aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Make it possible to run sshguard without blacklist database by settingfeld2014-11-042-4/+9
* Do not hide stdout from users by sending it to syslog. Users need to befeld2014-11-041-1/+1
* - Remove configurable options as they break the build when they are disabled.zi2014-11-031-6/+3
* - Fix build for Perl < 5.18culot2014-11-021-1/+7
* - Update to 5.07zi2014-11-022-4/+4
* Add licensebapt2014-11-021-0/+2
* Library providing a source-level compatibility layer to aid portingbapt2014-11-026-0/+54
* Update to 1.17.novel2014-11-013-4/+6
* Fix DEPENDSantoine2014-11-011-11/+10
* Fix security/nss plistrodrigo2014-11-012-0/+2
* Simplify plistbapt2014-10-311-3/+1
* Simplify plistbapt2014-10-311-15/+6
* Simplify plistbapt2014-10-311-27/+12
* Simplify plistbapt2014-10-311-3/+1
* Simplify plistbapt2014-10-311-4/+1
* Remove useless %Dbapt2014-10-311-8/+8
* Simplify plistbapt2014-10-311-4/+2
* Simplify plistbapt2014-10-311-30/+10
* Simplify plist by using @sample and @dirbapt2014-10-311-14/+4
* Simplify plistbapt2014-10-311-3/+1
* VuXML: document remote Perl code execution in TWikirea2014-10-311-0/+36
* Simplify plistbapt2014-10-311-31/+1
* - Update to 2.06culot2014-10-312-3/+6
* - Update to 5.93culot2014-10-312-3/+3
* VuXML: document vulnerability in Jenkinsrea2014-10-311-0/+53
* Update to 20141028antoine2014-10-312-4/+7
* Add USES=cpe, as requested by des and rea.rakuco2014-10-301-1/+1
* Update to 0.6.3 to fix CVE-2014-0017.rakuco2014-10-304-64/+17
* Horde package update:mm2014-10-302-3/+3
* Drop maintainership of all remaining ports where I am listed.anders2014-10-302-2/+2
* Remove @dirrm and @dirrmtry entries.rakuco2014-10-301-3/+0
* Add entry for libssh's CVE-2014-0017.rakuco2014-10-301-0/+31
* Upgrade to new upstream release 2.3.5.mandree2014-10-303-5/+3
* - Update to 2.002jadawin2014-10-292-3/+3
* Remove a bit of dead code.mat2014-10-291-4/+0
* - Fix plist for LIBDANE optionamdmi32014-10-282-0/+4
* security/polarssl: Update to 1.2.12jase2014-10-285-62/+11
* Remove usage of @dirrmehaupt2014-10-271-1/+0
* Mark broken with Perl 5.18 and newerswills2014-10-272-2/+14
* Do not infinite loop on the package builders creating GB (or TB) of logsantoine2014-10-261-0/+3
* - Update to 2.9.7.0zi2014-10-253-78/+108
* - Convert ports of science/ and security to new USES=pythonmva2014-10-2590-252/+159
* - Update to 2014.66ak2014-10-242-3/+3
* Install fix and @dirrm removal.cy2014-10-242-15/+3
* - Document recent vulnerabilities in libpurple/pidginzi2014-10-241-0/+34
* security/pam_search_list: Handle NO_PROFILE which affects pkg-plistmarino2014-10-231-1/+5
* Add hack to address wrong security index.cy2014-10-232-1/+12
* Document cross site scripting vulnerabilities in phpMyAdminmatthew2014-10-221-0/+35
* Document asterisk susceptibility to the POODLE vulnerability,madpilot2014-10-211-0/+32
* - Update to 5.06zi2014-10-213-7/+7
* Allow staging as a regular userantoine2014-10-213-8/+37
* Add USES=alias to several portsmarino2014-10-204-3/+4
* Update 2.9.0 --> 2.9.2cy2014-10-202-4/+3
* Adjust to work with new openpyxlantoine2014-10-201-1/+6
* Update to 2.1.0.8antoine2014-10-202-3/+3
* KDE/FreeBSD team presents KDE SC 4.14.2 and KDE Workspace 4.11.13!makc2014-10-196-33/+7
* Fix packagingantoine2014-10-192-3/+3
* - Un-break build for non-standard OPTION VCHKPWriggs2014-10-191-5/+7
* security/wpa_supplicant: Fix build on FreeBSD 11marino2014-10-191-0/+1
* security/sslsplit: add portswills2014-10-195-0/+61
* Fix LATEST_LINK.cy2014-10-193-2/+2
* Document libxml2 denial of servicekwm2014-10-181-0/+33
* The MAP_NORESERVE flag to mmap() has never been implemented in FreeBSD andjhb2014-10-181-0/+11
* Unbreakantoine2014-10-182-2/+4
* - Update to upstream version 20140826riggs2014-10-183-9/+9
* Add dependency option, defaulting to security/krb5.cy2014-10-181-2/+19
* security/linux-c6-openssl: kill poodlexmj2014-10-172-5/+6
* Add linux-c6-openssl to OpenSSL entry from 2014-10-15.xmj2014-10-171-0/+4
* Reset maintainershipbapt2014-10-171-1/+1
* - Update to 2.1.1.vsevolod2014-10-174-6/+12
* MIT Kerberos released 1.13; 1.12 becomes a maintenance release,cy2014-10-1728-11/+563
* Document critical SQL Injection Vulnerability in www/drupal7flo2014-10-171-0/+34
* Remove @dirrm from package list of 8 of my portsmarino2014-10-161-6/+0
* - Mark libxul as vulnerable toobeat2014-10-161-0/+5
* security/kpcli: update 2.5 -> 2.7robak2014-10-162-5/+5
* - Fix runtime error when used with OpenSSL 1.0.1i [1]madpilot2014-10-165-6/+22
* - Fix various distinfo errorsak2014-10-161-9/+0
* Update to 1.8.11p1wxs2014-10-166-20/+53
* - Update to 1.9.13zi2014-10-163-5/+5
* - Fix regex to match all sshd auth errorsamdmi32014-10-162-2/+2
* - Fix rule reset time on armamdmi32014-10-162-1/+12
* Fix build on systems without stdnoreturn.hbdrewery2014-10-161-0/+2
* Update gss to 1.0.3 (API+ABI compatible)johans2014-10-163-8/+11
* Update to 1.01j.delphij2014-10-163-13/+19
* Update to signing-party 1.1.10johans2014-10-163-8/+14
* Document OpenSSL multiple vulnerabilities.delphij2014-10-161-0/+61
* - Update Firefox to 33.0beat2014-10-156-10/+9
* - Update to 3.2.19bdrewery2014-10-153-4/+4
* Document mozilla vulnerabilitiesbeat2014-10-151-0/+82
* - Update to 1.6.2lme2014-10-143-22/+16
* Update to 1.20.2martymac2014-10-143-3/+5
* security/wpa_supplicant: Fix mis-information in pkg-messagemarino2014-10-141-1/+1
* security/wpa_supplicant: Bring in BSD driver fix from DragonFly BSDmarino2014-10-132-1/+17
* Only works with php 5.2 -> 5.4.mat2014-10-131-0/+1
* wpa/supplicant: Fix driver list with NDIS, take 2marino2014-10-133-1/+26
* security/wpa_supplicant: Fix NDIS driver, privsep no longer defaultmarino2014-10-133-5/+43
* - Update to 2.1.0vsevolod2014-10-133-5/+5
* Remove @dirrm/@dirrmty from my portsmartymac2014-10-132-13/+0
* Revive security/wpa_supplicant after 6.5 years => version 2.3marino2014-10-1315-0/+841
* Update security/pam_ocra to 1.1rodrigo2014-10-132-5/+20
* Unbreak on freebsd 8 and 9antoine2014-10-123-10/+16
* Update to 0.22.1.novel2014-10-124-18/+9
* - Update to 1.0.0vsevolod2014-10-123-6/+6
* Update to 1.4.23arved2014-10-122-3/+3
* Use Uses/gssapi.mk.ume2014-10-121-14/+6
* security/aespipe: update v2.3e -> v2.4crobak2014-10-122-4/+3
* Update to 1.16.novel2014-10-123-4/+4
* Since we don't use its own libtool, build arg is requiredume2014-10-111-1/+1
* security/sguil: Fix shebang in sguildmarino2014-10-101-1/+2
* Include RPATH in the libs, again.ume2014-10-091-1/+8
* Convert USE_PYTHON_RUN to new USES syntax;feld2014-10-091-1/+1
* Add entry for foreman-proxyfeld2014-10-091-0/+30
* Fix packaging for linux-c6-libtasn1 and linux-f10-libtasn1antoine2014-10-092-2/+2
* Remove @dirrm, @dirrmtryehaupt2014-10-082-2/+0
* Document new vulnerabilities in www/chromium < 38.0.2125.101rene2014-10-081-0/+71
* security/vinetto: switch from py-imaging to py-pillowwg2014-10-072-6/+17
* Note my intentions with OVERWRITE_BASEbdrewery2014-10-071-0/+1
* - Add py-oauth2client 1.3sunpoet2014-10-074-0/+29
* - document bugzilla security issuesohauer2014-10-071-0/+49
* Use new @dir for directories out of PREFIXgarga2014-10-062-13/+7
* security/py-pylibacl: update 0.5.0 -> 0.5.2 and fixesrobak2014-10-063-12/+8
* New port: security/py-rekallantoine2014-10-064-0/+59
* - Update devel/libtool and devel/libltdl to version 2.4.2.418tijl2014-10-064-13/+22
* Update to 20140928antoine2014-10-053-4/+4
* Switch from py-imaging to py-pillowantoine2014-10-041-1/+2
* - Mark OVERWRITE_BASE and security/openssh-portable-base as DEPRECATED.bdrewery2014-10-041-0/+2
* Support multiple ListenAddress portsbdrewery2014-10-042-4/+9
* Fix rsyslog entry for pkgname matchingbdrewery2014-10-031-0/+3
* www/rt42 < 4.2.8 is vulnerable to shellshock related exploits throughmatthew2014-10-031-0/+36
* - Update the rsyslog entry to reflect the new versionsbrd2014-10-031-2/+4
* Update to 3.2.18bdrewery2014-10-034-16/+13
* Cleanup @dirrm* from my ports.mat2014-10-031-5/+0
* The default pardon and prescribe settings in the rc script were swappedfeld2014-10-022-5/+5
* Update Jenkins entry 549a2771-49cc-11e4-ae2c-c80aa9043978 to be readable.bdrewery2014-10-021-54/+99
* Update grammar of DoS in Jenkins entrybdrewery2014-10-021-1/+1
* Fix Jenkins entry to note that XSS is an issue, not as compilerbdrewery2014-10-021-1/+1
* Document Jenkins vulnerabilitiesbdrewery2014-10-021-0/+94
* Fix bash entries to also mark bash-static vulnerablebdrewery2014-10-021-0/+2
* Document CVE-2014-6277 and CVE-2014-6278 for bash.bdrewery2014-10-021-0/+28
* - Document CVE-2014-7187 fixed in bash-4.3.27_1bdrewery2014-10-021-0/+7
* Document the latest phpMyAdmin vulnerability.matthew2014-10-021-1/+32
* - Convert to USES=autoreconftijl2014-10-011-7/+3
* Document CVE-2014-7186 for bashbdrewery2014-10-011-0/+29
* Convert to USES=hordebapt2014-10-018-36/+19
* - Document sysutils/rsyslog vulnerabilities CVE-2014-3634brd2014-10-011-0/+30
* security/libbeid: Add <stdlib.h> header for mallocmarino2014-10-011-4/+5
* - Pet portlint: move USES=pear downwardsunpoet2014-09-301-2/+2
* service_identity aspires to give you all the tools you needmva2014-09-304-0/+36
* Remove expired ports:rene2014-09-3012-178/+0
* Add pam_ocra 1.0, RFC6287 (OCRA) PAM module.vanilla2014-09-304-0/+33
* Document shells/fish vulnerabilitiesbdrewery2014-09-301-0/+35
* - adopt new pkg-plist styleohauer2014-09-291-33/+0
* - remove useless PORT_OPTIONS:MDOCS checkohauer2014-09-291-13/+9
* Move back to version 0.17.0 and take maintainership, new versions do notantoine2014-09-282-5/+7
* security/rubygem-metasploit_data_models: update to 0.20.1swills2014-09-282-3/+3
* security/linux-c6-nss: update to 3.16.1xmj2014-09-273-15/+26
* Revert broken non-conversion to USES=pearantoine2014-09-272-3/+10
* Fix stage violation (and allow staging as regular user)antoine2014-09-271-0/+1
* Add linux-c6-nss-3.15.1 package to the NSS vulnerability report.xmj2014-09-271-0/+4
* Add linux_base-c6-6.5 package to the bash vulnerability report.xmj2014-09-271-0/+4
* Convert to USES=pearbapt2014-09-2625-275/+82
* The 2nd bash issue was reassigned to CVE-2014-7169:bdrewery2014-09-261-2/+2
* Remove hack now that USES=pathfix no longer modifies configure (r369260)tijl2014-09-251-5/+0
* Update bash entry for CVE-2014-3659bdrewery2014-09-251-7/+12
* - Set CPPFLAGS and LIBS in a number of ports so configure can find libintl.htijl2014-09-252-1/+5
* VuXML entry 48108fb0-751c-4cbb-8f33-09239ead4b55: expanded detailsrea2014-09-251-2/+6
* www/linux-*-flashplugin11: Fix multiple security vulnerabilitiesxmj2014-09-251-0/+42
* - Remove obsolete @dirrm(try)ak2014-09-251-1/+1
* - Update ca_root_nss to 3.17.1beat2014-09-252-3/+3
* Update tor to 0.2.4.24 and tor-devel to 0.2.5.8-rcbf2014-09-256-13/+6
* fixdes2014-09-251-1/+1
* Add entry for the NSS signature forgery bug.des2014-09-251-1/+39
* Upgrade to 3.17.1des2014-09-252-4/+3
* Document new vulnerability in www/chromium < 37.0.2062.124rene2014-09-251-0/+28
* Add entry for net/krfb (CVE-2014-6055).rakuco2014-09-251-0/+31
* - Allow staging as a regular userantoine2014-09-252-36/+3
* Document bash remote code execution vulnerability.delphij2014-09-251-0/+36
* Hand back my ports to the pool.eadler2014-09-241-1/+1
* - Drop @dirrm* from plistamdmi32014-09-242-111/+1
* - Upgrade to 0.7.1.vsevolod2014-09-233-5/+4
* Simplify plistbapt2014-09-232-19/+5
* Simplify plistbapt2014-09-231-8/+2
* Simplify plistbapt2014-09-232-9/+3
* Simplify plistbapt2014-09-231-5/+0
* Simplify plistbapt2014-09-231-3/+1
* Simplify plistbapt2014-09-231-8/+4
* Simplify plistbapt2014-09-231-18/+2
* Simplify plistbapt2014-09-232-11/+5
* Simplify plistbapt2014-09-231-8/+3
* Simplify plistbapt2014-09-232-13/+3
* Simplify plist (and avoir @cwd)bapt2014-09-231-3/+1
* Simplify plistbapt2014-09-221-6/+2
* - Drop @dirrm* from plistamdmi32014-09-221-1/+0
* - Trim @dirrm[try] from pkg-plistjhale2014-09-222-4/+0
* Update CentOS base to 6.5, add userland portsxmj2014-09-2235-31/+557
* Fix build when security/openssl is installed.hrs2014-09-221-1/+4
* - Update to 5.04zi2014-09-222-3/+3
* Update to 1.15.novel2014-09-213-5/+4
* Update to 4.2.novel2014-09-213-4/+4
* security/heimdal: Unbreak on DragonFlymarino2014-09-211-0/+4
* Remove FORBIDDEN that references vuxml. We already have vuxml, portauditbdrewery2014-09-204-8/+0
* Remove expired portsrene2014-09-2015-444/+0
* fix build with perl 5.18az2014-09-201-1/+6
* fix build with perl 5.18az2014-09-201-0/+8
* - Remove dependency on pkgconftijl2014-09-191-9/+1
* Remove old libtool patchtijl2014-09-191-11/+0
* Document new asterisk11 vulnerability.madpilot2014-09-191-0/+38
* Expose the reload command in the tor and tor-devel rc-scripts [1],bf2014-09-195-5/+6
* - Drop .la files, no dependees require themamdmi32014-09-192-3/+2
* Fix recidive jail.ache2014-09-192-1/+16
* - Update to 1.3.1sunpoet2014-09-193-14/+6
* Document new squid vulnerability.madpilot2014-09-181-0/+35
* - Bump PORTREVISIONs on php*-mcrypt after libmcrypt .so version changeamdmi32014-09-184-0/+4
* fix scripoliver2014-09-181-0/+3
* - Drop .la files for security/libmcrypt, no dependees require themamdmi32014-09-187-7/+9
* - Drop .la files, no dependees require themamdmi32014-09-182-3/+2
* - Drop .la files, no dependees require themamdmi32014-09-172-2/+2
* - Drop .la files, no dependees require themamdmi32014-09-172-3/+2
* - Strip shared librariesgahr2014-09-171-0/+2
* Document new dbus vulnabilities.kwm2014-09-171-0/+52
* Replace USE_AUTOTOOLS=libltdl with an ordinary LIB_DEPENDS in all ports.tijl2014-09-178-11/+16
* Document nginx security advisory (CVE-2014-3616).osa2014-09-171-0/+32
* - Drop .la files for security/libksba, no dependees require themamdmi32014-09-165-6/+7
* Add ipropd_master and ipropd_slave rc.d scripts for branches which do nothrs2014-09-163-1/+92
* Add pkg-message for client userscs2014-09-162-0/+16
* Allow staging as a regular userantoine2014-09-153-3/+1
* - Use the ports framework to create user/groupantoine2014-09-153-45/+5
* - Patch a script to use the right syslogd socket (/var/run/log)tijl2014-09-152-6/+2
* Update to v2.0beta.hrs2014-09-155-11/+24
* Fix build with makeinfo version 5.2.hrs2014-09-152-0/+54
* - Switch to USES=libtool:buildtijl2014-09-141-5/+3
* Document the latest phpMyAdmin vulnerabilitymatthew2014-09-141-0/+30
* Use default LIBTOOLIZE_ARGStijl2014-09-141-1/+0
* security/heimdal: Restore MAKE_JOBS_UNSAFE removed recentlymarino2014-09-141-0/+2
* devel/glib12 x11-toolkits/gtk12:tijl2014-09-138-8/+8
* Re-deprecate and add back the expiration date.adamw2014-09-131-2/+5
* Fix build and minor clean-ups to Makefile.adamw2014-09-131-7/+8
* Allow staging as a regular userantoine2014-09-131-5/+5
* Allow staging as a regular userantoine2014-09-121-1/+0
* Adjust patch to avoid libtool. It is more similar to Linux now.tijl2014-09-123-10/+23
* Remove a comment about USE_AUTOTOOLS=libtooltijl2014-09-121-4/+0
* - fix build with ccache on FreeBSD 10ohauer2014-09-121-1/+1
* - update to 1.4d (see http://www.harding.motd.ca/autossh/CHANGES)leeym2014-09-122-3/+3
* Use @sample for sudoersbdrewery2014-09-121-3/+1
* databases/sqlite2:tijl2014-09-121-1/+1
* - Allow staging as a regular userantoine2014-09-121-3/+5
* - Update to CyaSSL 3.2.0johans2014-09-123-5/+10
* Allow staging as a regular userantoine2014-09-121-1/+1
* - Fix libnet dependencymich2014-09-121-4/+1
* Update to 2.8.1 which addresses CVE-2014-5284.brd2014-09-112-3/+3