aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Resolve IPV6 port logic issue when IPV6 support is disabled.zi2012-03-301-1/+1
* - Actually bump PORTREVISION for previous commit (pregenerate pw_dict), thispav2012-03-291-0/+1
* Fix formatting so that "make tidy" passeseadler2012-03-291-2/+1
* Another phpmyadmin security update.matthew2012-03-291-0/+32
* - drop invalid post-deinstall targetjgh2012-03-292-37/+34
* Document vulnerabilities in www/chromium < 18.0.1025.142rene2012-03-291-0/+52
* - Update to 12.0.0sunpoet2012-03-293-19/+21
* - Perl only needed to build, not needed to run. remove PERL5_RUN from Makefilescheidell2012-03-291-2/+1
* - Update to 2.9.2.2zi2012-03-282-4/+4
* - Upgrade to 2.0.19.kuriyama2012-03-273-17/+5
* - quagga-re affected the last vulnerability too.sem2012-03-261-0/+5
* Document CVE-2012-0037 for textproc/raptor and textproc/raptor2.rakuco2012-03-261-0/+44
* Update to 2.12.18. This update includes a dirty hack to prevent sharednovel2012-03-254-3/+33
* Fix formatting so that "make tidy" passeseadler2012-03-241-2/+1
* - Document recent vulnerabilities in net/quagga (CVE-2012-0249, CVE-2012-0250...zi2012-03-241-0/+37
* Correct version ranges.delphij2012-03-241-1/+11
* Document Apache Traffic Server -- heap overflow vulnerabilitylwhsu2012-03-241-0/+29
* - Update mirror URL on my portszi2012-03-236-6/+9
* Update to 1.4.9mm2012-03-232-3/+3
* - Add missing *_DEPENDS [1]skv2012-03-231-2/+5
* - Add missing *_DEPENDS [1]skv2012-03-231-8/+7
* Document vulnerabilities for www/chromium < 17.0.963.83rene2012-03-221-0/+56
* - Update to 2.05bzi2012-03-222-3/+3
* Update to 2.12.delphij2012-03-222-3/+3
* Document GNUtls and libtasn1 security vulnerabilities.delphij2012-03-221-0/+62
* Fix issue preventing successful installation on hosts with certain hostnames.lx2012-03-212-4/+11
* - Reset cwd in pkg-plist back to PREFIX before dynamically adding moreglarkin2012-03-212-0/+2
* - Update to 4.53zi2012-03-202-3/+3
* - Update to 0.4.3jgh2012-03-202-3/+3
* Fix broken get_fqhostname() logic. Without that fix mail/mutt-develnovel2012-03-202-1/+60
* - Add missing DEPENDS that the module uses but doesn't declareashish2012-03-181-3/+4
* Update to 5.71ashish2012-03-182-3/+3
* - Cleanupmiwi2012-03-181-27/+27
* - Correct the last 3 firefox 3.6 entrysmiwi2012-03-181-3/+6
* - Update to 0.97.4garga2012-03-173-141/+9
* - Update to 0.5.2tota2012-03-172-4/+3
* - Set / Update Portscout flagsmiwi2012-03-171-1/+3
* - Add OPTION to allow users to choose to build agains OpenSSL from portszi2012-03-161-1/+8
* Document recent asterisk vulnerabilities.flo2012-03-161-0/+39
* - Update to 3.15 [1]zi2012-03-164-13/+34
* Document CVE-2012-0884.wxs2012-03-151-0/+35
* Document nginx -- potential information leak.osa2012-03-151-0/+32
* File::KeePass is an interface to KeePassX and KeePass V1 database files.culot2012-03-155-0/+46
* - drop DTLS bugfixes, now included upstreamdinoex2012-03-152-34/+5
* - Document mozilla -- multiple vulnerabilitiesbeat2012-03-141-0/+74
* - Revert ports/165605 as requested by portmgr@pgollucci2012-03-1420-14/+149
* Update to 1.8.4p4wxs2012-03-132-3/+4
* Add official mirror and use official tarball since it was released recentlycs2012-03-132-3/+4
* - Do not overwrite files from devel/libhtp [1]zi2012-03-134-19/+38
* Do proper input validation for libXfont. This is for CVE-2011-2895.kwm2012-03-131-1/+2
* Update to 0.1.1 (and bump PORTEPOCH)cs2012-03-132-3/+4
* - Fix IPv6 OPTIONS supportzi2012-03-121-2/+2
* - Add missing dependency on py-pycryptokevlo2012-03-121-1/+3
* Typo fix.wxs2012-03-121-1/+1
* - Document portaudit -- auditfile remote code execution.simon2012-03-121-1/+43
* - Do not install examples whenever NOPORTEXAMPLES is defined [1]zi2012-03-121-12/+6
* Appease the tidy target. ;)wxs2012-03-121-2/+1
* Document vulnerabilities in www/chromium < 17.0.963.79rene2012-03-111-0/+28
* - Upgrade to 0.10.kuriyama2012-03-112-3/+5
* - update to 0.9rm2012-03-114-99/+530
* - adjust FreeBSD version provuded by snort-rulesohauer2012-03-111-11/+10
* - Do not install examples whenever NOPORTEXAMPLES is defined [1]zi2012-03-111-3/+4
* Update to 20120305garga2012-03-102-3/+3
* - Add security/sudo to RUN_DEPENDSzi2012-03-101-1/+2
* - update to version 5.61TEST5ohauer2012-03-104-13/+60
* - Update to 1.35sahil2012-03-102-5/+4
* Fix formatting so that "make tidy" passeseadler2012-03-101-4/+2
* Document the latest flash player vulnerabilitieseadler2012-03-101-0/+27
* - Avoid use of SITE_PERL in DEPENDSswills2012-03-101-3/+4
* Perl Crypto Extention to OpenSSLswills2012-03-104-0/+42
* Perl extension for handling X509 Certificatesswills2012-03-105-0/+35
* - Update to 1.59jadawin2012-03-102-3/+3
* Mark chromium < 17.0.963.78 as vulnerable.rene2012-03-091-0/+28
* - Add TEST_DEPENDS to enable testingswills2012-03-091-0/+2
* Update to 1.3.2crees2012-03-092-3/+3
* - Remove ports that only work with < perl 5.12 (devel/p5-B-Size, devel/p5-Dev...pgollucci2012-03-0920-149/+14
* - Include BUILD_DEPENDS as well as RUN_DEPENDS since the module seems toswills2012-03-081-1/+5
* - Fix build with curl 7.24.0: curl/types.h was removed (unused since Apr 2004)sunpoet2012-03-081-0/+1
* Document jenkins XSS vulnerability.lwhsu2012-03-081-0/+28
* - Add TEST_DEPENDS to enable testingswills2012-03-071-0/+2
* - Add missing BUILD_DEPENDS and RUN_DEPENDSswills2012-03-061-6/+9
* Add new vulnerabilities for www/chromium < 17.0.963.65rene2012-03-061-0/+67
* Update to 3.13.3flo2012-03-064-6/+6
* - Update to 1.58jadawin2012-03-052-3/+3
* Document dropbear security issueak2012-03-051-0/+32
* Update to 2012.55ak2012-03-052-3/+3
* Whitespace cleanup and stick to ASCII in recent openx entry.wxs2012-03-041-2/+2
* security/blocksshd: security/sshguard is more active and a better tool.eadler2012-03-048-126/+0
* update math/R to 2.14.2, and adjust dependent portsbf2012-03-042-1/+2
* Update to 1.1.1mm2012-03-032-3/+3
* Update to 1.0.5mm2012-03-032-3/+3
* Update maintainer email in my portsak2012-03-031-1/+1
* - Mark BROKEN: fails to installpav2012-03-031-0/+2
* - Chase libarchive shlib bumppav2012-03-032-4/+4
* document latest openx security issuejgh2012-03-031-0/+27
* Just overwrite the link if it still exists. That way we are sure that the linkflo2012-03-031-2/+1
* -Update to 0.8jgh2012-03-033-3/+9
* - Remove conditional checks for FreeBSD 6.Xpav2012-03-021-8/+0
* - Update to 0.4.0wen2012-03-013-144/+117
* - Update to 2.1.8wen2012-03-012-6/+5
* Update to 1.8.4p2wxs2012-03-014-7/+13
* - Update to 5.71sunpoet2012-03-012-4/+3
* Document latest PostgreSQL vulnerabilitiescrees2012-02-291-0/+35
* Fix build with recent OpenSSL from ports.demon2012-02-281-2/+14
* devel/apr hasn't existed in quite some time.pgollucci2012-02-281-2/+1
* - Add information about make tidy checking now that it actually functionseadler2012-02-281-3/+8
* Document recent flash vulnseadler2012-02-281-0/+32
* Pacify 'make tidy' and use valid XML.eadler2012-02-281-4/+3
* - Take maintainershipmatthew2012-02-281-2/+2
* make sure installation does not fail if for whatever reason the symlink inflo2012-02-281-1/+2
* Add libxml2 vulnability.kwm2012-02-281-0/+28
* - Reassign to the heapglarkin2012-02-285-5/+5
* - Update to 1.45swills2012-02-282-3/+3
* - Update to 201208 snapshotjgh2012-02-282-5/+5
* install rc.d scripts on FreeBSD 10.x and abovesumikawa2012-02-272-1/+12
* Fixup python entry. No need to have python metaport listed.wxs2012-02-271-4/+1
* Fix i386 packaging-- sha256c.so was named wrongly in the binaries tarballcrees2012-02-272-4/+4
* - Update to 2.04bzi2012-02-263-3/+5
* Return maintainership back to poolmm2012-02-261-1/+1
* - Update to 1.8zi2012-02-262-3/+3
* - Update to 4.52zi2012-02-269-161/+19
* - Adopt port per maintainers requestzi2012-02-251-1/+1
* - Take maintainership per request of current maintainerzi2012-02-251-1/+1
* Update to 5.3bcs2012-02-253-12/+12
* obfsproxy is a tool that attempts to circumvent censorship, by transforming thecs2012-02-245-0/+60
* - Update to 0.4.2culot2012-02-242-3/+3
* - Update to 1.43sunpoet2012-02-243-4/+10
* - Update to 1.2.1 [1]zi2012-02-232-5/+4
* - Update to 1.56jadawin2012-02-232-3/+3
* Misc fixes (not comprehensive) for freebsd8.cy2012-02-232-4/+168
* Really install samples.ale2012-02-231-1/+1
* Update to 1.5.0 release.ale2012-02-236-401/+26
* - Chase Emacs updatesashish2012-02-222-2/+2
* - tamper SHLIB_VERSION_NUMBER in opensslv.hdinoex2012-02-221-0/+2
* - Update to 0.7.1jgh2012-02-223-50/+68
* - Update to 1.55jadawin2012-02-222-3/+3
* - Update to 0.9.1tota2012-02-212-4/+3
* Fix library arch mismatch on amd64, hopefully fix powerpc as well.lx2012-02-211-2/+14
* update to 3.13.2flo2012-02-216-45/+14
* Update to 2.5wxs2012-02-203-7/+60
* Minor whitespace fixupeadler2012-02-201-1/+1
* This is a set of various Samba VFS modules to scan and filter viruskuriyama2012-02-205-0/+45
* - Update to 4.37miwi2012-02-202-3/+3
* Include PORTREVISION in plib version number to fix previous commit.rene2012-02-201-1/+1
* Document a remote code execution via a buffer overflow in PLIB.rene2012-02-201-0/+42
* Remove quotes from BROKEN and IGNORE as they are not requiredeadler2012-02-191-2/+2
* - replace `YES' with `yes' in USE_PYTHON/USE_PYDISTUTILS (mostly)rm2012-02-192-5/+5
* Fix build on x86, show output from buildlx2012-02-192-4/+15
* HsOpenSSL is an (incomplete) OpenSSL binding for Haskell. It canpgj2012-02-194-0/+30
* A set of extra definitions, default values and helpers for the tlspgj2012-02-194-0/+31
* Native Haskell TLS and SSL protocol implementation for server andpgj2012-02-194-0/+51
* Certificates and Key reader/writer. At the moment only X509 certificatepgj2012-02-194-0/+42
* This library implements the RSA encryption and signature algorithms forpgj2012-02-194-0/+52
* An unrolled implementation of MD5 purely in Haskell.pgj2012-02-194-0/+26
* Security update to 3.4.10.1matthew2012-02-181-0/+26
* - document latest piwik security vulnerabilityjgh2012-02-181-0/+27
* - document recent mozilla vulnerabilitiesflo2012-02-181-1/+52
* Update to 3.0.2 - minor bugfixes.lx2012-02-172-3/+3
* Update to 1.5.3.6crees2012-02-173-50/+103
* - add PACKETSTORM mirrorrm2012-02-171-1/+2
* - Bump PORTREVISION to chase the update of multimedia/libvpxashish2012-02-162-0/+2
* Document vulnerabilities in chromium < 17.0.963.56rene2012-02-161-0/+66
* Add new port (security/tsshbatch)jgh2012-02-164-0/+64
* - Added gpg run dependencyglarkin2012-02-161-0/+3
* - Updated the recent WebCalendar entry to match <= 1.2.4 instead of < 1.2.4,glarkin2012-02-161-10/+10
* gpgr is a very light interface to the command-line GPG (GNU Privacyglarkin2012-02-164-0/+30
* - Mark broken on 7.x. Builds fine, doesn't work, according to "make test"swills2012-02-151-1/+7
* - Fix missing \n in SIZE line for distinfoscheidell2012-02-151-1/+1
* Update to 4.1.nobutaka2012-02-152-3/+3
* - Add official site to MASTER_SITESsunpoet2012-02-151-1/+2
* - Add BUILD_DEPENDSsunpoet2012-02-151-5/+5
* This vuln also affects pypyeadler2012-02-151-0/+7
* update to 0.2.3.12-alphabf2012-02-152-3/+3
* - Bump PORTREVISIONpgollucci2012-02-152-5/+22
* Update to 0.11.novel2012-02-152-3/+3
* Bump pcre library dependency due to 8.30 updatemm2012-02-1410-13/+20
* - update to 7.2rm2012-02-142-3/+3
* typoeadler2012-02-141-1/+1
* Inform users of the DoS issue in the python SimpleXMLRPCServer functioneadler2012-02-141-0/+55
* Add the recently assigned cve numbereadler2012-02-141-0/+2
* - Update to 0.0.1.0pgj2012-02-132-4/+3
* - Update to 4.2.4pgj2012-02-132-4/+3
* Update to 1.0.4jpaetzel2012-02-132-5/+8
* - Connect all the previously added hs- ports to the buildpgj2012-02-131-0/+9
* - Please welcome GHC 7.0.4pgj2012-02-131-0/+1
* Skein [1] is a family of fast secure cryptographic hash functions. Thispgj2012-02-133-0/+35
* To store passwords securely, they should be salted, then hashed with apgj2012-02-133-0/+31
* A platform independent method to obtain cryptographically strong entropypgj2012-02-133-0/+28
* A collection of crypto hashes, with a practical incremental and one-pass,pgj2012-02-133-0/+30
* Symmetrical Block, Stream, and PubKey Ciphers.pgj2012-02-133-0/+27
* Generic cryptography public keys algorithm types.pgj2012-02-133-0/+26
* A generic interface for cryptographic operations, platform independent qualitypgj2012-02-133-0/+32
* Simple crypto pseudo-random-number-generator with really good randomnesspgj2012-02-133-0/+27
* Achieves security through AES-CTR encryption and Skein-MAC-512-256pgj2012-02-133-0/+29
* - Pregenerate pw_dict since cracklib stopped distributing onepgollucci2012-02-137-5/+12
* - Patch the port to not remove /dev/nullpgollucci2012-02-132-2/+13
* - Mark BROKEN immediately: this port deletes /dev/null during compilationpav2012-02-131-0/+2
* - sync PORTREVISION to lang/php4+1 (master port)pgollucci2012-02-131-1/+1
* - convert to using PYTHON_SITELIBDIR (non-functional change)rm2012-02-138-73/+74
* - fix origin from previous commitjgh2012-02-131-1/+1
* - Update to 1.05sunpoet2012-02-123-14/+13
* - Update to 1.05sunpoet2012-02-126-44/+121
* Add new port (security/sshpass)jgh2012-02-124-0/+31
* Inform users of the XSS issue in the latest version of WebCalendar.eadler2012-02-121-0/+29
* - Change WWW to CPANsunpoet2012-02-121-1/+1
* - Update to 2.1.4pgollucci2012-02-122-4/+5
* - Update to 3.1pgollucci2012-02-123-7/+17
* - Update to 1.5.3pgollucci2012-02-122-12/+9
* Whitespace fixes.wxs2012-02-121-3/+3
* - Update to version 4.1.0 [1]pawel2012-02-122-5/+5
* - Document mozilla -- use after free in nsXBLDocumentInfo::ReadPrototypeBindingsbeat2012-02-111-0/+46
* Inform bip users of buffer overflow (CVE-2012-0806)eadler2012-02-111-0/+27
* Inform users of the private information disclosure bug in surf (CVE-2012-0842)eadler2012-02-111-0/+24
* - Update to 7.1azi2012-02-112-7/+3
* - Convert from BUILD -> LIB depends for cracklib and move to .so usagepgollucci2012-02-111-5/+3
* - Chase shlib bump for security/cracklib from .1 -> .10pgollucci2012-02-115-2/+5
* - patch swatch.rc to check for buffer overflow in cmdarg with long _flags linesscheidell2012-02-102-5/+13
* Fix stylejadawin2012-02-101-8/+8
* Document last glpi vulnerabilitiesjadawin2012-02-101-0/+27
* Update security/pam_google_authenticator to 20120119 snapshotdumbbell2012-02-102-6/+4
* Fix build with thread-safe php.ale2012-02-101-0/+10
* Document new Chromium < 17.0.963.46 vulnerabilities.rene2012-02-091-0/+86
* - Restrict USE_PYTHON rangesunpoet2012-02-091-1/+1
* - Make non-interactive and remove IS_INTERACTIVEswills2012-02-091-1/+1
* - Update to 1.54jadawin2012-02-092-3/+3
* - Update to 0.8.6pgollucci2012-02-094-13/+22
* - Update to 2.8.18pgollucci2012-02-096-95/+20
* - Mark as deprecatedjadawin2012-02-081-0/+2
* - Fix build when using GCRYPT KNOBsbz2012-02-082-0/+12
* - Update to 2.2.0pgollucci2012-02-082-3/+3
* New Port: security/binwalkjgh2012-02-084-0/+56
* Document Drupal core multiple vulnerabilities.delphij2012-02-081-0/+52
* - Update to 0.0.6miwi2012-02-072-6/+3
* Fix up 3fd040be-4f0b-11e1-9e32-0025900931f by giving a better description.wxs2012-02-071-4/+11
* Use the correct variable that was obviously the intent of the authoreadler2012-02-071-1/+1
* - Chase unixODBC shlib bumpmiwi2012-02-061-1/+2
* Document "bugzilla" - multiple vulnerabilities.skv2012-02-061-0/+50
* If you used LDAP and NOPORTDOCS then the documentation directory would bewxs2012-02-062-1/+2
* - Replace WITH_GUI with WITH_X11 to adhear to standardszi2012-02-061-2/+2
* Document PHP remote code vulnerability.delphij2012-02-041-0/+26
* - Update to 1.4.0sbz2012-02-042-3/+7
* Update to 0.9.33 release.ale2012-02-032-3/+5
* Add vuxml entry for mathopd directory traversal vulnerability.rm2012-02-031-0/+27
* - adjust ordering for latest apache entryjgh2012-02-031-12/+12
* MITRE is spelled in all capital letters.wxs2012-02-021-1/+1
* Update to 1.4.8mm2012-02-022-3/+3
* - Remove missing file in previous commitsunpoet2012-02-021-13/+0
* document latest Apache vulnerabilitiesjgh2012-02-021-0/+54
* - fix sed regular expressionjgh2012-02-021-3/+4
* - Update to 1.3.2sunpoet2012-02-022-11/+8