aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* security/signify: update to 0.6jbeich2016-10-274-18/+7
* - Update to 2.10.0amdmi32016-10-274-47/+4
* Update to 1.5.1antoine2016-10-262-4/+4
* Fix FreeBSD-SA-16:32.bhyve to correctly document this affects FreeBSD-kernelfeld2016-10-261-1/+2
* Document revised FreeBSD-SA-16:15.sysarchfeld2016-10-261-7/+10
* Document FreeBSD-SA-16:32.bhyvefeld2016-10-261-0/+32
* Remove build dependency on the python symlinkantoine2016-10-251-5/+1
* - Mark broken on 9.x:amdmi32016-10-251-4/+5
* Bring in upstream commit ec165c392ca54317dbe3064a8c200de6531e89ad:bdrewery2016-10-252-1/+34
* Update to 20161017antoine2016-10-252-6/+6
* Update to 20161022antoine2016-10-252-5/+7
* Document flash vulnerabilitiesfeld2016-10-241-0/+53
* OPTIONS_SET/OPTIONS_UNSET are global variables, they cannot be used in ports ...mat2016-10-241-1/+1
* - Add LICENSEamdmi32016-10-241-6/+7
* - Update to 1.1.1.7antoine2016-10-232-4/+9
* New port: security/py-maecantoine2016-10-234-1/+48
* Update to 4.12.35antoine2016-10-232-5/+5
* Update to 1.1.24antoine2016-10-232-4/+4
* Update to 2.0.5antoine2016-10-232-4/+4
* Update to 0.1.1antoine2016-10-232-4/+4
* security/tsshbatch: update 1.228 -> 1.317pi2016-10-232-3/+5
* Fix build of the Qt interface on FreeBSD 10.2 and 10.3. On FreeBSD 10.1, itjhale2016-10-222-5/+14
* - update to 7.31ohauer2016-10-222-4/+4
* - update to 2.11.0flo2016-10-222-5/+5
* Use USES=pathfix where applicable.mat2016-10-217-24/+3
* Update to 0.041.vanilla2016-10-212-4/+4
* ${RM} already has -f.mat2016-10-2121-24/+24
* Reference MFSA for Thunderbird fixed by r423073jbeich2016-10-211-0/+2
* Document recent Firefox vulnerabilitiesjbeich2016-10-211-0/+28
* security/revealrk: update 1.2.1 -> 1.2.2pi2016-10-212-4/+4
* Remove expired PHP5.5 ports.rene2016-10-215-54/+0
* Unlink expired PHP5.5 ports.rene2016-10-211-4/+0
* security/p5-Crypt-OpenSSL-PKCS10: update 0.15 -> 0.16pi2016-10-212-5/+4
* - Update to 1.4zi2016-10-212-4/+4
* - Update to 5.36zi2016-10-218-188/+4
* Really fix build on 9.x for the c++ and Qt5 bindings;jhale2016-10-211-0/+6
* security/p5-Crypt-LE: update 0.18 -> 0.19pi2016-10-212-5/+4
* Remove non-php55 expired ports:rene2016-10-214-33/+0
* Add py-keystone 10.0.0, OpenStack Keystonenovel2016-10-215-0/+101
* Reassign makc's ports back to the pool.rakuco2016-10-201-1/+1
* Remove duplicate lines from plistantoine2016-10-202-8/+0
* security/suricata: Update to 3.1.2koobs2016-10-203-7/+6
* security/keepassx2: Update to 2.0.3cpm2016-10-203-20/+15
* [NEW PORT] security/keepassx-develcpm2016-10-205-0/+268
* - Update to 1.7.1jhale2016-10-206-14/+19
* - Update to 3.4.3amdmi32016-10-193-3/+15
* Add Linux CentOS 7 infrastructure ports.tijl2016-10-1946-0/+940
* security/rubygem-doorkeeper: Update from 3.1.0 to 4.2.0tz2016-10-192-4/+5
* - Update security/gpgme to 1.7.0jhale2016-10-1911-13/+323
* update gnupg to 2.1.15cmt2016-10-193-10/+11
* Fix some malformed <freebsdpr> entries in vuxmlfeld2016-10-191-10/+18
* Document vulnerability in Apache Axis2feld2016-10-191-0/+33
* Update security/tor to 0.2.8.9rene2016-10-196-15/+26
* Document remote denial of service vulnerability in security/tor*rene2016-10-191-0/+36
* Introduce new extensible virtual categories for KDEtcberner2016-10-192-6/+2
* Fix wrong range of vulnerable Rails 4 versionstz2016-10-181-4/+2
* Update to 3.4.16.tijl2016-10-183-8/+7
* security/gnome-ssh-askpass: Update version 5.8p2=>6.6p1bofh2016-10-173-11/+14
* Update the Linphone stack:tijl2016-10-176-9/+8
* Add DTLS-SRTP (RFC 5764) support for use within Linphone.tijl2016-10-172-1/+660
* security/p5-File-KeePass: Add p5-XML-Parser as dependency.woodsb022016-10-171-1/+2
* security/py-{acme,certbot}: Update to 0.9.3cpm2016-10-174-8/+8
* security/certificate-transparency: add missing patchpi2016-10-172-0/+12
* - Update to 0.18wen2016-10-172-4/+4
* Update to 1.1.1.6antoine2016-10-172-7/+11
* security/certificate-transparency: update 20160102 -> 20161015pi2016-10-1630-63/+46
* Update to 4.12.34antoine2016-10-162-6/+6
* Update to 0.0.8antoine2016-10-162-4/+4
* Update to 1.1.23antoine2016-10-162-4/+4
* Update to 0.2.4antoine2016-10-162-4/+4
* security/libkpass: Update to version 6woodsb022016-10-153-19/+8
* Rails 4: Document XSS Vulnerability in Action View andtz2016-10-141-0/+60
* Document multiple security issues of PHP 7.0tz2016-10-141-0/+39
* Document multiple security issues of PHP 5.6tz2016-10-141-0/+40
* security/py-{acme,certbot}: Update to 0.9.2cpm2016-10-134-8/+9
* - Set DIST_SUBDIR to handle distfile without version stringkmoore2016-10-132-5/+4
* - Add new port security/ngrokkmoore2016-10-134-0/+45
* - Switch couple more ports to verbose buildamdmi32016-10-132-3/+0
* Document file-roller vulnerabilityfeld2016-10-121-0/+29
* Document Virtualbox vulnerabilitiesfeld2016-10-121-0/+40
* Document ImageMagick vulnerabilitiesfeld2016-10-121-0/+30
* Document libgd vulnerabilitiesfeld2016-10-121-0/+35
* Document libvncserver vulnerabilitiesfeld2016-10-121-0/+35
* Document OpenOffice vulnerabilityfeld2016-10-121-0/+31
* Document mupdf vulnerabilitesfeld2016-10-121-0/+44
* Fix OpenSSL vuln version rangefeld2016-10-121-2/+2
* security/p5-Crypt-LE: add missing dependenciespi2016-10-121-1/+6
* Document openjpeg vulnerabilityfeld2016-10-111-0/+37
* Document redis vulnerabilityfeld2016-10-111-0/+31
* Update to 0.0108, and donate to the Perl collective.adamw2016-10-112-4/+5
* Fix typo in vuxml topicfeld2016-10-111-2/+2
* - update to 1.0.29dinoex2016-10-112-5/+5
* Document FreeBSD-SA-16:31.libarchivefeld2016-10-101-0/+33
* Document FreeBSD-SA-16:30.portsnapfeld2016-10-101-0/+35
* Document FreeBSD SA-16:29.bspatchfeld2016-10-101-0/+36
* Add FreeBSD SA info to recent BIND vulnerabilityfeld2016-10-101-0/+6
* Add FreeBSD SA info to recent OpenSSL vulnerabilityfeld2016-10-101-0/+6
* Thank you Uffe for your past work on FreeBSD ports! Hope you'll find timebsam2016-10-101-1/+1
* Update to 0.23.adamw2016-10-092-4/+5
* Update to 0.08 (which just improves the Makefile.PL), and stripadamw2016-10-092-4/+7
* devel/nspr, security/nss: drop version from SONAMEjbeich2016-10-0910-42/+14
* security/nss: update to 3.27.1 and define licensejbeich2016-10-094-8/+11
* Update to 4.12.31antoine2016-10-092-5/+6
* Update to 1.1.19antoine2016-10-092-4/+4
* New port: security/rubygem-rex-exploitationantoine2016-10-094-0/+30
* Update to 2.0.4antoine2016-10-092-4/+4
* Update to 2.0.4antoine2016-10-092-6/+4
* Update to 0.1.1antoine2016-10-092-4/+4
* Update to 0.1.66antoine2016-10-092-4/+4
* Document code execution vulnerability in mkvtoolnix < 9.4.1riggs2016-10-091-0/+27
* security/ca_root_nss: adjust pkg-plist to address leftover directorymarino2016-10-091-0/+1
* - Update to 0.81wen2016-10-092-4/+4
* security/acme-client: Bump port-revisionbrnrd2016-10-091-0/+1
* security/acme-client: Add STATIC optionbrnrd2016-10-082-2/+22
* Update the libXfixes version. The old version was still affected by thekwm2016-10-081-1/+2
* security/acme-client: Fixes for periodic scriptbrnrd2016-10-081-10/+10
* - set PORTSCOUT to ignoredinoex2016-10-081-0/+1
* security/xmlsec1: Fix build with LibreSSLbrnrd2016-10-082-2/+33
* - move DOCS and make them an optiondinoex2016-10-084-12/+26
* - use DATADIRdinoex2016-10-081-3/+3
* Document X.org client libraries insufficient validation of data fromkwm2016-10-081-0/+71
* security/openssl: Fix ldconfig issuebrnrd2016-10-071-1/+1
* Update to 0.2.21tj2016-10-072-4/+6
* - Bump portrevision for previous changeamdmi32016-10-061-1/+1
* - Bring back license installationamdmi32016-10-061-1/+7
* - Update to 2.4damdmi32016-10-062-19/+9
* Add math/gmp to LIB_DEPENDSjrm2016-10-051-1/+2
* security/arirant: remove USE_LIBRUBYswills2016-10-051-1/+3
* security/lynis:lme2016-10-053-4/+26
* security/openssl: Mark MAKE_JOBS_UNSAFEbrnrd2016-10-051-0/+2
* Add new port security/kdbx-viewerwoodsb022016-10-044-0/+49
* Update to version 1.0pawel2016-10-032-4/+4
* security/xmlsec1: unbreak on 9.xjbeich2016-10-031-0/+10
* security/openssl-devel: Align with security/opensslbrnrd2016-10-022-3007/+3001
* Update to 4.12.29antoine2016-10-022-6/+6
* Update to 1.1.16antoine2016-10-022-4/+4
* security/openssl: Modernize portbrnrd2016-10-022-1663/+1608
* Update to version 5.9p6pawel2016-10-012-6/+5
* Deprecate ports broken for more than 6 monthsantoine2016-10-012-0/+4
* - Mark broken: download link is no longer validamdmi32016-10-011-0/+2
* Chase php 5.5 expiration dateantoine2016-10-011-0/+3
* Remove expired ports:rene2016-10-0137-2137/+0
* Let USES=localbase add -L${LOCALBASE}/lib to LIBS instead of LDFLAGS.tijl2016-10-011-1/+1
* Add linux-c6-openssl to recent OpenSSL vulnerabilities.tijl2016-09-301-1/+5
* Update to 1.0.1e-48.el6_8.3.tijl2016-09-303-15/+15
* - update to 7.30ohauer2016-09-307-147/+14
* security/rubygem-doorkeeper: Remove Rails 3 optiontz2016-09-291-10/+1
* Record its need for OpenSSL, and do a first step into making it buildmat2016-09-291-1/+2
* - Reset maintainer to ports@wen2016-09-291-1/+1
* Update to 4.12.28antoine2016-09-292-4/+5
* New port: security/rubygem-rex-encoderantoine2016-09-294-0/+29
* Update to 0.1.6antoine2016-09-292-4/+4
* Add bind9-devel to the latest BIND9 vuln.mat2016-09-281-0/+4
* security/nss: update to 3.27jbeich2016-09-288-36/+36
* Document BIND remote DoS vulnerability.delphij2016-09-281-0/+39
* - Document the security vulnerability in py-django, py-django18 and py-django19.wen2016-09-281-0/+34
* security/libressl-devel: Update to 2.5.0brnrd2016-09-283-34/+13
* security/vuxml: Update recent OpenSSL vuln (add LibreSSL)brnrd2016-09-281-0/+9
* security/libressl: Update to 2.4.3brnrd2016-09-282-4/+4
* - Update to 1.0.11vsevolod2016-09-283-5/+5
* Update to 0.4.2 release.ale2016-09-273-7/+6
* - Update to 0.8wen2016-09-272-5/+6
* security/openssl-devel: Update to 1.1.0bbrnrd2016-09-263-5/+6
* security/openssl: Update to 1.0.2jbrnrd2016-09-262-12/+12
* security/vuxml: Add 2016-09-26 OpenSSL entriesbrnrd2016-09-261-0/+34
* - Add LICENSEamdmi32016-09-262-9/+8
* security/nss: unbreak build on armv6jbeich2016-09-261-1/+4
* - add missing man pages to pkg-plist (fix package building)ohauer2016-09-251-2/+6
* security/openssl: Take maintainershipbrnrd2016-09-251-1/+1
* security/munge: UNBREAK and Update version 0.5.11=>0.5.12bofh2016-09-255-15/+51
* devel/openssl: change CONFLICTS to CONFLICTS_INSTALLmarino2016-09-241-3/+3
* - Update devel/icu to 57.1.tijl2016-09-241-0/+1
* - add option ASM for OPNsensedinoex2016-09-241-2/+7
* Update email address to jrm@FreeBSD.org for ports that I maintainjrm2016-09-241-1/+1
* This uses OpenSSL, use openssl from ports if available.mat2016-09-231-2/+3
* Document affected FreeBSD versions for recent OpenSSL vulnerabilitiesfeld2016-09-231-0/+9
* security/openssl: Update to 1.0.2ibrnrd2016-09-236-291/+12
* security/openssl-devel: Revert to PORTVERSIONbrnrd2016-09-231-3/+1
* lang/php56: Update from 5.6.25 to 5.6.26tz2016-09-234-4/+0
* - Update py-scrypt to 0.8.0cpm2016-09-232-3/+4
* - Add LICENSE_FILEamdmi32016-09-231-1/+2
* security/openssl-devel: Bump portrevisionbrnrd2016-09-221-0/+1
* security/openssl-devel: Update to 1.1.0abrnrd2016-09-223-5/+9
* Remove extra / invalid CVE entry for OpenSSLfeld2016-09-221-1/+0
* Update range of vulnerable irssi versionsfeld2016-09-221-2/+2
* security/vuxml: Add new OpenSSL 1.0.2 and 1.1.0 vulnerabilitiesbrnrd2016-09-221-0/+57
* Document that chinese/irssi is vulnerable as wellfeld2016-09-221-0/+2
* Document irssi vulnerabilitiesfeld2016-09-221-0/+28
* lang/php70: Update from 7.0.10 to 7.0.11tz2016-09-214-4/+0
* - Fix build when a previous version is insalled and ssl from ports is usedantoine2016-09-212-2/+13
* - Update to 2.038jadawin2016-09-212-4/+4
* Update security/sudo to 1.8.18garga2016-09-213-4/+5
* Python 3 version of security/py-libnacl.philip2016-09-212-0/+9
* Allow overriding the Python version.philip2016-09-211-1/+1
* Update plaso to 1.5.0antoine2016-09-213-21/+15
* Update to 20160918antoine2016-09-213-35/+13
* Document recent Firefox vulnerabilitiesjbeich2016-09-211-0/+86
* New port: security/py-dfwinregantoine2016-09-214-0/+36
* New port: security/py-dfdatetimeantoine2016-09-214-0/+32
* Update to 20160918antoine2016-09-212-4/+4
* Update to 2.4.3jhale2016-09-203-4/+5
* Increase the length of the password.marcus2016-09-192-3/+6
* security/vuxml: Fix curl version rangesbrnrd2016-09-181-2/+1
* security/snort2pfcd: Update to 0.7woodsb022016-09-184-15/+8
* Mark as broken on mips64 and sparc64.linimon2016-09-181-0/+2
* Mark as broken on mips64 and sparc64.linimon2016-09-181-0/+2
* - Update to 0.25wen2016-09-182-3/+4
* - Update to 5.96wen2016-09-182-3/+4
* security/dehydrated: minor fixesrobak2016-09-183-3/+4
* security/revealrk: 1.1.2 -> 1.2.1pi2016-09-183-16/+4
* Complete the adoption of options helpers, remove old cruft,adamw2016-09-172-26/+20
* Update 1.13.6 --> 1.13.7cy2016-09-172-4/+4
* Update to 4.12.26antoine2016-09-172-8/+13
* New port: security/rubygem-rex-sslscanantoine2016-09-174-0/+27
* New port: security/rubygem-rex-socketantoine2016-09-174-0/+27
* New port: security/rubygem-rex-rop_builderantoine2016-09-174-0/+30
* New port: security/rubygem-rex-nopantoine2016-09-174-0/+29
* New port: security/rubygem-rex-bin_toolsantoine2016-09-174-0/+42
* New port: security/rubygem-rex-coreantoine2016-09-174-0/+26
* security/zenmap: Update to 7.25 BETA2 and use security/nmap as MASTERDIRwoodsb022016-09-173-34/+21
* security/amap: Update to 5.4woodsb022016-09-174-16/+23
* Document new vulnerabilities in www/chromium < 53.0.2785.113rene2016-09-171-0/+47
* Document CVE 2016-6662: zero-day remote vulnerability in mysql portsriggs2016-09-171-0/+30
* security/libp11: Mark IGNORE if SSL_DEFAULT matchs libresslmarino2016-09-161-3/+8
* security/openscep: Mark IGNORE if SSL_DEFAULT matches libresslmarino2016-09-161-5/+10
* Mark BROKEN: wrong build dependsantoine2016-09-161-0/+2
* ftp.openssl.org is being taken out.mat2016-09-162-2/+0
* Document security problems in dropbearmatthew2016-09-151-0/+42
* Unmark broken on powerpc64swills2016-09-155-10/+0
* Release some of my ports back to the heapmarino2016-09-151-1/+1
* GOOGLE_CODE has gone away.mat2016-09-1415-5/+27
* Update to version 2.2.1pawel2016-09-142-4/+4
* Update 1.14.3 --> 1.14.4.cy2016-09-142-4/+4
* security/vuxml: Document www/h2o vulnerabilitybrnrd2016-09-141-0/+26
* ftp/curl: Document integer overflow vulnbrnrd2016-09-141-0/+35
* - Update to 0.13amdmi32016-09-142-5/+6
* security/dehydrated: Rename from letsencrypt.shbrnrd2016-09-1410-77/+102
* Add vulnerabilities for www/chromium < 53.0.2785.92rene2016-09-141-0/+93
* security/proxytunnel: Fix all SSL configuration, fix no SSLv3 (LibreSSL)marino2016-09-142-0/+30
* Belatedly add vulnerabilities for www/chromium < 52.0.2743.116rene2016-09-141-0/+53
* - This port are no longer used or cared for.nemysis2016-09-141-1/+1
* security/openssl_tpm_engine: Document SSL requirement, IGNORE LIbreSSLmarino2016-09-141-4/+10
* security/hydra: Configure for any SSL base and IGNORE LibreSSLmarino2016-09-141-1/+9
* LibreSSL checks: Check for libressl-devel option toomarino2016-09-132-3/+3
* security/ncrack: Update to 0.5woodsb022016-09-132-5/+7
* Update to 0.040.vanilla2016-09-132-4/+4
* security/amap: Fix hardermarino2016-09-132-6/+22
* Document MySQL root code execution vulnerability.delphij2016-09-131-0/+69
* security/p5-openxpki: IGNORE for libressl-devel as well as libresslmarino2016-09-131-1/+1
* securty/bro: Modernize options, remove Ports SSL option, support LibreSSLmarino2016-09-133-81/+59