aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* security/nss: limit ports binutils to FreeBSDjbeich2016-03-041-1/+1
* security/py-passlib: Update to 1.6.5koobs2016-03-044-21/+18
* - extend CONFLICTS for openssl-develdinoex2016-03-041-1/+1
* - Switch to USES=taramdmi32016-03-041-4/+9
* - Simplify strippingamdmi32016-03-042-11/+8
* - Switch to options helpersamdmi32016-03-041-10/+10
* - Remove unneeded CONFIGURE_ARGSamdmi32016-03-041-2/+5
* - Add LICENSEamdmi32016-03-041-5/+10
* - Add LICENSE_FILEamdmi32016-03-041-4/+9
* - Switch to options helpersamdmi32016-03-042-7/+9
* - Silence patching and strippingamdmi32016-03-042-6/+8
* security/openssl-devel: Create OpenSSL 1.1.0 Alpha portbrnrd2016-03-037-7/+0
* security/openssl-devel: Create OpenSSL 1.1.0 Alpha portbrnrd2016-03-0315-0/+2297
* security/openssl: Revert disabling of SSLv2 and MD2feld2016-03-031-2/+2
* security/nss: update to 3.23jbeich2016-03-034-161/+62
* Restore the original creator's record.mi2016-03-031-1/+1
* Common:cpm2016-03-034-7/+7
* security/nss: unbreak build on 9.x after r409978jbeich2016-03-031-0/+38
* - unbreak and pass maintainer-ship to submitterjgh2016-03-031-4/+2
* security/nss: update to 3.22.2jbeich2016-03-034-6/+6
* Update to 3.4.rakuco2016-03-032-3/+3
* security/openssl: Disable SSLv2 and MD2feld2016-03-031-2/+2
* Document the latest exim vulnerability - local privilleges escalation viavsevolod2016-03-031-0/+31
* security/py-cryptography: Fix build with OpenSSL 1.0.2gkoobs2016-03-032-1/+32
* Add the forgot patch at my previous commit.ume2016-03-021-0/+11
* - Make SASLdb excludable.ume2016-03-029-83/+94
* Update graphite vuxml entry to add another relevant URLfeld2016-03-021-1/+2
* Update libssh to 0.7.3johans2016-03-023-5/+5
* Update to 1.7.0.vanilla2016-03-023-3/+6
* Update to 1.7.0.vanilla2016-03-023-3/+9
* - Update maintainer's email addresslwhsu2016-03-022-4/+4
* Update 1.14 --> 1.14.1cy2016-03-023-14/+3
* Document SQL injection and authentication bypass in Cactijunovitch2016-03-021-0/+39
* security/p5-Crypt-PKCS10: 1.3 -> 1.5pi2016-03-022-3/+3
* - Security update to 1.0.2gdinoex2016-03-022-12/+12
* Update zxid and p5-Net-SAML to 1.42.adamw2016-03-026-32/+22
* USES=shebangfix.mat2016-03-011-1/+3
* Document the latest round of phpMyAdmin vulnerabilities. Lots of XSSmatthew2016-03-011-0/+67
* Document wireshark multiple vulnerabilitiesjunovitch2016-03-011-0/+158
* security/pdfcrack: update to 0.15 (redo r409827)mi2016-03-014-0/+34
* Back out r409827 to restore old historymi2016-03-014-34/+0
* Add a tool for brute-force cracking PDF-passwords (both user andmi2016-03-014-0/+34
* - Update to 7.2p1bdrewery2016-03-018-110/+37
* Update security/pinentry and slave ports to 0.9.7.rakuco2016-03-013-23/+8
* - Add LICENSEamdmi32016-03-011-8/+10
* Add acme-tiny, a tiny script to issue and renew TLS certs from Let's Encrypt.mat2016-03-015-0/+49
* Remove security/openssh-portable-devel since it is outdated, insecure,bdrewery2016-03-0127-2730/+0
* - Update DEPENDSwen2016-02-291-1/+3
* security/honeybadger: Update to 0.0.0.2016022301swills2016-02-292-7/+7
* Update www/tomcat7 version.osa2016-02-291-2/+2
* Update tomcat vuxml entryfeld2016-02-291-3/+1
* Document additional tomcat vulnerabilitiesfeld2016-02-291-0/+38
* Update documented tomcat vulnerabiltiiesfeld2016-02-291-6/+16
* Document tomcat vulnerabilitiesfeld2016-02-291-0/+36
* Update xerces-c3 and shibboleth to latest versionsgirgen2016-02-293-6/+3
* Update security/certificate-transparency to 20160102.trasz2016-02-2931-78/+165
* Document vulnerability i xerces-c3girgen2016-02-291-0/+31
* Revise Squid entry with CVE assignment and SQUID-2016:2 advisory referencejunovitch2016-02-281-9/+15
* Document django vulnerabilityfeld2016-02-281-0/+37
* Document Xen Security Advisories (XSAs 167, 168, 170)junovitch2016-02-281-0/+106
* Document moodle vulnerabilitiesfeld2016-02-281-0/+40
* Update to 1.4.0.rakuco2016-02-282-3/+3
* Update to 1.4.0.rakuco2016-02-283-3/+4
* security/openvpn-devel: 201548 -> 201607pi2016-02-283-5/+5
* security/letsencrypt.sh: periodic script needs to find curl in $PATHpi2016-02-282-0/+4
* Move PLIST_FILES for plugins into cyrus-sasl2/Makefile.common.ume2016-02-284-16/+8
* When linking nss uses plain CC and does not pass CFLAGSbapt2016-02-271-1/+1
* - Update to 0.9.2tota2016-02-273-13/+3
* Move the common part of the cyrus-sasl2 separated ports intoume2016-02-276-381/+233
* Document multimedia/pitivi vulnerabilityfeld2016-02-271-0/+29
* Document graphics/giflib vulnerabilityfeld2016-02-261-0/+31
* security/py-{acme,letsencrypt}: Update to 0.4.0koobs2016-02-264-14/+20
* Revert r409585 to avoid dependency loop.ume2016-02-261-14/+2
* security/py-oauthlib: Update 1.0.3koobs2016-02-262-24/+22
* security/py-libnacl: Update to 1.4.4koobs2016-02-263-6/+8
* security/py-cpe: Update to 1.2.0koobs2016-02-262-6/+11
* OPTIONSfy ANONYMOUS authentication.ume2016-02-262-7/+10
* - set dependency to libmilter, bump PORTREVISIONdinoex2016-02-261-1/+2
* Add OPTIONS for the separeted cyrus-sasl2 ports.ume2016-02-261-3/+14
* Use gssapi related descriptions in bsd.options.desc.mk.ume2016-02-262-36/+30
* Document drupal vulnerabilitiesfeld2016-02-251-0/+54
* - Clarify LICENSEamdmi32016-02-251-5/+8
* Document Jenkins Security Advisory 2016-02-24lwhsu2016-02-251-0/+53
* vuxml: Update entry for graphics/jasperfeld2016-02-251-4/+4
* Document squid remote DoS in HTTP response processingjunovitch2016-02-241-0/+32
* Add Cyrus SASL SRP authentication plugin.ume2016-02-244-0/+79
* - Switch to options helpersamdmi32016-02-241-1/+3
* - Update to 1.228miwi2016-02-232-3/+3
* - Update to 1.2.0miwi2016-02-232-3/+3
* - Update to 20160222danilo2016-02-232-4/+4
* - Update to 0.11wen2016-02-232-3/+3
* security/nss: update to 3.22.1jbeich2016-02-222-4/+4
* security/afl: update 2.02b -> 2.03bjunovitch2016-02-222-3/+3
* security/keepassx2: update 2.0 -> 2.0.2junovitch2016-02-223-5/+5
* Document bsh remote code execution vulnerabilityjunovitch2016-02-211-0/+44
* Document libsrtp DoS via crafted RTP header vulnerabilityjunovitch2016-02-211-0/+33
* Respace entry so `make validate' passesjunovitch2016-02-211-34/+34
* - add jasper -- multiple vulnerabilitiesdinoex2016-02-201-2/+66
* security/afl: 1.96.b -> 2.02bpi2016-02-206-26/+94
* security/honeybadger: add portswills2016-02-204-0/+95
* security/letsencrypt.sh: Update to 2016-02-17brnrd2016-02-202-4/+10
* security/gnupg: ldap module needs gcrypt toogahr2016-02-202-6/+13
* security/gnupg: fix build when NLS is disabledgahr2016-02-203-1/+23
* Regenerate distinfo information for gnupg-2.1.11.tar.bz2.sig.rakuco2016-02-191-2/+2
* Update to 2.1.11 (minor fixes, with upstream patch).kuriyama2016-02-195-17/+37
* Document that graphics/silgraphite is also vulnerablefeld2016-02-191-1/+5
* Document new vulnerability in www/chromium < 48.0.2564.116rene2016-02-191-0/+29
* - Ignore php70miwi2016-02-187-2/+8
* - Switch to options helpersamdmi32016-02-181-9/+12
* Document Linux glibc crash/code execution via crafted DNS responsesjunovitch2016-02-181-0/+45
* Revise earlier Squid entry with official Squid SA as a referencejunovitch2016-02-181-0/+2
* Document Squid SSL/TLS processing remote DoSjunovitch2016-02-181-0/+37
* Install openssl-1.0.cnf as well (EasyRSA-3.0 specific).mandree2016-02-182-2/+5
* Document databases/adminer vulnerabilitiesfeld2016-02-181-0/+101
* Update my email for ports I maintainolivier2016-02-172-3/+3
* lang/p5-Scalar-Util-Numeric was already there at devel/p5-Scalar-Util-Numeric.mat2016-02-171-1/+1
* Add security/p5-Crypt-XTEA, and its dependency lang/p5-Scalar-Util-Numeric.adamw2016-02-175-0/+45
* security/strongswan: enable options to increase usefulness of default pkgjunovitch2016-02-171-3/+6
* Correct CVE numbers for recent Flash vulnerabilities.jkim2016-02-171-22/+22
* Add LICENSE info, and donate to the perl collective.adamw2016-02-171-1/+4
* security/letsencrypt.sh: Update to 2015-02-15brnrd2016-02-162-5/+4
* - Update libgcrypt to 1.6.5cpm2016-02-165-67/+28
* Document libgcrypt side-channel attack on ECDHcpm2016-02-161-0/+26
* Document xdelta3 buffer overflow vulnerabilityjunovitch2016-02-161-0/+29
* security/letsencrypt.sh: Fix periodic scriptbrnrd2016-02-161-0/+1
* - Update Description from previous commit.miwi2016-02-151-2/+6
* - Document firefox -- Same-origin-policy violation using Service Workers with...miwi2016-02-151-0/+31
* Welcome php 7.0.3miwi2016-02-156-0/+54
* security/letsencrypt.sh: Fix periodic scriptbrnrd2016-02-151-0/+1
* Add CVE to the OpenSSH 7.0.p1 entry and also mention CVE-2015-6565junovitch2016-02-151-1/+8
* Remove PHP 5.4 from the Ports Tree, it expired upstream in 2015-Q3 and therene2016-02-156-54/+0
* Correct URL.girgen2016-02-151-1/+1
* The FreeBSD GNOME team proudly presents GNOME 3.18 for FreeBSD.kwm2016-02-1514-67/+57
* security/letsencrypt.sh: Update to 2016-02-12brnrd2016-02-154-13/+45
* Deprecate ports that are incompatible with both PHP 5.5 and PHP 5.6 and setrene2016-02-151-0/+3
* - Fix formatingmiwi2016-02-141-12/+12
* security/vuxml: Add entry for www/nghttp2 < 1.7.1brnrd2016-02-141-0/+32
* Document cross-site scripting vulnerabilities in Horde Groupwarejunovitch2016-02-141-0/+36
* Fix dnscrypt-proxy reference URL (ihttps -> https)junovitch2016-02-141-1/+2
* Document security problems in PostgreSQLgirgen2016-02-141-0/+58
* Reflect QEMU DoS vulnerabilities now fixed in qemu-sbruno/qemu-user-staticjunovitch2016-02-141-5/+20
* Update to 0.160410. Note that the dependencies have all changed for thisadamw2016-02-142-7/+9
* Add security/p5-Digest-SHA3, a NIST SHA3 implementation and perl interface.adamw2016-02-145-0/+37
* - mark options ASM broken on sparc64dinoex2016-02-131-0/+1
* - split libmilter from sendmail into a seperate portdinoex2016-02-131-1/+1
* security/py-python-openid: adopt portrm2016-02-133-13/+16
* security/py-openid: rename to security/py-python-openidrm2016-02-135-3/+4
* security/py-keyring: update to 8.3rm2016-02-132-15/+9
* Alternate keyring backend implementations for use with the Python keyringrm2016-02-134-0/+41
* security/py-pyscard: update to 1.9.2rm2016-02-132-3/+3
* Update to 2.31.rakuco2016-02-124-91/+5
* - Update to 4.6.0miwi2016-02-123-4/+4
* Update to 5.6.rakuco2016-02-122-3/+3
* security/py-flask-httpauth: update to 2.7.1rm2016-02-122-3/+3
* - Update to 2.024jadawin2016-02-112-3/+3
* Document feb 8, 2016 flash vulnerabilities.kwm2016-02-101-0/+61
* - Update to 4.0.2miwi2016-02-102-3/+3
* Document dns/dnscrypt-proxy vulnerabilityfeld2016-02-101-0/+26
* Fix vuxml to pass `make validate`feld2016-02-101-1/+0
* Document new vulnerabilities in www/chromium < 48.0.2564.109rene2016-02-101-1/+48
* Update graphics/graphite2 vulnerability detailsfeld2016-02-101-4/+18
* Document graphics/graphite2 vulnerabilityfeld2016-02-101-0/+27
* Fix duplicate "reports" in last entryfeld2016-02-101-1/+1
* Document net-mgmt/xymon-server vulnerabilitiesfeld2016-02-101-0/+42
* - Document php -- pcre vulnerabilitymiwi2016-02-091-0/+44
* Document multiple vulnerabilities in graphics/py-imaging and graphics/py-pillow.rakuco2016-02-091-0/+156
* security/nss: update to 3.22jbeich2016-02-096-10/+9
* This patch fixes alignment of self-test context in salsa20 requiredcpm2016-02-095-65/+83
* Unbreak with new cracklibantoine2016-02-091-2/+2
* - Mark BROKEN, does not build:amdmi32016-02-081-0/+1
* - Update to 1.20jadawin2016-02-082-4/+5
* 2015-12-31 security/polarssl: Upstream is ending support for 1.2.xdelphij2016-02-077-194/+0
* Update to 1.2.19.delphij2016-02-072-3/+3
* - Update to 20160204danilo2016-02-062-4/+4
* Document remote denial of service in ffmpeg before 2.8.6 andriggs2016-02-061-0/+34
* Update to 1.6.1.vanilla2016-02-063-4/+5
* Update to 1.6.1.vanilla2016-02-063-5/+7
* Update version of net/samba36 package to reflect it is still unpatchedjunovitch2016-02-061-1/+2
* Document shotwell failure to validate TLS certificates.kwm2016-02-061-0/+39
* Fix Shared object "libcrack.so.2" not found, required bycy2016-02-051-1/+1
* Update 2.9.4 --> 2.9.6cy2016-02-056-9/+25
* - Update unbound to 1.5.7erwin2016-02-042-2/+2
* Document webkit CVE-2014-1748.kwm2016-02-041-0/+30
* security/py-rsa: Update to 3.3 (Fixes CVE-2016-1494)koobs2016-02-043-22/+21
* security/vuxml: Add CVE-2016-1494 for security/py-rsakoobs2016-02-041-0/+37
* Document new asterisk ports vulnerabilities.madpilot2016-02-041-0/+37
* security/suricata: Add netmap IPS mode to pkg-messagekoobs2016-02-042-1/+13
* security/pwman: document ncurses requirement (USES+=ncurses)marino2016-02-042-0/+30
* security/yapet: document ncurses requirement (USES+=ncurses)marino2016-02-041-1/+1
* x11/xterm: document ncurses requirement (USES+=ncurses)marino2016-02-042-1/+12
* security/mdcrack: document ncurses rqmt (USES+=ncurses), respect LDFLAGSmarino2016-02-041-1/+2
* security/krb5-appl: document ncurses requirement (USES+=ncurses)marino2016-02-041-1/+1
* security/ckpass: document ncurses requirement (USES+=ncurses)marino2016-02-041-0/+1
* - Update RUN_DEPENDS: use Rails 4sunpoet2016-02-041-1/+2
* - Add letsencrypt.shsunpoet2016-02-046-0/+84
* Document py-salt vulnerabilityfeld2016-02-041-0/+32
* - Fix build on OSVERSION < 1000015tota2016-02-031-1/+9
* Horde package update:mm2016-02-0312-18/+18
* Update Nettle to 3.2 (ABI compatible)johans2016-02-036-47/+5
* - Document Ruby on Rails multiple vulnerabilitiessunpoet2016-02-031-0/+71
* security/suricata: Update to 3.0koobs2016-02-032-3/+3
* security/py-{letsencrypt,acme}: Update to 0.3.0koobs2016-02-025-26/+16
* Document that the linux curl ports are still vulnerable.kwm2016-02-021-1/+10
* Document net/socat vulnerabilityfeld2016-02-021-0/+31
* - Update to 0.23.0sunpoet2016-02-022-9/+24
* security/govpn: 5.3 -> 5.4pi2016-02-022-3/+3
* - Update to 2.023jadawin2016-02-012-3/+3
* [NEW] security/stud: Scalable TLS Unwrapping Daemonkoobs2016-02-014-0/+40
* Add a new option to conditionalize xconv installationgarga2016-02-015-13/+17
* Document recent Mozilla vulnerabilitiesjbeich2016-02-011-0/+79
* Document multiple vulnerabilities in gdcmjunovitch2016-02-011-0/+35
* security/libressl-devel: Update to 2.3.2brnrd2016-01-315-109/+31
* security/libressl: Update to 2.2.6brnrd2016-01-313-5/+6
* - Fix x11/linux-c6-xorg-libs entry as fixedmiwi2016-01-311-2/+2
* security/clamav: document ncurses requirement (USES+=ncurses)marino2016-01-311-1/+1
* - Mark linux-c6* entys as fixedmiwi2016-01-311-5/+6
* Welcome Centos 6.7miwi2016-01-3124-106/+112
* ftp/curl: Fix vuxml version checkbrnrd2016-01-311-2/+2
* On FreeBSD, using TIOCSCTTY ioctl to get a controlling tty.kevlo2016-01-301-8/+21
* vuxml: fix version range for nginx which has a PORTEPOCHfeld2016-01-301-1/+1
* Document www/nginx vulnerabilitiesfeld2016-01-301-0/+35
* Document www/typo3 and www/typo3-lts vulnerabilitiesfeld2016-01-301-0/+36
* vuxml: Fix owncloud discovery datefeld2016-01-301-1/+1
* Document www/nghttp2 vulnerabilityfeld2016-01-301-0/+28
* vuxml: Fix openssl entry so `make validate` doesn't throw errorsfeld2016-01-301-36/+36
* Document www/owncloud vulnerabilitiesfeld2016-01-301-0/+38
* vuxml: radicale entry needs python prefixes for packagenamefeld2016-01-291-1/+4
* Document www/radicale vulnerabilitiesfeld2016-01-291-0/+29
* - Add new port: security/R-cran-openssltota2016-01-295-0/+44
* - Update to 5.30zi2016-01-292-3/+3
* - Do not #include <unistd.h> twice in the same filedanfe2016-01-293-13/+3
* - Update to 1.9.18zi2016-01-292-3/+3
* - Update to 1.1.1zi2016-01-293-189/+3
* - Update to 4.2zi2016-01-292-8/+7
* Add 9 security advisories for phpMyAdmin:matthew2016-01-291-0/+295
* Update to 1.96b.rakuco2016-01-292-11/+9
* vuxml for prosody CVE-2016-0756.lx2016-01-291-0/+28
* - add new manpagesdinoex2016-01-292-4/+9
* - report OpenSSL 1.0.2e vulnerabilitydinoex2016-01-281-0/+53
* - Security update:dinoex2016-01-282-12/+14
* security/vuxml: Document cURL vulnerabilitybrnrd2016-01-281-0/+30
* Add patch to fix build on ARM v6johans2016-01-273-4/+26
* Update to 0.027.vanilla2016-01-272-3/+3
* Upgrade security/elixir-comeonin to version 2.1.0.olgeni2016-01-262-3/+3
* Document Wordpress cross site scripting vulnerabilityjunovitch2016-01-261-0/+40
* Document recent privoxy security vulnerabilitiesjunovitch2016-01-261-0/+149
* Document potential privilege escalation via symlink misconfiguration in sudojunovitch2016-01-261-0/+32
* Remove BROKEN_FreeBSD_8 from all remaining ports.rakuco2016-01-261-1/+0
* security/govpn: update 5.2 -> 5.3robak2016-01-252-3/+3
* Fix use as a regular userantoine2016-01-251-0/+4