aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Set NO_ARCH for remaining rubygem-* ports with no arch dependent filespgollucci2015-07-0317-0/+33
* - Update to 0.20sunpoet2015-07-022-5/+4
* - Upgrade to 2.1.6 (minor bugfixes).kuriyama2015-07-022-5/+5
* security/sslsplit: update to 0.4.11swills2015-07-013-34/+3
* Record libxml2 vulnabilitykwm2015-07-011-0/+30
* Correct version range for netpbm CVE-2015-3885feld2015-07-011-3/+2
* Upgrade to 0.024.vanilla2015-07-012-4/+3
* Document games/wesnoth authentication information disclosure vulnerability.delphij2015-07-011-0/+40
* - Document CVE-2015-3258 (cups-filters buffer overflow vulnerability)amdmi32015-07-011-0/+38
* Document ntp remote control message DoS vulnerability.delphij2015-07-011-0/+40
* security/rubygem-gssapi: update to 1.2.0mmoll2015-07-013-5/+8
* - Update to 0.8.1amdmi32015-07-012-10/+10
* remove BROKEN. Port now builds with django16dvl2015-07-011-2/+0
* Remove expired ports:rene2015-07-014-33/+0
* security/py-crits must use django v1.6 and will not work with v1.8dvl2015-06-301-2/+3
* Update to 3.4.0.wxs2015-06-302-3/+3
* Update to 3.4.0.wxs2015-06-304-18/+5
* After r390893, chmod u+w/u-w for stripping perl XS modules is unnecessary,adamw2015-06-293-6/+0
* security/vault: add missing line to rc scriptswills2015-06-292-0/+3
* - Add NO_ARCHsunpoet2015-06-291-0/+1
* - Update to 1.70sunpoet2015-06-282-3/+3
* - Mark ONLY_FOR_ARCHS: uses x86 assemblyamdmi32015-06-271-6/+5
* - Make xsel run dependency optional - it makes clipboard pastingpawel2015-06-271-2/+11
* Document qemu pcnet guest to host escape vulnerability - CVE-2015-3209nox2015-06-271-0/+36
* security/clambc is not jobs safe.marino2015-06-271-0/+2
* security/vault: create portswills2015-06-276-0/+227
* Document CVE-2014-3120, CVE-2014-6439, CVE-2015-1427, CVE-2015-3337,delphij2015-06-261-0/+210
* - Mark BROKEN on 9.x:amdmi32015-06-261-0/+2
* security/afl: Update to 1.83bdelphij2015-06-262-4/+4
* - Mark BROKEN on 9.x:amdmi32015-06-251-0/+2
* - Mark BROKEN on 9.x:amdmi32015-06-251-0/+2
* security/py-libnacl: Update to 1.4.3koobs2015-06-253-4/+17
* Split CVE-2015-4152 to its own entry as the affected port is logstash only.delphij2015-06-251-11/+75
* Add entry for logstash-forwarder/logstash.delphij2015-06-251-0/+53
* Support changed ETCDIR in pkg-plistbdrewery2015-06-252-7/+5
* Aggressively mark more consumers of bundled dcraw as vulnerablejbeich2015-06-251-2/+47
* Allow user overriding ETCDIRbdrewery2015-06-251-1/+2
* Update to 20150624 snapshotbdrewery2015-06-252-3/+3
* - Update to 1.4.11sunpoet2015-06-252-5/+10
* - Update to 1.80bamdmi32015-06-253-522/+16
* Convert all p5-Test-use-ok dependencies to p5-Test-Simple, but only onadamw2015-06-251-3/+8
* Document linux-*-flashplugin11 CVE.xmj2015-06-241-0/+41
* - Add LICENSEsunpoet2015-06-241-0/+2
* Remove expired portrm2015-06-244-26/+0
* - Add NO_ARCHsunpoet2015-06-231-0/+1
* - Update to 1.2.1sunpoet2015-06-232-3/+4
* Fix entry date.delphij2015-06-231-1/+1
* Document rubygem-bson DoS and possible injection vulnerability.delphij2015-06-231-0/+30
* Document 3 vulnerabilities with PHP that affected 4 extensions.delphij2015-06-231-0/+60
* Reflect version range change after r390340. While I'm there, also fixdelphij2015-06-231-2/+5
* Document vulnerabilities in devel/ipython < 3.2.0.olgeni2015-06-231-0/+36
* Remove deprecated USE_RCORDER which was already off except if one enforcedbapt2015-06-231-4/+0
* security/py-backports.ssl_match_hostname: add comment on blocker PRrm2015-06-231-0/+1
* Document new vulnerabilities in www/chromium < 43.0.2357.130rene2015-06-231-0/+49
* Document rubygem-paperclip validation bypass vulnerabilitiy.delphij2015-06-221-0/+36
* Document lang/chicken vulnerabilities CVE-2014-9651 and CVE-2015-4556.delphij2015-06-221-0/+64
* Document cacti multiple vulnerabilities (affects < 0.8.8c) anddelphij2015-06-221-0/+86
* Convert to USES=autoreconfbapt2015-06-221-6/+1
* - Update to 0.18sunpoet2015-06-212-3/+4
* Add p5-Dancer vuln.kuriyama2015-06-201-0/+30
* Fix fetchamdmi32015-06-191-2/+2
* remove target 'regression-test', it's on perl5.mk already.vanilla2015-06-191-3/+0
* Fix: pkg-static: POST-INSTALL script failedcy2015-06-191-30/+31
* Document Drupal multiple vulnerabilities.delphij2015-06-191-0/+76
* - Strip binariesamdmi32015-06-191-0/+5
* - Fix library installationamdmi32015-06-191-2/+2
* Chase py-ldap2 rename in more ports that I missed.rm2015-06-191-1/+1
* Fix build on non-root user.vanilla2015-06-181-0/+2
* 1: bump version for add depends to p5-JSON.vanilla2015-06-181-0/+10
* Upgrade to 0.023.vanilla2015-06-182-3/+3
* Document two vulnerabilities of cURL.delphij2015-06-181-0/+71
* - Make it compatible with Python 3.xsunpoet2015-06-181-1/+1
* - Document Ruby on Rails multiple vulnerabilitiessunpoet2015-06-181-0/+67
* Mark BROKEN: Depends on conflicting versions of djangoantoine2015-06-181-0/+2
* Modify a5f160fa-deee-11e4-99f8-080027ef73ec so it covers ja-mailman too.delphij2015-06-181-0/+5
* A Python library for parsing PGP packetsdelphij2015-06-174-0/+25
* Document testdisk multiple vulnerabilities.delphij2015-06-171-0/+40
* Update to 0.15.1.delphij2015-06-172-3/+3
* - Update to 5.19zi2015-06-162-4/+5
* - Add missing perl run-dependencyamdmi32015-06-162-3/+5
* - Simplify docs and plist handlingamdmi32015-06-161-12/+6
* Update to 201523.delphij2015-06-162-4/+3
* Document Tomcat multiple vulnerabilities.delphij2015-06-161-0/+49
* - Update to 1.2.0sunpoet2015-06-162-4/+3
* Update to 2.6.0 release.ale2015-06-153-8/+6
* Update PHP ports:ale2015-06-152-2/+0
* Update to 1.5.5jhale2015-06-153-5/+5
* Bump PORTREVISION because of svn commit r389649cs2015-06-151-0/+1
* fix broken pkg-plistcs2015-06-151-4/+0
* - update to upstream svn r269ohauer2015-06-155-69/+209
* security/libressl: Update to 2.2.0brnrd2015-06-144-10/+128
* Add py-gpsoauth, a Python client library for Google Play Services OAuthriggs2015-06-144-0/+39
* - Upgrade to 0.36.kuriyama2015-06-142-4/+7
* - Upgrade to 2.0.28 (bugfixes).kuriyama2015-06-142-5/+5
* - Add NO_ARCHsunpoet2015-06-141-0/+1
* - Update RUN_DEPENDS: use newer rubygem-racksunpoet2015-06-141-1/+3
* - Update RUN_DEPENDS: use newer rubygem-racksunpoet2015-06-141-1/+2
* - Updated libsodium to 1.0.3 [1]vsevolod2015-06-146-5/+9
* - Update WWWsunpoet2015-06-131-1/+1
* Sort entries.olgeni2015-06-131-1/+1
* - Upgrade to 2.1.5 (bugfixes, minor enhancements).kuriyama2015-06-132-6/+6
* - Update to 0.9.6tota2015-06-132-5/+4
* - Update to 0.6.8tota2015-06-133-17/+17
* - update to 1.0.2cdinoex2015-06-132-12/+12
* - Update security/polarssl13 to 1.3.11tijl2015-06-139-110/+92
* - use portable cpu option for sparcv8dinoex2015-06-121-5/+6
* - fix path in SIZE linesdinoex2015-06-121-3/+3
* - Correct patch filename for SIZEzi2015-06-121-1/+1
* Update security/ossec-hids-* to 2.8.2.brd2015-06-126-52/+58
* Add ossec-hids-* vulnerabilities.brd2015-06-121-0/+32
* - Restore missing checksum for 1001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESH...zi2015-06-121-1/+2
* Update to 0.2.6.9bf2015-06-122-3/+3
* - Update to 2.1.7 that fixes the recent openssl vulnerabilitiesvsevolod2015-06-124-15/+4
* - Add vulnerability information for additional ports affected by openssl CVEs...zi2015-06-121-0/+13
* - Resolve build issuezi2015-06-122-7/+7
* - Update to 1.0.2bzi2015-06-123-22/+21
* - Document recent vulnerabilities in security/opensslzi2015-06-121-0/+42
* Document 13 Flash vulnerabilities.xmj2015-06-111-0/+85
* security/sguil: Fix wrong dependency for databases/mysqltcl [1]bofh2015-06-1116-76/+59
* - Add LICENSEamdmi32015-06-111-2/+7
* Horde package update:mm2015-06-114-6/+6
* Update to new upstream release 2.3.7.mandree2015-06-116-350/+4
* security/rubygem-ezcrypto: update gemspec patch to new ruby-gems versionmmoll2015-06-111-1/+1
* Document libzmq4 V3 protocol handler protocol downgrade vulnerability.delphij2015-06-111-0/+31
* Document pgbouncer remote denial of service vulnerability.delphij2015-06-111-0/+29
* - Add NO_ARCHamdmi32015-06-112-2/+1
* - Add LICENSEamdmi32015-06-112-7/+5
* - Fix library installationamdmi32015-06-112-8/+3
* - Update to 0.06sunpoet2015-06-113-7/+11
* - Add NO_ARCHsunpoet2015-06-111-1/+2
* Update to 3.10.2lx2015-06-103-50/+67
* Document cups multiple vulnerabilities.delphij2015-06-101-0/+34
* Update to 1.4.1cs2015-06-103-4/+14
* - Update to 15.2.1sunpoet2015-06-102-3/+3
* Update to 5.3.2garga2015-06-094-4/+23
* Document two strongswan vulnerabilities.delphij2015-06-091-0/+59
* - add freebsd-mips targetdinoex2015-06-091-7/+13
* Document redis EVAL Lua sandbox escape vulnerability.delphij2015-06-091-0/+37
* Update to 20150608 snapshotbdrewery2015-06-092-3/+3
* security/fcrackzip: Take MAINTAINERSHIPbofh2015-06-094-8/+10
* Add an entry for www/tidy-* heap-buffer-overflow.thierry2015-06-091-0/+40
* Fix typo and remove PHP from pcre vulnerabilities, as the bundled pcredelphij2015-06-081-25/+2
* Document fixed version of pcre in e69af246-0ae2-11e5-90e4-d050996490d0.delphij2015-06-081-2/+2
* - Fix shebangsamdmi32015-06-071-1/+3
* MIT KRB5 ports build unusable binaries due to incorrect linkingcy2015-06-074-6/+10
* - Update VuXMLsunpoet2015-06-071-2/+6
* - Update to 2.0.2sunpoet2015-06-072-3/+3
* Update ocaml-ssl to 0.5.1johans2015-06-062-3/+3
* security/ca_root_nss: Enable certificate verification (for Base OpenSSL)koobs2015-06-061-0/+3
* - Re-add PHP removed in previous commitzi2015-06-061-1/+13
* - Fix shebangsamdmi32015-06-061-2/+3
* - Update to 1.69sunpoet2015-06-062-3/+5
* - Update to 2.0.1sunpoet2015-06-062-3/+3
* - Make version matching on the pcre vuln a little more sanezi2015-06-051-13/+2
* Document two recent pcre vulnerabilities that can be triggered bydelphij2015-06-051-0/+49
* Fix spellgarga2015-06-051-1/+1
* security/p5-Crypt-OpenSSL-X509: 1.8.04 -> 1.8.06pi2015-06-042-4/+6
* - Add CPE infoamdmi32015-06-041-1/+1
* Update information for graphics/libraw.osa2015-06-041-2/+7
* - Add NO_ARCHsunpoet2015-06-041-0/+1
* - Update to 2.016jadawin2015-06-032-3/+3
* Add openssh-portable-devel which is based on the upstream snapshots for stagi...bdrewery2015-06-0229-1/+2783
* security/munge: Add munged_flags in rc filebofh2015-06-021-12/+9
* - Drop @dirrm* from plistamdmi32015-06-021-3/+0
* - Drop @dirrm* from plistamdmi32015-06-021-1/+0
* - Drop @dirrm* from plistamdmi32015-06-021-1/+0
* security/vuxml: multiple vulnerabilities of wpa_supplicant and hostapdmarino2015-06-021-0/+47
* security/wpa_supplicant: Address 3 latest security advisoriesmarino2015-06-025-1/+166
* Update to 4.1.2tijl2015-06-0210-229/+123
* Update 1.12.3 --> 1.12.4cy2015-06-023-71/+3
* Document recent ffmpeg0 vulnerabilitiesjbeich2015-06-021-0/+125
* Add entry for vulnerable versions of avidemux2 and avidemux26riggs2015-06-021-0/+39
* security/vuxml: add www/rubygem-rest-client vulnerabilitiesmmoll2015-06-021-0/+59
* Adjust after rubygem-jsobfu updateantoine2015-06-021-0/+2
* - Update NSS and ca_root_nss to 3.19.1jbeich2015-06-014-7/+7
* - Strip libraryamdmi32015-06-012-4/+2
* - Fix licenseamdmi32015-06-012-6/+5
* - Strip binaryamdmi32015-06-012-2/+4
* - Add LICENSEamdmi32015-06-011-1/+8
* - Strip librariesamdmi32015-06-012-2/+4
* - Drop @dirrm* from plistamdmi32015-06-012-3/+6
* - Drop @dirrm* from plistamdmi32015-06-012-2/+4
* - Strip libraryamdmi32015-06-011-7/+6
* - Strip libraryamdmi32015-06-011-1/+5
* security/libressl: Backport change for missing EGD featurebrnrd2015-06-013-0/+12
* - Add kodi to 57325ecf-facc-11e4-968f-b888e347c638 [1]delphij2015-06-011-4/+8
* Reflect CVE-2015-2060 and CVE-2014-9556.delphij2015-06-011-0/+65
* - Clarify LICENSEamdmi32015-06-012-43/+46
* - Add LICENSE_FILEamdmi32015-06-012-11/+14
* - Strip libraryamdmi32015-06-011-1/+2
* - Update RUN_DEPENDSsunpoet2015-06-012-2/+2
* - Document django vulnerability CVE-2015-3982lwhsu2015-06-011-0/+67
* - Update to 0.4.2sunpoet2015-05-312-3/+3
* Update to 2.2.1jhale2015-05-313-4/+4
* - Add NO_ARCHamdmi32015-05-312-0/+2
* - Fix shebangsamdmi32015-05-311-2/+4
* - Fix shebangsamdmi32015-05-311-2/+4
* - Fix shebangsamdmi32015-05-311-2/+3
* Extend 57325ecf-facc-11e4-968f-b888e347c638 to cover rawstudio as well.delphij2015-05-311-2/+8
* - Update to 2.2.1sunpoet2015-05-312-3/+3
* Cleanup USE_GITHUB usage.mat2015-05-312-4/+3
* - Update to 0.17sunpoet2015-05-302-3/+3
* - Fix shebangsamdmi32015-05-301-2/+4
* security/afterglow: Fix PORTSCOUT to skip 2.0 beta versionbofh2015-05-301-0/+1
* - Drop @dirrm* from plistamdmi32015-05-302-3/+1
* Document the issue with proxychains-ng which uses current directory whendelphij2015-05-301-0/+30
* - Add LICENSE_FILEamdmi32015-05-291-3/+1
* - Switch to USES=autoreconfamdmi32015-05-291-2/+2
* Document wireshark multiple vulnerabilities.delphij2015-05-291-0/+66
* Apply vendor patch for CVE-2015-2694 (changesetdelphij2015-05-292-1/+66
* Document krb5 requires_preauth bypass in PKINIT-enabled KDC.delphij2015-05-291-0/+35
* - Update to 0.40amdmi32015-05-283-4/+4
* Unbreak INDEXamdmi32015-05-281-1/+1
* - Update to 0.400amdmi32015-05-283-4/+9
* This module provides a secure, efficient, and simple interface foramdmi32015-05-285-0/+38
* - Update to 2.9.7.3zi2015-05-282-3/+4
* - Don't cat pkg-message from Makefilesamdmi32015-05-273-10/+0
* - Update to upstream version 1.20amdmi32015-05-272-16/+8
* Retrofit document cURL multiple vulnerabilities.delphij2015-05-271-0/+107
* new port: security/rubygem-rack-oauth2mmoll2015-05-274-0/+31
* Switch PYTHON_REL from a 3 digits number to a 4 digits number to handleantoine2015-05-273-3/+3
* - Fix build with clang < 3.6 (which doesn't recognize -fforce-addr option)amdmi32015-05-271-2/+14
* security/gnupg20: update signature file.xmj2015-05-261-2/+2
* Fix build with mono 4antoine2015-05-256-1/+121
* Upgrade to 0.022.vanilla2015-05-254-111/+7
* - Rename security/qtkeychain to qtkeychain-qt5, update to 0.5.0 and make it u...madpilot2015-05-2511-110/+59
* - Update to 1.01sunpoet2015-05-253-6/+8
* - Move security/rubygem-rc4 to security/rubygem-ruby-rc4sunpoet2015-05-244-5/+5
* - Add LICENSEsunpoet2015-05-241-1/+2
* - Add LICENSEsunpoet2015-05-242-2/+3
* - Add LICENSEsunpoet2015-05-241-0/+2
* - Update WWWsunpoet2015-05-241-1/+1
* - Mark DEPRECATED and set EXPIRATION_DATE to 2015-06-30sunpoet2015-05-241-0/+3
* - Add LICENSEsunpoet2015-05-241-0/+2
* - Update dist signature file.kuriyama2015-05-241-2/+2
* Document cassandra remote code execution vulnerability.delphij2015-05-241-0/+47
* Fix version range for previous commit.delphij2015-05-241-1/+1
* Extend CVE-2015-3456 to cover xen-tools (4.5.0-4.5.0_5: we didn't supporteddelphij2015-05-241-1/+12
* document possible vulnerabilities in sysutils/py-saltxmj2015-05-241-0/+42
* Add entry for mail/davmail.pi2015-05-241-0/+28
* Update security/metasploit to 4.11.2antoine2015-05-2416-35/+33
* Update to 0.6.1antoine2015-05-232-3/+3
* Update to 1.0.29antoine2015-05-232-6/+6
* Document dnsmasq and -devel vulnerabilities (CVE-2015-3294 and one other in rc).mandree2015-05-231-0/+65
* Document PCRE and PHP multiple vulnerabilities.delphij2015-05-231-0/+100
* Update Shibboleth and opensaml to latest version.girgen2015-05-236-30/+32
* Correct PR number.delphij2015-05-231-1/+2
* Add experimental patch by Gert Döring to fix PR #194745.mandree2015-05-232-2/+72
* Remove $FreeBSD$ from patches files everywhere.mat2015-05-2316-44/+0
* Add new port: security/py-critsdvl2015-05-236-0/+1050