aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Reassign to the perl collectiveadamw2017-01-031-1/+1
* leeym handed in his commit bit.rene2017-01-031-1/+1
* - Document multiple vulnerabilities in w3m portszi2017-01-031-0/+59
* - Update to 2.4.13zi2017-01-033-5/+17
* - Update to 5.39zi2017-01-032-4/+4
* Remove outdated OSVERSION checksunpoet2017-01-021-7/+1
* Remove BROKEN_FreeBSD_9sunpoet2017-01-0113-33/+1
* - Update to 0.9.6tota2017-01-012-4/+4
* Fix gemspec for rubygem-rotp 3.3.0 updatesunpoet2017-01-012-1/+12
* Remove warnings about installing documentation and examples. The only usersadamw2017-01-011-1/+0
* Purge checks for perl < 5.20. For p5-Net, remove the IPV6 knob which onlyadamw2017-01-012-15/+2
* Drop support for Linux Fedora 10 (ports part)rene2017-01-0121-362/+0
* - Update to 1.100sunpoet2016-12-312-4/+4
* security/acme-client: Fix build for SSL_DEFAULT=libresslbrnrd2016-12-311-1/+1
* security/acme-client: Update to 0.1.15brnrd2016-12-312-17/+23
* - Update to 3.3sunpoet2016-12-313-6/+7
* security/hashcat: batch of small fixeslifanov2016-12-312-49/+15
* security/vault: fix syslog socket pathswills2016-12-302-0/+12
* - Remove unnecessary `hostname -s`.hrs2016-12-304-27/+21
* - Add LICENSE.hrs2016-12-301-7/+8
* Update to 1.2.23.hrs2016-12-304-194/+38
* - Add LICENSEamdmi32016-12-303-16/+20
* security/vuxml: Don't category prefix the <topic>brnrd2016-12-301-1/+1
* security/vuxml: Fix entry date on most recent commitbrnrd2016-12-301-1/+1
* - Update to 5.38zi2016-12-302-4/+4
* - Remove bogus (in presence of USE_GITHUB) USES=tar*amdmi32016-12-293-6/+10
* - Update to 0.96amdmi32016-12-293-21/+20
* security/vault: update to 0.6.4swills2016-12-292-4/+4
* security/vuxml: Document h2o vulnerabilitybrnrd2016-12-291-0/+28
* Cleanup NO_BUILD and NO_INSTALL usage.mat2016-12-292-3/+1
* security/vuxml: Document PHP 0-day vulnerabilitiesbrnrd2016-12-291-0/+39
* security/vuxml: Document PHP vulnerabilitiesbrnrd2016-12-291-0/+31
* Adding tt-rss to the phpmailer's vulnerabilities.thierry2016-12-291-0/+8
* security/rubygem-ruby-saml: update to 1.4.1swills2016-12-292-4/+4
* security/rubygem-omniauth-saml: update to 1.7.0swills2016-12-292-4/+4
* security/rubygem-net-ssh: update to 4.0.0swills2016-12-292-3/+4
* security/rubygem-attr_encrypted: update to 3.0.3swills2016-12-292-4/+4
* - Fix LICENSEamdmi32016-12-282-6/+4
* - Add newsyslog config fileamdmi32016-12-283-1/+7
* security/vuxml: Document phpmailer vulnerabilitybrnrd2016-12-281-0/+38
* - Update to 0.3.1wen2016-12-282-4/+4
* Prevent PKGBASE collision with security/openvpnantoine2016-12-281-0/+1
* security/nss: expose TLS 1.3 supportjbeich2016-12-281-0/+2
* security/ruby-tcpwrap: deprecateswills2016-12-281-0/+3
* security/ruby-password: deprecateswills2016-12-281-0/+3
* security/ruby-hmac: deprecateswills2016-12-281-0/+3
* OpenVPN update to v2.4.0, old version in openvpn23*.mandree2016-12-2821-207/+971
* Update fail2ban to version 0.9.6lifanov2016-12-285-20/+11
* Add entry for multiple samba 3.6.* - 4.4.* vulnerabilities.timur2016-12-281-0/+63
* Document devel/upnp 2 security vulnerabilities:pawel2016-12-281-0/+39
* - Remove bogus (in presence of USE_GITHUB) USES=tar*amdmi32016-12-271-1/+1
* - Remove bogus (in presence of USE_GITHUB) USES=tar*amdmi32016-12-272-10/+7
* Fix range for exim vulnerabilitybapt2016-12-271-2/+1
* Update to WolfSSL 3.10johans2016-12-273-5/+10
* security/p5-dicewaregen: update to 1.4 [1]rene2016-12-263-11/+15
* Reset ports per maintainer request.rene2016-12-261-4/+3
* security/vuxml: Document phpmailer vulnerabilitybrnrd2016-12-261-2/+37
* - Bump revision for previous changeamdmi32016-12-261-1/+1
* - Don't replace /usr/bin with ${LOCALBASE}/bin as it does need /usr/bin (to s...amdmi32016-12-261-1/+3
* - Update to 0.3.0.1-alphaamdmi32016-12-262-5/+15
* - Document CVE-2016-9963 for eximvsevolod2016-12-251-0/+29
* security/libgpg-error: update to 1.26novel2016-12-253-5/+6
* security/vuxml: Document OpenSSH vulnerabilitiesbrnrd2016-12-251-0/+53
* security/wpa_supplicant: Allow users of FreeBSD 9 with libre- or openssljrm2016-12-251-4/+8
* - Update to 1.11.1amdmi32016-12-253-15/+5
* - Add upstream patch to avoid kqueue descriptor loss on daemonization, which ...amdmi32016-12-242-1/+205
* security/p11-kit: update to 0.23.3novel2016-12-244-8/+19
* - Fix space/tab: it was not caught by 'make validate'sunpoet2016-12-241-1/+1
* - Document cURL vulnerabilitysunpoet2016-12-241-0/+38
* security/tor: update 2.8.11 -> 2.9.8pi2016-12-242-4/+4
* security/libgcrypt: Update to 1.7.5cpm2016-12-234-34/+7
* Document information disclosure CVEs in SQUID-2016:10 and SQUID-2016:11junovitch2016-12-231-0/+53
* Document command execution in vim/neovim via specially crafted filesjunovitch2016-12-231-0/+36
* Add a entry about a XSS concerning www/pliggbapt2016-12-231-0/+30
* security/vuxml: Add severity to recent Apache vulnerabilitiesbrnrd2016-12-231-2/+3
* Document FreeBSD-SA-16:39.ntpfeld2016-12-231-0/+99
* security/nss: update to 3.28jbeich2016-12-225-8/+9
* - Add rc.d scriptamdmi32016-12-224-3/+54
* - Pass maintainership to submitterwen2016-12-222-2/+2
* security/vuxml: Document cURL 7.51 vulnerabilitybrnrd2016-12-221-0/+29
* Document Joomla! security advisories since 3.4.6 was released.junovitch2016-12-221-6/+195
* Document Xen Security Advisory (XSA 202)junovitch2016-12-221-0/+32
* - Remove unneeded CHMOD after r390893 (file mode changed from 444 to 644)sunpoet2016-12-222-79/+77
* Update to 2.2.0cs2016-12-222-5/+5
* - Update to 2.11.0amdmi32016-12-222-5/+4
* - update to 7.40ohauer2016-12-213-5/+18
* - document Apache httpd-2.4.x defectsohauer2016-12-211-0/+104
* - Unbreak on 10.x+amdmi32016-12-211-1/+1
* Update 1.8.19 --> 1.8.19p1cy2016-12-212-4/+4
* security/vuxml: Mark openssl-devel not vulnerable to CVE-2016-2178brnrd2016-12-211-5/+1
* Fix configure of security/gpgme-qt5 for users that havejhale2016-12-201-0/+32
* Document Xen Security Advisory (XSA 204)junovitch2016-12-201-0/+34
* Update 1.8.18p1 --> 1.8.19.cy2016-12-203-4/+15
* Update KDE Frameworks to 5.29.0tcberner2016-12-191-3/+3
* - Mark BROKEN: does not build (undefined reference to `get_ie')amdmi32016-12-191-0/+2
* - Mark BROKEN on 9.xamdmi32016-12-191-0/+2
* Get rid of QT_PREFIX in favour of PREFIX.tcberner2016-12-193-3/+3
* - Update to 1.11.5sunpoet2016-12-182-4/+4
* Fix configure for users that have 'WITHOUT_GNU_GREP_COMPAT=yes' setjhale2016-12-181-0/+29
* - Update to 2.0.4sbz2016-12-182-4/+4
* Update to 1.2jhale2016-12-182-4/+4
* Whatever you do, ${PORTSDIR}/ keeps creeping back.mat2016-12-181-1/+1
* Rename python openstack clients to match pypi namesnovel2016-12-171-2/+2
* - Use = instead of += for CONFIGURE_ENVsunpoet2016-12-173-26/+22
* Add licensesehaupt2016-12-171-0/+4
* Add licenseehaupt2016-12-171-0/+3
* - Update to 0.2.9.7-rcamdmi32016-12-172-4/+4
* Horde package update:mm2016-12-172-4/+4
* Add new putty-nogtk port as alternative SSH implementation.mandree2016-12-173-1/+14
* Replace description with somthing more relevant to today.cy2016-12-174-4/+4
* Update to 1.0.0jhale2016-12-164-17/+19
* security/vuxml: oops, seamonkey 2.46 has CVE-2016-9079 fixjbeich2016-12-161-3/+3
* Document two CVEs fixed in Atheme 7.2.7junovitch2016-12-161-0/+37
* security/hashcat-legacy: fix if lang/gccXX is installed and lang/gcc is notlifanov2016-12-151-0/+3
* - Update to 0.2.8.11amdmi32016-12-152-4/+4
* security/clamav-unofficial-sigs: fix regexp problemspi2016-12-152-3/+4
* - Take maintainershipsunpoet2016-12-151-1/+1
* Stepping down as maintainer for some ports.johans2016-12-157-7/+7
* - Update devel/protobuf to 3.1.0sunpoet2016-12-151-1/+1
* - Update to 2.0.3sbz2016-12-152-4/+4
* - Update to 1.8.0sbz2016-12-154-45/+55
* More USE_GITHUB cleanup.mat2016-12-151-33/+7
* security/nacl: fix post-patch (prevented c++ from working) and add LICENSEgahr2016-12-141-4/+6
* security/vuxml: mark www/firefox < 50.1_1,1 as vulnerablejbeich2016-12-141-0/+79
* update MAINTAINER to my FreeBSD.org emaillifanov2016-12-142-2/+2
* Update Roundcube entry with CVE and Bugtraq ID and switch to more detailedjunovitch2016-12-141-2/+11
* Document Wordpress security issues in 4.6.1.junovitch2016-12-141-0/+37
* Document Xen Security Advisory (XSA 200)junovitch2016-12-141-0/+38
* - Update to 0.26sunpoet2016-12-143-29/+6
* - Update WWW: pear.php.net uses https://sunpoet2016-12-1321-21/+21
* - fix clamd socket file location in default config file [1]flo2016-12-133-3/+14
* - Update WWW: pecl.php.net uses https://sunpoet2016-12-137-7/+7
* security/R-cran-openssl: Fix openssl support, IGNORE LibreSSLmarino2016-12-131-7/+11
* security/p5-Crypt-SMIME: IGNORE with LibreSSLmarino2016-12-131-1/+5
* security/vuxml: Document PHP 7.0.13 & 5.6.29 vulnerabilitiesbrnrd2016-12-131-0/+31
* security/p5-Dancer2-Plugin-Auth-Extensible-Provider-Database: update 0.600 ->...pi2016-12-132-4/+4
* security/p5-Dancer2-Plugin-Auth-Extensible-Provider-Usergroup: update 0.600 -...pi2016-12-132-6/+7
* Note that this needs a more recent OpenSSL version.mat2016-12-121-1/+7
* Horde package update:mm2016-12-124-7/+8
* Update to 1.21.arved2016-12-122-4/+5
* - Update WWW: rubygems.org uses https://sunpoet2016-12-122-2/+2
* Update to 2.3.1ehaupt2016-12-122-5/+5
* Allow running when openpyxl 2.4 is installedantoine2016-12-112-0/+27
* security/p5-Crypt-SSLeay: Fix build without SSLv2/3brnrd2016-12-111-0/+25
* New port: security/p5-Dancer2-Plugin-Auth-Extensible-Provider-Databasepi2016-12-115-0/+37
* Update to 4.13.6antoine2016-12-102-7/+7
* Update to 0.1.4antoine2016-12-102-4/+4
* Update to 0.1.4antoine2016-12-102-4/+4
* Update to 0.1.4antoine2016-12-102-4/+4
* Update to 1.2.4antoine2016-12-102-4/+4
* Update to 2.0.10antoine2016-12-102-4/+4
* Update to 2.1.2antoine2016-12-102-4/+4
* Update to 10.0.2ehaupt2016-12-102-4/+4
* Register a build fail on FreeBSD-9 due to pkinit.so not being built,cy2016-12-101-1/+8
* security/sqlmap: update to 1.0.12rm2016-12-102-4/+4
* security/ngrok: Restore build on DF (Free no-op)marino2016-12-101-1/+1
* Update to 1.5.3cs2016-12-103-8/+12
* Document vulnerabilities in net/asterisk11 and net/asterisk13.madpilot2016-12-101-0/+86
* Update security/keychain to 2.8.3garga2016-12-092-3/+4
* security/softhsm2: update 2.1.0 -> 2.2.0robak2016-12-092-3/+4
* Update to 3.4.17 and pass the right dlopen path for libtspi to configure.tijl2016-12-093-6/+9
* - Update to 0.9.10jhale2016-12-093-12/+13
* Remove libintl.so.9 compatibility link that was added in r374303 totijl2016-12-0915-10/+15
* Remove libiconv.so.3 compatibility link that was added in r374303 totijl2016-12-091-1/+1
* Remove libexpat.so.6 compatibility link that was added in r374303 totijl2016-12-092-1/+2
* Unbreakantoine2016-12-091-5/+0
* security/py-pycryptography: Fix build on FreeBSD 9.3feld2016-12-091-0/+5
* Remove libcurl.so.7 compatibility link that was added in r374303 totijl2016-12-092-1/+2
* Revise FreeBSD-SA-16:37.libc entryfeld2016-12-081-5/+6
* Update to 2016-W47 snapshot (2.4 beta).mandree2016-12-082-4/+4
* Add some comments on the Googlecode->Github export. Not yet formally converted.mandree2016-12-081-2/+6
* Upgrade to new upstream bugfix release 2.3.14.mandree2016-12-083-100/+6
* New port: security/dotdotpwnpi2016-12-087-0/+109
* security/trousers: Fix libressl support regressionmarino2016-12-081-0/+2
* - Update to 0.25sunpoet2016-12-082-7/+9
* - Add LICENSEamdmi32016-12-071-5/+7
* - Update to 5.9p7wen2016-12-072-5/+5
* - Update to 2016.9.26wen2016-12-072-3/+4
* - Update security/cryptopp to 5.6.5jhale2016-12-078-149/+182
* Document vulnerabilities in security/cryptoppjhale2016-12-071-0/+43
* security/dradis: deprecate due to dependency on deprecated www/rubygem-railsswills2016-12-071-0/+4
* Fix a couple <freebsdsa> that were meant to be <freebsdpr>feld2016-12-071-2/+4
* Document FreeBSD-SA-16:38.bhyvefeld2016-12-071-0/+36
* Document FreeBSD-SA-16:37.libcfeld2016-12-071-0/+37
* Document FreeBSD-SA-16:36.telnetdfeld2016-12-071-0/+38
* - Add LICENSE_FILE [1]sunpoet2016-12-061-2/+2
* - Update to 2.6.8sunpoet2016-12-061-1/+1
* Use DIST_SUBDIRs on my mirror to mimic DISTDIR hierarchy, simplify mirroring ...amdmi32016-12-061-1/+1
* security/vuxml: Document Apache HTTP/2 vulnerabilitybrnrd2016-12-061-0/+36
* Update to 0.10.3ehaupt2016-12-064-15/+15
* Update security/tor to 0.2.8.10rene2016-12-064-9/+8
* Document new vulnerabilities in www/chromium < 55.0.2883.75rene2016-12-061-0/+110
* security/ngrok: update to 2.1.18jrm2016-12-063-23/+16
* Update to 0.08ehaupt2016-12-052-6/+8
* Update to 0.4.3 release.ale2016-12-054-15/+5
* - Update to 1.4.0sunpoet2016-12-052-3/+4
* - Update RUN_DEPENDS: use newer rubygem-racksunpoet2016-12-051-1/+2
* security/nss: update to 3.27.2jbeich2016-12-052-5/+4
* Document ImageMagick7 vulnerabilitiesfeld2016-12-051-0/+38
* Document py-pillow vulnerabilitiesfeld2016-12-051-0/+38
* Document ImageMagick vulnerabilityfeld2016-12-051-0/+38
* Document py-cryptography vulnerabilityfeld2016-12-051-0/+32
* security/py-cryptography: Update to 1.6feld2016-12-053-18/+5
* Document qemu vulnerabilityfeld2016-12-051-0/+32
* Document Xen Security Advisories (XSAs 185-188, 190-195, 197-198)junovitch2016-12-051-0/+438
* Remove dependency on devel/py-argparse which is expired and included inrene2016-12-041-1/+0
* Remove expired ports:rene2016-12-044-37/+0
* - Allow build on archs besides amd64sunpoet2016-12-041-3/+3
* - Update to 0.19sunpoet2016-12-042-8/+6
* - Update to 1.1.1sunpoet2016-12-042-3/+4
* - Update to 1.11.4sunpoet2016-12-042-4/+4
* - Update to 3.0.3sunpoet2016-12-042-7/+8
* - update to 0.9.5tota2016-12-042-5/+8
* Update to 3.20matthew2016-12-035-4/+85
* security/p5-Crypt-RSA-Parse: 0.041 -> 0.043pi2016-12-032-3/+4
* Remove expired krb5-112. It was mistakenly "re-added" by r427588.cy2016-12-0313-563/+1
* Welcome the new security/krb5-115 port. This port follows MIT'scy2016-12-0326-1/+1133
* - Update to 0.11sunpoet2016-12-032-4/+4
* Do not use post-stage. Use post-install instead.mat2016-12-029-19/+18
* http://github.com redirects to https://github.com, spare everyone a redirect.mat2016-12-0231-31/+31
* Update to 1.3.8jhale2016-12-022-5/+5
* Update to 0.5.0jhale2016-12-023-6/+50
* - Add LICENSEsunpoet2016-12-021-1/+4
* Add an entry for wireshark < 2.2.2marcus2016-12-021-0/+53
* document mozilla vulnerabilities CVE-2016-9079cmt2016-12-011-0/+49
* Don't quote {} in find -exec calls.mat2016-12-011-1/+1
* Set library SONAME, this makes pkg correctly detect provided packagepawel2016-12-011-1/+2
* Update to 0.044.vanilla2016-12-012-4/+4
* - Update to 2.0.2sbz2016-12-013-7/+18
* Update to 3.21.3-2.el7_3.tijl2016-12-013-46/+36
* linux-c7-libgcrypt 1.5.3_1 fixes CVE-2016-6313.tijl2016-12-011-2/+2
* Update to 1.5.3-13.el7_3.1.tijl2016-12-013-13/+15
* Fix a package name.tijl2016-12-011-1/+2
* Add linux-*-expat to CVE-2016-0718 entry.tijl2016-12-011-1/+9
* Document ftp/wget's Access List Bypass / Race Condition vulnerabilityvd2016-11-301-0/+30
* Add entry for CVE-2016-9296 in archivers/p7zip.rakuco2016-11-301-0/+33
* Document Apache Subverision vulnerability CVE-2016-8734:cy2016-11-301-0/+34
* security/chkrootkit: follow-up on r427350; MASTER_SITES cleanupjunovitch2016-11-301-8/+1
* Document libwww vulnerabilitiesjunovitch2016-11-301-0/+49
* Mark some ports as not openssl-devel ready.mat2016-11-3012-10/+78
* security/vuxml: mark www/firefox < 50.0.1,1 as vulnerablejbeich2016-11-291-0/+31
* security/vuxml: Document Roundcube vulnerabilitybrnrd2016-11-291-0/+25
* security/chkrootkit: update 0.50 -> 0.51junovitch2016-11-292-3/+4
* Release this back to pool.delphij2016-11-281-3/+2
* Update to 4.13.1antoine2016-11-282-7/+8
* Update to 0.1.2antoine2016-11-282-4/+4
* Update to 1.2.1antoine2016-11-282-4/+5
* Update to 2.0.8antoine2016-11-282-4/+4
* Update to 2.0.9antoine2016-11-282-4/+4
* Update to 2.0.3antoine2016-11-282-4/+4