aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Remove extra / invalid CVE entry for OpenSSLfeld2016-09-221-1/+0
* Update range of vulnerable irssi versionsfeld2016-09-221-2/+2
* security/vuxml: Add new OpenSSL 1.0.2 and 1.1.0 vulnerabilitiesbrnrd2016-09-221-0/+57
* Document that chinese/irssi is vulnerable as wellfeld2016-09-221-0/+2
* Document irssi vulnerabilitiesfeld2016-09-221-0/+28
* lang/php70: Update from 7.0.10 to 7.0.11tz2016-09-214-4/+0
* - Fix build when a previous version is insalled and ssl from ports is usedantoine2016-09-212-2/+13
* - Update to 2.038jadawin2016-09-212-4/+4
* Update security/sudo to 1.8.18garga2016-09-213-4/+5
* Python 3 version of security/py-libnacl.philip2016-09-212-0/+9
* Allow overriding the Python version.philip2016-09-211-1/+1
* Update plaso to 1.5.0antoine2016-09-213-21/+15
* Update to 20160918antoine2016-09-213-35/+13
* Document recent Firefox vulnerabilitiesjbeich2016-09-211-0/+86
* New port: security/py-dfwinregantoine2016-09-214-0/+36
* New port: security/py-dfdatetimeantoine2016-09-214-0/+32
* Update to 20160918antoine2016-09-212-4/+4
* Update to 2.4.3jhale2016-09-203-4/+5
* Increase the length of the password.marcus2016-09-192-3/+6
* security/vuxml: Fix curl version rangesbrnrd2016-09-181-2/+1
* security/snort2pfcd: Update to 0.7woodsb022016-09-184-15/+8
* Mark as broken on mips64 and sparc64.linimon2016-09-181-0/+2
* Mark as broken on mips64 and sparc64.linimon2016-09-181-0/+2
* - Update to 0.25wen2016-09-182-3/+4
* - Update to 5.96wen2016-09-182-3/+4
* security/dehydrated: minor fixesrobak2016-09-183-3/+4
* security/revealrk: 1.1.2 -> 1.2.1pi2016-09-183-16/+4
* Complete the adoption of options helpers, remove old cruft,adamw2016-09-172-26/+20
* Update 1.13.6 --> 1.13.7cy2016-09-172-4/+4
* Update to 4.12.26antoine2016-09-172-8/+13
* New port: security/rubygem-rex-sslscanantoine2016-09-174-0/+27
* New port: security/rubygem-rex-socketantoine2016-09-174-0/+27
* New port: security/rubygem-rex-rop_builderantoine2016-09-174-0/+30
* New port: security/rubygem-rex-nopantoine2016-09-174-0/+29
* New port: security/rubygem-rex-bin_toolsantoine2016-09-174-0/+42
* New port: security/rubygem-rex-coreantoine2016-09-174-0/+26
* security/zenmap: Update to 7.25 BETA2 and use security/nmap as MASTERDIRwoodsb022016-09-173-34/+21
* security/amap: Update to 5.4woodsb022016-09-174-16/+23
* Document new vulnerabilities in www/chromium < 53.0.2785.113rene2016-09-171-0/+47
* Document CVE 2016-6662: zero-day remote vulnerability in mysql portsriggs2016-09-171-0/+30
* security/libp11: Mark IGNORE if SSL_DEFAULT matchs libresslmarino2016-09-161-3/+8
* security/openscep: Mark IGNORE if SSL_DEFAULT matches libresslmarino2016-09-161-5/+10
* Mark BROKEN: wrong build dependsantoine2016-09-161-0/+2
* ftp.openssl.org is being taken out.mat2016-09-162-2/+0
* Document security problems in dropbearmatthew2016-09-151-0/+42
* Unmark broken on powerpc64swills2016-09-155-10/+0
* Release some of my ports back to the heapmarino2016-09-151-1/+1
* GOOGLE_CODE has gone away.mat2016-09-1415-5/+27
* Update to version 2.2.1pawel2016-09-142-4/+4
* Update 1.14.3 --> 1.14.4.cy2016-09-142-4/+4
* security/vuxml: Document www/h2o vulnerabilitybrnrd2016-09-141-0/+26
* ftp/curl: Document integer overflow vulnbrnrd2016-09-141-0/+35
* - Update to 0.13amdmi32016-09-142-5/+6
* security/dehydrated: Rename from letsencrypt.shbrnrd2016-09-1410-77/+102
* Add vulnerabilities for www/chromium < 53.0.2785.92rene2016-09-141-0/+93
* security/proxytunnel: Fix all SSL configuration, fix no SSLv3 (LibreSSL)marino2016-09-142-0/+30
* Belatedly add vulnerabilities for www/chromium < 52.0.2743.116rene2016-09-141-0/+53
* - This port are no longer used or cared for.nemysis2016-09-141-1/+1
* security/openssl_tpm_engine: Document SSL requirement, IGNORE LIbreSSLmarino2016-09-141-4/+10
* security/hydra: Configure for any SSL base and IGNORE LibreSSLmarino2016-09-141-1/+9
* LibreSSL checks: Check for libressl-devel option toomarino2016-09-132-3/+3
* security/ncrack: Update to 0.5woodsb022016-09-132-5/+7
* Update to 0.040.vanilla2016-09-132-4/+4
* security/amap: Fix hardermarino2016-09-132-6/+22
* Document MySQL root code execution vulnerability.delphij2016-09-131-0/+69
* security/p5-openxpki: IGNORE for libressl-devel as well as libresslmarino2016-09-131-1/+1
* securty/bro: Modernize options, remove Ports SSL option, support LibreSSLmarino2016-09-133-81/+59
* security/amap: configure SSL base properlymarino2016-09-131-3/+6
* security/opencryptoki: Fix build with LIbreSSL (old DES functions)marino2016-09-132-2/+63
* Update to WolfSSL 3.9.8johans2016-09-133-5/+7
* Fix build.gjb2016-09-131-1/+1
* Document WolfSSL vulnerabilities (< 3.6.8)johans2016-09-131-0/+50
* security/strongswan: Fix build with LibreSSLmarino2016-09-131-0/+11
* security/xca: Fix build with LibreSSLmarino2016-09-132-2/+13
* - unroll for loopdinoex2016-09-131-4/+4
* security/starttls: Add support for any SSL basemarino2016-09-131-2/+2
* security/openconnect; Fix build with LibreSSLmarino2016-09-122-0/+45
* security/heimdal: Fix build when EGD is not available (e.g. LibreSSL)marino2016-09-123-2/+30
* security/distcache: Configure SSL base, fix build on LibreSSLmarino2016-09-126-30/+29
* security/john: Handle SLL libraries without SHA0 (e.g. LibreSSL)marino2016-09-123-2/+40
* security/rcracki_mt: Document SSL req't, honor flags, fix build with LibreSSLmarino2016-09-122-3/+123
* security/govpn: Update to 6.0swills2016-09-123-5/+6
* security/stunnel: Support building with LibreSSLmarino2016-09-127-2/+184
* security/broccoli: Document SSL requirement and handle no SSLv3 (LibreSSL)marino2016-09-122-1/+16
* Upgrade shibboleth-sp 2.6 and its tool chaingirgen2016-09-129-20/+26
* - Add LICENSEamdmi32016-09-121-2/+7
* - Add LICENSEamdmi32016-09-121-0/+3
* security/wpa_supplicant: Add support for LibreSSLmarino2016-09-122-3/+70
* - Add LICENSEamdmi32016-09-121-12/+6
* - Honor SSL_DEFAULTantoine2016-09-111-1/+1
* Honor SSL_DEFAULTantoine2016-09-111-0/+2
* security/vnccrack: Document SSL requirement and set its flagsmarino2016-09-111-2/+3
* security/tcpcrypt: Document SSL requirement and set its flagsmarino2016-09-111-1/+3
* seurity/stegdetect: Document SSL requirement and set its flagsmarino2016-09-111-1/+3
* security/py-scrypt: Document SSL requirement and define its flagsmarino2016-09-111-1/+3
* security/pvk: Document SSL requirement and honor its flagsmarino2016-09-111-0/+7
* security/pks: Document SSL requirement and configure SSL base correctlymarino2016-09-111-3/+5
* security/tlswrap: Add SSL flags and base configurationmarino2016-09-111-3/+5
* security/titus; Add SSL flags and fix tab alignmentmarino2016-09-111-6/+6
* security/symbion-sslproxy: Add SSL flagsmarino2016-09-111-2/+3
* security/sslsniffer: Add SSL flagsmarino2016-09-111-2/+3
* security/signify: Remove unnecessary -lcrypto linkagemarino2016-09-111-1/+2
* security/ratproxy: Add SSL flags and honor themmarino2016-09-111-3/+5
* security/pev: Add SSL flagsmarino2016-09-111-3/+3
* security/pecl-crypto: Add SSL flagsmarino2016-09-111-2/+3
* security/pam_ssh_agent_auth: Document SSL requirement and configure itmarino2016-09-111-2/+3
* security/pam_ocra: Fix SSL handling especially wrt FreeBSD 9marino2016-09-111-10/+8
* security/pad: Add SSL flags and honor themmarino2016-09-111-2/+8
* security/openca-tools-forked: Configure SSL base properlymarino2016-09-111-2/+3
* security/ocaml-ssl: Add SSL flagsmarino2016-09-111-2/+5
* security/netpgp: Document SSL requirement and support ports SSL librariesmarino2016-09-111-5/+8
* security/ncrack: Add SSL flagsmarino2016-09-111-2/+3
* security/munge: Document SSL requirementmarino2016-09-111-1/+1
* lang/luasec: Add SLL flags and fix builds on LibreSSLmarino2016-09-112-3/+13
* security/libpwstor: Document SSL requirementmarino2016-09-111-1/+1
* security/kc: Document SSL requirementmarino2016-09-111-1/+1
* security/ike-scan: Document SSL requirementmarino2016-09-111-0/+1
* security/gwee: Add SSL flagsmarino2016-09-111-4/+3
* security/erlang-p1tls: Add SSL flagsmarino2016-09-111-2/+5
* security/d0_blind_id: Add SSL flagsmarino2016-09-111-2/+3
* security/arirang: Add SSL flagsmarino2016-09-111-2/+3
* Update to 2.6gblach2016-09-112-4/+4
* Update to upstream version 0.3.0riggs2016-09-114-19/+30
* security/yafic: Document SSL requirement, convert to optionsmarino2016-09-101-9/+14
* security/trousers: Set CFLAGS and LDFLAGS for SSL supportmarino2016-09-101-0/+2
* security/p5-Crypt-OpenSSL-ECDSA: USES+=ssl, Set CFLAGS accordinglymarino2016-09-101-1/+2
* Most commonly used build systems support silent builds, when theyamdmi32016-09-103-3/+1
* - Update to 1.4.2amdmi32016-09-102-37/+12
* Add entry for GNUTLS-SA-2016-3.tijl2016-09-091-0/+27
* Update to 3.4.15.tijl2016-09-093-5/+5
* document mozilla vulnerabilities (<48, <45.3esr)cmt2016-09-091-0/+127
* security/p5-Crypt-OpenSSL-EC: USES+=ssl, Set CFLAGS accordinglymarino2016-09-091-1/+2
* Document asterisk vulnerabilities.madpilot2016-09-091-0/+75
* security/p5-Crypt-SSLeay: Set CFLAGS to support USES+=sslmarino2016-09-091-2/+2
* Update to 3.5.0antoine2016-09-093-14/+10
* Update to 3.5.0antoine2016-09-094-9/+11
* - Add LICENSEamdmi32016-09-092-44/+28
* - Fix command in pkg-messageamdmi32016-09-082-4/+4
* Change security/tor{,-devel} to only have a build dependency on opensslmat2016-09-082-2/+10
* security/openssl-devel: Fix EC option on DragonflyBSDbrnrd2016-09-081-4/+5
* Horde package update:mm2016-09-084-7/+8
* security/rubygem-bcrypt: rip out unused crypt_r implementationswills2016-09-082-0/+26
* - Don't return an error on package installation when spmd.pwd doesn't exist.tijl2016-09-082-7/+6
* Add a port of Cardpeek, a graphical (GTK+ 3.0) tool to read the contents ofdanfe2016-09-084-0/+48
* - In Uses/linux.mk use the loop variable directly when appending totijl2016-09-074-4/+4
* - Update to 0.2.9.2-alpha [1]amdmi32016-09-072-32/+9
* - Update to 0.2.8.7 [1]amdmi32016-09-072-32/+9
* security/zeronet: 0.3.7 -> 0.4.0pi2016-09-073-7/+16
* - Add linux-*-tiff information to existing tiff vulnerabilities.tijl2016-09-071-27/+32
* Take maintainershipgarga2016-09-071-1/+1
* Document vulnerability in irc/inspircdfeld2016-09-061-0/+28
* Add CVE-2016-7123 for resolved mailman CSRF.mandree2016-09-061-0/+39
* - Correct typo in previous commitzi2016-09-062-3/+2
* - Remove reference to nonexistent filezi2016-09-062-4/+3
* Fix the version range for a linux-c6-nss vulnerability.tijl2016-09-061-1/+6
* Update to nss-softokn 3.14.3-23.3.el6_8.tijl2016-09-065-33/+33
* - Replace Mk/bsd.linux-apps.mk and Mk/bsd.linux-rpm.mk withtijl2016-09-0622-101/+68
* Fix some edge cases in xinetd file descriptor handlinggarga2016-09-062-1/+25
* - Update to 1.00wen2016-09-042-3/+4
* Use the same PORTVERSION as the one on Pypiantoine2016-09-041-2/+1
* Update to 0.2.2antoine2016-09-042-4/+4
* Update to 4.12.23antoine2016-09-042-5/+7
* New port: security/rubygem-rex-mimeantoine2016-09-044-0/+29
* New port: security/rubygem-nessus_restantoine2016-09-044-0/+28
* Fix dependencies and path to gpg.adamw2016-09-031-7/+3
* - fix build with libresslohauer2016-09-035-0/+154
* - update nmap to 7.25BETA2ohauer2016-09-034-12/+15
* security/acme-client: Fall back to letskencrypt periodic varsbrnrd2016-09-022-8/+34
* security/acme-client: Rename from letskencrypt, update to 0.1.11brnrd2016-09-0211-70/+70
* Fix build.gjb2016-09-021-2/+2
* Document OpenSSH CVE-2015-8325 and CVE-2016-6210 fixed in OpenSSH 7.3p1.bdrewery2016-09-021-0/+39
* - Add LZ4 OPTIONzi2016-08-311-1/+5
* Update to 2.6.2 release.ale2016-08-312-3/+4
* Add new port security/snort2pfcd, which analyzes snort alert output andwoodsb022016-08-316-0/+87
* - Update to 0.601amdmi32016-08-302-5/+5
* - Update to 0.610amdmi32016-08-303-9/+5
* lang/php56: Update from 5.6.24 to 5.6.25tz2016-08-304-4/+4
* security/sshguard: Unbreak build by making a metaportfeld2016-08-305-15/+33
* Document mailman < 2.1.23 CVE-2016-6893, insufficient CSRF protection.mandree2016-08-301-0/+32
* Update to 1.78.adamw2016-08-302-5/+5
* Update to 4.12.22antoine2016-08-292-5/+7
* New port: security/rubygem-openvas-ompantoine2016-08-294-0/+28
* Update to 0.1.64antoine2016-08-292-4/+4
* Update to 0.2.1antoine2016-08-292-4/+4
* Update to 2.0.22antoine2016-08-292-6/+6
* Fix build on 11, when using OpenSSL from ports.mat2016-08-291-1/+1
* security/sshguard-ipfilter: Delete portfeld2016-08-292-13/+0
* Update to 2.0.0antoine2016-08-294-18/+10
* security/openssl-devel: Fix index build failure on 9.xbrnrd2016-08-291-1/+1
* security/openssl-devel: Configure, Build fixesbrnrd2016-08-292-31/+49
* Document libxml2 vulnabilities.kwm2016-08-291-0/+65
* - remove options ASM and GMPdinoex2016-08-291-23/+10
* Document kdelibs KArchive directory traversal vulnerability.tcberner2016-08-281-0/+29
* Fix self-tests in poudriere, make them more robust [1].mandree2016-08-272-5/+4
* Revert the OpenSSL 1.1.0 update, it was not tested.mat2016-08-2716-1703/+796
* - update to 1.1.0dinoex2016-08-2716-795/+1703
* Make self-test the TEST option, support make test. Enabled by default.mandree2016-08-271-10/+13
* Update Tunnelblick XOR patch.mandree2016-08-272-26/+22
* security/sshguard: Update to 1.7.0feld2016-08-273-32/+7
* Update to latest commit.mat2016-08-262-7/+6
* security/afl: 2.29 -> 2.32pi2016-08-264-27/+20
* security/openssl-devel: Remove defunct pkg-messagebrnrd2016-08-261-7/+0
* security/openssl-devel: Update to 1.1.0-releasebrnrd2016-08-263-30/+92
* Fix build with tunnelblick patch.mat2016-08-251-11/+11
* Update to new upstream bugfix release 2.3.12, add "stats" to rc script.mandree2016-08-258-45/+30
* security/doas: Update to 5.9p5woodsb022016-08-242-5/+6
* Replace Mk/bsd.kde4.mk by Mk/Uses/kde.mk in preparation for KDE Frameworks andtcberner2016-08-244-7/+9
* - Update to 2.037jadawin2016-08-242-4/+4
* security/whatweb: update to latest revisionrm2016-08-243-1386/+1408
* Update to 1.9.1ehaupt2016-08-244-37/+13
* - Update to 20160821amdmi32016-08-232-5/+6
* security/p5-Protocol-ACME: 0.15 -> 0.16pi2016-08-232-5/+7
* security/hydra: update to 8.3rm2016-08-235-98/+6
* Docuement eog out of bounds write.kwm2016-08-231-0/+26
* security/libargon2 is not jobs safemarino2016-08-231-0/+2
* Some more cleanup to Perl vulnerabilities.mat2016-08-221-9/+20
* security/p5-Crypt-LE: 0.17 -> 0.18pi2016-08-222-5/+4
* Document fontconfig insufficiently cache file validationkwm2016-08-221-0/+31
* security/py-flask-httpauth: update to 3.2.0rm2016-08-212-4/+5
* Reset sem@'s ports per his request.rene2016-08-212-2/+2
* Update to 1.3.0.ume2016-08-214-13/+11
* security/letskencrypt: Remove patchesbrnrd2016-08-204-140/+0
* security/letskencrypt: Update to 0.1.10brnrd2016-08-202-5/+4
* Update to 3.10matthew2016-08-198-170/+7
* Fix ruby version range which was missing the important portepochfeld2016-08-191-1/+38
* Fix PKGNAME matching for old ruby in vuxmlfeld2016-08-191-6/+2
* - Update to 0.2.9.1-alphaamdmi32016-08-192-4/+4
* - Update to 0.2.8.6amdmi32016-08-193-53/+4
* Fixup Perl package names in the EoL vuln.mat2016-08-191-1/+2
* Actually switch to opt_CMAKE_BOOLamdmi32016-08-191-8/+5
* - Fix build with enabled UPNPamdmi32016-08-192-0/+43
* - Update to 1.9.19zi2016-08-193-5/+6
* - Update to 7.07zi2016-08-194-34/+6
* unbreak build (validation and tests pass)jgh2016-08-191-16/+0
* Add a number of old expired and End of Life ports to vuxmlfeld2016-08-191-0/+94
* security/p5-Session-Token: 1.502 -> 1.503pi2016-08-192-4/+4
* Fix CVE name for security/gnupg and security/libgcrypt. There was a typo injkim2016-08-191-1/+2
* - Update to 1.7.3 (security fixes)cpm2016-08-183-5/+5
* - Update to 2.9.0amdmi32016-08-183-56/+6
* Register recent gnupg1/libgcrypt vuln.kuriyama2016-08-181-0/+33
* - Upgrade to 1.4.21 (security, predictable bits in some situation).kuriyama2016-08-182-5/+6
* Document 26 new security advisories from phpmadmin. Some of these arematthew2016-08-171-0/+482
* - Update to 2.036jadawin2016-08-162-4/+4
* security/dsniff: Replace deprecated des_ methods and structsbrnrd2016-08-152-8/+63
* Note where the XSLoader thing is being fixed in Perl 5.18 and 5.20.mat2016-08-151-3/+3
* security/vuxml: Fix/Improve a few entry titles (<topic)koobs2016-08-151-3/+3
* audio/teamspeak3-server: Document remote code executionpi2016-08-151-0/+28
* - cleanup optionsdinoex2016-08-151-13/+2
* Fix PKGNAME for collectd5junovitch2016-08-151-1/+1
* Add entry for CVE-2015-7331romain2016-08-141-0/+26