151-0/+35
* - Bump PORTREVISION to chase the update of dns/libidnwen2011-03-143-5/+6
* Deprecate unmaintained ports from security where upstream disapear and/orbapt2011-03-1426-0/+78
* Make hidden dependency on GnuTLS explicitjohans2011-03-131-0/+2
* Unbreak build with LPK option (broken after commit 1.674 in bsd.port.mk).skv2011-03-121-1/+1
* Upgrade to 1.8.0bapt2011-03-112-3/+4
* Fix discovery for mailman XSS vulnerabilities.wxs2011-03-101-1/+1
* Document mail/mailman XSS vulnerabilities.wxs2011-03-101-0/+29
* - Update to 5.61swills2011-03-102-3/+4
* - Update to 2.08_20101224wen2011-03-081-2/+7
* - Update to 2.08wen2011-03-083-25/+51
* - Document redmine -- XSS vulnerabilitydecke2011-03-081-0/+29
* - Fix plistpav2011-03-081-85/+85
* Two new ports: security/yara and security/py-yara. The latter is the pythonwxs2011-03-089-0/+99
* This module extends existing IO::Async classes with extra methods todhn2011-03-075-0/+38
* - Update to 1.39jadawin2011-03-072-3/+3
* Document subversion -- remote HTTP DoS vulnerabilitylev2011-03-051-0/+32
* - Security update to 0.14.2dinoex2011-03-052-3/+4
* Update to RCjpaetzel2011-03-052-3/+4
* The OpenVPN Radius Plugin provides RADIUS authenticationmiwi2011-03-054-0/+53
* Update to 3.4.0 release and add support for amd64.ale2011-03-047-42/+42
* Update to 1.08 release and add LICENSE.ale2011-03-042-5/+9
* Remove extra spaces after port namesmartymac2011-03-041-1/+1
* - Update to 6.1miwi2011-03-043-19/+18
* Patch a assumtion that uname -m returns the architecture value instead of MAC...kwm2011-03-041-0/+11
* Add a more reliable mirrors for fc4 and f10 linux emulation ports.ehaupt2011-03-034-0/+4
* - Update to 0.30clsung2011-03-032-4/+3
* - Update to 1.0.8clsung2011-03-036-28/+28
* Update to 3.12.9.kwm2011-03-023-15/+5
* - Installing of libraries in ${OCAML_SITELIBDIR)/stublibs, which is not searc...wen2011-03-024-6/+16
* - Document mozilla -- multiple vulnerabilitiesbeat2011-03-021-0/+83
* - change the port to use devel/libevent2bf2011-03-021-4/+13
* - update to 0.2.1.30 (also submittedbf2011-03-022-12/+11
* Document Chromium versions 9.0.597.[84,94,107]rene2011-03-021-2/+71
* - Update to 0.76sunpoet2011-03-012-3/+3
* Deprecate all non-default Fedora based linux_base respectively linux-fx-*netchild2011-02-283-0/+9