aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Commit the patch that was forgotten when myume2012-12-112-1/+14
* Update PCRE to 8.32mm2012-12-1113-13/+19
* Update cyrus-sasl2 to 2.1.26.ume2012-12-1013-148/+29
* Decommissioning java 1.5 (EOLed since October 2009):bapt2012-12-105-20/+8
* Update to 1.4.21arved2012-12-102-3/+3
* - Fix build with clangbeech2012-12-103-41/+28
* - Convert Makefile headers to new styleak2012-12-102-8/+8
* Revert Chris Petrik's ports to the pool. Thank you for all your work so far,...eadler2012-12-103-3/+3
* Upgrade to 4.43tj2012-12-093-3/+5
* - Update MASTER_SITESbeech2012-12-082-11/+19
* - Reset MAINTAINER on ports with addresses that have unrecoverable bounces.zi2012-12-071-1/+1
* Add missing patch.kevlo2012-12-061-0/+14
* - Fix recent vulnerability entry for www/tomcat[67]zi2012-12-061-1/+1
* - Update mirror site for HPN patchbdrewery2012-12-061-1/+1
* - Document recent vulnerabilities in www/tomcat6 and www/tomcat7zi2012-12-061-0/+43
* - update to 1.10, trim historical headerjgh2012-12-063-24/+21
* Update to 0.13.0 release.ale2012-12-055-36/+78
* Update to the latest patch level from ISC:erwin2012-12-051-0/+42
* - Update to 2.33sunpoet2012-12-052-8/+4
* - Reset MAINTAINER due to unrecoverable bouncezi2012-12-051-1/+1
* - Update to 2.9.4zi2012-12-053-5/+8
* - Update to 1.80jadawin2012-12-042-3/+3
* - update to 1.3.4rm2012-12-042-10/+6
* Add URL for recent bogofilter heap vuln', CVE-2012-5468, aka. vuln vid=mandree2012-12-041-0/+1
* - revert PORTDOCS change from r308105 - it made this port not DOCS-saferm2012-12-042-8/+1
* Update bogofilter to new upstream release 1.2.3.mandree2012-12-041-0/+25
* - set explicit value for StartupNotify in DESKTOP_ENTRIESrm2012-12-031-1/+1
* Update to 2.1.kevlo2012-12-033-9/+43
* - Update to 1.4.3sbz2012-12-032-4/+3
* - pass maintainership to submitterrm2012-12-024-16/+26
* - update to 1.11rm2012-12-026-48/+90
* - fix wording of "RUN_DEPENDS"rm2012-12-023-4/+4
* - correct displaying of pkg-messagerm2012-12-023-10/+8
* - Update to version 6.01sperber2012-12-013-156/+138
* - Update to version 3.3sperber2012-12-014-52/+97
* Fix compilation with clang on headbapt2012-11-301-13/+2
* Document vulnerabilities in www/chromium < 23.0.1271.95rene2012-11-301-0/+30
* The Volatility Framework is a completely open collection of tools, implementedsbz2012-11-305-0/+695
* www/yahoo-uiohauer2012-11-301-2/+2
* Supplemental plugins for Harlan Carvey's RegRipper.pawel2012-11-305-0/+276
* RegRipper is an open source tool, written in Perl, for extracting/parsingpawel2012-11-304-0/+41
* - Update to 0.46culot2012-11-302-10/+5
* Fix date in yahoo-ui entry.wxs2012-11-281-1/+2
* 2012-11-28 editors/glimmer: Depends on the expired gtkglarea through py-gtkbapt2012-11-2818-680/+0
* Update to 2.0.3.rakuco2012-11-2820-555/+68
* - document www/yahoo-ui security issue and mark port forbidden [1]ohauer2012-11-281-1/+38
* Describe new vulnerabilities in www/chromium < 23.0.1271.91rene2012-11-271-0/+42
* - Update to 0.6.0tota2012-11-273-10/+5
* - Update to 1.2.3jase2012-11-275-33/+38
* Update to 5.74.tobez2012-11-262-3/+3
* Update to 1.5.3 release.ale2012-11-262-10/+5
* - Update backports patch to 20121114flo2012-11-251-7/+2
* Add entries for the following advisories:wxs2012-11-251-0/+91
* - Update to 0.8.7.1swills2012-11-244-16/+37
* - Remove hardcoded dependency on security/gpg. Instead, add OPTIONS to allowjase2012-11-231-2/+18
* - opera -- execution of arbitrary codedinoex2012-11-231-0/+34
* update to 0.2.4.6-alphabf2012-11-222-8/+11
* Update to 3.0.8, unbreak with utmpx.lx2012-11-223-4/+19
* Document new vulnerability in www/lighttpd 1.4.31mm2012-11-211-0/+32
* - Update firefox and thunderbird to 17.0flo2012-11-211-0/+119
* update to 0.2.3.25bf2012-11-204-39/+73
* Update to 20121120garga2012-11-202-3/+3
* - Update to 0.14culot2012-11-192-8/+7
* - Update to 2.31culot2012-11-192-8/+4
* - Update to 0.22culot2012-11-192-9/+4
* horde4 update:mm2012-11-194-6/+6
* - Fix copy and paste error in latest weechat entryjase2012-11-181-1/+2
* - Document new vulnerability in irc/weechat and irc/weechat-develjase2012-11-181-0/+33
* - Update to 1.3.4zi2012-11-182-3/+3
* - Update to 1.77jadawin2012-11-162-8/+4
* * Fix build against libcli 0.9.6tj2012-11-162-1/+27
* Add CONFLICTS.mandree2012-11-161-0/+2
* - Update to 1.9.0sbz2012-11-163-4/+7
* - bugzilla security updates to version(s)ohauer2012-11-151-0/+57
* - Update to version 2.1.5pawel2012-11-143-50/+67
* - Update recent weechat entry (e02c572f-2af0-11e2-bb44-003067b2972c)jase2012-11-141-1/+4
* Document vulnerabilities in two typo3 components.rene2012-11-131-0/+38
* Update pkg-descr to current project statepawel2012-11-131-10/+9
* Mark IGNORE on ${OSVERSION} >= 1000024 where the script got added to the baseehaupt2012-11-121-6/+8
* Fix typo.madpilot2012-11-121-1/+1
* - Update to 2.7.1madpilot2012-11-121-0/+27
* - Update MASTER_SITES and WWW: linepawel2012-11-114-29/+37
* - Add LICENSEpawel2012-11-113-25/+26
* - Add LICENSEpawel2012-11-116-94/+15
* - Add LICENSEpawel2012-11-112-13/+11
* - Improve latest ruby entry slightlyswills2012-11-101-2/+2
* - Modify recent e02c572f-2af0-11e2-bb44-003067b2972c entryjase2012-11-101-5/+8
* Apply an upstream patch that fixes a security holeeadler2012-11-101-0/+30
* - Update lang/ruby19 to 1.9.3p327swills2012-11-101-0/+35
* - clarification that ASF reported issue for:jgh2012-11-101-2/+4
* - document tomcat vulnerabilitiesjgh2012-11-101-0/+76
* - Update to 0.4.3bdrewery2012-11-103-7/+10
* Update latest version and document security issueseadler2012-11-091-0/+32
* - fix MASTER_SITESgahr2012-11-081-1/+1
* - Update to 1.2.0jhale2012-11-083-10/+6
* - fix mtree by avoiding to install a .in CMake configure filegahr2012-11-081-0/+4
* Document new vulnerabilities in www/chromium < 23.0.1271.64rene2012-11-071-0/+66
* Update to 4.42.tj2012-11-072-4/+3
* Document opera vulnerabilitiescrees2012-11-071-0/+42
* pev is a multiplatform PE analysis toolkit thatlippe2012-11-078-0/+114
* Pass maintainership to Jr Aquino <tanawts@gmail.com>.rakuco2012-11-061-6/+2
* Unbreak package build by registering PORTDOCS if we're installing docs.adamw2012-11-061-2/+1
* Force NLS support with a very broken autotools configure. This fixesadamw2012-11-061-0/+2
* - Update to 0.3sbz2012-11-062-3/+3
* Fix minor typoeadler2012-11-061-1/+2
* Update latest version and document security issueseadler2012-11-061-0/+60
* - Update to 0.5 [1]bdrewery2012-11-062-8/+4
* - Update WWWsbz2012-11-051-1/+1
* - Update to 1.5sbz2012-11-054-116/+145
* Update to 2.0.1 release.ale2012-11-053-5/+15
* - Change my email address to gblach@FreeBSD.orggblach2012-11-041-6/+2
* - Update to 0.9.2tota2012-11-043-10/+5
* Fix plist.cy2012-11-042-0/+3
* Update krb5-appl 1.0.2 --> 1.0.3cy2012-11-042-7/+3
* Update krb5 1.9.2 --> 1.10.3cy2012-11-045-207/+24
* Restore 'Created by' header information. This has been removed during theehaupt2012-11-041-0/+1
* - Update to 1.72ehaupt2012-11-042-9/+4
* - Update to 0.69ehaupt2012-11-042-8/+4
* - update to svn revision 243ohauer2012-11-032-27/+137
* Correct plural of "vulnerability"crees2012-11-031-2/+2
* - Update to 1.49ehaupt2012-11-032-8/+4
* - Update to 1.3.3zi2012-11-032-3/+3
* - update apache22 to version 2.22.23ohauer2012-11-032-5/+47
* Add entry for webmin < 1.600_1 (potential XSS attack).olgeni2012-11-031-0/+26
* Add cfv to category Makefilecrees2012-11-031-0/+1
* - Update MASTER_SITES and WWW: linepawel2012-11-036-120/+36
* Resurrect security/cfv and remove optional dependency oncrees2012-11-026-0/+73
* Remove because it depends on security/py-fchksum which is not in the ports tr...ak2012-11-027-76/+0
* Remove expired port:ak2012-11-024-40/+0
* - Document ruby vulnerabilities:bdrewery2012-11-021-0/+81
* Update to 3.8.15flo2012-11-011-0/+59
* - Update to 1.2.4lwhsu2012-11-012-8/+4
* - Update to 1.8.0lwhsu2012-11-012-8/+4
* Update pam_krb5 from 4.4 to 4.6.cy2012-11-012-4/+3
* - update to 0.06tobez2012-10-312-11/+3
* remove a problematic mirror; attempt to fix build on ia64 [1]bf2012-10-311-2/+2
* - update to 7.16 [1]rm2012-10-311-0/+40
* update to 0.2.3.24-rc [1]; remove a problematic mirror;bf2012-10-302-5/+4
* - Take maintainershipbdrewery2012-10-291-1/+1
* - Convert options to the new formatpgj2012-10-291-9/+10
* - Update www/firefox{,-i18n} to 16.0.2flo2012-10-296-9/+66
* RC fixes;crees2012-10-285-72/+57
* - Update MASTER_SITES and WWW: linebapt2012-10-274-39/+45
* - Update MASTER_SITES and WWW: linebapt2012-10-272-15/+7
* - Update to 1.6 [1]culot2012-10-273-8/+8
* Deprecate a bunch of ports that are either abandonware and/or for which no morebapt2012-10-261-5/+4
* - Update MASTER_SITESjhale2012-10-264-21/+15
* mail/exim: upgrade to 4.80.1rea2012-10-261-0/+39
* Mark as BROKEN: incomplete plistbeat2012-10-261-0/+2
* - add CVE reference (still in reserved state) for recent django vulnerabiltyrm2012-10-261-0/+1
* 2012-10-20 security/sscep: No more public distfilesbapt2012-10-2621-560/+0
* Update to 4.3.nobutaka2012-10-252-3/+3
* - update django ports to 1.3.4 and 1.4.2, that fixing couple of security issues.rm2012-10-251-0/+63
* . remove directories installed by other porst from pkg-plist; [1]bsam2012-10-242-9/+2
* Adjust for usage of new MASTER_SITE_SAMBAtimur2012-10-221-1/+1
* Document multiple wireshark vulnerabilities.wxs2012-10-221-0/+50
* Update to 4.4.0.rakuco2012-10-212-4/+4
* Make works with perl5.16sumikawa2012-10-212-1/+19
* - Add upstream patch to fix CPU consumption and termination bugjhale2012-10-202-6/+14
* - Update MASTER_SITESjhale2012-10-201-11/+7
* - drop maintainershipdinoex2012-10-191-1/+1
* - drop maintainershipdinoex2012-10-191-1/+1
* - clarify end-user impact for 57652765-18aa-11e2-8382-00a0d181e71djgh2012-10-181-11/+4
* - document xlockmore issue, 57652765-18aa-11e2-8382-00a0d181e71d, CVE-2012-4524jgh2012-10-181-0/+37
* - Converted a remaining conditional to OptionsNGglarkin2012-10-181-1/+1
* - Updated to 1.3.15glarkin2012-10-183-31/+29
* - Update to 2.3.15sem2012-10-182-4/+5
* - xinetd vulnerabilitysem2012-10-181-0/+33
* sha3 wrapper (keccak) for Python. The package is a wrapper around therm2012-10-175-0/+57
* - Updated ZF advisory to include similar XEE vulnerabilityglarkin2012-10-161-4/+12
* - Document Zend Framework XXE injection vulnerabilityglarkin2012-10-161-0/+35
* - Add missing dependency on perlkevlo2012-10-161-9/+4
* Update the distinfo as upstream has changed.eadler2012-10-161-2/+2
* - Make as BROKEN: missing prerequisitesbeat2012-10-161-0/+2
* Add the CVE for the gitolite vuln.eadler2012-10-161-0/+1
* - Actually commit the VuXML entryswills2012-10-161-0/+33
* disable SQLite support for the time being (no child port exists)oliver2012-10-151-1/+2
* Document the latest security vulnerabilities for phpMyAdmin.matthew2012-10-151-0/+36
* - Add in additional package names for recent bind vulnerabilityzi2012-10-141-0/+16
* update to 0.65.0oliver2012-10-144-31/+44
* - Update to 0.4.4tota2012-10-142-7/+4
* - Fix mistakenly expanded variable substitutiongabor2012-10-141-1/+1
* - Let amavisd_ram respect tmpfs [1]gabor2012-10-143-11/+4
* Convert to OptionsNGeadler2012-10-141-35/+32
* - cleanup commentsdinoex2012-10-135-25/+0
* Update to 1.4.20arved2012-10-132-3/+6
* - As pulledpork/barnyard are required for most installations, depend on these...zi2012-10-131-2/+13
* - Update to 1.10jhale2012-10-127-242/+76
* - Update to 20120831 snapshot [1]bdrewery2012-10-122-9/+4
* - Update to latest snapshot [1]bdrewery2012-10-124-15/+10
* - Properly install symlinks for auth-pam and down-root plugins [1]bdrewery2012-10-123-9/+6
* - update to 16.0.1flo2012-10-121-9/+18
* Update to 2.0.0 release:ale2012-10-113-8/+94
* If OPIE option is on we can not pass --with-pam in CONFIGURE_ARGS. Make itwxs2012-10-112-16/+8
* Document a new vulnerability in www/chromium < 22.0.1229.94rene2012-10-111-0/+27
* - Update firefox-esr, thunderbird-esr, linux-firefox and linux-thunderbird to...flo2012-10-115-5/+124
* - Remove SITE_PERL from *_DEPENDS (final part)az2012-10-111-4/+2
* - Update to 2.0.3jhale2012-10-102-14/+7
* - Take maintainershipjhale2012-10-101-2/+1
* Upgrade to the latest BIND patch level:erwin2012-10-101-0/+38
* - Update to 1.3.2zi2012-10-104-6/+58
* - Add additional MASTER_SITES for pkcs header files.zi2012-10-101-1/+2
* - Update to 4.54zi2012-10-102-3/+3
* Force numerous ports that fail to build with clang over to instead alwayslinimon2012-10-101-0/+1
* - Fix Makefile headersbz2012-10-091-1/+1
* - Update MASTER_SITESsbz2012-10-091-9/+5
* Add a few casts to initializer of int array when the constant is greaterdelphij2012-10-092-5/+21
* Document new vulnerabilities in www/chromium < 22.0.1229.92rene2012-10-091-0/+40
* Throw my ports back in the pool, and make my intentions clear for thedougb2012-10-084-9/+6
* - Fix logic problemsbz2012-10-081-1/+1
* - Convert to new option frameworksbz2012-10-082-33/+19
* - Fix typojhale2012-10-081-1/+1
* - Update to 0.4.5 [1]jhale2012-10-083-11/+23
* Restore option descriptions to what the maintainer actually put in the PRdougb2012-10-081-0/+5
* silence reinplace command from last commitdougb2012-10-081-1/+1
* - Convert to new options frameworksbz2012-10-071-13/+11
* Work around a problem on stable/[89] with libotr generating andougb2012-10-072-4/+9
* use libtommath as default math library as it used to be before conversion tobapt2012-10-071-0/+1
* Convert to OptionsNGeadler2012-10-071-17/+12
* Trim the headers in the ports I maintain.eadler2012-10-061-5/+0
* Change headers of all ports maintained by me to new formatgarga2012-10-057-35/+6
* - Updated to 1.3.0glarkin2012-10-052-6/+6
* - Make GMP OPTION'aljgh2012-10-054-13/+68
* Convert to new options frameworkbapt2012-10-048-91/+52
* - fix runtime when devel/subversion and/or devel/pysvn is installed [1]rm2012-10-042-9/+19
* - correct the range in last entry (le/lt typo)rm2012-10-031-1/+1
* - update to 2.8.10rm2012-10-031-0/+36
* - Update to 1.8.0sbz2012-10-034-16/+11
* - Update to 20121001 snapshotjlaffaye2012-10-033-12/+81
* - set maintainer to ruby@jgh2012-10-031-5/+1
* - Fix typos (LICENSE is correct form inside bsd.licenses.mk).az2012-10-031-1/+1
* - Fix header to proper formatbdrewery2012-10-012-2/+2
* - pass maintainership to new volonteerrm2012-09-302-12/+4
* - Reassign to the heap due to mail bouncestabthorpe2012-09-301-6/+2
* - Update to 201237 snapshot [1]bdrewery2012-09-294-31/+43
* - Update to 2.3-beta1 [1]bdrewery2012-09-296-132/+68
* Fix type in headedbapt2012-09-281-1/+1
* Mark nvidia-driver-173.14.35_1 as not vulnerable.danfe2012-09-281-1/+1
* Fix the temporary workaround by passing the appropriate flag inwxs2012-09-271-9/+3
* Fix build on i386 by disabling hardening measures. This is a temporarywxs2012-09-271-2/+10
* Document vulnerabilities in www/chromium < 22.0.1229.79rene2012-09-271-0/+96
* - Chase www/smarty -> www/smarty2 renameglarkin2012-09-271-2/+2
* - Document remote code execution in ePerl (all versions)glarkin2012-09-261-0/+36
* - Update to 5.72culot2012-09-262-8/+7
* Enable the Berkley DB backend by default.zeising2012-09-261-2/+2
* - Update to 2.15culot2012-09-262-8/+7
* - Update MASTER_SITES and WWW linkculot2012-09-262-8/+8
* Convert to OptionsNGbapt2012-09-261-14/+11
* Update to 1.8.6p3wxs2012-09-263-3/+8
* - Documented PNG file DoS vulnerability in ImageMagick and GraphicsMagickglarkin2012-09-261-0/+49