aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - update to 0.7.3ohauer2017-12-313-24/+31
* security/rubygem-omniauth-saml: update to 1.8.1swills2017-12-312-4/+4
* security/clamav: handle memfs/tmpfs /var/run.ler2017-12-313-2/+23
* security/vault: Update to 0.9.1swills2017-12-312-5/+5
* Update to 1.8.1sunpoet2017-12-312-4/+4
* security/vuxml: Document vulnerabilities in www/otrsdbaio2017-12-311-0/+49
* Fix cut-n-paste error in the previous addition for bouncycastle15eugen2017-12-291-1/+1
* Document security defect in the Bouncy Castle Crypto APIs: CVE-2017-13098 ("R...eugen2017-12-291-0/+31
* Simplify some USES=pythonantoine2017-12-293-3/+3
* Update to 1.8.0sunpoet2017-12-282-4/+4
* devel/google{test,mock}: update to 1.8.0.450jbeich2017-12-281-1/+1
* Fix build on arm (the port is for 32-bit only). While here, canonicalizelinimon2017-12-281-4/+4
* security/afl: Switch to devel/llvm50tobik2017-12-281-1/+5
* Update security/erlang-fast_tls to 1.0.18farrokhi2017-12-272-4/+4
* Deprecate ports broken for more than 6 monthsantoine2017-12-274-0/+8
* security/otpw: set LLD_UNSAFE to avoid linking with lldemaste2017-12-271-0/+1
* Update to 1.7.0sunpoet2017-12-272-4/+4
* Update to 1.03sunpoet2017-12-272-4/+4
* Update to 6.01sunpoet2017-12-272-4/+4
* New port: security/titan: Command line password manager and file encryption p...yuri2017-12-275-0/+79
* Update to WolfSSL 3.13.0johans2017-12-253-6/+6
* security/vuxml: mark thunderbird < 52.5.2 as vulnerablejbeich2017-12-251-0/+35
* New port: security/snuffleupagusjoneum2017-12-245-0/+57
* Update to 0.056.vanilla2017-12-243-4/+6
* Update to 20171203antoine2017-12-242-4/+4
* Update to 4.16.26antoine2017-12-242-6/+6
* Update to 0.3.3antoine2017-12-242-4/+4
* Update to 1.3.23antoine2017-12-242-4/+4
* - Convert to USES=autoreconf.tijl2017-12-243-24/+22
* Update security/erlang-fast_tls to 1.0.17farrokhi2017-12-242-4/+4
* Add standalone option to pull in socatdvl2017-12-241-1/+5
* Document phpMyAdmin PMSA-2017-9: Critical XSRF/CSRF vulnerability.matthew2017-12-241-0/+30
* Convert to USES=autoreconf.tijl2017-12-231-5/+1
* Update to 4.11ehaupt2017-12-232-5/+4
* security/acme-client: Unbreak buildbrnrd2017-12-231-7/+7
* Update to 2.1.0.16antoine2017-12-232-4/+4
* security/vuxml: Fix typo in CVE number of latest Oracle CPU entrybrnrd2017-12-231-2/+2
* Document new asterisk vulnerability.madpilot2017-12-231-0/+33
* Update to 20171129antoine2017-12-232-4/+4
* security/vuxml: Document new MariaDB vulnbrnrd2017-12-231-0/+31
* Change default version of samba from 4.4 to 4.6antoine2017-12-231-1/+1
* Update to 1.0.39sunpoet2017-12-232-4/+4
* New port: security/obfs4proxy-tor: Pluggable transport proxy for Tor (obfs4, ...yuri2017-12-225-0/+89
* - Update WWWamdmi32017-12-221-1/+1
* security/py-pynacl: Update to 1.2.1yuri2017-12-222-5/+5
* security/tor-devel: Update to 0.3.2.8-rcyuri2017-12-223-5/+6
* Update to 2.0.7sunpoet2017-12-222-4/+4
* Try to bring some consistency to ports that have x86-specific pieces.linimon2017-12-211-2/+7
* Use a more modern way of distinguishing "big-endian platforms".linimon2017-12-211-3/+3
* The ARCH value of 'arm' is only for arm v4/v5 which are antique. Let'slinimon2017-12-211-1/+1
* security/libressl-devel: Bugfix update to 2.6.4brnrd2017-12-212-4/+4
* security/libressl: Bugfix update to 2.6.4brnrd2017-12-212-4/+5
* Update gnupg to 2.2.4. Bump the libassuan requirement to 2.5.1.adamw2017-12-212-5/+5
* Update to 2.5.1jhale2017-12-213-5/+5
* Fix build on 11 and 12.mat2017-12-212-16/+35
* Add PORTSCOUTsunpoet2017-12-201-0/+2
* Update to 2.0.15sunpoet2017-12-202-4/+4
* Use swig 3.0 for perl bindingsbapt2017-12-201-1/+2
* Document multiple vulnerabilities in rsync.ehaupt2017-12-201-0/+35
* Use swig 3.0bapt2017-12-201-3/+3
* switch from swig 1.3 to 3.0bapt2017-12-201-1/+2
* Mark some older failing ports broken on aarch64.linimon2017-12-191-5/+6
* Mark more recently failing ports broken on aarch64.linimon2017-12-193-1/+5
* Document ruby issueswills2017-12-191-0/+29
* security/tor-devel: Update to 0.3.2.7-rc; Unbreaking on systems without timin...yuri2017-12-193-4/+16
* security/tor: Unbreaking on systems without timingsafe_memcmp(3)yuri2017-12-192-0/+13
* Mark BROKEN: fails to configureantoine2017-12-191-0/+2
* Add vuxml entry for CVE-2017-16355 to rubygem-passengerasomers2017-12-191-0/+28
* security/py-keyring: Upgrade to 10.5.1swills2017-12-192-4/+4
* Copy security/rubygem-openssl to create new port,jrm2017-12-184-0/+28
* Document multiple vulnerabilities in libXfont and libXfont2.zeising2017-12-181-0/+73
* security/pgpin: back out my last commit. pgpin is still useful for various ca...rene2017-12-181-3/+0
* Update to 1.6.0sunpoet2017-12-172-4/+4
* Add CVE to references.zeising2017-12-171-0/+1
* Document x11/libXcursor -- integer overflow that can lead to heap bufferzeising2017-12-171-0/+39
* Schedule security/pgpin for removal on 2018-02-01rene2017-12-171-0/+3
* Use setup.py instead of PYSETUPsunpoet2017-12-171-1/+1
* Document global vulnerabilitysunpoet2017-12-171-0/+30
* Update security/keepassxc to version 2.2.4.olgeni2017-12-173-7/+8
* Remove two unmaintained ports that were only useful for the AIM network, whichrene2017-12-164-51/+0
* Put the target definition inside the .if to avoid empty targetsunpoet2017-12-161-1/+1
* - Fix WWW:amdmi32017-12-161-1/+1
* Fix build on mips64sunpoet2017-12-161-0/+5
* security/libgcrypt: update to 1.8.2cpm2017-12-163-5/+5
* security/nextcloud-twofactor_u2f: Update to 1.5.0brnrd2017-12-163-12/+39
* Document Jenkins vulnerabilities.brd2017-12-161-0/+37
* security/suricata: update to 4.0.3swills2017-12-152-4/+4
* Update to 2.1.0sunpoet2017-12-152-4/+4
* Update KDE Frameworks to 5.41tcberner2017-12-151-3/+3
* security/vuxml: document Node.js vulnerabilities, December 2017bhughes2017-12-151-0/+45
* security/nss: don't pull llvm40 on 10.* i386 if CPUTYPE is setjbeich2017-12-151-1/+1
* Add missing IGNORE_WITH_PHP for various pecl-ports.tz2017-12-143-3/+3
* Document GitLab Vulnerabilitytz2017-12-141-0/+45
* Add entry for CVE-2017-8819.remko2017-12-141-0/+32
* Update to 0.38sunpoet2017-12-142-4/+4
* - Add CVE names for old asterisk13 vulnerabilitiesmadpilot2017-12-141-1/+7
* Document asterisk13 vulnerability.madpilot2017-12-141-0/+29
* Snort 3 is the next major release of the Snort utility:feld2017-12-145-0/+259
* Update to pgpdump 0.32johans2017-12-142-3/+6
* Document libxml2 issueswills2017-12-131-0/+40
* security/nextcloud-twofactor_totp: Update to 1.4.0brnrd2017-12-133-170/+58
* - Fix build with boost 1.66amdmi32017-12-123-0/+38
* security/vault: Update to 0.9.0swills2017-12-122-5/+5
* - Those ports fail to build with python3antoine2017-12-122-2/+2
* security/libargon2: Add SONAME to shared librarytz2017-12-122-4/+18
* Re-try ports affected by bug 193528 on powerpc* after r449590jbeich2017-12-121-2/+0
* Update devel/protobuf to 3.5.0sunpoet2017-12-121-1/+1
* Fix version range in latest curl entry.tijl2017-12-111-2/+2
* Add linux-c7-curl to latest curl entry.tijl2017-12-111-0/+5
* Bump PORTREVISION on *-sbcl ports after lang/sbcl upgrade.krion2017-12-111-1/+1
* Update to 1.02sunpoet2017-12-112-4/+4
* security/libhijack: mark broken for 10.xswills2017-12-111-0/+2
* Mark as failing to compile on big-endian.linimon2017-12-111-0/+3
* - Those ports fail to build with python3antoine2017-12-112-4/+4
* Audit base system against known vulnerabilities and generate reportsfeld2017-12-115-0/+254
* Document FreeBSD-SA-17:12.opensslfeld2017-12-101-0/+57
* document latest wireshark vulnerabilitiescmt2017-12-101-0/+54
* - hotssh doesn't work with python3antoine2017-12-091-13/+11
* py-cracklib fails to build with python3antoine2017-12-091-1/+1
* - Add security/u2f-devd dependency to ensure the maintenance of the devd rule...cpm2017-12-093-22/+2
* security/u2f-devd: Devd hotplug rules for Universal 2nd Factor (U2F) tokenscpm2017-12-095-0/+205
* parano is not compatible with python3antoine2017-12-091-1/+1
* gcipher is not compatible with python3antoine2017-12-091-1/+1
* Fix version range of mail/procmailsunpoet2017-12-091-1/+2
* Update */pear-Horde to the latest versionjoneum2017-12-096-12/+12
* security/py-{acme,certbot}: Update to 0.20.0cpm2017-12-086-16/+16
* security/boringssl: update to new snapshotswills2017-12-082-5/+5
* security/openssl: Update to 1.0.2mbrnrd2017-12-074-32/+52
* secuirty/vuxml: Document OpenSSL vulnerabilitiesbrnrd2017-12-071-0/+53
* Document FreeBSD-SA-17:11.opensslfeld2017-12-071-0/+53
* Document FreeBSD-SA-17:10.kldstatfeld2017-12-071-0/+34
* Document FreeBSD-SA-17:09.shmfeld2017-12-071-0/+36
* Document FreeBSD-SA-17:08.ptracefeld2017-12-071-0/+35
* Document FreeBSD-SA-17:07.wpafeld2017-12-071-0/+38
* security/hitch: Add reload command to rc scriptfeld2017-12-072-1/+2
* Adjust expiry date.cy2017-12-061-1/+1
* www/nextcloud: Add WWW to all appsbrnrd2017-12-062-0/+4
* As per MIT policy, deprecate and expire twelve months followingcy2017-12-061-0/+3
* Welcome the new security/krb5-116 port. This port follows MIT'scy2017-12-0614-1/+561
* security/vuxml: mark firefox < 57.0.1 as vulnerablejbeich2017-12-061-0/+46
* - Update to 2.17.0amdmi32017-12-063-18/+6
* Upgrade to 2.7.5dvl2017-12-063-5/+6
* New port: security/libhijack: Runtime process infection made easyyuri2017-12-064-0/+41
* security/vuls: Update to 0.4.2swills2017-12-062-8/+8
* GitLab and related ports maintained by me: pass maintainership to Matthias Fe...tz2017-12-063-3/+3
* add devel/py-backports - namespace shim for Python backportslifanov2017-12-051-0/+13
* Follow up on r455423.cy2017-12-051-1/+1
* - spike-proxy fails to run with python3antoine2017-12-051-2/+3
* It now no longer build on 11.mat2017-12-051-0/+1
* Add a USES=python:env, that will not add a dependency on Python.mat2017-12-041-2/+1
* Update to 0.09sunpoet2017-12-042-4/+4
* Remove expired port:rene2017-12-0412-535/+0
* security/{racoon2,krb5-appl}: drop option for expired krb5-113rene2017-12-042-18/+6
* security/morphis: Unbroke the port by adding shebangfixyuri2017-12-032-90/+89
* - Update to 20171118antoine2017-12-022-12/+13
* Update to 20171125antoine2017-12-022-4/+4
* Update to 20171109antoine2017-12-022-5/+4
* - Update to 20171107antoine2017-12-022-5/+5
* Document varnish vulnerabiltyfeld2017-12-021-0/+32
* Update to 3.7.0antoine2017-12-022-4/+4
* Update to 3.7.0antoine2017-12-023-5/+9
* Update to 4.16.21antoine2017-12-022-8/+7
* Update to 0.2.8antoine2017-12-022-4/+4
* Update to 1.3.18antoine2017-12-022-4/+4
* Update to 0.1.16antoine2017-12-022-4/+4
* Update to 2.1.17antoine2017-12-022-4/+4
* Document vulnerability in www/mybbjoneum2017-12-021-0/+26
* Explicitely pass ipython FLAVOR in a few portsantoine2017-12-021-1/+1
* security/tor-devel: Update to 0.3.2.6-alpha (security update)yuri2017-12-022-4/+4
* security/tor: Update to 0.3.1.9 (security update)yuri2017-12-022-5/+5
* Document wordpress issuesjoneum2017-12-021-0/+37
* Documeent net/asterisk13 vulnerability.madpilot2017-12-021-0/+29
* - Simplify Makefileamdmi32017-12-011-37/+14
* - Switch to options helpersamdmi32017-12-014-16/+17
* - Add LICENSEamdmi32017-12-012-11/+7
* - Switch to USES=localbaseamdmi32017-12-012-23/+20
* - Add NO_ARCHamdmi32017-12-012-3/+5
* Remove expired port:rene2017-12-016-202/+0
* - Fix LICENSEamdmi32017-12-012-3/+8
* Remove expired port:rene2017-12-015-59/+0
* Document CVE-2017-16944 in Eximvsevolod2017-12-011-0/+26
* Convert Python ports to FLAVORS.mat2017-11-30130-705/+611
* Update to 0.055.vanilla2017-11-303-4/+12
* security/vuxml: Document vulnerability in net/xrdp-develpizzamig2017-11-301-0/+28
* - Update to 1.18.4lwhsu2017-11-302-4/+4
* For ports that are marked BROKEN on armv6, and also fail to build onlinimon2017-11-305-0/+5
* For ports that are marked NOT_FOR/ONLY_FOR armv6, also mark them solinimon2017-11-302-2/+2
* security/2fa: Update to 1.0.0dbaio2017-11-302-5/+7
* security/nss: update to 3.34.1jbeich2017-11-304-8/+8
* security/vuxml: Fix formattingbrnrd2017-11-291-6/+6
* security/vuxml: Document cURL vulnerabilitiesbrnrd2017-11-291-0/+53
* Update to 0.1.24ehaupt2017-11-292-4/+4
* security/vuxml: Document vulnerability in py-borgbackupdbaio2017-11-291-0/+32
* security/clamav: incorrect type size on amd64 in pcre2.ler2017-11-292-1/+13
* * Updated to 0.0.61ultima2017-11-292-77/+83
* Document www/palemoon vulnerabilitiestobik2017-11-291-0/+29
* security/rubygem-doorkeeper-openid_connect: Update from 1.1.2 to 1.2.0tz2017-11-292-4/+4
* New port: security/rubygem-rbnacl-libsodiumtz2017-11-285-0/+38
* New port: security/rubygem-bcrypt_pbkdftz2017-11-284-0/+32
* - Update to 2.16.0amdmi32017-11-283-7/+37
* Upgrade to openiked-1.10marcel2017-11-282-4/+4
* Document mail/exim vulnerability: CVE-2017-16943vsevolod2017-11-271-0/+25
* - Update to 5.44zi2017-11-272-4/+4
* security/acme-client: Chase upstream URL updatebrnrd2017-11-272-2/+13
* security/p5-openxpki[-i18n]: Update to 1.19.4dbaio2017-11-276-47/+67
* Update security/py-keyring to 10.5.0tcberner2017-11-262-5/+4
* - Add LICENSEamdmi32017-11-251-8/+8
* Add kbfs 1.0.36sunpoet2017-11-254-0/+37
* www/nextcloud: Add essential appsbrnrd2017-11-259-0/+798
* New port: security/py-ssh-audit: SSH server auditingyuri2017-11-255-0/+69
* Document vulnerability in www/mybbjoneum2017-11-251-0/+31
* New port: security/2fa: Two-factor authentication on the command lineyuri2017-11-254-0/+39
* Update to 0.006sunpoet2017-11-242-4/+6
* Update to 1.0.36sunpoet2017-11-242-4/+4
* Document multiple vulnerabilities in sysutils/py-saltwoodsb022017-11-231-0/+43
* Document security issue fixed in CodeIgniter 3.1.6junovitch2017-11-231-0/+26
* Update to 3.0.2sunpoet2017-11-232-4/+4
* Update to 3.0.2sunpoet2017-11-232-4/+4
* Update to 3.0.2sunpoet2017-11-232-4/+4
* security/tor-devel: Update to 0.3.2.5-alphayuri2017-11-232-4/+4
* Update to 2.2.3adamw2017-11-224-16/+7
* Update to WolfSSL 3.12johans2017-11-223-8/+10
* Update to 4.0.1zeising2017-11-222-5/+4
* Fix suricata failing to start if there is a stale pid file laying around.zeising2017-11-222-2/+16
* - Document vulnerability in procmailzi2017-11-221-0/+28
* Document vulnerability in net/frrolivier2017-11-211-0/+29
* security/vuxml: Document multiple vulnerabilities in net-mgmt/cactipizzamig2017-11-211-0/+33
* Update to 1.15.1sunpoet2017-11-202-4/+4
* Update to 3.4sunpoet2017-11-203-7/+11
* - Switch to options helpersamdmi32017-11-201-6/+6
* - Document vulnerability in www/mediawiki127, www/mediawiki128 and www/mediaw...wen2017-11-191-0/+52
* Update to 0.2.4sunpoet2017-11-182-4/+4
* security/obfsproxy: Make argparse a conditional dependencycpm2017-11-182-7/+15
* security/vuxml: Mark MariaDB <10.1.29 vulnerablebrnrd2017-11-181-2/+2
* Update 2.4.3.2 --> 2.4.3.6cy2017-11-186-46/+81
* Update 1.9.9 --> 1.9.13cy2017-11-182-3/+4
* security/keepass: Update to 2.37woodsb022017-11-182-4/+4
* Update to 0.2.3sunpoet2017-11-182-4/+4
* Upgrade from 0.15 to 0.16. Install the author's LICENSE-filemi2017-11-172-4/+11
* Document the latest Flash Player vulnerability.jkim2017-11-171-0/+37
* PHP 7.2: Remove bad repocopies.tz2017-11-174-37/+0
* New port: security/rubygem-rbnacltz2017-11-174-0/+29
* Add PHP 7.2 RC6tz2017-11-1611-0/+104
* Update KDE Frameworks to 5.40.0tcberner2017-11-162-5/+4
* Fix vuxml build.gjb2017-11-161-1/+1
* Shibboleth Service Provider Security Advisory [15 November 2017]girgen2017-11-166-15/+16
* Information about shibbloeth2-sp security issuegirgen2017-11-161-0/+42
* - This vulnerability aapplies to pjsip too.madpilot2017-11-161-1/+10
* Chase upgrade of lang/sbcljrm2017-11-151-1/+1
* Update to 1.2.1sunpoet2017-11-152-4/+4