aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Use new @dir for directories out of PREFIXgarga2014-10-062-13/+7
* security/py-pylibacl: update 0.5.0 -> 0.5.2 and fixesrobak2014-10-063-12/+8
* New port: security/py-rekallantoine2014-10-064-0/+59
* - Update devel/libtool and devel/libltdl to version 2.4.2.418tijl2014-10-064-13/+22
* Update to 20140928antoine2014-10-053-4/+4
* Switch from py-imaging to py-pillowantoine2014-10-041-1/+2
* - Mark OVERWRITE_BASE and security/openssh-portable-base as DEPRECATED.bdrewery2014-10-041-0/+2
* Support multiple ListenAddress portsbdrewery2014-10-042-4/+9
* Fix rsyslog entry for pkgname matchingbdrewery2014-10-031-0/+3
* www/rt42 < 4.2.8 is vulnerable to shellshock related exploits throughmatthew2014-10-031-0/+36
* - Update the rsyslog entry to reflect the new versionsbrd2014-10-031-2/+4
* Update to 3.2.18bdrewery2014-10-034-16/+13
* Cleanup @dirrm* from my ports.mat2014-10-031-5/+0
* The default pardon and prescribe settings in the rc script were swappedfeld2014-10-022-5/+5
* Update Jenkins entry 549a2771-49cc-11e4-ae2c-c80aa9043978 to be readable.bdrewery2014-10-021-54/+99
* Update grammar of DoS in Jenkins entrybdrewery2014-10-021-1/+1
* Fix Jenkins entry to note that XSS is an issue, not as compilerbdrewery2014-10-021-1/+1
* Document Jenkins vulnerabilitiesbdrewery2014-10-021-0/+94
* Fix bash entries to also mark bash-static vulnerablebdrewery2014-10-021-0/+2
* Document CVE-2014-6277 and CVE-2014-6278 for bash.bdrewery2014-10-021-0/+28
* - Document CVE-2014-7187 fixed in bash-4.3.27_1bdrewery2014-10-021-0/+7
* Document the latest phpMyAdmin vulnerability.matthew2014-10-021-1/+32
* - Convert to USES=autoreconftijl2014-10-011-7/+3
* Document CVE-2014-7186 for bashbdrewery2014-10-011-0/+29
* Convert to USES=hordebapt2014-10-018-36/+19
* - Document sysutils/rsyslog vulnerabilities CVE-2014-3634brd2014-10-011-0/+30
* security/libbeid: Add <stdlib.h> header for mallocmarino2014-10-011-4/+5
* - Pet portlint: move USES=pear downwardsunpoet2014-09-301-2/+2
* service_identity aspires to give you all the tools you needmva2014-09-304-0/+36
* Remove expired ports:rene2014-09-3012-178/+0
* Add pam_ocra 1.0, RFC6287 (OCRA) PAM module.vanilla2014-09-304-0/+33
* Document shells/fish vulnerabilitiesbdrewery2014-09-301-0/+35
* - adopt new pkg-plist styleohauer2014-09-291-33/+0
* - remove useless PORT_OPTIONS:MDOCS checkohauer2014-09-291-13/+9
* Move back to version 0.17.0 and take maintainership, new versions do notantoine2014-09-282-5/+7
* security/rubygem-metasploit_data_models: update to 0.20.1swills2014-09-282-3/+3
* security/linux-c6-nss: update to 3.16.1xmj2014-09-273-15/+26
* Revert broken non-conversion to USES=pearantoine2014-09-272-3/+10
* Fix stage violation (and allow staging as regular user)antoine2014-09-271-0/+1
* Add linux-c6-nss-3.15.1 package to the NSS vulnerability report.xmj2014-09-271-0/+4
* Add linux_base-c6-6.5 package to the bash vulnerability report.xmj2014-09-271-0/+4
* Convert to USES=pearbapt2014-09-2625-275/+82
* The 2nd bash issue was reassigned to CVE-2014-7169:bdrewery2014-09-261-2/+2
* Remove hack now that USES=pathfix no longer modifies configure (r369260)tijl2014-09-251-5/+0
* Update bash entry for CVE-2014-3659bdrewery2014-09-251-7/+12
* - Set CPPFLAGS and LIBS in a number of ports so configure can find libintl.htijl2014-09-252-1/+5
* VuXML entry 48108fb0-751c-4cbb-8f33-09239ead4b55: expanded detailsrea2014-09-251-2/+6
* www/linux-*-flashplugin11: Fix multiple security vulnerabilitiesxmj2014-09-251-0/+42
* - Remove obsolete @dirrm(try)ak2014-09-251-1/+1
* - Update ca_root_nss to 3.17.1beat2014-09-252-3/+3
* Update tor to 0.2.4.24 and tor-devel to 0.2.5.8-rcbf2014-09-256-13/+6
* fixdes2014-09-251-1/+1
* Add entry for the NSS signature forgery bug.des2014-09-251-1/+39
* Upgrade to 3.17.1des2014-09-252-4/+3
* Document new vulnerability in www/chromium < 37.0.2062.124rene2014-09-251-0/+28
* Add entry for net/krfb (CVE-2014-6055).rakuco2014-09-251-0/+31
* - Allow staging as a regular userantoine2014-09-252-36/+3
* Document bash remote code execution vulnerability.delphij2014-09-251-0/+36
* Hand back my ports to the pool.eadler2014-09-241-1/+1
* - Drop @dirrm* from plistamdmi32014-09-242-111/+1
* - Upgrade to 0.7.1.vsevolod2014-09-233-5/+4
* Simplify plistbapt2014-09-232-19/+5
* Simplify plistbapt2014-09-231-8/+2
* Simplify plistbapt2014-09-232-9/+3
* Simplify plistbapt2014-09-231-5/+0
* Simplify plistbapt2014-09-231-3/+1
* Simplify plistbapt2014-09-231-8/+4
* Simplify plistbapt2014-09-231-18/+2
* Simplify plistbapt2014-09-232-11/+5
* Simplify plistbapt2014-09-231-8/+3
* Simplify plistbapt2014-09-232-13/+3
* Simplify plist (and avoir @cwd)bapt2014-09-231-3/+1
* Simplify plistbapt2014-09-221-6/+2
* - Drop @dirrm* from plistamdmi32014-09-221-1/+0
* - Trim @dirrm[try] from pkg-plistjhale2014-09-222-4/+0
* Update CentOS base to 6.5, add userland portsxmj2014-09-2235-31/+557
* Fix build when security/openssl is installed.hrs2014-09-221-1/+4
* - Update to 5.04zi2014-09-222-3/+3
* Update to 1.15.novel2014-09-213-5/+4
* Update to 4.2.novel2014-09-213-4/+4
* security/heimdal: Unbreak on DragonFlymarino2014-09-211-0/+4
* Remove FORBIDDEN that references vuxml. We already have vuxml, portauditbdrewery2014-09-204-8/+0
* Remove expired portsrene2014-09-2015-444/+0
* fix build with perl 5.18az2014-09-201-1/+6
* fix build with perl 5.18az2014-09-201-0/+8
* - Remove dependency on pkgconftijl2014-09-191-9/+1
* Remove old libtool patchtijl2014-09-191-11/+0
* Document new asterisk11 vulnerability.madpilot2014-09-191-0/+38
* Expose the reload command in the tor and tor-devel rc-scripts [1],bf2014-09-195-5/+6
* - Drop .la files, no dependees require themamdmi32014-09-192-3/+2
* Fix recidive jail.ache2014-09-192-1/+16
* - Update to 1.3.1sunpoet2014-09-193-14/+6
* Document new squid vulnerability.madpilot2014-09-181-0/+35
* - Bump PORTREVISIONs on php*-mcrypt after libmcrypt .so version changeamdmi32014-09-184-0/+4
* fix scripoliver2014-09-181-0/+3
* - Drop .la files for security/libmcrypt, no dependees require themamdmi32014-09-187-7/+9
* - Drop .la files, no dependees require themamdmi32014-09-182-3/+2
* - Drop .la files, no dependees require themamdmi32014-09-172-2/+2
* - Drop .la files, no dependees require themamdmi32014-09-172-3/+2
* - Strip shared librariesgahr2014-09-171-0/+2
* Document new dbus vulnabilities.kwm2014-09-171-0/+52
* Replace USE_AUTOTOOLS=libltdl with an ordinary LIB_DEPENDS in all ports.tijl2014-09-178-11/+16
* Document nginx security advisory (CVE-2014-3616).osa2014-09-171-0/+32
* - Drop .la files for security/libksba, no dependees require themamdmi32014-09-165-6/+7
* Add ipropd_master and ipropd_slave rc.d scripts for branches which do nothrs2014-09-163-1/+92
* Add pkg-message for client userscs2014-09-162-0/+16
* Allow staging as a regular userantoine2014-09-153-3/+1
* - Use the ports framework to create user/groupantoine2014-09-153-45/+5
* - Patch a script to use the right syslogd socket (/var/run/log)tijl2014-09-152-6/+2
* Update to v2.0beta.hrs2014-09-155-11/+24
* Fix build with makeinfo version 5.2.hrs2014-09-152-0/+54
* - Switch to USES=libtool:buildtijl2014-09-141-5/+3
* Document the latest phpMyAdmin vulnerabilitymatthew2014-09-141-0/+30
* Use default LIBTOOLIZE_ARGStijl2014-09-141-1/+0
* security/heimdal: Restore MAKE_JOBS_UNSAFE removed recentlymarino2014-09-141-0/+2
* devel/glib12 x11-toolkits/gtk12:tijl2014-09-138-8/+8
* Re-deprecate and add back the expiration date.adamw2014-09-131-2/+5
* Fix build and minor clean-ups to Makefile.adamw2014-09-131-7/+8
* Allow staging as a regular userantoine2014-09-131-5/+5
* Allow staging as a regular userantoine2014-09-121-1/+0
* Adjust patch to avoid libtool. It is more similar to Linux now.tijl2014-09-123-10/+23
* Remove a comment about USE_AUTOTOOLS=libtooltijl2014-09-121-4/+0
* - fix build with ccache on FreeBSD 10ohauer2014-09-121-1/+1
* - update to 1.4d (see http://www.harding.motd.ca/autossh/CHANGES)leeym2014-09-122-3/+3
* Use @sample for sudoersbdrewery2014-09-121-3/+1
* databases/sqlite2:tijl2014-09-121-1/+1
* - Allow staging as a regular userantoine2014-09-121-3/+5
* - Update to CyaSSL 3.2.0johans2014-09-123-5/+10
* Allow staging as a regular userantoine2014-09-121-1/+1
* - Fix libnet dependencymich2014-09-121-4/+1
* Update to 2.8.1 which addresses CVE-2014-5284.brd2014-09-112-3/+3
* Document CVE-2014-5284 affecting security/ossec-hids-* < 2.8.1.brd2014-09-111-0/+32
* Add back USE_LDCONFIG for coourier-authlib-base only.madpilot2014-09-111-1/+3
* Fix a typoantoine2014-09-111-2/+2
* - Allow staging as a regular userantoine2014-09-111-8/+5
* Update the default version of GCC in the Ports Collection from GCC 4.7.4gerald2014-09-1152-14/+52
* Allow staging as a regular userantoine2014-09-101-2/+2
* Update to 1.66ehaupt2014-09-102-3/+3
* Welcome Mate Desktop 1.8bapt2014-09-1014-546/+0
* Document new vulnerabilities in www/chromium < 37.0.2062.120rene2014-09-101-0/+33
* Update nss to 3.17bapt2014-09-092-8/+10
* net/libnet10 expired, set the 12 dependent ports to expire 30 SEP 2014marino2014-09-092-0/+6
* Mozilla upgrades:bapt2014-09-092-3/+4
* - Update to 1.998jadawin2014-09-082-4/+3
* - Update to 0.21.0.1culot2014-09-082-6/+4
* - Update to 0.21.0.1culot2014-09-084-6/+22
* Let USES=libtool also delete links to .la files (and links to links to...)tijl2014-09-082-3/+1
* Allow staging as a regular userantoine2014-09-081-0/+1
* Allow staging as a regular userantoine2014-09-081-0/+1
* Allow staging as a regular userantoine2014-09-081-0/+1
* Allow staging as a regular userantoine2014-09-081-1/+2
* Remove three unstaged security/prelude-* portsmarino2014-09-0821-481/+0
* security/barnyard2: Remove PRELUDE optionmarino2014-09-081-4/+2
* Stage security/distcache; Apache24 optionally depends on itmarino2014-09-083-27/+32
* */courier-authlib*:tijl2014-09-0812-233/+102
* Allow staging as a regular userantoine2014-09-071-2/+2
* . Fix LICENSE specification (BSD -> BSD3CLAUSE)glewis2014-09-071-1/+1
* security/hydra: Switch Firebird client options from 2.1 => 2.5marino2014-09-071-1/+1
* Update to 2.1.0.7antoine2014-09-062-3/+3
* Webshag is a multi-threaded, multi-platform web server audit tool. Written incs2014-09-066-0/+211
* https has been the default for www.keltia.net for more than a year.roberto2014-09-061-1/+1
* security/umit: fix build since sphinx updatewg2014-09-061-0/+1
* Update to Calife 3.0.4: support for %group synatx in addition to @grouproberto2014-09-062-3/+5
* Radamsa is a generic test case generator for robustness testing, aka a fuzzer.cs2014-09-065-0/+51
* security/cracklib:tijl2014-09-068-17/+17
* Add USES=libtool and INSTALL_TARGET=install-striptijl2014-09-061-6/+6
* Remove IGNORE -- port should work fine nowcs2014-09-061-2/+1
* Update to 20140828cs2014-09-063-44/+68
* Add USES=libtool and INSTALL_TARGET=install-striptijl2014-09-062-3/+3
* Document trafficserver vulnerabilitytijl2014-09-051-0/+31
* - Update to 6.47, announce message:nemysis2014-09-052-7/+5
* Change INSTALL_DATA to install with mode 644antoine2014-09-052-3/+4
* security/libgcrypt: fix build with GCC on 8.x/amd64, 2nd attemptpi2014-09-051-3/+2
* Import PHP 5.6 branch!ale2014-09-046-0/+54
* Fix permissions (@group/@mode) handlingmartymac2014-09-042-7/+4
* - update vid f927e06c-1109-11e4-b090-20cf30e32f6dohauer2014-09-041-6/+12
* Update to 20140824cs2014-09-046-290/+30
* - Update to 0.9.5jhale2014-09-032-5/+5
* - Update to 2.1.2jhale2014-09-033-17/+17
* Upgrade to 0.9.4. bump PORTREVISION due shared library incr.vanilla2014-09-031-1/+1
* Remove pkg_install only bitsbapt2014-09-031-4/+0
* security/libgcrypt: fix build without assembler on 8.x/amd64pi2014-09-032-5/+18
* Update to 1.3.1cs2014-09-032-6/+5
* Mark brokencs2014-09-031-0/+1
* Remove non staged ports without pending PR from s*bapt2014-09-0275-2699/+0
* Support stagingcs2014-09-022-9/+15
* Reading up on it a bit more, there are some differences betweenadamw2014-09-021-1/+1
* Deprecate as upstream has abandoned it for security/py-potrcs2014-09-021-0/+2
* Add security/p5-Crypt-Tea_JS.adamw2014-09-026-0/+58
* Fix build on 8 and 9.adamw2014-09-021-2/+2
* Remove support for pkg_installbapt2014-09-012-10/+0
* lang/guile:tijl2014-08-311-1/+1
* security/umit: support stagewg2014-08-312-47/+58
* security/orthrus: support stagewg2014-08-312-20/+25
* security/libpreludedb: support stagewg2014-08-312-91/+59
* security/kedpm: support stagewg2014-08-313-89/+16
* security/rubygem-omniauth: correct dependencyswills2014-08-311-1/+1
* security/rubygem-omniauth: update to 1.2.2swills2014-08-312-3/+3
* security/rubygem-net-ssh27: limit portscout to proper versionsswills2014-08-311-1/+1
* security/rubygem-net-scp11: limit portscout to proper versionsswills2014-08-311-1/+1
* dns/libidn:tijl2014-08-315-4/+5
* Fix build on amd64 on 8 and 9.adamw2014-08-312-3/+21
* Fix build on branches which do not have com_right_r() in libcom_err.hrs2014-08-314-1/+43
* - Add LICENSE.hrs2014-08-308-191/+186
* Update to 1.0.4antoine2014-08-302-9/+7
* Switch to USES=python and autoplistantoine2014-08-302-47/+2
* - Update LICENSE [1]sunpoet2014-08-302-42/+3
* - Add missing OPTIONS_DEFINEsunpoet2014-08-302-28/+20
* - Update to 0.24olivierd2014-08-302-6/+5
* - Convert my own Python ports to USES= pythonolivierd2014-08-301-3/+2
* Convert a few ports to USES=pythonantoine2014-08-304-12/+8
* Modernize pythonbapt2014-08-291-3/+2
* Modernize pythonbapt2014-08-291-3/+2
* devel/libunistring:tijl2014-08-291-1/+1
* security/libssh2:tijl2014-08-292-12/+19
* Remove bad usage of BROKENantoine2014-08-291-1/+1
* dns/c-ares:tijl2014-08-281-1/+1
* - Fix plist issuesvsevolod2014-08-282-1/+3
* - Update libsodium to 0.7.0vsevolod2014-08-273-16/+22
* Update signing-party to 1.1.9johans2014-08-272-4/+3
* Reset maintainership, the maintainer has no time for itbapt2014-08-271-1/+1
* security/rubygem-net-scp11: tell portscout to ignoreswills2014-08-271-0/+2
* security/rubygem-net-ssh27: tell portscout to ignore thisswills2014-08-271-0/+2
* Remove some duplicate lines from plist (or duplicate plist)antoine2014-08-271-4/+3
* Document new vulnerabilities in www/chromium < 37.0.2062.94rene2014-08-271-0/+58
* security/rubygem-bcrypt-ruby: fix missing dependencyswills2014-08-261-1/+2
* security/rubygem-bcrypt: add rubygem-bcrypt portswills2014-08-264-0/+24
* - Fix missing library problems when the linker enforces explicit linkingtijl2014-08-265-5/+11
* Update to 20140824antoine2014-08-262-3/+3
* - Fix configure with the EXE option enabledpgj2014-08-261-1/+3
* security/rubygem-net-ssh: update to 2.9.1swills2014-08-262-3/+3
* Update to 4.1.novel2014-08-263-4/+4
* Update to 1.10.8madpilot2014-08-262-4/+4
* security/rubygem-net-scp: update to 1.2.1swills2014-08-262-3/+3
* - Drop USE_AUTOTOOLS=libtool, not usedamdmi32014-08-251-1/+1
* - Merge in workaround from 191002zi2014-08-253-12/+36
* security/py-cryptography: Update to 0.5.4, Modernizekoobs2014-08-252-8/+9
* security/rubygem-bcrypt-ruby: update to 3.1.5swills2014-08-252-3/+3
* Add security/fprintd.adamw2014-08-258-0/+175
* Update to 0.9.14.1cs2014-08-252-3/+3
* 2014-08-24 security/pam_abl: Newer version requires large number of hacks, no...antoine2014-08-2417-681/+0
* Add devel/liballium and security/obfsclient.adamw2014-08-234-0/+51
* security/xzid: suppress broken and unnecesary missing target checkmarino2014-08-231-0/+1
* - update to 6.4.7ohauer2014-08-233-36/+36
* security/suricata: Update to 2.0.3, Modernizekoobs2014-08-234-46/+122
* Remove double slash to pass check-plistantoine2014-08-231-1/+1
* - Update to 2014.65ak2014-08-222-3/+3
* New port: security/p5-Crypt-RHash:zi2014-08-226-0/+50
* - Switch dns/unbound to USES=libtool, drop .la filesamdmi32014-08-222-1/+2
* Fix up missed or botched PORTREVISION bumps from r365599.mandree2014-08-221-1/+1