aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - update to 7.2rm2012-02-142-3/+3
* typoeadler2012-02-141-1/+1
* Inform users of the DoS issue in the python SimpleXMLRPCServer functioneadler2012-02-141-0/+55
* Add the recently assigned cve numbereadler2012-02-141-0/+2
* - Update to 0.0.1.0pgj2012-02-132-4/+3
* - Update to 4.2.4pgj2012-02-132-4/+3
* Update to 1.0.4jpaetzel2012-02-132-5/+8
* - Connect all the previously added hs- ports to the buildpgj2012-02-131-0/+9
* - Please welcome GHC 7.0.4pgj2012-02-131-0/+1
* Skein [1] is a family of fast secure cryptographic hash functions. Thispgj2012-02-133-0/+35
* To store passwords securely, they should be salted, then hashed with apgj2012-02-133-0/+31
* A platform independent method to obtain cryptographically strong entropypgj2012-02-133-0/+28
* A collection of crypto hashes, with a practical incremental and one-pass,pgj2012-02-133-0/+30
* Symmetrical Block, Stream, and PubKey Ciphers.pgj2012-02-133-0/+27
* Generic cryptography public keys algorithm types.pgj2012-02-133-0/+26
* A generic interface for cryptographic operations, platform independent qualitypgj2012-02-133-0/+32
* Simple crypto pseudo-random-number-generator with really good randomnesspgj2012-02-133-0/+27
* Achieves security through AES-CTR encryption and Skein-MAC-512-256pgj2012-02-133-0/+29
* - Pregenerate pw_dict since cracklib stopped distributing onepgollucci2012-02-137-5/+12
* - Patch the port to not remove /dev/nullpgollucci2012-02-132-2/+13
* - Mark BROKEN immediately: this port deletes /dev/null during compilationpav2012-02-131-0/+2
* - sync PORTREVISION to lang/php4+1 (master port)pgollucci2012-02-131-1/+1
* - convert to using PYTHON_SITELIBDIR (non-functional change)rm2012-02-138-73/+74
* - fix origin from previous commitjgh2012-02-131-1/+1
* - Update to 1.05sunpoet2012-02-123-14/+13
* - Update to 1.05sunpoet2012-02-126-44/+121
* Add new port (security/sshpass)jgh2012-02-124-0/+31
* Inform users of the XSS issue in the latest version of WebCalendar.eadler2012-02-121-0/+29
* - Change WWW to CPANsunpoet2012-02-121-1/+1
* - Update to 2.1.4pgollucci2012-02-122-4/+5
* - Update to 3.1pgollucci2012-02-123-7/+17
* - Update to 1.5.3pgollucci2012-02-122-12/+9
* Whitespace fixes.wxs2012-02-121-3/+3
* - Update to version 4.1.0 [1]pawel2012-02-122-5/+5
* - Document mozilla -- use after free in nsXBLDocumentInfo::ReadPrototypeBindingsbeat2012-02-111-0/+46
* Inform bip users of buffer overflow (CVE-2012-0806)eadler2012-02-111-0/+27
* Inform users of the private information disclosure bug in surf (CVE-2012-0842)eadler2012-02-111-0/+24
* - Update to 7.1azi2012-02-112-7/+3
* - Convert from BUILD -> LIB depends for cracklib and move to .so usagepgollucci2012-02-111-5/+3
* - Chase shlib bump for security/cracklib from .1 -> .10pgollucci2012-02-115-2/+5
* - patch swatch.rc to check for buffer overflow in cmdarg with long _flags linesscheidell2012-02-102-5/+13
* Fix stylejadawin2012-02-101-8/+8
* Document last glpi vulnerabilitiesjadawin2012-02-101-0/+27
* Update security/pam_google_authenticator to 20120119 snapshotdumbbell2012-02-102-6/+4
* Fix build with thread-safe php.ale2012-02-101-0/+10
* Document new Chromium < 17.0.963.46 vulnerabilities.rene2012-02-091-0/+86
* - Restrict USE_PYTHON rangesunpoet2012-02-091-1/+1
* - Make non-interactive and remove IS_INTERACTIVEswills2012-02-091-1/+1
* - Update to 1.54jadawin2012-02-092-3/+3
* - Update to 0.8.6pgollucci2012-02-094-13/+22
* - Update to 2.8.18pgollucci2012-02-096-95/+20
* - Mark as deprecatedjadawin2012-02-081-0/+2
* - Fix build when using GCRYPT KNOBsbz2012-02-082-0/+12
* - Update to 2.2.0pgollucci2012-02-082-3/+3
* New Port: security/binwalkjgh2012-02-084-0/+56
* Document Drupal core multiple vulnerabilities.delphij2012-02-081-0/+52
* - Update to 0.0.6miwi2012-02-072-6/+3
* Fix up 3fd040be-4f0b-11e1-9e32-0025900931f by giving a better description.wxs2012-02-071-4/+11
* Use the correct variable that was obviously the intent of the authoreadler2012-02-071-1/+1
* - Chase unixODBC shlib bumpmiwi2012-02-061-1/+2
* Document "bugzilla" - multiple vulnerabilities.skv2012-02-061-0/+50
* If you used LDAP and NOPORTDOCS then the documentation directory would bewxs2012-02-062-1/+2
* - Replace WITH_GUI with WITH_X11 to adhear to standardszi2012-02-061-2/+2
* Document PHP remote code vulnerability.delphij2012-02-041-0/+26
* - Update to 1.4.0sbz2012-02-042-3/+7
* Update to 0.9.33 release.ale2012-02-032-3/+5
* Add vuxml entry for mathopd directory traversal vulnerability.rm2012-02-031-0/+27
* - adjust ordering for latest apache entryjgh2012-02-031-12/+12
* MITRE is spelled in all capital letters.wxs2012-02-021-1/+1
* Update to 1.4.8mm2012-02-022-3/+3
* - Remove missing file in previous commitsunpoet2012-02-021-13/+0
* document latest Apache vulnerabilitiesjgh2012-02-021-0/+54
* - fix sed regular expressionjgh2012-02-021-3/+4
* - Update to 1.3.2sunpoet2012-02-022-11/+8
* - Update to 1.5jgh2012-02-025-69/+12
* - Pet portlintsunpoet2012-02-023-25/+10
* - Reassign to the heaptabthorpe2012-02-013-3/+3
* document recent mozilla vulnerabilitiesflo2012-02-011-0/+79
* add upstream patch, to fix "__GNUC_MINOR is not defined" build error thatflo2012-02-012-0/+24
* Fix PORTREVISION typo.cy2012-01-311-1/+1
* Correct versions for sudo format string vulnerability.wxs2012-01-311-1/+2
* - Upgrade to 1.14.12 (minor bugfixes).kuriyama2012-01-315-29/+30
* Update package description.cy2012-01-312-6/+5
* Update 1.0.2 --> 1.0.4cy2012-01-312-6/+5
* Update to 1.8.3p2wxs2012-01-312-4/+4
* Document sudo format string vulnerability.wxs2012-01-311-0/+38
* - Fix build due to libtool updates. [1]scheidell2012-01-303-17/+169
* - update to 1.1.1dinoex2012-01-302-3/+3
* Document missing FreeBSD Security Advisories:wxs2012-01-301-2/+195
* - Adjust formatting for 93688f8f-4935-11e1-89b4-001ec9578670zi2012-01-301-8/+10
* - Fix build on 10-current (i386) [1]kuriyama2012-01-292-0/+12
* - Mark BROKEN under FreeBSD 10zi2012-01-291-0/+4
* - Document vulnerabilities in mail/postfixadmin (CVE-2012-0811, CVE-2012-0812)zi2012-01-281-0/+39
* - Update to 1.0.1miwi2012-01-282-6/+5
* - Update to 1.7.7miwi2012-01-282-3/+3
* - Cleanup & Formatingmiwi2012-01-281-32/+32
* Additional software only options and binary package build tweaks.`cy2012-01-282-26/+76
* Fix typo.cy2012-01-271-1/+1
* - Document vulnerability in converters/mpackzi2012-01-261-0/+27
* - Document vulnerabilities in print/acroread9 (prior to 9.4.7)zi2012-01-261-0/+46
* Somehow a character got lostarved2012-01-261-1/+1
* - Update to 0.18ashish2012-01-262-3/+3
* - Update to 5.70ashish2012-01-262-3/+3
* Binary package improvements.cy2012-01-262-16/+83
* Update 2.4.1.2 --> 2.4.2.2.cy2012-01-265-10/+110
* The KDE/FreeBSD team is pleased to announce KDE SC 4.7.4, whichavilla2012-01-254-6/+6
* Apply utmp patch from ${FILESDIR} (not files) if OSVERSION < 900007jgh2012-01-251-2/+2
* - Update to 1.3.1jgh2012-01-253-13/+14
* update to 0.2.3.11-alphabf2012-01-242-3/+3
* update lang/sbcl to 1.0.55, and adjust dependent portsbf2012-01-241-1/+1
* Dancer::Plugin::Passphrase manages the hashing of passwords for Dancer apps,culot2012-01-245-0/+49
* - update entry fixed in chromium-16.0.912.75 (CVE-2011-3925)rene2012-01-241-0/+40
* Fix build while chanting "I will run make validate". :(wxs2012-01-241-1/+1
* Add CVE for recent spamdyke buffer overflows.wxs2012-01-241-0/+1
* Document multiple vulnerabilities in wireshark, all of which havewxs2012-01-241-0/+58
* Whitespace cleanup.wxs2012-01-241-2/+2
* - Document buffer overflows in spamdyke.wxs2012-01-241-0/+33
* - update to DISTVERSION 201204ohauer2012-01-243-7/+6
* Update to 4.0.1.nobutaka2012-01-232-3/+3
* Fixup to please "make tidy". No need to wrap this line.wxs2012-01-231-2/+1
* - Add CVE for spamdyke STARTTLS plaintext injection.wxs2012-01-231-0/+2
* - Fix affected rubygem-rack version: add ,3 as PORTEPOCH=3 is restoredsunpoet2012-01-221-1/+1
* - Update to 0.22culot2012-01-223-5/+8
* - Correct package range in 5c5f19ce-43af-11e1-89b4-001ec9578670zi2012-01-221-1/+5
* At the moment 1385 ports use BUILD_DEPENDS= ${RUN_DEPENDS} and 450eadler2012-01-2272-72/+72
* - Fix issue when NOPORTDOCS and SNORTSAM are both definedzi2012-01-211-1/+3
* - Update to 2.9.2.1zi2012-01-212-3/+5
* - Fix formatting/topic in 91be81e7-3fea-11e1-afc7-2c4138874f7dzi2012-01-211-6/+25
* - Document security vulnerability in security/openssl (CVE-2012-0050)zi2012-01-211-0/+28
* fix uuid on latest tomcat vulnerabilityjgh2012-01-211-1/+1
* - Fix modified date;delphij2012-01-211-1/+3
* Update 91be81e7-3fea-11e1-afc7-2c4138874f7d to cover ruby+no-pthreads asdelphij2012-01-211-0/+2
* Remove license infodougb2012-01-202-4/+0
* Add pcsc-tools, tools for testing PCSC cards and readersarved2012-01-206-0/+63
* - document asterisk remote crash vulnerabilityflo2012-01-201-0/+31
* Document recent vulnerability of Apache Tomcat Server.jgh2012-01-201-0/+43
* - Security update to 1.0.0gdinoex2012-01-202-10/+10
* Sigh, should have used <lt> instead of <gt>.delphij2012-01-201-1/+1
* php52-exif no longer vulnerable to CVE-2011-4566 as of 5.2.17_6delphij2012-01-201-1/+2
* Fix the version range for ruby. The stock version is affected.knu2012-01-191-1/+1
* There was no patch release in rubygem-rack 1.3.5_*, so just say < 1.3.6.knu2012-01-191-1/+1
* - Fix affected rubygem-rack version: it should be _3 for PORTREVISION=3sunpoet2012-01-191-1/+1
* update math/R to 2.14.1, and adjust dependent portsbf2012-01-192-2/+2
* Fix CVE URL in recent OpenTTD entry.danfe2012-01-171-1/+1
* Unexpand (convert leading spaces to tabs when possible).danfe2012-01-171-871/+871
* Document recent vulnerability of OpenTTD game server.danfe2012-01-171-0/+34
* - transfer maintainership for my zope-ports to zope@rm2012-01-1623-46/+46
* PHP5 had its own entry for this vulnerability, so remove this.knu2012-01-161-5/+0
* Add node < 0.6.7 (for V8).knu2012-01-161-0/+4
* Add v8 < 3.8.5 (CVE-2011-5037).knu2012-01-161-0/+5
* Add PHP < 5.3.9 (CVE-2011-4885).knu2012-01-161-0/+5
* Add Multiple implementations denial-of-service via hash algorithm collision.knu2012-01-161-0/+41
* Add missing dependency to gnutls. [1]netchild2012-01-151-1/+2
* Certifi: Python Mozilla's SSL Certificates.miwi2012-01-155-0/+37
* - Update to 110511miwi2012-01-152-3/+3
* - fix runtime with ruby18 (add dependency on converters/ruby-iconv)rm2012-01-151-9/+5
* - escape shell namesdinoex2012-01-141-1/+1
* Add missing URL reference to last commitmm2012-01-141-0/+1
* Add relevant FFmpeg vulnerabilities from Ubuntu USN-1320-1mm2012-01-141-0/+55
* In the rc.d scripts, change assignments to rcvar to use thedougb2012-01-1480-82/+80
* - clean upmiwi2012-01-141-42/+42
* - Document vulnerabilities in security/opensslzi2012-01-141-0/+49
* - Document vulnerability in net/isc-dhcp42-server (CVE-2011-4868)zi2012-01-131-0/+32
* - update to NSS_3_13_1_WITH_CKBI_1_88_RTMflo2012-01-132-8/+10
* - update to NSS_3_13_1_WITH_CKBI_1_88_RTMflo2012-01-132-4/+3
* Document PowerDNS DoS vulnerability.delphij2012-01-131-0/+28
* - update to 1.1.0dinoex2012-01-123-3/+7
* The Authen::OATH module provides a Perl implementation of theculot2012-01-125-0/+43
* Update to 2.12.16.novel2012-01-122-3/+3
* Document PHP multiple vulnerabilities.delphij2012-01-121-0/+42
* - use /etc/rc.d/ipfilter quietresyncdinoex2012-01-111-1/+1
* - Build with obsolte MD2 hash by defaultdinoex2012-01-112-27/+16
* - Update to 1.1.1.wxs2012-01-114-29/+9
* Update to 1.4.6 release.ale2012-01-102-3/+3
* Update to 1.10.5 release.ale2012-01-102-3/+4
* Update to 3.4.1 release.ale2012-01-103-7/+7
* - update to 4.0.10rm2012-01-102-4/+3
* Document a untrusted local library exploit in games/torcs.rene2012-01-101-0/+31
* - The proper acronym for Apache Software License 2 is really AL2tabthorpe2012-01-099-9/+9
* The port asks the user a question. Tools like portmaster need tolbr2012-01-091-0/+2
* - Remove outdated version checkseadler2012-01-093-6/+0
* Document spamdyke STARTTLS plaintext injection vulnerability.wxs2012-01-091-0/+31
* 2012-01-08 security/cryptplug: development has ceasedeadler2012-01-0918-280/+0
* - Update to 0.10novel2012-01-092-4/+4
* - Update to version 1.7.9-jumbo-5danfe2012-01-083-8/+15
* Expand 11 (number) into `eleven' (word) to make port description look better.danfe2012-01-081-1/+1
* Repeated words are are hard to to find sometimes.eadler2012-01-089-9/+9
* - Update to 1.6.wxs2012-01-082-4/+4
* Update to 1.6.wxs2012-01-083-29/+4
* Remove HTML entity from a VuXML entry as they are not allowed insimon2012-01-081-1/+1
* - update to 0.3rm2012-01-085-31/+13
* - Add BUILD_DEPENDS to silence build warningsswills2012-01-081-1/+2
* Update to 4.0.0.nobutaka2012-01-072-3/+3
* - Selectivly adds mysql/and/or postgresql to rc script 'REQUIRES:'scheidell2012-01-072-3/+7
* Add new vulnerabilities for www/chromium.rene2012-01-071-0/+32
* Update to 1.3.1ehaupt2012-01-062-3/+3
* Fix build.delphij2012-01-061-1/+0
* - document bugzilla and bugzilla3 security issuesohauer2012-01-061-0/+61
* - update to 1.7.6rm2012-01-053-3/+6
* - Reassignment of ECHO_MSG breaks 'make readme', so remove and reformat IGNORE.jgh2012-01-051-9/+6
* - update to 5.61TEST4ohauer2012-01-054-26/+65
* Document wordpress xss vulnerability.delphij2012-01-041-0/+36
* Import plone4 dependencies part 8/15rm2012-01-029-0/+353
* - Reassign to the heaptabthorpe2012-01-021-1/+1
* - change required APACHE version from 13+ to 20+ohauer2012-01-022-4/+2
* The murmur hash algorithm by Austin Appleby is an exteremely fastkuriyama2011-12-315-0/+36
* Update to the latest development build (now same as primary port).cy2011-12-312-3/+4
* Update 5.0.0 --> 5.0.1cy2011-12-313-4/+5
* Add additional MITKRB5 reference.cy2011-12-301-1/+1
* Replace local patch file with identical MIT patch.cy2011-12-303-13/+4
* - Add missing BUILD_DEPENDS to silence build warningsswills2011-12-301-1/+4
* - Update to 0.4.6miwi2011-12-292-4/+3
* Fix build by adding a reference to the original URL.remko2011-12-291-0/+1
* Document XSS vulnerability in net-mgmt/zabbix-frontendcrees2011-12-291-0/+26
* update to CKBI version 1.88 which includes the latest mozilla cert dataflo2011-12-294-7/+8
* Update to new upstream release v2.2.2.mandree2011-12-292-7/+3
* Update to 20111228garga2011-12-282-3/+3
* Document remote DoS vulnerability in lighttpd HTTP authenticationmm2011-12-281-0/+30
* End WWW CPAN URL with a "/"ehaupt2011-12-2819-19/+19
* - Fix compile if WITH_STATIC is enabled [1]scheidell2011-12-282-3/+3
* Pacify portlintehaupt2011-12-272-4/+4
* - Fix most of the duplicate words in vuxml, a few affect 'blockquotes' but th...eadler2011-12-271-10/+10
* Install schema files with pam_ldap.marcus2011-12-271-2/+8
* Don't wrap a couple of lines. No other entries wrap these lines, so whenwxs2011-12-271-4/+2
* Whitespace cleanup in a BIND topic.wxs2011-12-271-1/+1
* Fix the build. Missing a quote on the blockquote citation and a missing </p>.wxs2011-12-271-2/+2
* Document CVE-2011-4862 (FreeBSD-SA-11:08.telnetd) as it affects krb5-appl too.cy2011-12-271-0/+28
* Fix when an encryption key is supplied via the TELNET protocol, its lengthcy2011-12-272-0/+13
* Switch to using bsd.port.options.mk and remove unnecessary assignments.wxs2011-12-261-6/+2
* Add vuxml entry for proftpd chroot vulnerability.delphij2011-12-241-0/+34
* - I meant LIBDIR not SITELIBDIRpgollucci2011-12-241-1/+1
* - Add USE_PERL5_BUILDscheidell2011-12-231-0/+1
* Update to 0.62.nobutaka2011-12-233-3/+6
* - openssh-portable needs perl to build (reported by Gleb Smirnoff via mail)scheidell2011-12-231-0/+3
* - Update to 1.2.2lwhsu2011-12-232-4/+3
* - Add fifth portion of dependencies needed for Plone 4 import.rm2011-12-2237-0/+1224
* - Document recent vulnerabilities in databases/phpmyadmin (PMASA-2011-19 and ...zi2011-12-221-0/+34
* Mark broken on tier-2: fails to link.linimon2011-12-221-0/+3
* - Add p5-CACertOrg-CA 20110724.001sunpoet2011-12-215-0/+39
* - Also fix SeaMonkey version rangebeat2011-12-211-1/+2
* - Fix cvename in latest mozilla vulnerabilitybeat2011-12-211-5/+5
* - Document mozilla -- multiple vulnerabilitiesbeat2011-12-211-0/+58
* - Update 2.1.3 -> 2.1.4pgollucci2011-12-212-3/+3
* Update to 3.0.1.lx2011-12-212-3/+3
* move contributor address => jghjgh2011-12-211-1/+1
* - Remove expired security/p5-Digest-SHA256: use the builtinvsevolod2011-12-216-70/+0
* - chef 0.10.8 requires ~> 0.10.8pgollucci2011-12-212-3/+4
* - Remove explicit dependency in setup.py for `python ./setup.py test`lwhsu2011-12-202-1/+11
* - Update to 2.2.0pgollucci2011-12-202-4/+3
* - Add missing dependencylwhsu2011-12-201-0/+3