aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Adjust "Created by" tag to include more complete submitter's informationdanfe2012-09-231-3/+3
* - Fix spelling in docs: normally I'd submit this change upstream, butmatthew2012-09-235-16/+33
* Update vuxml to indicate which versions are vulnerable.eadler2012-09-231-1/+3
* Deprecate a bunch a ports with no more public distfiles (thanks ehaupt's dist...bapt2012-09-219-0/+27
* Add a sourceforge mirrorbapt2012-09-211-6/+3
* - Update php52 backports patch to 20120911bdrewery2012-09-201-2/+86
* - CVE-2012-2688 was addressed by php52-5.2.17_10bdrewery2012-09-201-1/+2
* Update to 0.12.6 release.ale2012-09-192-8/+3
* Upgrade to the latest BIND patch level:dougb2012-09-191-0/+47
* - Add missing dependency on bisonkevlo2012-09-181-2/+3
* Update to 20120917garga2012-09-182-3/+3
* Update to 0.97.6garga2012-09-182-4/+3
* Document Jenkins Security Advisory 2012-09-17lwhsu2012-09-181-0/+41
* Point shebang in a perl script to ${PERL} in order to solve a build problem ifehaupt2012-09-161-0/+1
* include newly 'awarded' CVEeadler2012-09-161-0/+1
* Add vuxml for older versions of multimedia/vlc .nox2012-09-161-0/+30
* Tell the world about the recent bacula vulneadler2012-09-151-0/+31
* - chase textproc/nltk update (upstream switched to setuptools)rm2012-09-141-1/+2
* - Update to 2.16jadawin2012-09-132-3/+3
* - Update MAINTAINER to my new FreeBSD.org addressjhale2012-09-132-2/+2
* update security/tor to 0.2.2.39 and security/tor-devel to 0.2.3.22-rcbf2012-09-134-6/+6
* - Update to 0.10.22.6 which fixes two security issuesswills2012-09-131-0/+50
* update lang/sbcl to 1.0.58 and switch to the new options format;bf2012-09-131-1/+1
* Update to 2.0; with some help from rm@kevlo2012-09-123-201/+250
* Update NVIDIA arbitrary memory access vulnerability with CVE-2012-4225.danfe2012-09-121-2/+16
* Update Plone to 4.2.1.rm2012-09-127-23/+14
* - Update entry for net/freeradius2 to reflect local patch to address cve-2012...zi2012-09-111-1/+2
* VuXML: document remote code execution in freeRADIUSrea2012-09-111-0/+47
* www/moinmoin: fix CVE-2012-4404, wrong processing of group ACLsrea2012-09-111-1/+2
* - Move libxul 1.9.2 to www/libxul19beat2012-09-111-2/+2
* Update to 0.14.novel2012-09-112-3/+3
* - Add Emacs 24 to IGNORE listebeat2012-09-101-2/+2
* - Use OPTIONSngehaupt2012-09-101-15/+13
* update to 0.2.3.21-rcbf2012-09-092-3/+3
* Welcome back Chris Petrik <c.petrik.sosa@gmail.com>eadler2012-09-091-1/+1
* - Update to 0.13swills2012-09-093-5/+4
* - Remove dependency on p5-Devel-Mallinfoswills2012-09-091-1/+3
* - Update to 1.09swills2012-09-082-4/+3
* Update libotr and pidgin-otr to 4.0.0dougb2012-09-086-28/+24
* Hook security/libotr3 up, and move ports that depend on the old versiondougb2012-09-084-15/+10
* Mark as broken on sparc64.linimon2012-09-081-1/+7
* Copy libotr to libotr3 so that ports that still rely on the old,dougb2012-09-084-0/+81
* Add vim specific modeline to help users write correct vuxmleadler2012-09-081-0/+1
* Document the vulnerability that led to emacs 24.2rakuco2012-09-081-0/+40
* - Update firefox to 15.0.1flo2012-09-082-9/+15
* Add a sanity check to ensure vuxml is actually installed prior to performingeadler2012-09-081-0/+5
* - Update to 3.4.2 [1] [2] [3]swills2012-09-081-0/+29
* Mark as broken on powerpc only on -current. This will unblock gnome,linimon2012-09-081-0/+3
* Update to 20120906garga2012-09-072-3/+3
* VuXML: add <modified> tag for Wireshark's entry for CVE-2012-3548rea2012-09-061-0/+1
* - Update to 4.07zi2012-09-062-3/+3
* - Update to 1.3.1zi2012-09-062-4/+3
* - Add in workaround for compatibility with libhtp >= 0.3zi2012-09-062-0/+12
* Change the wireshark version for the DRDA fix.marcus2012-09-061-4/+4
* Remove useless metadata from ports I created.des2012-09-051-5/+0
* Update 0.13.1 --> 0.15.1cy2012-09-052-4/+3
* - Update to 0.23culot2012-09-052-3/+3
* VuXML: document XSS in MoinMoin before 1.9.4 via RST parserrea2012-09-051-0/+32
* VuXML: document wrong group ACL processing in MoinMoinrea2012-09-051-0/+44
* PHP 5.x: document header splitting vulnerabilityrea2012-09-051-0/+43
* Modify fetchmail vuln' URLs to established site.mandree2012-09-051-23/+24
* Chase Emacs updatesashish2012-09-052-2/+2
* security/squidclamav: fix DoS and XSS vulnerabilitiesrea2012-09-044-1/+198
* Mark as broken on powerpc and sparc64 (and, presumably, ia64).linimon2012-09-042-1/+11
* - Add patch to fix getsubopt() parsingjohans2012-09-022-7/+257
* Inform the community about a recent bitcoin DoS vuln.eadler2012-09-021-0/+26
* - update bugzilla bugzilla3 and bugzilla42ohauer2012-09-021-0/+50
* VuXML: document CVE-2012-3534, DoS via large number of connectionsrea2012-09-021-0/+31
* vuxml matches on PKGNAME, not on the port directory.eadler2012-09-021-5/+2
* Add "modified" tag to the Java 7 entryrea2012-09-021-0/+1
* - Update www/mediawiki to 1.19.2wen2012-09-011-0/+67
* VuXML: update Java 7 entry with Oracle-provided detailsrea2012-09-011-2/+3
* Tidy up paragraph formatting (it passed "make validate" before).mandree2012-08-311-10/+8
* VuXML: document CVE-2012-3548, DoS in Wiresharkrea2012-08-311-0/+45
* Document vulnerabilities in www/chromium < 21.0.1180.89rene2012-08-311-0/+47
* - Update net/asterisk to 1.8.15.1flo2012-08-311-1/+37
* Update to 1.11skreuzer2012-08-312-3/+3
* - update firefox and thunderbird to 15.0flo2012-08-308-26/+159
* - Update to 1.5.20jase2012-08-301-0/+34
* VuXML: document CVE-2012-4681, security manager bypass in Java 7.xrea2012-08-301-0/+49
* Add a vuln' entry for fetchmail's CVE-2011-3389 vulnerability.mandree2012-08-301-1/+35
* - Fix duplicated flagssbz2012-08-292-1/+1
* - Update to 0.04swills2012-08-282-3/+3
* Update fetchmail to 6.3.21_1, fixing CVE-2012-3482.mandree2012-08-281-1/+2
* - fix commentdinoex2012-08-271-1/+1
* VuXML entry c906e0a4-efa6-11e1-8fbf-001b77d09812: fix port epochrea2012-08-271-1/+1
* VuXML: document XSS in RoundCube Web-mail applicationrea2012-08-271-0/+29
* - Update to 0.121930swills2012-08-272-3/+3
* news/inn: fix plaintext command injection, CVE-2012-3523rea2012-08-271-1/+1
* update security/tor to 0.2.2.38 and security/tor-devel to 0.2.3.20-rcbf2012-08-264-9/+7
* - Document Calligra input validation failure.avilla2012-08-261-0/+40
* - Document that CVE-2012-3386 only affects automake >= 1.5.0bdrewery2012-08-261-2/+2
* VuXML: document cross-site scripting in SquidClamavrea2012-08-251-0/+32
* VuXML: document DoS in SquidGuardrea2012-08-251-0/+35
* - Properly define deprecated functions to remove warnings in othernovel2012-08-253-4/+21
* VuXML: document INN plaintext command injection vulnerabilityrea2012-08-251-0/+33
* - Reset maintainer due to mail bouncestabthorpe2012-08-241-1/+1
* Update to 1.12.5 release.ale2012-08-232-3/+3
* Upgrade to 4.41.tj2012-08-233-5/+9
* VuXML: document CVE-2012-3525 in jabberd 2.xrea2012-08-231-0/+33
* VuXML: fix whitespace in my previous rssh entryrea2012-08-231-2/+1
* VuXML: document rssh vulnerabilities fixed in version 2.3.3rea2012-08-231-0/+35
* Fix problem introduced in r302141. The directory for the unpacked sourcedougb2012-08-222-2/+6
* rssh: document arbitrary code execution, CVE-2012-3478rea2012-08-221-0/+33
* - Mark BROKEN: does not configurebeat2012-08-221-0/+2
* Update to v1.2.3.hrs2012-08-202-3/+3
* Put libotr entry back. I added the cited URL to the references.wxs2012-08-201-0/+39
* Remove the improperly formatted libotr entry. Someone with more knowledgedougb2012-08-201-38/+0
* - remove www/apache20 and devel/apr0ohauer2012-08-184-5/+6
* 14 August 2012 libotr version 3.2.1 releaseddougb2012-08-183-12/+49
* Document OpenTTD DoS.wxs2012-08-181-0/+27
* Document multiple wireshark vulnerabilities.wxs2012-08-181-0/+87
* The PostgreSQL Global Development Group today released security updates for a...jgh2012-08-181-0/+46
* Update to 1.8.5p3wxs2012-08-182-3/+3
* - dictionary.rfc2869 was missed from installation.az2012-08-172-0/+3
* Document the latest phpMyAdmin vulnerability PMSA-2012-4matthew2012-08-171-0/+37
* Update to 20120815garga2012-08-162-3/+3
* - Update www/typo3 to 4.7.4 [1]bdrewery2012-08-161-0/+50
* - Reassign nork@ ports to the heaptabthorpe2012-08-165-5/+5
* - Drop automatic dependency detection [1]novel2012-08-151-9/+13
* Document CVE-2012-3482 for fetchmail, one DoS and one information disclosuremandree2012-08-151-0/+31
* - Reassign ports to the heap due to a mail bouncetabthorpe2012-08-154-4/+4
* - Update to 0.3.0sbz2012-08-144-32/+37
* - Update security/gpa to 0.9.3 bugfix releasescheidell2012-08-142-9/+13
* Belatedly add an entry for the recent IcedTea-Web updates.jkim2012-08-141-0/+49
* Import Zope 2.13.16 and update this release required dependencies:rm2012-08-142-5/+5
* Revert previous tty patch until matured.kuriyama2012-08-132-37/+1
* - Update to 1.6.1wen2012-08-122-4/+4
* Document libcloud MITM vuln.novel2012-08-121-0/+31
* Fix post r302141: The files in USE_RC_SUBR are already included in SUB_FILESdougb2012-08-111-3/+1
* Document the latest phpmyadmin security problem.matthew2012-08-111-0/+28
* - Document vulnerabilities in www/chromium 20.0.1132.57 and 21.0.1180.60.rene2012-08-101-0/+110
* Document two vulnerabilities in www/chromium < 21.0.1180.75 related to therene2012-08-101-0/+32
* - Update rails and friends to 3.2.8swills2012-08-101-0/+45
* - Update to 2.9.3.1zi2012-08-102-5/+3
* Secunia Advisory SA38292, ISS X-Force sudosh-replay-bo (55903), replay() func...cy2012-08-101-0/+2
* Document old sudosh buffer overflow.wxs2012-08-091-0/+36
* Fix up whitespace in 10f38033-e006-11e1-9304-000000000000.wxs2012-08-071-9/+12
* - Disable live tests (without prompt)sunpoet2012-08-071-1/+5
* - Document FreeBSD-SA-12:05.bindzi2012-08-071-0/+35
* Document CVE-2012-3386 for devel/automakebdrewery2012-08-071-0/+35
* - Update to 0.64sunpoet2012-08-072-5/+4
* - Copy ruby-hmac to rubygem-hmac for use with ports that depend on the gemswills2012-08-064-0/+35
* Fix what looks like a copy-paste-o that originated in the same script:dougb2012-08-062-2/+4
* Move the rc.d scripts of the form *.sh.in to *.indougb2012-08-0665-47/+53
* When installing in the base, USE_RCORDER does the right thing withoutdougb2012-08-061-10/+2
* - Convert to OptionsNG.kuriyama2012-08-054-60/+112
* Add py-passlib 1.6, python password hashing framework supporting over 30miwi2012-08-056-0/+263
* - Update to 1.0.0miwi2012-08-052-3/+3
* - update to 1.0.19dinoex2012-08-042-3/+3
* Remove unecessary OPTIONS_DEFAULT definitions added on r301957garga2012-08-044-4/+0
* Fix typos and make small modifications in COMMENT (according to Porter'scs2012-08-038-8/+8
* Add DOCS, EXAMPLES and NLS to OPTIONS_DEFINE to my portsgarga2012-08-036-11/+27
* - Update to 0.3.5pgj2012-08-032-3/+3
* - Update to 0.10.3.2pgj2012-08-032-3/+3
* - Teach the Haskell Cabal ports to use the new options frameworkpgj2012-08-0319-25/+38
* Belatedly add an entry for the recent Mozilla updatesflo2012-08-031-0/+103
* - Cleanup whitespacezi2012-08-021-16/+19
* Whitespace fixes.wxs2012-08-021-24/+23
* Add modified for django entry.wxs2012-08-021-0/+1
* - Fix typos in COMMENTcs2012-08-0211-11/+11
* Add CVE entries for f01292a0-db3c-11e1-a84b-00e0814cab4e.wxs2012-08-021-0/+3
* Document Apache 2.2.x insecure handling of LD_LIBRARY_PATH.wxs2012-08-021-0/+46
* - Bump PORTREVISION to chase Emacs port updatesashish2012-08-022-2/+2
* - Document django -- multiple vulnerabilitieslwhsu2012-08-011-0/+40
* Remove DEPRECATED and EXPIRATION_DATE as the main site appears back online.wxs2012-07-311-5/+1
* - Update to 0.60sunpoet2012-07-312-6/+18
* Upgrade to 2.3.1. [0]brooks2012-07-313-4/+7
* - Update net/isc-dhcp41-server to 4.1-ESV-R6 [1]zi2012-07-301-23/+27
* Update to 1.2.2.hrs2012-07-302-3/+3
* - fix pkg-plist for option SHAREDdinoex2012-07-301-12/+12
* Fix typos in COMMENTcs2012-07-293-3/+3
* - fix pkg-plist for option SHARED disableddinoex2012-07-291-12/+12
* - pass no-thread if threads are disableddinoex2012-07-291-1/+6
* Remove my personal web site from MASTER_SITESdougb2012-07-292-4/+2
* - fix option THREADSdinoex2012-07-291-9/+10
* Fix build.delphij2012-07-281-0/+1
* - security update bugzillaohauer2012-07-281-0/+51
* - Whitespace only fixes.miwi2012-07-271-13/+13
* - Update to 3.2.13zi2012-07-271-0/+32
* Use the new USE_PKGCONFIG macroehaupt2012-07-271-1/+1
* - Convert my ports to new options frameworkmakc2012-07-276-32/+33
* - Update Rails and friends to 3.2.7swills2012-07-271-0/+27
* - update firefox/thunderbird ESR versions to 10.0.6flo2012-07-272-2/+12
* Security update to 0.11matthew2012-07-271-0/+33
* For ports that depend on security/libotr, add the new USE_PKGCONFIG macro.dougb2012-07-262-0/+2
* Revert the unauthorized conversion of pkg-config from a proper build depdougb2012-07-262-2/+3
* new devel/pkgconf added to replace devel/pkg-config. new version of pkg-configbapt2012-07-265-7/+6
* - Update to latest snapshotscheidell2012-07-263-68/+35
* Fix typos in COMMENTcs2012-07-251-1/+1
* Fix typos in COMMENTcs2012-07-251-1/+1
* - Document vulnerabilities in net/isc-dhcp42-serverzi2012-07-251-0/+47
* Fix typos in COMMENTcs2012-07-251-1/+1
* Deprecate these ports as upstream has abandoned them for a while now.wxs2012-07-251-0/+3
* Heavy DNSSEC Validation Load Can Cause a "Bad Cache" Assertion Failuredougb2012-07-251-0/+47
* Update to 2.9nobutaka2012-07-252-3/+3
* - Mark Broken for ppcscheidell2012-07-241-5/+3
* / is not allowed in package name, fix the entry by removing thedelphij2012-07-241-1/+2
* - Document activerecord security issuesswills2012-07-241-0/+37
* Make it possible to build and install shared library of crypto++, anddelphij2012-07-243-5/+51
* - update to 5.3.15flo2012-07-231-0/+35
* - Update to 2.9.3zi2012-07-233-125/+102
* - Update to 4.06zi2012-07-232-3/+3
* Change USE_GNOME= pkgconfig to a direct BUILD_DEPENDS for my portsdougb2012-07-231-1/+1
* For ports maintained by ports@ where pkgconfig is one of the USE_GNOME depsdougb2012-07-231-1/+2
* Fix nit:eadler2012-07-221-0/+2
* Update to 3.0eadler2012-07-222-7/+11
* Fix some errors in the port:cs2012-07-213-4/+1
* Update to 0.13.novel2012-07-212-3/+3
* Convert to new options frameworkbapt2012-07-211-4/+6
* Convert to new options frameworkbapt2012-07-211-4/+5
* GnuPG - Perl module interface to the GNU Privacy Guard (v1.x.x series)cs2012-07-216-0/+46
* Document nsd vulnerabilitycrees2012-07-201-0/+31
* - update WWWrm2012-07-201-1/+1
* The changelog indicates the bug can be found in versions prior to 1.2.1eadler2012-07-191-2/+5
* Document buffer overflow in jpeg-turbocs2012-07-191-0/+35
* Document dokuwiki XSS vulnerability.delphij2012-07-191-0/+34
* Horde4 port update rollout:mm2012-07-194-6/+6
* - [1] Fix the use of SRV resource queries via DNS;johans2012-07-183-5/+65
* Update to 0.64.nobutaka2012-07-173-60/+79
* Update to 1.2.1.hrs2012-07-172-3/+3
* Add security/ipv6toolkit, a portable IPv6 security assessment suite.hrs2012-07-178-0/+127
* Update to 4.2.nobutaka2012-07-172-3/+3
* - Update to 1.9zi2012-07-163-6/+14
* - Mark BROKEN when compiling with clangzi2012-07-161-0/+4
* - Convert to OptionsNGsbz2012-07-161-8/+11
* - Update to 4.05zi2012-07-132-3/+3
* - add github as primary mirror, since the development moved there from SFrm2012-07-131-1/+3
* - Update Nettle to 2.5 releasejohans2012-07-133-14/+14
* - remove rcscript REQUIRE: LOGINscheidell2012-07-131-1/+0
* - Update to 1.3zi2012-07-112-17/+19
* - Document puppet security issueswills2012-07-111-0/+79
* Fix build of security/krb5 with clang.cy2012-07-101-0/+1
* Fix build of security/krb5 with clang.cy2012-07-101-0/+1
* - Convert to optionsNGjase2012-07-091-11/+19
* update to 0.2.3.19-rcbf2012-07-092-3/+3
* openx reported a new security issue but does not provide any details: inform ...eadler2012-07-091-8/+5
* - Update to 4.04zi2012-07-094-19/+8
* - Update to 0.07sunpoet2012-07-072-4/+7
* Document asterisk vulnerabilities.flo2012-07-071-0/+33
* - Document typo3 4.5.x, 4.6.x and 4.7.x XSS vulnerabilitysunpoet2012-07-061-0/+35
* add new port: security/kpclijgh2012-07-064-0/+53
* - Update to 3.1.1sbz2012-07-054-13/+14
* - Fix CONFLICTS with security/doormansbz2012-07-051-2/+4
* - Update to 1.4.0sbz2012-07-046-62/+44
* graphics/ImageMagick can change package name via PKGNAMESUFFIX.az2012-07-041-2/+2
* - Update to 2.8.0gabor2012-07-042-14/+5
* - Update to 2.8.19sbz2012-07-032-4/+3
* Move to OPTIONSnggarga2012-07-031-3/+3
* Document phplist SQL injection and XSS.wxs2012-07-031-0/+34