aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Update to 1.86b.delphij2015-08-152-3/+3
* security/afl: cannonicalize MAINTAINERpgollucci2015-08-151-1/+1
* Update MASTER_SITES to fix fetching problem due to abnormal version numberfeld2015-08-151-1/+1
* Document MediaWiki multiple security vulnerabilitiesjunovitch2015-08-151-0/+45
* - Update to 3.3.17.1feld2015-08-153-4/+4
* Sync libvpx check for CVE-2015-448[56] with r394231jbeich2015-08-151-2/+2
* Document freeradius3 vulnerabilityfeld2015-08-151-0/+28
* Document gnutls vulnerabilitiesfeld2015-08-151-0/+65
* security/nss: update legacy ckbi suffix to the one used in 3.19.1jbeich2015-08-141-1/+1
* security/{,ca_root_}nss: update to 3.19.3jbeich2015-08-144-7/+7
* Update to 2.8.1garga2015-08-142-4/+3
* Update to 1.4.24arved2015-08-142-3/+3
* - Remove RG linksunpoet2015-08-142-2/+0
* - Update to 1.4.1sunpoet2015-08-143-15/+4
* - Update to 1.0.0sunpoet2015-08-142-3/+3
* - Add PORTSCOUTsunpoet2015-08-141-0/+2
* - Update to 1.1.0sunpoet2015-08-143-23/+10
* - Remove MASTER_SITE_SUBDIRsunpoet2015-08-141-1/+0
* - Switch to USES=autoreconfamdmi32015-08-131-3/+2
* Document Froxlor database password information disclosure vulnerabilityjunovitch2015-08-131-0/+40
* Document two XSS vulnerabilities in rt40, rt42.matthew2015-08-131-0/+40
* Document py-foolscap vulnerabilityfeld2015-08-131-0/+32
* Make libvpx-1.3.0 vulnerable by moving MFSA 2014-77 into separate entryjbeich2015-08-121-4/+65
* Document newest flash vulnabilities.kwm2015-08-121-0/+92
* - Upgrade to 2.1.7 (minor fixes).kuriyama2015-08-125-53/+10
* Update to version 1.17.1pawel2015-08-122-4/+4
* Oops, mark bundled libvpx v1.4.0 in firefox as vulnerable againjbeich2015-08-121-0/+9
* Move libvpx vulnerability into its own entryjbeich2015-08-121-5/+33
* Document recent mozilla vulnerabilitiesjbeich2015-08-121-0/+110
* - Switch to USES=autoreconfamdmi32015-08-121-2/+1
* - Switch to USES=autoreconfamdmi32015-08-121-2/+1
* - Add NO_ARCHamdmi32015-08-121-0/+1
* - Switch to USES=autoreconfamdmi32015-08-121-2/+1
* - Switch to USES=autoreconfamdmi32015-08-111-2/+1
* - Switch to USES=autoreconfamdmi32015-08-111-2/+1
* - Switch to USES=autoreconfamdmi32015-08-111-2/+1
* - Switch to USES=autoreconfamdmi32015-08-111-2/+1
* - Drop @dirrm* from plistamdmi32015-08-112-38/+0
* - Drop @dirrm* from plistamdmi32015-08-111-0/+15
* - Drop @dirrm* from plistamdmi32015-08-111-1/+0
* - Switch to USES=autoreconfamdmi32015-08-111-2/+1
* - Switch to USES=autoreconfamdmi32015-08-111-2/+1
* - Switch to USES=autoreconfamdmi32015-08-111-2/+1
* - Switch to USES=autoreconfamdmi32015-08-111-2/+1
* - Switch to USES=autoreconfamdmi32015-08-111-2/+1
* Document an already fixxed vulnerability in lighttpd 1.4.35 or older.madpilot2015-08-101-0/+29
* Document PCRE heap overflow vulnerability in '(?|' situationsjunovitch2015-08-101-0/+34
* Adds -fPIC to CFLAGS_aarch64 to a number of ports that already have itandrew2015-08-101-0/+1
* security/rubygem-omniauth-saml: create portswills2015-08-105-0/+39
* security/rubygem-ruby-saml: create portswills2015-08-104-0/+26
* security/rubygem-devise-two-factor: create portswills2015-08-105-0/+44
* secrutiy/rubygem-attr_encrypted: create portswills2015-08-104-0/+27
* security/rubygem-encryptor: create portswills2015-08-104-0/+25
* Re-commit ofnetchild2015-08-1033-13/+314
* Mention all CVEs that are fixed in 4.2.4. The release notes only mentionedflo2015-08-101-0/+6
* Update to signing-party 2.1 (bugfix release)johans2015-08-092-4/+3
* - editors/lazarus update to 1.4.2acm2015-08-092-2/+2
* Document recent mozilla vulnerabilitiesjbeich2015-08-071-0/+35
* Document wordpress vulnerabilitiesflo2015-08-071-0/+36
* Revert pkg-plist OPENSSL_SHLIBVER additionbrnrd2015-08-072-8/+3
* security/libressl: Update to 2.2.2brnrd2015-08-074-18/+27
* Add two security issues for subversion.lev2015-08-061-0/+35
* security/kpcli: update 2.8 -> 3.0robak2015-08-062-3/+8
* security/p5-Crypt-PWSafe3: new portrobak2015-08-065-0/+48
* Document Elasticsearch directory traversal attack and remote code executionjunovitch2015-08-061-0/+61
* The FreeBSD GNOME team proudly presents GNOME 3.16 for FreeBSD.kwm2015-08-0618-80/+331
* Bugfix upgrade to new upstream release 2.3.8.mandree2015-08-062-4/+3
* Part 2 of adding USE_GNOME=intltool to ports that require it.kwm2015-08-051-1/+1
* - Strip libraryamdmi32015-08-051-1/+2
* - Don't use / in sed regexps to allow paths, unbreaking cross-buildsamdmi32015-08-051-3/+3
* security/py-fail2ban: update 0.9.2 -> 0.9.3robak2015-08-043-4/+8
* Document xen-tools QEMU heap overflow flaw with certain ATAPI commandsjunovitch2015-08-041-0/+32
* - Drop @dirrm* from plistamdmi32015-08-041-1/+0
* - Add LICENSEamdmi32015-08-041-1/+5
* Correct version range for libidn entryjunovitch2015-08-031-1/+2
* Horde package update:mm2015-08-036-9/+9
* Part 1 of adding USE_GNOME=intltool to ports that require it.kwm2015-08-037-7/+7
* By default libtool replaces -export-symbols <file> with -retain-symbols-filetijl2015-08-0218-14/+18
* security/sshguard: update to 1.6.1feld2015-08-025-51/+4
* - Drop @dirrm* from plistamdmi32015-08-011-1/+0
* - Add NO_ARCHamdmi32015-08-012-1/+1
* - Add NO_ARCHamdmi32015-08-012-1/+1
* - Drop @dirrm* from plistamdmi32015-08-011-1/+0
* Document older net-snmp DoS vulnerabilityfeld2015-08-011-0/+35
* - Update to 1.2.1sunpoet2015-08-012-3/+3
* - Update to 3.0.0sunpoet2015-08-012-3/+3
* Document net-snmp vulnerabilityfeld2015-07-311-0/+30
* security/vault: fix typo in Makefileswills2015-07-311-1/+2
* Fix dependencyantoine2015-07-311-1/+1
* Reflect Chicken 4.10.0 RC2 as the minimum version with the CVE-2015-4556 fixjunovitch2015-07-311-2/+3
* - Drop @dirrm* from plistamdmi32015-07-311-1/+0
* - Drop @dirrm* from plistamdmi32015-07-311-1/+0
* - Drop @dirrm* from plistamdmi32015-07-311-1/+0
* - Drop @dirrm* from plistamdmi32015-07-311-1/+0
* - Drop @dirrm* from plistamdmi32015-07-311-2/+0
* - Drop @dirrm* from plistamdmi32015-07-311-11/+0
* Set path to krb5-config properly.jkim2015-07-311-10/+9
* Convert to USES=gssapi.jkim2015-07-312-0/+32
* - Drop @dirrm* from plistamdmi32015-07-301-1/+0
* Update to new upstream bug-fix release 0.65mandree2015-07-302-3/+3
* - Drop @dirrm* from plistamdmi32015-07-302-4/+2
* - Fix installation from non-rootamdmi32015-07-301-0/+13
* Switch default python_CMD used by shebangfix to ${PYTHON_CMD} for portsantoine2015-07-301-1/+0
* - Add LICENSEamdmi32015-07-292-1/+3
* - Add LICENSEamdmi32015-07-292-1/+3
* - Drop @dirrm* from plistamdmi32015-07-291-1/+0
* - Add NO_ARCHamdmi32015-07-292-1/+1
* - Drop @dirrm* from plistamdmi32015-07-291-1/+0
* - Drop @dirrm* from plistamdmi32015-07-292-1/+1
* - Fix shebangsamdmi32015-07-291-1/+3
* - Fix shebangsamdmi32015-07-291-1/+3
* Document bind CVEfeld2015-07-291-0/+43
* Update to 1.2.14feld2015-07-292-15/+18
* Upgrade to version 1.1.0.olgeni2015-07-282-3/+3
* - Drop @dirrm* from plistamdmi32015-07-281-1/+0
* - Update to 3.3.16bdrewery2015-07-283-4/+4
* Add upstream fix to address CVE-2015-5600 for MaxAuthTries bypass.bdrewery2015-07-282-1/+53
* Document OpenSSH CVE-2015-5600 for MaxAuthTries bypassbdrewery2015-07-281-0/+28
* Fix accidental revert of PermitRootLogin default to NO.bdrewery2015-07-282-1/+10
* Update to snapshot 20150727bdrewery2015-07-283-16/+16
* - Update to 6.9p1bdrewery2015-07-2811-189/+54
* Bring over ETCDIR and libedit updates from main portbdrewery2015-07-282-8/+8
* - Fix fetch, againamdmi32015-07-271-1/+2
* Document logstash SSL/TLS security vulnerability (FREAK attack)feld2015-07-271-0/+33
* Version 2.0.0 of SoftHSM has been released. More updates and bug fixes can be...erwin2015-07-272-3/+3
* security/py-paramiko: 1.14.0 -> 1.15.2pi2015-07-274-8/+9
* security/sshguard-nullfeld2015-07-266-4/+18
* Unbreak INDEX, reverting r392921antoine2015-07-2633-314/+13
* 64 bit linuxulator support (not activated by default):netchild2015-07-2633-13/+314
* Update to 1.3.0antoine2015-07-264-28/+19
* Update to 20150708antoine2015-07-262-12/+5
* New port: security/py-artifactsantoine2015-07-264-0/+29
* Document new vulnerabilities in www/chromium < 44.0.2403.89rene2015-07-251-0/+101
* Use new USES=libeditbdrewery2015-07-251-0/+1
* Document shibboleth DoSfeld2015-07-251-0/+48
* Adjust wordpress range -- www/wordpress has PORTEPOCHfeld2015-07-241-0/+3
* Update Wordpress entry to add CVEsfeld2015-07-241-0/+3
* The new shibboleth will refuse to accept -u when it wasgirgen2015-07-242-8/+9
* - Update to 2.9.7.5zi2015-07-243-9/+16
* Document wordpress XSSfeld2015-07-241-0/+34
* Document libidn out-of-bounds read issue with invalid UTF-8 inputfeld2015-07-231-0/+29
* Document buffer overflow vulnerabilities in SoXfeld2015-07-231-0/+58
* Shibboleth SP software crashes on well-formed but invalid XML.girgen2015-07-238-27/+16
* Document CVE assignment in iPython 3.2.1 entry.olgeni2015-07-231-0/+2
* Fix build with new libcaca when CACASAVER is onmartymac2015-07-232-1/+13
* Update to 1.8.14p3garga2015-07-222-3/+3
* Add gdk-pixbuf2 vulnability.kwm2015-07-221-0/+26
* security/vault: update to 0.2.0swills2015-07-223-137/+12
* - Fix ksh shebangkuriyama2015-07-221-3/+6
* Update to 1.8.14p2garga2015-07-212-4/+3
* Remove expired ports:rene2015-07-217-84/+0
* Adjust range for apache22feld2015-07-211-1/+1
* Document PCRE buffer overflowfeld2015-07-201-0/+36
* Fix moodle reference URLfeld2015-07-201-1/+2
* Document Cacti Multiple XSS and SQL injection vulnerabilitiesfeld2015-07-201-0/+44
* - Fix installation with DOCS broken by my last commitgarga2015-07-201-5/+1
* Fix build WITHOUT=NLS.mat2015-07-201-0/+41
* - Replace DISTVERSION by PORTVERSION otherwise it ends up as 1.8.14.p1,garga2015-07-205-17/+15
* Update to 1.8.14p1garga2015-07-192-3/+3
* Document php-phar vulnerabilitiesfeld2015-07-191-0/+37
* zenphoto was assigned CVEsfeld2015-07-191-0/+5
* Document recent Moodle security advisoriesfeld2015-07-191-0/+48
* package name is mariadb100, not mariadb10feld2015-07-191-1/+1
* MySQL SSL Downgrade affects the client not the serverfeld2015-07-191-11/+3
* Add missing <cvename> to apache entryfeld2015-07-181-0/+1
* Add missing apache22 packages for other "workers"feld2015-07-181-0/+4
* Apache 2.2.31 is now public, fixing CVE-2015-3183feld2015-07-181-0/+30
* CVE now assigned to squidfeld2015-07-181-1/+2
* security/pinentry:makc2015-07-173-3/+27
* Update to 1.8.14garga2015-07-172-5/+3
* Update flash entry.kwm2015-07-171-3/+3
* Correct range for libavfeld2015-07-171-1/+1
* Document zenphoto vulnerabilitiesfeld2015-07-171-0/+28
* Document groovy vulnerabilityfeld2015-07-171-0/+35
* Document libav vulnerabilityfeld2015-07-171-0/+27
* Add a new port for mbed TLS 2.0.0 (formerly polarssl)tijl2015-07-165-0/+156
* Document recent multiple mozilla vulnerabilitiesjbeich2015-07-161-0/+116
* - Update NSS and ca_root_nss to 3.19.2jbeich2015-07-164-8/+7
* - Drop @dirrm* from plistamdmi32015-07-161-1/+0
* - Drop @dirrm* from plistamdmi32015-07-161-1/+0
* - Drop @dirrm* from plistamdmi32015-07-161-1/+0
* Add PolarSSL < 1.2.14 issues.mandree2015-07-161-0/+28
* Latest libxml2 vulnerability also affects linux-*-libxml2tijl2015-07-161-0/+9
* Document linux-*-libxml2 vulnerabilitiestijl2015-07-161-2/+29
* Document linux-c6-flac vulnerabilitiestijl2015-07-161-0/+5
* - Add LICENSE_FILEamdmi32015-07-161-1/+11
* security/tclgpg: new portrobak2015-07-164-0/+36
* - Note that the previous commit has added missing USES=perl5amdmi32015-07-161-0/+1
* Update to nss-3.19.1-3.el6_6tijl2015-07-163-28/+29
* Update to libssh2-1.4.2-1.el6_6.1tijl2015-07-162-6/+7
* Update to cyrus-sasl-lib-2.1.23-15.el6_6.2tijl2015-07-152-8/+7
* - Document multiple security issues for libwmffeld2015-07-151-0/+103
* Reference another URL for tidy's CVEfeld2015-07-151-0/+1
* CVEs have been assigned for tidyfeld2015-07-151-0/+3
* Document multiple apache24 vulnerabilitiesfeld2015-07-151-0/+43
* Fix typo in flash security bulletin.kwm2015-07-151-2/+2
* - Update url of latest Flash plugin advisorytijl2015-07-151-4/+19
* Add an openvpn-polarssl that selects PolarSSL for its default TLS provider.mandree2015-07-153-2/+16
* Development ceased, broken with modern ssh (lots of options just do not work)bapt2015-07-154-46/+0
* - Fix shebangsamdmi32015-07-151-0/+6
* - Fix shebangsamdmi32015-07-151-2/+8
* - Fix shebangsamdmi32015-07-151-1/+3
* - Fix shebangsamdmi32015-07-151-2/+4
* Add security/elixir-comeonin, a password hashing library for Elixir.olgeni2015-07-146-0/+60
* Use the correct package name for linux-*-flashplugintijl2015-07-141-20/+20
* security/pinentry:makc2015-07-141-1/+4
* Use correct <tag> to mark all versions vulnerable.kwm2015-07-141-2/+2
* Add newest flash vulnerabilities CVE-2015-5122 and CVE-2015-5123.kwm2015-07-141-0/+35
* Document php sqlite3 use-after-free vulnerabilityfeld2015-07-141-1/+34
* Document php spl use-after-free vulnerabilityfeld2015-07-141-0/+33
* Document PHP arbitrary code execution. No CVE assigned yet.feld2015-07-141-1/+36
* php 5.4 package name is php5, not php54feld2015-07-141-2/+2
* Document CVE-2015-3152 "BACKRONYM" vulnerabilityfeld2015-07-141-0/+61
* - Update to 0.9.5.jkim2015-07-143-17/+3
* hadoop2 and oozie ports fetch a version of tomcat that is vulnerablefeld2015-07-131-0/+9
* Document CSRF remote execution vulnerability for devel/ipython (CVE pending).olgeni2015-07-131-0/+42
* Document freeradius vulnerabilityfeld2015-07-131-0/+44
* Correct range for non-devel version of v8feld2015-07-131-0/+3
* - Drop @dirrm* from plistamdmi32015-07-131-1/+0
* - Modernize plistamdmi32015-07-132-10/+4
* - Drop @dirrm* from plistamdmi32015-07-131-3/+0
* - Drop @dirrm* from plistamdmi32015-07-131-1/+0
* - Switch to @sampleamdmi32015-07-132-12/+5
* CVE-2015-5380 also affects v8 and v8-develfeld2015-07-131-2/+8
* - Drop @dirrm* from plistamdmi32015-07-131-3/+0
* - Switch to @sampleamdmi32015-07-132-9/+5
* Advisory URL was identical; remove duplicatefeld2015-07-131-1/+0
* PowerDNS discovered the fix for CVE-2015-1868 was not complete in thefeld2015-07-131-2/+6
* Add note on how to use the new html functionalityfeld2015-07-131-1/+2
* Add ability to produce html files for vuxml entriesfeld2015-07-133-1/+417
* - Add NO_ARCHsunpoet2015-07-131-1/+2
* security/wpa_supplicant: Address security issue (2015-5)marino2015-07-122-1/+22
* - refelct mod_wsgi3 => mod_wsgi3 updateohauer2015-07-121-1/+2
* - Add xen-tools to the list of packages fixed in existingbapt2015-07-121-0/+5
* Document all recent xen-kernel and xen-tools security issuesbapt2015-07-121-0/+604
* Upgrade to 0.025.vanilla2015-07-122-3/+3
* - Revive security/chkrootkitriggs2015-07-116-0/+109
* Document a few pivotx vulnerabilitiesbapt2015-07-111-0/+55
* Update squid entry to reflect new range of affected versionsfeld2015-07-101-16/+12
* - add more manpage linksdinoex2015-07-101-0/+4
* Document wpa_supplicant WPS_NFC option payload length validationdelphij2015-07-101-0/+26
* Document OpenSSL alternative chains certificate forgery vulnerability.delphij2015-07-101-0/+36
* - Security update to 1.0.2ddinoex2015-07-104-23/+51
* - Correct the version range of www/py-django-devellwhsu2015-07-101-4/+4
* document django vulnerabilitiesfeld2015-07-091-0/+96
* node and iojs vuln now has a CVE assignedfeld2015-07-091-1/+2
* - Update to 5.20zi2015-07-092-3/+3
* Drop .la files.kwm2015-07-092-3/+2
* - update to 1.0.26dinoex2015-07-092-3/+3
* security/libressl: Update to 2.2.1brnrd2015-07-094-10/+10