aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Remove @exec/@unexec redundant with USES=desktop-file-utilsantoine2015-09-261-2/+0
* Upgrade security/elixir-comeonin to version 1.2.0.olgeni2015-09-263-7/+10
* Replace plist entries with proper USESbapt2015-09-261-1/+1
* Mark as broken on sparc64: these ports fail to link with boost.linimon2015-09-261-0/+2
* Mark as broken on sparc64 et. al.: uses SSE compiler-specific flag.linimon2015-09-261-0/+3
* Mark as broken on arm/sparc64: "cannot detect endianness."linimon2015-09-261-0/+3
* Mark as broken on sparc64: fails to build.linimon2015-09-261-0/+2
* Mark as broken on sparc64 and others: uses x86 assembler.linimon2015-09-261-0/+3
* Mark as broken on sparc64: fails to build.linimon2015-09-261-0/+1
* Mark as broken on sparc64: not yet ported to this architecture.linimon2015-09-261-0/+2
* Upgrade security/elixir-comeonin to version 1.1.4.olgeni2015-09-252-3/+3
* Convert to @samplebapt2015-09-251-3/+1
* - Update to latest snapshot.bdrewery2015-09-254-21/+11
* Stop trying to create the RSA protocol 1 key from the rc.d file. It is nobdrewery2015-09-252-12/+2
* - Update to 3.0.1sunpoet2015-09-252-3/+4
* security/libssh2: Fix pkgconfigfeld2015-09-251-1/+5
* Revise Moodle multiple security vulnerabilities from r397210 to reflectjunovitch2015-09-241-9/+27
* Fix older ruby vuxml entryfeld2015-09-241-3/+7
* - Fix shebangsamdmi32015-09-241-2/+14
* Update to 0.20cs2015-09-232-3/+3
* Update to 0.5cs2015-09-233-3/+4
* - Drop 8.x supportamdmi32015-09-232-16/+0
* - Update to 1.72sunpoet2015-09-232-3/+3
* Update to 2.0.hrs2015-09-235-11/+14
* security/libssh2: Update to 1.6.0feld2015-09-233-4/+7
* libssh2 version entry range was missing PORTEPOCHfeld2015-09-231-1/+2
* Document vulnerability in security/libssh2feld2015-09-231-0/+30
* Summary: Document recent Mozilla vulnerabilitiesjbeich2015-09-231-5/+144
* Update to 0.9.38 release.ale2015-09-222-4/+3
* security/pecl-scrypt: various fixes and improvementsrobak2015-09-221-11/+21
* Fix pkg-descr, Strongswan supports IKEv1 since version 5.0.0garga2015-09-211-1/+2
* Update security/strongswan to 5.3.3garga2015-09-215-24/+5
* Typos, whitespace and capitalization fixes (S-X).olgeni2015-09-2117-22/+23
* - Update to 1.0.1sunpoet2015-09-212-3/+3
* - Fix OpenSSL dependencysunpoet2015-09-212-8/+8
* - Drop 8.x supportamdmi32015-09-212-25/+1
* - Switch to options helpersamdmi32015-09-211-5/+3
* Remove BROKEN on Tier-2 systems statements which no longer true at leastdanfe2015-09-203-9/+0
* - Update to 0.7.2 (bugfix release) [1]johans2015-09-202-4/+4
* Mention ports with libzip copyjbeich2015-09-201-0/+17
* Fix typojbeich2015-09-201-2/+3
* Next avidemux2 may have CVE-2015-3395 fix, adjustjbeich2015-09-201-2/+2
* Document recent ffmpeg vulnerabilitiesjbeich2015-09-201-0/+186
* - Update to 4.0wen2015-09-202-4/+4
* Update to 2.6.1 release.ale2015-09-192-3/+3
* Update dcraw entry in VUXMLcs2015-09-191-3/+2
* - Update to 1.71sunpoet2015-09-193-5/+5
* Document Moodle multiple security vulnerabilitiesjunovitch2015-09-181-0/+38
* Document squid TLS/SSL parser denial of service vulnerabilityjunovitch2015-09-181-0/+41
* Document remind buffer overflow with malicious reminder file inputjunovitch2015-09-181-0/+30
* - Update to 2.0.0sunpoet2015-09-182-3/+3
* - Add NO_ARCHsunpoet2015-09-182-1/+2
* Alter <topic> of some of my recent entries to be more consistently wordedfeld2015-09-181-3/+3
* Normalize "use after free" as "use-after-free" in <topic>feld2015-09-181-8/+8
* Document deskutils/shutter vulnerabilityfeld2015-09-181-0/+31
* Document graphics/openjpeg vulnerabilityfeld2015-09-171-0/+27
* Document vulnerability in older graphics/optipngfeld2015-09-171-0/+26
* Document net/openslp vulnerabilityfeld2015-09-171-0/+29
* Update MASTER_SITEScs2015-09-171-1/+1
* Document archivers/p7zip vulnerabilityfeld2015-09-171-0/+31
* Remove ansi version fo wxGTK 2.8 and only keep the unicode versionbapt2015-09-171-0/+1
* - Switch to autoplist, fixing .egg-info handlingamdmi32015-09-173-30/+15
* Document www/h2o vulnerabilityfeld2015-09-171-0/+34
* It seems some people keep adding $FreeBSD$ to patch files.mat2015-09-163-5/+0
* krb5-111 is EOLed and retired.cy2015-09-161-5/+1
* Expiry date has passed, retire security/krb5-111.cy2015-09-1613-543/+0
* Fix build with LibreSSLcs2015-09-164-23/+73
* Fix spelling of zh_CN for wordpress vulnerabilities.delphij2015-09-161-7/+10
* security/libressl: Fix AESNI supportbrnrd2015-09-161-1/+7
* Document wordpress multiple vulnerabilities.delphij2015-09-161-0/+50
* Update to 4.7.novel2015-09-163-4/+4
* - Drop ARCH condition for removing -m32 flag: on i386 it's no-op anywayamdmi32015-09-151-10/+2
* Upgrade to version 1.1.3.olgeni2015-09-152-3/+3
* Make it so that the default Perl is always called perl5.mat2015-09-1418-33/+33
* - document bugzilla CVE-2015-4499ohauer2015-09-141-0/+37
* - Upgrade to 2.1.8 (minor bugfixes).kuriyama2015-09-142-5/+5
* Remove INSTALL_TARGETgblach2015-09-141-1/+0
* - Update to 2.4gblach2015-09-142-10/+11
* net/openldap24-server Fix affected package namefeld2015-09-141-1/+2
* Enforce unicode version of wxGTKbapt2015-09-141-0/+1
* - Update to 3.5wen2015-09-123-9/+13
* Document net/openldap24-server vulnerabilityfeld2015-09-121-0/+28
* - No need to install .conf when it's handled by @sampleamdmi32015-09-122-7/+4
* - Pass maintainership to submitterwen2015-09-111-1/+1
* - Upgrade to 2.0.29 (minor bugfixes).kuriyama2015-09-112-5/+5
* Update rekall to 1.4.1antoine2015-09-1110-37/+109
* Update to 0.17antoine2015-09-112-3/+3
* security/govpn: create portswills2015-09-114-0/+39
* - Add empty directories to plistamdmi32015-09-102-10/+17
* Expand a35f415d-572a-11e5-b0a4-f8b156b6dcc8:naddy2015-09-101-3/+25
* Document oggenc buffer overflow in audio/vorbis-tools.naddy2015-09-101-0/+28
* - Remove BROKEN statement for Tier-2 systems (tested on PowerPC only duedanfe2015-09-101-14/+10
* Document pgbouncer failed auth_query lookups falling back to auth_userjunovitch2015-09-091-0/+31
* Update to 0.6.0cs2015-09-092-3/+3
* Removed p5-Digest-SHA and p5-File-Temp (already exists in perl5-* package)cs2015-09-091-3/+2
* Document the latest phpMyAdmin vulnerability: reCaptcha bypassmatthew2015-09-091-0/+32
* Correct some package names that were mistakenly labeled as php56feld2015-09-091-4/+5
* Add assigned CVEs to previous php vulnerability entryfeld2015-09-091-0/+4
* Document php vulnerabilitiesfeld2015-09-091-0/+80
* Spelling frontent -> frontendfeld2015-09-091-2/+3
* Document sysutils/ganglia-webfrontent vulnerabilityfeld2015-09-091-0/+26
* Add net/wireshark-qt5 as affectedfeld2015-09-091-0/+2
* Document net/wireshark vulnerabilitiesfeld2015-09-091-0/+57
* Document sysutils/screen vulnerabilityfeld2015-09-091-0/+27
* Document net/libvncserver vulnerabilityfeld2015-09-091-0/+26
* New Port: security/erlang-p1tls - TLS / SSL native driver for Erlangfarrokhi2015-09-096-0/+57
* - Fix PYDISTUTILS_EGGINFOamdmi32015-09-081-1/+3
* - Remove no longer valid "BROKEN on powerpc" statement, port builds finedanfe2015-09-081-19/+9
* - Update to devel/courier-unicode to 1.4madpilot2015-09-081-1/+1
* Update to 0.21, and remove p5-Rinci dependency.adamw2015-09-082-5/+4
* Unbreak on 11, again.mat2015-09-071-1/+1
* - add support for tincd_flags= in rc.confdinoex2015-09-051-1/+1
* - new OPTION MAN3dinoex2015-09-052-9/+9
* Update to 4.6.novel2015-09-053-5/+5
* Document a number of integer overflows in gdk-pixbuf2.kwm2015-09-051-0/+25
* Convert most ports using cloud.github.com to GHC.mat2015-09-051-1/+4
* Minimum range adjustment for bind vulnerabilityfeld2015-09-031-1/+1
* Correct version range mistakes in bind vulnerabilitiesfeld2015-09-031-3/+3
* Document bind vulnerabilitiesfeld2015-09-031-0/+81
* - Switch to options helpersamdmi32015-09-0313-68/+28
* - Switch to options helpersamdmi32015-09-032-11/+7
* - Switch to options helpersamdmi32015-09-032-14/+11
* - Fix identationamdmi32015-09-031-10/+7
* Document new vulnerabilities in www/chromium < 45.0.2454.85rene2015-09-031-0/+70
* - Allow concurrent installation (USE_PYTHON=concurrent)sunpoet2015-09-031-1/+1
* Document dns/powerdns vulnerabilityfeld2015-09-031-0/+29
* Update to 1.20.novel2015-09-033-5/+4
* - Switch to USES=libedit as suggested by stage-qaamdmi32015-09-021-2/+2
* - Update to 5.23zi2015-09-022-4/+4
* Fix LICENSE_FILE path.rakuco2015-09-021-1/+1
* Revise Ghostscript entry date to match date of commit.junovitch2015-09-021-1/+2
* Document denial of service (crash) via crafted Postscript files for Ghostscriptjunovitch2015-09-021-0/+59
* New port: security/softetherpi2015-09-0219-0/+439
* Document recent ffmpeg/libav vulnerabilitiesjbeich2015-09-011-0/+176
* Remove configuration argument used during testing.cy2015-08-311-1/+0
* security/libressl: Update to 2.2.3brnrd2015-08-312-3/+4
* Fix build under 11-CURRENT. r378417 introduced a libreadline linkcy2015-08-312-14/+3
* - Update to 1.010sunpoet2015-08-302-5/+3
* Document graphics/graphviz vulnerabilityfeld2015-08-291-0/+26
* - Switch to @sampleamdmi32015-08-291-3/+1
* - Don't try to install empty examples directoriesamdmi32015-08-292-5/+3
* - Switch to USES=libedit as suggested by stage-qaamdmi32015-08-291-2/+3
* - Fix shebangsamdmi32015-08-281-0/+11
* Document recent mozilla vulnerabilitiesjbeich2015-08-281-0/+43
* graphics/libpgf was assigned a CVEfeld2015-08-261-0/+2
* - ensure demon starts after ldconfigdinoex2015-08-262-1/+2
* Fix security/obfsclient build with clang 3.7.0.delphij2015-08-262-1/+21
* Document multiple security advisories for go and go14junovitch2015-08-261-0/+39
* Claim ownership of security/scrypt. It's my code anyway...cperciva2015-08-261-13/+1
* - Pass maintainership to perl@sunpoet2015-08-252-2/+2
* - Fix LICENSEsunpoet2015-08-252-5/+6
* - Add LICENSEsunpoet2015-08-251-3/+6
* - Fix LICENSEsunpoet2015-08-251-5/+6
* - Strip libraryamdmi32015-08-251-2/+6
* - Strip libraryamdmi32015-08-251-1/+4
* - Strip libraryamdmi32015-08-251-1/+4
* - Add NO_ARCHamdmi32015-08-251-0/+1
* - Fix build when CC contains slashesamdmi32015-08-251-1/+1
* - Add LICENSEamdmi32015-08-251-2/+4
* Fix MFSA quote link and add libtremor commitsjbeich2015-08-251-1/+7
* Document libtremor vulnerabilities in the ancient version we providejbeich2015-08-251-0/+64
* Fix patch from r395182 on head. The patch(1) command works fine on 8.4bdrewery2015-08-251-1/+1
* - Update to 1.2.0 [1]wen2015-08-253-6/+6
* - Drop maintainershipbrix2015-08-254-4/+4
* Apply upstream fix for 'HostkeyAlgorithms +' support.bdrewery2015-08-252-1/+54
* Document devel/pcre vulnerabilityfeld2015-08-251-0/+37
* - update to 1.4eleeym2015-08-233-21/+16
* - Add LICENSEamdmi32015-08-221-0/+3
* Document drupal multiple vulnerabilities.delphij2015-08-221-0/+69
* Remove excess spacebdrewery2015-08-221-1/+1
* Document OpenSSH 7.0 PAM fixes.bdrewery2015-08-221-0/+32
* Document OpenSSH 7.0 PermitRootLogin issuebdrewery2015-08-221-0/+29
* Update to 7.1p1bdrewery2015-08-222-3/+4
* Update to 20150821 snapshotbdrewery2015-08-222-3/+3
* - Add NO_ARCHamdmi32015-08-221-0/+1
* - Add NO_ARCHamdmi32015-08-211-0/+1
* Document sysutils/tarsnap security announcementfeld2015-08-211-0/+36
* Build the pinentry-gnome3 port with libsecret support. GNOME 3.18 expects it.kwm2015-08-212-1/+2
* Fix build on FreeBSD 11.mat2015-08-211-0/+3
* - Update The Glorious Glasgow Haskell Compiler to version 7.10.2pgj2015-08-2174-153/+214
* Document vlc arbitrary pointer dereference.delphij2015-08-211-0/+35
* graphics/jasper new CVE added to entryfeld2015-08-201-1/+10
* Document vulnerability in graphics/libpgffeld2015-08-201-0/+28
* security/{,ca_root_}nss: update to 3.20jbeich2015-08-204-7/+7
* Look up a reference to a commit in 2005 that had been previously lost.peter2015-08-201-1/+1
* Update some legacy items that don't work or are using runtime remapping:peter2015-08-201-10/+9
* Extend recent QEMU related xen-tools CVEs to include the qemu-* portsjunovitch2015-08-201-3/+42
* Document CVE-2015-4491 in gdk-pixbuf2.kwm2015-08-191-0/+27
* Reset maintainererwin2015-08-191-1/+1
* Reset maintainererwin2015-08-191-1/+1
* Reset maintainererwin2015-08-191-1/+1
* Reset maintainererwin2015-08-191-1/+1
* Reset maintainer.erwin2015-08-191-1/+1
* irc/unreal fix <name> to be capitalizedfeld2015-08-191-1/+1
* - Fix shebangsamdmi32015-08-191-0/+3
* Document django vulnerabilitiesfeld2015-08-191-0/+73
* Document irc/unreal denial of servicefeld2015-08-191-0/+29
* Document graphics/jasper vulnerabilityfeld2015-08-191-0/+30
* Document freexl multiple vulnerabilities. One is still awaiting CVE assignment.feld2015-08-191-0/+66
* rt was assigned a CVEfeld2015-08-191-0/+2
* ansible was assigned a CVEfeld2015-08-191-0/+2
* gnutls was assigned a CVEfeld2015-08-191-0/+2
* - Update to OpenSSH 7.0p1bdrewery2015-08-185-115/+56
* Update to snapshot 20150817bdrewery2015-08-183-31/+33
* security/keepass: update 2.29 -> 2.30junovitch2015-08-182-3/+3
* Document mod_jk vulnerabilityfeld2015-08-181-0/+32
* Remove UNIQUENAME and LATEST_LINK.mat2015-08-1710-14/+0
* Document two QEMU related xen-tools security advisoriesjunovitch2015-08-171-0/+65
* Document PHP security issues impacting the lang/php5* ports (Core/SPL)junovitch2015-08-171-0/+77
* - Fix shebangsamdmi32015-08-171-0/+4
* Update to 2.13.nobutaka2015-08-173-4/+4
* Add more signature (locally verified).kuriyama2015-08-171-2/+2
* - Upgrade to 2.3gblach2015-08-172-4/+4
* - Update to 1.9.0amdmi32015-08-162-10/+8
* - Add NO_ARCHsunpoet2015-08-162-1/+2
* - Add NO_ARCHsunpoet2015-08-162-1/+2
* - Add NO_ARCHsunpoet2015-08-162-1/+2
* - Remove qt4-linguist dependency; add qt4-network instead.vg2015-08-161-3/+4
* Update to 1.86b.delphij2015-08-152-3/+3
* security/afl: cannonicalize MAINTAINERpgollucci2015-08-151-1/+1
* Update MASTER_SITES to fix fetching problem due to abnormal version numberfeld2015-08-151-1/+1
* Document MediaWiki multiple security vulnerabilitiesjunovitch2015-08-151-0/+45
* - Update to 3.3.17.1feld2015-08-153-4/+4
* Sync libvpx check for CVE-2015-448[56] with r394231jbeich2015-08-151-2/+2
* Document freeradius3 vulnerabilityfeld2015-08-151-0/+28
* Document gnutls vulnerabilitiesfeld2015-08-151-0/+65
* security/nss: update legacy ckbi suffix to the one used in 3.19.1jbeich2015-08-141-1/+1
* security/{,ca_root_}nss: update to 3.19.3jbeich2015-08-144-7/+7
* Update to 2.8.1garga2015-08-142-4/+3
* Update to 1.4.24arved2015-08-142-3/+3
* - Remove RG linksunpoet2015-08-142-2/+0
* - Update to 1.4.1sunpoet2015-08-143-15/+4
* - Update to 1.0.0sunpoet2015-08-142-3/+3
* - Add PORTSCOUTsunpoet2015-08-141-0/+2
* - Update to 1.1.0sunpoet2015-08-143-23/+10
* - Remove MASTER_SITE_SUBDIRsunpoet2015-08-141-1/+0
* - Switch to USES=autoreconfamdmi32015-08-131-3/+2
* Document Froxlor database password information disclosure vulnerabilityjunovitch2015-08-131-0/+40
* Document two XSS vulnerabilities in rt40, rt42.matthew2015-08-131-0/+40
* Document py-foolscap vulnerabilityfeld2015-08-131-0/+32
* Make libvpx-1.3.0 vulnerable by moving MFSA 2014-77 into separate entryjbeich2015-08-121-4/+65
* Document newest flash vulnabilities.kwm2015-08-121-0/+92
* - Upgrade to 2.1.7 (minor fixes).kuriyama2015-08-125-53/+10
* Update to version 1.17.1pawel2015-08-122-4/+4
* Oops, mark bundled libvpx v1.4.0 in firefox as vulnerable againjbeich2015-08-121-0/+9
* Move libvpx vulnerability into its own entryjbeich2015-08-121-5/+33
* Document recent mozilla vulnerabilitiesjbeich2015-08-121-0/+110
* - Switch to USES=autoreconfamdmi32015-08-121-2/+1
* - Switch to USES=autoreconfamdmi32015-08-121-2/+1
* - Add NO_ARCHamdmi32015-08-121-0/+1