aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Document new vulnerabilities in www/chromium < 47.0.2526.80rene2015-12-141-0/+44
* * Update the freeimage entry in the dcraw vulnability.kwm2015-12-141-3/+29
* - update to 7.01ohauer2015-12-132-3/+3
* - Add LICENSE_FILEamdmi32015-12-132-11/+12
* - Update to 5.28 + build fixeszi2015-12-133-3/+201
* graphics/variety and security/py-crits: chase r403641 and r403642junovitch2015-12-131-2/+2
* Add recent CVE assignment to earlier Git entry in r399700junovitch2015-12-131-0/+3
* Horde package update:mm2015-12-122-3/+3
* Add support of krb5 1.14 for external/pacriggs2015-12-122-7/+6
* Parse and create rules for the Snort IDS.miwi2015-12-115-0/+29
* - Update to 4.4.0sunpoet2015-12-113-6/+5
* - Update to 1.15sunpoet2015-12-112-3/+4
* - Bump PORTREVISION after security/clamav updatezi2015-12-115-5/+5
* - Update to 0.99zi2015-12-113-11/+16
* Add CVE assignment to the most recent Redmine vulnerabilityjunovitch2015-12-111-0/+2
* Catch up on documentation of Redmine vulnerabilitiesjunovitch2015-12-101-0/+250
* Document Jenkins Security Advisory 2015-12-09lwhsu2015-12-101-0/+48
* - Update to 1.5.2sunpoet2015-12-092-4/+3
* Upgrade to 1.4.2.vanilla2015-12-092-3/+3
* Update 2.0-beta2 --> 2.0cy2015-12-093-5/+12
* Document a few, *cough* 78, flash vulnabilities.kwm2015-12-091-0/+152
* Upgrade to 0.4.9.vanilla2015-12-092-3/+3
* security/p11-kit: update to 0.23.2novel2015-12-083-5/+4
* Drop maintainership on a bunch of portsbapt2015-12-081-1/+1
* security/libressl: Update to 2.2.5brnrd2015-12-082-6/+4
* security/libressl: Update to 2.2.5brnrd2015-12-081-0/+30
* Don't use GH_TAGNAME when DISTVERSION* variables can be used.mat2015-12-082-3/+3
* Update to 0.9.9jhale2015-12-082-3/+3
* Update to 1.6.0jhale2015-12-083-5/+5
* Update to 2.4.2jhale2015-12-083-4/+4
* Document additional CVE assigned to incomplete fix png 1.6.19junovitch2015-12-081-1/+2
* Document information disclosure in KeePassXjunovitch2015-12-081-0/+29
* Document client controlled header overwriting in Phusion Passengerjunovitch2015-12-081-0/+47
* Wrap earlier libraw entries at 80 charactersjunovitch2015-12-081-4/+11
* Document information disclosure via insecure default permissions in Saltjunovitch2015-12-081-0/+33
* Update to 2.0.2cs2015-12-082-3/+3
* - Update to 2.021jadawin2015-12-072-3/+3
* Document multiple graphics/libraw vulnerabilities.rakuco2015-12-071-0/+58
* - Update to 5.27zi2015-12-062-3/+3
* FPC ecosystem: Upgrade version 2.6.4 => 3.0.0marino2015-12-065-39/+5
* security/py-letsencrypt: Update to 0.1.0brnrd2015-12-055-20/+10
* Document OpenSSL multiple vulnerabilities.delphij2015-12-051-0/+48
* Update to 1.0.2e.delphij2015-12-053-12/+20
* Update 1.13.2 --> 1.13.3cy2015-12-052-9/+3
* - Update to 1.8.1sunpoet2015-12-052-4/+4
* fastd, fastd-devel: Disable mpclmul module on FreeBSD 9.rakuco2015-12-042-2/+16
* Python OpenSSL wrapper. For modern cryptography with ECC, AES, HMAC,amdmi32015-12-044-0/+31
* - Update to 1.8.0sunpoet2015-12-042-5/+6
* - Update to 1.8.0sunpoet2015-12-042-3/+3
* security/suricata: Add rules files, netmap startup supportkoobs2015-12-043-7/+22
* - Fix broken MASTER_SITESzi2015-12-041-0/+1
* libpng security fix was not complete. New version released.feld2015-12-041-1/+3
* Bump PORTREVISION to help users with custom OPTIONS to get the fixgarga2015-12-041-0/+1
* Add @sample to gcm.conf missed when I introduced it. No bump on PORTREVISIONgarga2015-12-041-1/+1
* Document PHPmailer SMTP injection vulnerabilityamdmi32015-12-041-0/+29
* Document recent ffmpeg vulnerabilitiesjbeich2015-12-031-0/+171
* Doument new vulnerabilities in www/chromium < 47.0.2526.73rene2015-12-031-1/+103
* security/titus: fix documentation in rc scriptfeld2015-12-031-1/+1
* Pixiewps is a tool written in C used to bruteforce offline the WPS pinfeld2015-12-034-0/+37
* New port: security/titusfeld2015-12-036-0/+83
* - Document piwik multiple vulnerabilitiesamdmi32015-12-021-0/+35
* Update security/strongswan to 5.3.5garga2015-12-022-3/+3
* Document Cyrus IMAPd integer overflow vulnerability.ume2015-12-011-0/+36
* Upgrade to 0.026.vanilla2015-12-012-3/+3
* Upgrade to 1.4.2.vanilla2015-12-012-3/+3
* Document django information leak vulnerabilityfeld2015-12-011-0/+47
* Update to 0.15.0 release.ale2015-11-303-4/+21
* security/py-letsencrypt: Update to 2015-11-23 versionbrnrd2015-11-304-13/+7
* - Update to 2015-48miwi2015-11-302-9/+6
* Deprecate ports broken for more than 6 monthsantoine2015-11-291-0/+2
* - Add LICENSE_FILEsunpoet2015-11-291-1/+2
* - Cosmetic changesunpoet2015-11-292-2/+2
* - Update to 2015.11.20sunpoet2015-11-282-3/+3
* security/gnupg1: fix build on armmmoll2015-11-281-0/+39
* - Take Maintainershipmiwi2015-11-264-4/+4
* - Take Maintainershipmiwi2015-11-2622-22/+22
* security/suricata: Update to 3.0 RC1koobs2015-11-265-300/+24
* - Update to 0.7.3.2wen2015-11-252-4/+5
* Update to ocaml-ssl 0.5.2johans2015-11-252-3/+3
* - Use ASCII characterssunpoet2015-11-245-5/+5
* Upgrade to 0.7.0dvl2015-11-242-3/+3
* security/putty: Fix typomarino2015-11-231-1/+1
* security/putty: Fix krb5 dependencymarino2015-11-231-3/+2
* Remove mirrors.mit.edu from MASTER_SITES, no 2.x tarball available theregarga2015-11-231-2/+1
* Allow to select pf instead of default ipfw for firewall backendriggs2015-11-231-2/+13
* security/libyubikey: update 1.12 -> 1.13, add install-stripjunovitch2015-11-232-4/+5
* security/libgcrypt: Re-add missing patchpi2015-11-232-1/+24
* Document Kibana CSRF attack vulnerabilityjunovitch2015-11-221-0/+33
* Document code execution via a format string vulnerability in a2psjunovitch2015-11-221-0/+27
* security/govpn: update 4.1 -> 4.2junovitch2015-11-222-3/+3
* - make portlint happierdinoex2015-11-221-2/+2
* - use USES=tardinoex2015-11-222-10/+5
* - use post-install-DOCS-ondinoex2015-11-221-7/+6
* Introduce the new krb5 1.14:cy2015-11-2119-18/+601
* - Add LICENSEsunpoet2015-11-211-0/+5
* Document libxslt:kwm2015-11-211-0/+87
* Add optional extra patch for Tunnelblick obfuscation.mandree2015-11-213-2/+317
* Upgrade security/elixir-comeonin to version 1.6.olgeni2015-11-202-3/+3
* - Add LICENSEsunpoet2015-11-201-0/+3
* - Update distinfo (missing in r401990)sunpoet2015-11-201-2/+2
* security/py-letsencrypt: Update to version 20151114brnrd2015-11-203-5/+7
* - update to version 7.00ohauer2015-11-203-3/+9
* security/pecl-crypto: update 0.1.1 -> 0.2.1junovitch2015-11-203-7/+7
* Document recent Mozilla vulnerabilitiesjbeich2015-11-201-0/+137
* gecko: catch up with 2015-11-03 release trainjbeich2015-11-204-7/+7
* security/p5-Crypt-GeneratePassword: Update version 0.04=>0.05bofh2015-11-192-3/+4
* devel/py-asn1: move to devel/py-pyasn1 to match PyPI namerm2015-11-196-9/+12
* security/py-keyring: update to 5.6rm2015-11-192-8/+9
* security/py-SecretStorage: update to 2.1.2rm2015-11-192-6/+15
* security/py-keyczar: update to 0.715rm2015-11-192-6/+7
* Document gdm lock screen bypasskwm2015-11-181-0/+27
* Upgrade to 1.4.0.vanilla2015-11-182-4/+3
* Upgrade to 1.4.0.vanilla2015-11-182-4/+3
* Commit message will be:dvl2015-11-175-5/+96
* Fix a bad URL caused by an errant 'i' in the <url></url> tagsjunovitch2015-11-171-1/+1
* Remove bogus DISTREVISION variable.lme2015-11-171-1/+0
* Update security/strongswan to 5.3.4garga2015-11-164-98/+3
* Register CVE 2015-8023 on VuXML. It affects strongswan < 5.3.4garga2015-11-161-0/+29
* - Update security/keychain to 2.8.2garga2015-11-162-9/+8
* Document Moodle multiple security vulnerabilitiesjunovitch2015-11-161-0/+38
* Document Xen XSA-156junovitch2015-11-161-0/+32
* Add GCC_DESC to Mk/bsd.options.desc.mk. Use this in a number of portsgerald2015-11-161-1/+0
* Document vulnerability of libpngbrnrd2015-11-161-0/+31
* (1) Place pkgconfig files to proper directory (libdata)lev2015-11-154-0/+8
* - Add NO_ARCHsunpoet2015-11-151-0/+1
* - Add NO_ARCHsunpoet2015-11-151-0/+1
* - Add LICENSEsunpoet2015-11-152-1/+4
* - Update MASTER_SITES and WWWamdmi32015-11-152-30/+21
* Document latest flash vulnabilities.kwm2015-11-151-0/+55
* devel/py-asn1-modules: rename to py-pyasn1-modules to match upstream namingrm2015-11-152-2/+4
* - Switch to USES=autoreconfamdmi32015-11-151-5/+4
* - Fix fetch after upstreams switch from http to httpslme2015-11-141-1/+2
* - Update to 2015.9.6.2sunpoet2015-11-132-4/+5
* Unbreakantoine2015-11-131-1/+3
* Remove GH_TAGNAME because project was tagged upstream.olgeni2015-11-132-3/+3
* - Switch to USES=taramdmi32015-11-131-3/+5
* - Clarify LICENSEamdmi32015-11-131-1/+4
* Upgrade security/elixir-comeonin to version 1.5.olgeni2015-11-124-10/+9
* - Add LICENSE_FILEamdmi32015-11-121-2/+3
* - Switch to options helpersamdmi32015-11-121-4/+4
* Add security/elixir-comeonin_i18n, an internationalization library forolgeni2015-11-126-0/+48
* - Update to 1.2-alpha4zi2015-11-124-15/+115
* - Update to 1.9.17zi2015-11-122-4/+3
* - Update to 1.1.1sunpoet2015-11-122-3/+3
* Use OPTIONS helper.ume2015-11-121-2/+2
* Use OPTIONS helper.ume2015-11-122-10/+5
* Document new vulnerabilities in www/chromium < 46.0.2490.86rene2015-11-121-0/+30
* Make portlint stop spamming me. It's gotten quite silly.bdrewery2015-11-1216-6/+17
* Fix the NONECIPHER not actually being offered by the server.bdrewery2015-11-122-25/+25
* Document CVE's in MySQL/MariaDB/Perconabrnrd2015-11-121-0/+92
* This is a fast and Secure Tunnelling Daemon.dinoex2015-11-126-0/+124
* This is a fast and Secure Tunnelling Daemon.dinoex2015-11-125-0/+109
* Update advice to disable ChallengeResponseAuthentication for key usage.bdrewery2015-11-122-2/+3
* This is a very small Elliptic Curve Cryptography library.dinoex2015-11-126-0/+43
* Document RCE in jenkinsswills2015-11-121-0/+32
* Document owncloudclient vulnerabilitymadpilot2015-11-111-0/+26
* Document Xen XSAs-{142,148,149,150,151,152,153}junovitch2015-11-111-0/+241
* Document p5-HTML-Scrubber XSS vulnerabilityjunovitch2015-11-111-0/+31
* Document MFSA 2015-101 affects multimedia/libvpx as welljbeich2015-11-111-0/+30
* Document CVE assignment on wpa_supplicant 2015-5 advisoryjunovitch2015-11-101-0/+2
* Revise lldpd entry to cover denial of service CVE and add references.junovitch2015-11-101-1/+9
* Document dns/powerdns denial of service vulnerabilityfeld2015-11-101-0/+28
* - Mark IGNORE on FreeBSD 9.xsunpoet2015-11-101-1/+7
* - Update to 2.5.0sunpoet2015-11-101-1/+1
* Backport a couple of commits from master, that will be present in 5.3.4:garga2015-11-103-1/+95
* - Update polarssl/mbedtls portstijl2015-11-097-11/+16
* - Bump PORTEPOCH as 1.26b1 > 1.26zi2015-11-091-0/+1
* Mark a few ports BROKEN: unfetchableantoine2015-11-0915-0/+30
* - Update to 5.26zi2015-11-092-4/+3
* Update to new upstream release 0.66 (security fix).mandree2015-11-092-4/+4
* Record PuTTY vuln' CVE-2015-5309 (Erase char handling).mandree2015-11-091-0/+40
* Forced commit. PR ID was 204360 not 162881lme2015-11-081-0/+1
* Update to 2.1.1lme2015-11-083-9/+10
* Upgrade security/elixir-comeonin to version 1.4.olgeni2015-11-074-6/+12
* Fix plist when DOCS=offpawel2015-11-071-1/+1
* Update the Linphone stack.tijl2015-11-072-4/+3
* - Fix MASTER_SITESsunpoet2015-11-061-2/+2
* [NEW] security/py-letsencrypt: Welcome Let's Encrypt client!koobs2015-11-066-0/+109
* security/py-acme: Update to 0.0.0.dev20151104koobs2015-11-062-4/+4
* - Use USES=pathfixsunpoet2015-11-062-13/+3
* Add openoffice-devel version information to entrytruckman2015-11-061-0/+5
* - Add LICENSEamdmi32015-11-063-1/+16
* Apache OpenOffice 4.1.1 -- multiple vulnerabilities.truckman2015-11-061-0/+61
* Fix ports that confused the meaning of WRKDIR and WRKSRC.mat2015-11-058-18/+18
* - Mark MAKE_JOBS_UNSAFE, fails in parallel build:amdmi32015-11-051-0/+3
* security/govpn: update 4.0 -> 4.1robak2015-11-052-3/+3
* - Update TEST_DEPENDS: remove redundant LOCALBASE/binsunpoet2015-11-051-3/+3
* - Add LICENSE_FILEsunpoet2015-11-052-4/+3
* - Update to 0.22.5sunpoet2015-11-053-6/+13
* - Move devel/py-parsing to devel/py-pyparsingsunpoet2015-11-052-4/+4
* Add CVE for xscreensaver lock bypass.zeising2015-11-051-0/+2
* - Add LICENSEamdmi32015-11-053-4/+7
* - update to 6.49BETA6ohauer2015-11-054-37/+30
* Simplify and standardize port structure.cy2015-11-041-27/+7
* - Update to 5.26b1 (5.25 contains a build breaking bug, 5.26b1 resolves this)zi2015-11-032-3/+5
* - Update security/sudo to 1.8.15garga2015-11-036-27/+8
* As of r399238, when the heimdal port option was selected, this port didcy2015-11-031-2/+4
* security/py-cryptography: Add missing run-time dependencieskoobs2015-11-031-4/+9
* - Update to 0.020jadawin2015-11-022-3/+3
* security/softether: fix USESpi2015-11-021-1/+1
* security/softether: fixespi2015-11-022-6/+23
* Upgrade security/elixir-comeonin to version 1.3.1.olgeni2015-11-022-3/+3
* Document multiple vulnerabilities fixed in CodeIgniterjunovitch2015-11-011-0/+32
* Update to 2.1.0.12antoine2015-11-012-3/+3
* - update patches to match latest git rev (v0.7.2)ohauer2015-10-314-23/+203
* Fix Kerberos selection option and USES.cy2015-10-311-2/+3
* - Convert to new options helpersunpoet2015-10-301-13/+6
* - Fix gemspec for rubygem-ruby-saml 1.1.0 updatesunpoet2015-10-302-0/+12
* - Update to 1.1.0sunpoet2015-10-302-3/+6
* Enable the building and installation of the .a version of the librarysbruno2015-10-292-1/+3
* security/libgpg-error: enable static libnovel2015-10-292-2/+5
* - Add a new option, SWANCTL, to install swanctll utilitygarga2015-10-292-2/+30
* Update to 2.5antoine2015-10-295-130/+8
* Document additional CVE assigned for the last Wordpress updatejunovitch2015-10-291-1/+3
* Document information disclosure in net/openafsfeld2015-10-291-0/+34
* Framework to connect any number of virtual machines to thepawel2015-10-295-0/+98
* - Add a new option (VICI) to build VICI management protocolgarga2015-10-282-2/+14
* Add entry for x11/xscreensaver for a lock bypass vulnerabilityzeising2015-10-281-0/+29
* - Fix shebangsamdmi32015-10-281-1/+4
* - Update to 1.8.4sunpoet2015-10-275-40/+5
* - Update to 0.22sunpoet2015-10-272-4/+4
* - Add LICENSE_FILEsunpoet2015-10-271-0/+1
* - Update to 1.055sunpoet2015-10-272-3/+3
* Document lldpd security vunlnerability.mat2015-10-271-0/+26
* strongSwan can be beuit using 3 different printf hooks: builtin, glibcgarga2015-10-271-1/+11
* Update to upstream version 0.3.8riggs2015-10-272-3/+3
* Update range for libressl vulnerabilityfeld2015-10-261-1/+2
* security/py-python-gnupg: create portswills2015-10-264-0/+29
* security/webfwlog: update 1.00 -> 1.01 [1]junovitch2015-10-263-4/+4
* Add an entry for wireshark-1.12.8 for CVE-2015-7830.marcus2015-10-261-0/+34
* Document the recent remote site takeover via SQL injection vuln in Joomlajunovitch2015-10-251-0/+259
* Un-break build on systems where cxx does not support c++11riggs2015-10-241-2/+8
* Handle OpenSSL/PolarSSL options in the right way,mandree2015-10-241-3/+4
* Document redirect vulnerability in the drupal7 overlay modulejunovitch2015-10-241-0/+37
* - New port: security/s2ndanilo2015-10-248-0/+113
* Record phpMyAdmin -- content spoofing vulnerability.matthew2015-10-241-0/+32
* Update to upstream version 2.4.1, add BROKER OPTIONriggs2015-10-2420-28/+665
* - Add NO_ARCHamdmi32015-10-242-5/+1
* Adopt broccoli version numbering, update to 1.97riggs2015-10-243-5/+8
* Add CVE references to the NTP entry.delphij2015-10-231-0/+17
* Document Mediawiki security vulnerabilities for 1.25.3, 1.24.4, and 1.23.11junovitch2015-10-231-0/+53
* Horde package update:mm2015-10-232-3/+3
* Fix build without POLARSSL.mat2015-10-221-1/+1
* security/suricata: Update to 2.0.9koobs2015-10-223-6/+7
* Document October 2015 NTP Security Vulnerability Announcement (Medium)cy2015-10-221-0/+74
* - Update to 2.9.7.6dvl2015-10-222-3/+3
* Update to 2.0-beta2.mat2015-10-213-70/+81
* Update to 201541. [1]mat2015-10-212-29/+16
* Update to 4.1.8tijl2015-10-217-46/+21
* Add sonames and minor versioned library names.cy2015-10-213-7/+22