aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Reset miwi@'s ports, he stepped down from the Ports Team.rene2016-07-2625-25/+25
* security/letskencrypt: Update to 0.1.9brnrd2016-07-253-15/+14
* Update to version 0.9.5pawel2016-07-252-5/+4
* Update to version 1.12.0pawel2016-07-245-8/+12
* - Remove duplicate information from pkg-messagezi2016-07-242-5/+4
* Remove unneeded post-install USES=libtool nukes .la already nowbapt2016-07-241-3/+0
* Update to 4.12.15antoine2016-07-232-7/+9
* Update to 1.1.13antoine2016-07-232-4/+4
* New port: security/rubygem-rex-struct2antoine2016-07-234-0/+27
* New port: security/rubygem-metasploit_payloads-mettleantoine2016-07-234-0/+26
* security/libgpg-error: update to 1.24novel2016-07-233-5/+5
* Document new vulnerabilities in www/chromium < 52.0.2743.82rene2016-07-231-0/+80
* security/hydra: update to 8.2rm2016-07-235-44/+34
* Stop people putting arguments to USES=ssl.mat2016-07-221-1/+1
* Replace USE_OPENSSL with USES=ssl.cy2016-07-221-2/+1
* Update to 1.14.3.cy2016-07-222-3/+4
* Document a rare KDC denial of service vulnerability when anonymouscy2016-07-221-0/+28
* security/vuxml: Current mysql57 is NOT vulnerablebrnrd2016-07-221-1/+2
* Apache OpenOffice CVE-2016-1513 Memory Corruption Vulnerabilitytruckman2016-07-221-0/+38
* security/vuxml: Add MySQL vulnerabilities from quarterly updatebrnrd2016-07-211-0/+76
* Properly cancel the httpoxy vuxml entryfeld2016-07-211-0/+4
* Cleanup $() variables in ports Makefiles.mat2016-07-207-14/+14
* Remove unused variable.mat2016-07-201-1/+0
* Add LICENSE, tweak CONFLICTS and remove unused pkg-descr.tijl2016-07-202-4/+4
* Remove HTTPoxy entry in vuxml until a we know if upstream vendors willfeld2016-07-201-103/+0
* - Update to 1.7.2cpm2016-07-203-5/+5
* security/unicornscan is not jobs safemarino2016-07-201-0/+2
* Update security/strongswan to 5.5.0garga2016-07-202-7/+8
* - Update to 1.9.4amdmi32016-07-192-3/+4
* www/typo3 and www/typo3-lts: Document missing access check in Extbasetz2016-07-191-0/+38
* When there is a do-install target, do not use a post-install target, domat2016-07-1917-37/+15
* net/haproxy: Mark vulnerable to httpoxy in vuxmlbrnrd2016-07-191-1/+5
* Fix ancient getopts invocation in pskgen.cy2016-07-192-10/+5
* lang/go: Mark 1.6.3 as NOT vulnerable to httpoxybrnrd2016-07-191-1/+1
* www/apache24: Fix httpoxy vulnerability (+2.2)brnrd2016-07-191-2/+8
* httpoxy: Mark ports as vulnerablebrnrd2016-07-191-0/+93
* Fix CVE-2016-0772 entry to not blame only Python 2.7bdrewery2016-07-191-1/+1
* Cleanup USE_GITHUB usage.mat2016-07-182-5/+4
* - Update to 5.35zi2016-07-182-4/+4
* - Switch to options helpersamdmi32016-07-181-1/+1
* Update to 1.7.9.vanilla2016-07-183-19/+27
* Update to 1.7.9.vanilla2016-07-183-6/+7
* - update to 7.25BETA1ohauer2016-07-173-4/+12
* Update py-rekall/py-rekall-core to 1.5.2antoine2016-07-165-16/+18
* Update to 0.24.post1antoine2016-07-162-6/+6
* Update to 20160114antoine2016-07-162-5/+5
* Update to 0.1.1antoine2016-07-162-4/+4
* Document security issues from ATutor 2.2.1 and 2.2.2 changelogjunovitch2016-07-161-0/+53
* Update Drupal SA-CORE-2016-002 with the assigned CVEsjunovitch2016-07-161-0/+4
* Document Flash vulnerabilities in Adobe Security Bulletins APSB16-25junovitch2016-07-161-0/+105
* Update to 4.12.12antoine2016-07-162-4/+12
* Update to 1.1.12antoine2016-07-162-6/+4
* New port: security/rubygem-rex-zipantoine2016-07-164-0/+29
* New port: security/rubygem-rex-registryantoine2016-07-164-0/+27
* New port: security/rubygem-rex-powershellantoine2016-07-164-0/+30
* New port: security/rubygem-rex-javaantoine2016-07-164-0/+24
* New port: security/rubygem-rex-random_identifierantoine2016-07-164-0/+26
* New port: security/rubygem-rex-textantoine2016-07-164-0/+27
* Rename vuxml entry, add new detailed reference as primary.feld2016-07-161-3/+4
* Package name for jakarta-struts is actually apache-strutsfeld2016-07-161-1/+1
* Also add jakara-struts to the vuxml entry for CVE-2016-3092feld2016-07-161-0/+5
* Document tomcat vulnerabilityfeld2016-07-161-0/+36
* Document libreoffice vulnerabilityfeld2016-07-161-0/+31
* Update name in vuxml of person who reported CVE-2016-5102feld2016-07-161-1/+1
* Document tiff vulnerabilitiesfeld2016-07-161-0/+81
* Document CVE-2016-2334 and CVE-2016-2335 in archivers/p7zip.rakuco2016-07-151-0/+64
* Update to version 0.2.8.5-rcpawel2016-07-152-4/+4
* New port: security/py-vulndbpi2016-07-154-0/+29
* New port: security/py-halberdpi2016-07-154-0/+28
* Update to version 1.11.0pawel2016-07-145-10/+30
* Add information about CVE-2016-2119 vulnerability in Samba suits.timur2016-07-131-0/+43
* security/libsodium: Upgrade version 1.0.8 => 1.0.10marino2016-07-1310-10/+15
* Add patch from upstream commit 7247f99b3e068a2b90b7776a2cdd438fddb7a38btijl2016-07-122-0/+12
* security/libargon2: add new portjbeich2016-07-125-0/+42
* Rename security/hashcat to security/hashcat-legacymatthew2016-07-126-0/+315
* Upgrade to 3.00matthew2016-07-1210-177/+613
* Back to poolcs2016-07-121-1/+1
* rubygem-ruby-saml: Document XML signature wrapping attacktz2016-07-111-0/+32
* security/py-safe: add new portjbeich2016-07-114-0/+27
* Update to version 5.10pawel2016-07-112-3/+3
* security/afl: update 2.07b -> 2.19bjunovitch2016-07-095-12/+17
* security/p5-Protocol-ACME: 0.12 -> 0.15pi2016-07-093-6/+4
* Update to 0.038.vanilla2016-07-082-4/+4
* Update to 3.4.14.tijl2016-07-083-5/+5
* security/rubygem-omniauth-saml: update from 1.5.0 to 1.6.0tz2016-07-082-4/+5
* security/rubygem-ruby-saml: update from 1.2.0 to 1.3.0tz2016-07-082-3/+4
* OTPW is a one-time password system which is robust against the passwordjkim2016-07-088-0/+103
* - Update to 5.9amdmi32016-07-072-4/+5
* - Fix affected versions of qemu and qemu-devellwhsu2016-07-071-12/+13
* Document remote denial of service in quasseljunovitch2016-07-071-0/+31
* Update to 5.9p4, which fixes a bug where command output is not displayednaddy2016-07-062-5/+5
* - document apache24 H2/X509 sec. issue.ohauer2016-07-061-0/+30
* Remove expired ports without open PRs:rene2016-07-0546-823/+0
* Document Xen Security Advisories (XSAs 173, 175, 176, 178, 179, and 180).junovitch2016-07-051-0/+208
* Update wnpa-sec-2016-12 through wnpa-sec-2016-18 with CVE assignment forjunovitch2016-07-041-1/+10
* Update wnpa-sec-2016-19 through wnpa-sec-2016-27 with CVE assignment forjunovitch2016-07-041-0/+12
* Document wnpa-sec-2016-29 through wnpa-sec-2016-37 for issues fixed injunovitch2016-07-041-0/+65
* Fix ports depending on security/(open|libre)ssl directly.mat2016-07-041-2/+2
* Add fixed entries for Python 2.7, 3.4, 3.5 for urllib vulnerability.junovitch2016-07-041-1/+14
* Update earlier openvswitch entry with version fixed in portsjunovitch2016-07-041-1/+5
* Document multiple security advisories for Moodlejunovitch2016-07-041-0/+49
* Document icingaweb2 vulnerabilityfeld2016-07-041-0/+26
* Fix date from r417994 (2016 not 2015)junovitch2016-07-041-1/+1
* Document authorization logic vulnerability in Apache Hivejunovitch2016-07-041-0/+31
* Document SQLite3 tempdir selection vulnerabilityjunovitch2016-07-041-0/+35
* Bump PORTREVISION in security/pinentry and pinentry-qt4 after r415872.rakuco2016-07-032-2/+2
* security/p5-Business-PayPal-EWP: Fix build with LibreSSLbrnrd2016-07-032-2/+12
* security/vuxml: Add Python smtplib TLS stripping vulnbrnrd2016-07-031-0/+43
* security/medusa: 2.1.1 -> 2.2pi2016-07-035-72/+9
* - Update to 1.206wen2016-07-032-4/+4
* security/py-spake2: create portswills2016-07-034-0/+22
* security/py-hkdf: create portswills2016-07-034-0/+24
* Horde package update:mm2016-07-022-3/+4
* Belatedly document 12 security advisories about phpMyAdmin.matthew2016-07-011-0/+237
* Add a test target, testing that what the port is supposed to do works.mat2016-07-011-0/+5
* Add missing dependency.mat2016-07-011-1/+2
* Document haproxy vulnerabilityfeld2016-07-011-0/+29
* Document libtorrent-rasterbar vulnerabilityfeld2016-07-011-0/+28
* Modify dnsmasq vuxml entryfeld2016-07-011-1/+5
* Document expat2 vulnerabilityfeld2016-07-011-0/+29
* Document dnsmasq vulnerabilityfeld2016-07-011-0/+30
* Document python vulnerabilityfeld2016-07-011-0/+30
* Document openssl vulnerabilityfeld2016-07-011-0/+32
* - Update to 0.7.1wen2016-06-309-356/+6
* security/letskencrypt: Update to 0.1.7brnrd2016-06-302-8/+5
* - Update to 20160628danilo2016-06-302-6/+6
* Remove all usage of OPENSSL_PORT from ports, this is deprecated, andmat2016-06-291-2/+7
* Update to 2.3.0.tijl2016-06-292-3/+4
* Update to 1.3.17.tijl2016-06-292-3/+4
* security/p5-Crypt-LE: Add RUN_DEPENDS security/p5-Crypt-PKCS10pi2016-06-291-0/+3
* security/p5-Crypt-OpenSSL-PKCS10: add missing DEPENDpi2016-06-291-0/+4
* New port: security/p5-Crypt-OpenSSL-PKCS10pi2016-06-295-0/+28
* New port: security/p5-Crypt-LEpi2016-06-295-0/+39
* security/openvpn-devel: 201607 -> 201623pi2016-06-292-13/+11
* Convert USE_PHP*=yes into USES=php*mat2016-06-2811-46/+15
* USEify USES=php.mat2016-06-284-4/+4
* - PORTEPOCH != PORTVERSIONzi2016-06-281-0/+1
* - Update to 2.029jadawin2016-06-282-4/+4
* Reset ports maintained by horia@racoviceanu.com.rakuco2016-06-282-2/+2
* - Pass maintainership to submitterwen2016-06-281-1/+1
* - Pass maintainership to submitterwen2016-06-281-1/+1
* Reset ports maintained by bf@ until he has time again to work on them.rene2016-06-282-2/+2
* security/doas: 5.9p1 -> 5.9p2pi2016-06-282-5/+7
* Insert tab. No functional change.ume2016-06-281-1/+1
* Replace bsd.openssl.mk with USES=sslmat2016-06-272-3/+3
* Add new port -- YubiKey PIV Managerume2016-06-277-0/+74
* - Update to 5.33zi2016-06-273-4/+6
* Document remote denial of service via FileUpload component in Tomcatjunovitch2016-06-271-0/+38
* - Update to 1.11.1sunpoet2016-06-272-3/+4
* - Update to 2.2.0sunpoet2016-06-272-4/+4
* - Update to 1.058sunpoet2016-06-272-3/+4
* Document Wordpress vulnerabilities fixed in 4.5.3junovitch2016-06-261-0/+58
* Docment security issues fixed in PHP 7.0.8, 5.6.23, and 5.5.37junovitch2016-06-261-0/+114
* Fix filename in distinfo.roberto2016-06-251-3/+3
* Add new port -- Yubico PIV toolume2016-06-254-0/+53
* Hook doas to the buildantoine2016-06-251-0/+1
* Change PORTREVISION to something sensible as upstream did not change.roberto2016-06-251-1/+1
* security/py-certbot: Complete renaming from letsencryptbrnrd2016-06-252-2/+2
* Missed the fact that ${ETCDIR} includes the port's name.roberto2016-06-251-0/+1
* Update to commit 720db72 to fix a security issue.roberto2016-06-254-26/+4
* security/nss: update to 3.25jbeich2016-06-244-6/+6
* New port: security/doasroberto2016-06-246-0/+69
* Update to 2.5gblach2016-06-242-5/+6
* Fix vuxmlfeld2016-06-241-1/+1
* Document libarchive vulnerabilitiesfeld2016-06-241-0/+41
* Add piwik XSS to vuxmlfeld2016-06-231-0/+28
* security/py-certbot: Rename from py-letsencrypt and updatebrnrd2016-06-238-13/+15
* Change all occurrences of xmj@chaot.net to johannes@perceivon.net as the owne...tz2016-06-234-4/+4
* Prefer relative symlinks to make the package relocation friendlybapt2016-06-231-1/+2
* - Update to 2.9.8.3zi2016-06-232-4/+4
* Update security/sudo to 1.8.17p1garga2016-06-233-7/+5
* security/tor-devel: update to 0.2.8.4.rjbeich2016-06-222-4/+4
* security/eschalot: add new portjbeich2016-06-224-0/+37
* Update to 0.17.mat2016-06-222-3/+4
* Drop maintainership for some of my ports.trasz2016-06-221-1/+1
* Update to 0.037.vanilla2016-06-212-4/+4
* Update to 0.80.mat2016-06-212-3/+4
* Update to 1.205.mat2016-06-212-3/+4
* Update to 0.161520.mat2016-06-212-3/+4
* Rename all three p5-ReadLine-(Gnu,Perl,TTYtter) to their real namesmat2016-06-211-1/+1
* Followup to r417190 - all versions of wget<1.18 are affectedvd2016-06-211-1/+1
* Document ftp/wget's HTTP to FTP redirection file name confusion vulnerabilityvd2016-06-211-0/+28
* - fix possible integer overflow and application crashdinoex2016-06-214-1/+243
* Update vuxml for libxslt vulnerabilitiesfeld2016-06-211-6/+33
* Update Linux ports to Centos 6.8.tijl2016-06-2121-132/+143
* With the power of USES=dos2unix, get rid of most patches and filesmat2016-06-2139-130/+134
* Update 1.8.16 --> 1.8.17cy2016-06-204-39/+6
* Update to 0.16.0 release.ale2016-06-203-7/+12
* - Upgrade to 2.1.13 (minor bugfixes).kuriyama2016-06-202-5/+6
* Provide a new MASTER_SITESbapt2016-06-201-8/+3
* Mark as deprecated: does not fetchbapt2016-06-201-0/+3
* Update to version 1.10.0pawel2016-06-206-6/+24
* security/letskencrypt: Don't automatically execute installed samplebrnrd2016-06-191-2/+0
* security/letskencrypt: Add periodic(8) and multi-cert capabilitybrnrd2016-06-196-0/+143
* Update security/libressl vulnerability for quarterly branchbrnrd2016-06-191-2/+3
* Document Flash vulnerabilities in Adobe Security Bulletins APSB16-10,junovitch2016-06-191-0/+229
* Teach security/scrypt about libcrypto versions:cperciva2016-06-191-0/+5
* Convert to @samplebapt2016-06-181-22/+6
* Fix with GCRYPT option on.mat2016-06-181-6/+4
* security/py-oauthlib: update to 1.1.2rene2016-06-182-3/+4
* security/libgpg-error: update to 1.23novel2016-06-183-4/+5
* Rename all files containing a : in their filename.mat2016-06-186-25/+25
* - Update to 1.7.1cpm2016-06-185-290/+10
* Fix vuxml <cvename> syntax for recent Chrome entryfeld2016-06-181-1/+1
* Update to a newer snapshot (6 june 2016)antoine2016-06-182-4/+5
* Update to 1.5.1antoine2016-06-182-4/+5
* Update to 1.5.1antoine2016-06-183-16/+17
* Document new vulnerabilities in www/chromium < 51.0.2704.103rene2016-06-181-0/+32
* Document integer overflow in python's zipimport modulerm2016-06-181-0/+39
* New port: security/clamfspi2016-06-176-0/+72
* Document Drupal vulnerabilitiesjunovitch2016-06-171-0/+34
* - update warning message for new macrosdinoex2016-06-171-2/+2
* Fix usage of WITH_OPENSSL_BASE, WITH_OPENSSL_PORT and OPENSSL_PORT.mat2016-06-1610-32/+24
* Add DEFAULT_VERSIONS=ssl=XXXmat2016-06-164-0/+4
* New port: security/zeronetpi2016-06-159-0/+1035
* security/botan110: update 1.10.12 -> 1.10.13junovitch2016-06-142-4/+5
* Document multiple issues in Botanjunovitch2016-06-141-0/+57
* Update vuxmlfeld2016-06-141-1/+2
* - Fix DSA, preserve BN_FLG_CONSTTIMEdinoex2016-06-132-1/+36
* security/ftimes: Fix build without SSLv3 methodsbrnrd2016-06-132-2/+48
* Fix build on 9.x.hrs2016-06-122-4/+43
* This is a library for verifying YubiKey OTP tokens. It includes both thecs2016-06-124-0/+32
* Add a patch to fix sudo bug #743 that causes a bug where it dereferencegarga2016-06-122-1/+36
* - Stop forcing -lssp_nonshared since libc already include it in every link.garga2016-06-121-1/+1
* Drop maintainershipgarga2016-06-111-1/+1
* security/keepass: Update to 2.34woodsb022016-06-112-3/+4
* Document remote code execution vulnerability in multimedia vlc before 2.2.4riggs2016-06-111-0/+29
* Fix dependency and build of ICSF token support. The configure scripthrs2016-06-113-3/+15
* security/p5-Session-Token: Update to 1.502tz2016-06-102-3/+4
* Update to 0.036.vanilla2016-06-102-4/+4
* Chase MFSA typo fixjbeich2016-06-101-2/+3
* Document cross-site scripting CVE in Roundcubejunovitch2016-06-101-0/+28
* Add entry for CVE-2016-2178 OpenSSL vulnerabilitybrnrd2016-06-101-0/+43
* security/libressl-devel: Update to 2.4.1brnrd2016-06-102-5/+5
* security/libressl: Update to version 2.3.6brnrd2016-06-102-4/+4
* Typo.mat2016-06-101-1/+1
* Fix wrongly use of QT_BINDIR PLIST_SUBarved2016-06-092-1/+2
* - Add LICENSE_FILEamdmi32016-06-091-5/+2
* Fill in <freebsdpr> tag on last entry; I staged it prior to opening the PRjunovitch2016-06-091-1/+1
* Document two expat CVEs reported by upstreamjunovitch2016-06-091-0/+38
* Add entry for recent iperf3 vulnerability.bmah2016-06-091-0/+34
* Remove the README.3 from the plist.mat2016-06-082-1/+1
* Document GNUTLS-SA-2016-1.tijl2016-06-081-0/+27
* Document recent Firefox vulnerabilitiesjbeich2016-06-081-0/+118
* Update to 3.4.13.tijl2016-06-083-6/+5
* - Fix build on 11.xamdmi32016-06-071-0/+17
* Fix cvename entriesfeld2016-06-071-9/+9
* Document new vulnerabilities in www/chromium < 51.0.2704.79rene2016-06-071-0/+54
* security/letskencrypt: Change MASTER_SITESbrnrd2016-06-072-10/+8
* Update to 0.035.vanilla2016-06-062-3/+4