aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Fix build on versions of FreeBSD that don't have gcc as the defaultskreuzer2014-04-042-0/+12
* Support stagebapt2014-04-041-21/+12
* Fix SoftHSM's umask handling (upstream patch)mat2014-04-042-0/+120
* Support stagingehaupt2014-04-041-6/+5
* - Support stagingehaupt2014-04-044-19/+16
* - Fix shebangjadawin2014-04-041-15/+8
* Remove expired ports:rene2014-04-0419-334/+0
* New OTRS vulnerabilitycs2014-04-031-0/+29
* Add CVE-2014-2525 which affects libyaml.knu2014-04-031-0/+39
* KDE/FreeBSD team presents KDE SC 4.12.4 and KDE Workspace 4.11.8!makc2014-04-034-8/+6
* - Update to 1.975jadawin2014-04-032-3/+3
* Switch to USES=tar for my portsmartymac2014-04-031-1/+1
* - Hide libdane support behind option LIBDANEbdrewery2014-04-022-9/+12
* Remove expired ports:rene2014-04-026-815/+0
* Bring back from the dead; take ownershipfeld2014-04-028-0/+185
* Finish stage supportantoine2014-04-022-5/+3
* - USES=libtool tar:bzip2.tijl2014-04-014-45/+37
* Fix all mod_php entries.ale2014-04-011-9/+12
* Update to 2.1.0.2antoine2014-04-012-3/+3
* - add missing LIB_DEPENDS for forbidden option GMPdinoex2014-03-311-0/+2
* Update to 0.2.7cs2014-03-303-4/+25
* Update to version 1.777pawel2014-03-302-3/+3
* Add an entry for CVE-2014-2386lme2014-03-291-0/+26
* - Update to 0.14sunpoet2014-03-292-3/+3
* Add an entry for CVE-2014-2270, and correct the indentationbf2014-03-291-3/+31
* - Reroll and update bootstrap Haskell compilers to GHC 7.6.3 on 8.x andpgj2014-03-2926-26/+26
* - reset GREP_OPTIONSdinoex2014-03-291-1/+1
* Fix mod_php5 entry.ale2014-03-281-2/+3
* Add new port security/keybase.bdrewery2014-03-284-0/+89
* Sort reference entries in 36f9ac43-b2ac-11e3-8752-080027ef73ecmandree2014-03-281-1/+1
* Support stagegarga2014-03-283-2/+16
* - Support stagingehaupt2014-03-272-15/+5
* - Stage supportantoine2014-03-271-25/+9
* Stage supportantoine2014-03-271-6/+8
* Stage supportantoine2014-03-272-22/+7
* Update to 0.9.35 release with support for PHP 5.4+.ale2014-03-264-38/+10
* Update to v13.11.08 release.ale2014-03-265-24/+19
* Fix build with enabling SQLITE on recent 10-STABLE and later.ume2014-03-251-1/+25
* Bump PORTREVISION, forgotten in previous commit.madpilot2014-03-251-0/+1
* - update to 1.0.23dinoex2014-03-252-3/+3
* - Really disable iconv support when LIBICONV option is not selected [1]madpilot2014-03-251-6/+3
* - Add p5-Net-SSLGlue 1.052sunpoet2014-03-255-0/+62
* - Remove USES desktop-file-utils and add dos2unixnemysis2014-03-242-4/+5
* - Update to 1.972jadawin2014-03-242-3/+3
* - Add SF to MASTER_SITESlioux2014-03-241-3/+3
* - Document multiple vulnerabilities for Joomla! 2 and Joomla! 3nivit2014-03-241-0/+43
* Add an entry for trojita mail leak across unencrypted connections (CVE-2014-2...mandree2014-03-241-0/+30
* Split nginx and nginx-devel entries, update date.osa2014-03-231-3/+37
* Cryptographic library to perform identification using Schnorrpawel2014-03-236-0/+60
* Add CVE-2014-0133 entries for www/nginx and www/nginx-devel.osa2014-03-231-0/+38
* Add new port security/py-backports.ssl_match_hostname:gblach2014-03-234-0/+23
* - document apache22 /apache24ohauer2014-03-231-0/+51
* - update to 0.11az2014-03-223-4/+8
* Convert to USES=tar:xzpawel2014-03-221-2/+1
* Make libsasl2.pc usable.ume2014-03-222-1/+18
* - Update to version 2.3.11pawel2014-03-202-10/+10
* Attempt to fix latest mozilla entry for firefox-esrbeat2014-03-201-1/+5
* - Use tar:bzip2 instead of USE_BZIP2=yesnemysis2014-03-201-5/+6
* - Update Firefox to 28.0beat2014-03-204-6/+6
* Document mozilla vulnerabilitiesbeat2014-03-201-0/+113
* - Update to 5.88sunpoet2014-03-202-3/+3
* Add php 5.5 in IGNORE.ale2014-03-191-1/+1
* - Update to 2.4.9zi2014-03-192-3/+3
* - Update to 1.970jadawin2014-03-192-3/+3
* Fix @@${MKDIR} -> @${MKDIR}ehaupt2014-03-181-1/+1
* - Change License from BSD to BSD2CLAUSEswills2014-03-181-2/+25
* Quiesce mkdirehaupt2014-03-188-9/+9
* - Simulate SSP_NEED_NONSHARED for gccswills2014-03-181-6/+25
* - Update to 1.969jadawin2014-03-182-3/+3
* - Support stagingehaupt2014-03-181-4/+4
* Update to 1.8.10p2.wxs2014-03-183-3/+12
* - Update to 6.6bdrewery2014-03-174-34/+16
* ProFTPD module mod_clamavmm2014-03-163-0/+40
* Document new vulnerabilities in www/chromium < 33.0.1750.152rene2014-03-151-0/+45
* - Add LICENSEsunpoet2014-03-152-10/+10
* Update (c) year to be 2014.simon2014-03-141-1/+1
* - fix issue with interactivityjadawin2014-03-141-0/+2
* Support stagingehaupt2014-03-141-5/+3
* - Support stagingehaupt2014-03-141-9/+8
* - Fix orderingzi2014-03-141-1/+1
* - Document recent vulnerability in mail/mutt (CVE-2014-0467)zi2014-03-141-0/+30
* - Update to 1.968jadawin2014-03-142-3/+3
* - Support stagingehaupt2014-03-141-3/+7
* - Support stagingehaupt2014-03-142-11/+12
* - Use USES=tar:tgzsunpoet2014-03-141-1/+1
* - Deprecate (upstream ceased development in 2003)culot2014-03-141-0/+3
* Vulnerability in sysutils/wemuxcs2014-03-141-0/+25
* security/libsparkcrypto: Fix plist extra for DOCS=no optionmarino2014-03-141-1/+1
* - Update to version 1.3.6 [1]pawel2014-03-142-4/+7
* - Version update to 1.18swills2014-03-142-16/+13
* - Support stagingehaupt2014-03-131-4/+3
* Document samba multiple vulnerabilities announced today.delphij2014-03-121-0/+52
* Move {mail,japanese}/p5-Mail-SpamAssassin to &/spamassassin, in the name ofadamw2014-03-122-3/+3
* Deprecate a few old unmaintained portsantoine2014-03-123-0/+6
* Document asterisk vulnerabilitiesflo2014-03-121-0/+53
* Document new vulnerabilities in www/chromium < 33.0.1750.149rene2014-03-121-0/+42
* - Update to 1.3.16jadawin2014-03-126-82/+43
* gnome-panel will be updated to the 3.x version when GNOME 3 will merged.kwm2014-03-111-0/+3
* - Take maintainership for nowbdrewery2014-03-111-1/+1
* - Convert to auto-plistmiwi2014-03-112-7/+2
* Unbreakantoine2014-03-111-1/+1
* Unbreakantoine2014-03-111-3/+1
* Unbreakantoine2014-03-111-1/+1
* Update the default version of GCC used in the Ports Collection fromgerald2014-03-1132-30/+32
* Convert s* to USES=zipbapt2014-03-1127-34/+28
* Update to 0.28.mat2014-03-102-7/+5
* Remove expired portrene2014-03-106-139/+0
* Remove expired port:rene2014-03-1010-246/+0
* Remove expired ports:rene2014-03-108-128/+0
* Fix the build on big-endian arches (again). It was fixed once already indanfe2014-03-101-4/+9
* Stagify; convert LIB_DEPENDS and USE_GMAKE.danfe2014-03-101-9/+5
* Properly indent the last entry.remko2014-03-101-5/+6
* - Stage supportmiwi2014-03-091-2/+2
* - Stage supportmiwi2014-03-091-1/+0
* - Stage supportmiwi2014-03-092-11/+17
* - Convert to autoplistmiwi2014-03-092-91/+2
* - Stage supportmiwi2014-03-092-5/+4
* - Stage supportmiwi2014-03-092-3/+3
* Stage supportmiwi2014-03-091-6/+2
* - Stage supportmiwi2014-03-092-4/+4
* - Convert to autoplistmiwi2014-03-092-69/+1
* - Stage supportmiwi2014-03-091-7/+2
* - Stage supportmiwi2014-03-092-5/+2
* - Stage supportmiwi2014-03-091-1/+2
* - Stage supportmiwi2014-03-091-1/+0
* - Update to 1.0jhale2014-03-096-112/+30
* - Stage supportmiwi2014-03-092-3/+2
* - Stage supportmiwi2014-03-092-4/+1
* - Stage supportmiwi2014-03-091-1/+0
* - Convert to autoplistmiwi2014-03-091-5/+4
* - Convert to autoplistmiwi2014-03-091-3/+3
* - Convert to autoplistmiwi2014-03-091-4/+3
* - Convert to autoplistmiwi2014-03-091-6/+3
* - Convert to autoplistmiwi2014-03-091-5/+3
* - Stage supportmiwi2014-03-091-1/+0
* Unbreak vuxml.kwm2014-03-091-1/+1
* Document freetype2 vuln.kwm2014-03-091-0/+29
* Deprecate a few unmaintained ports (leaf ports, non staged and unmaintained s...antoine2014-03-092-0/+4
* Add libpwquality.kwm2014-03-095-0/+137
* libsecret is a library for storing and retrieving passwords and otherkwm2014-03-095-0/+137
* Mark BROKEN: Does not buildantoine2014-03-081-0/+1
* Fix a BUILD_DEPENDS line after last py-openssl updateantoine2014-03-081-1/+1
* - Add LICENSEsunpoet2014-03-081-0/+2
* security/py-cryptography: BUILD_DEPENDS are also RUN_DEPENDSkoobs2014-03-081-0/+2
* security/py-rsa: Update to 3.1.4, add TESTS optionkoobs2014-03-082-4/+8
* security/py-cryptography: Update to 0.2.2koobs2014-03-082-4/+3
* Link i2p to build after move from net-p2p/i2p to security/i2plioux2014-03-081-0/+1
* - Change net-p2p/i2p primary category to security. Therefore, movelioux2014-03-087-0/+304
* Horde package update:mm2014-03-088-12/+12
* - Use new OPTIONS featuresamdmi32014-03-071-27/+12
* - Remove outdated PERL_LEVEL checksunpoet2014-03-071-7/+1
* - Update to 5.00zi2014-03-074-41/+31
* - Fix checksum mismatch problem during updates by installing signatures as sa...sbz2014-03-071-0/+9
* USES=libtools fixes overlinking but reveals when upstream fails at properlybapt2014-03-061-0/+3
* Reference xmms vulnerabilities: CVE-2007-0653 and CVE-2007-0654bapt2014-03-061-0/+40
* - Update to 0.14sbz2014-03-064-25/+13
* Add security advisory for nginx-1.5.10.osa2014-03-061-0/+34
* Document new vulnerabilities in www/chromium < 33.0.1750.146rene2014-03-061-0/+45
* Update to 0.2.5.2-alphabf2014-03-052-4/+5
* - Update to 3.1.22bdrewery2014-03-053-3/+6
* security/gnutls is fixed for CVE-2014-0092 and CVE-2014-1959bdrewery2014-03-051-0/+4
* - Add fixes for:bdrewery2014-03-052-1/+104
* - Mark FORBIDDEN and deprecatebdrewery2014-03-051-0/+3
* Document GnuTLS multiple certification verification issues.delphij2014-03-051-0/+44
* KDE/FreeBSD team presents KDE SC 4.12.3 and KDE Workspace 4.11.7!makc2014-03-057-6/+6
* - Update to 0.2 [1]culot2014-03-054-6/+17
* - Add LICENSEsunpoet2014-03-051-5/+3
* Stage supportantoine2014-03-052-9/+13
* - remove broken MANPREFIXdinoex2014-03-041-1/+1
* Use OPTIONS helpers.adamw2014-03-041-46/+20
* - Update to version 1.0.3pawel2014-03-042-5/+9
* Add an entry for the file DOS vulnerability, CVE-2014-1943bf2014-03-031-0/+28
* - Update LEGAL per eadler@zi2014-03-031-3/+3
* Update to 0.2.4.21bf2014-03-032-3/+3
* Fix typo in legal text.cy2014-03-031-1/+1
* Update 1.9-9 --> 1.9-9cy2014-03-032-4/+4
* This port really requires not just GCC, but also no version newer thangerald2014-03-031-4/+4
* Support stagebapt2014-03-032-16/+10
* - Update to 0.20.2novel2014-03-033-11/+11
* Use correct PORTREVISION for python33's CVE.demon2014-03-021-1/+1
* Revert per baptfeld2014-03-021-8/+15
* plist was incorrect; stage/packaging was brokenfeld2014-03-021-15/+8
* - error out early if users trying to break their base systemdinoex2014-03-021-0/+4
* Leverage USES=shebangfix to fix two Perl scripts (logtail, logtail2)gerald2014-03-021-3/+2
* - Fix build with HEIMBAL_BASEbdrewery2014-03-021-2/+0
* Add missing dependency on pkgconf [1]bapt2014-03-021-7/+2
* security/netpgp: Fix typo that broke DragonFly (GCC 4.7)marino2014-03-021-1/+1
* Replace USE_GCC=4.2+ by USE_GCC=any. [1]gerald2014-03-022-2/+2
* - Convert to autoplistmiwi2014-03-022-132/+2
* - Add LICENSEsunpoet2014-03-021-13/+6
* security/vuxml: Sort Python entry references alphabeticallykoobs2014-03-011-1/+1
* security/vuxml: Document CVE-2014-1912 for Python 2.7 - 3.3koobs2014-03-011-0/+49
* PHP 5.2 has reached it end-of-life in the FreeBSD Ports Tree, timerene2014-03-017-85/+0
* security/destroy: fix build on DragonflyBSD. The distribution Makefilerene2014-03-011-0/+3
* Fix several compilation issues where the upstream's configure scriptmandree2014-03-011-1/+1
* - Support stagingehaupt2014-02-281-7/+3
* Support stagingehaupt2014-02-282-8/+7
* - Support stagingehaupt2014-02-281-6/+4
* - Support stagingehaupt2014-02-281-4/+3
* - Support stagingehaupt2014-02-281-5/+3
* - Support stagingehaupt2014-02-281-4/+5
* Support stagingehaupt2014-02-281-5/+4
* Support stagingehaupt2014-02-281-17/+12
* - Support stagingehaupt2014-02-281-7/+8
* Support stagingehaupt2014-02-281-9/+3
* - Support stagingehaupt2014-02-281-8/+7
* - Support stagingehaupt2014-02-282-22/+11
* - Support stagingehaupt2014-02-281-6/+4
* Remove expired ports:rene2014-02-289-98/+0
* Support stagingehaupt2014-02-271-2/+2
* - Support stagingehaupt2014-02-272-7/+7
* Support stagingehaupt2014-02-271-2/+1
* - Support stagingehaupt2014-02-271-10/+5
* Support stagingehaupt2014-02-271-8/+5
* - Support stagingehaupt2014-02-271-6/+6
* - Support stagingehaupt2014-02-272-12/+11
* Support stagingehaupt2014-02-271-10/+5
* - Support stagingehaupt2014-02-271-10/+6
* - add entry for subversion CVE-2014-0032ohauer2014-02-271-0/+32
* Report new vulnerability in otrs to vuxmlcs2014-02-261-0/+30
* Support stagingehaupt2014-02-251-4/+3
* Support stagingehaupt2014-02-251-7/+5
* Support stagingehaupt2014-02-251-6/+4
* - Support stagingehaupt2014-02-251-7/+9
* Support stagingehaupt2014-02-251-9/+3
* Support stagingehaupt2014-02-251-6/+5
* Support stagingehaupt2014-02-251-9/+3
* Support stagingehaupt2014-02-251-13/+9
* Support stagingehaupt2014-02-251-9/+5
* Support stagingehaupt2014-02-251-4/+7
* Support stagingehaupt2014-02-252-10/+12
* Support stagingehaupt2014-02-251-5/+4
* Support stagingehaupt2014-02-252-9/+7
* Support stagingehaupt2014-02-251-4/+2
* Support stagingehaupt2014-02-251-5/+4
* Support stagingehaupt2014-02-251-20/+7
* - Support stagingehaupt2014-02-252-11/+1
* Support stagingehaupt2014-02-251-5/+1
* Support stagingehaupt2014-02-251-8/+3
* - Support stagingehaupt2014-02-252-15/+15
* Support stagingehaupt2014-02-252-9/+12
* security/py-cryptography: Tests fix, Depend on OpenSSLkoobs2014-02-252-0/+65
* Use DATADIRehaupt2014-02-251-1/+1
* Support stagingehaupt2014-02-251-8/+9
* Support stagingehaupt2014-02-251-6/+5
* Support stagingehaupt2014-02-251-11/+5
* Support stagingehaupt2014-02-251-6/+5
* Support stagingehaupt2014-02-251-2/+1
* Support stagingehaupt2014-02-252-13/+8
* Support stagingehaupt2014-02-251-6/+6