aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* New port: security/pecl-libsodiumpi2016-08-134-0/+27
* security/py-cryptography: update to 1.4swills2016-08-134-38/+7
* Update to 1.4.1.ume2016-08-122-6/+6
* [NEW PORT] security/py-tuf: Framework for securing software update systemskoobs2016-08-125-0/+51
* The perl5 release candidate versions also address the XSLoader localmatthew2016-08-121-3/+3
* Update to version 0.716pawel2016-08-122-4/+6
* Correct the syntax for the <freebsdsa> entries.feld2016-08-121-45/+45
* Correct old vuxml entries for FreeBSD that use <ge>0</ge> or a <ge> without a...feld2016-08-121-29/+5
* Add missing FreeBSD SA entries from 2016 to vuxmlfeld2016-08-121-0/+575
* Add missing FreeBSD SA entries from 2015 to vuxmlfeld2016-08-121-0/+447
* Add missing FreeBSD SA entries from 2014 to vuxmlfeld2016-08-121-0/+669
* security/libressl: Update to 2.4.2brnrd2016-08-125-26/+15
* Fix vuxml build.gjb2016-08-121-1/+1
* security/vuxml: Make PostgreSQL entry more explicitkoobs2016-08-121-1/+1
* Add missing FreeBSD SA to vuxmlfeld2016-08-111-0/+33
* devel/rubygem-devise: switch to Rails 4 and fix fallouttz2016-08-111-1/+2
* Add security info for upcoming PostgreSQL updates.girgen2016-08-111-0/+54
* Fixup Perl versions for CVE-2016-1238.mat2016-08-111-6/+6
* - Stage II. FreeBSD 9.x brach need a bit more love to deal with c++11-aware codefluffy2016-08-111-3/+4
* Update to 1.8.0.vanilla2016-08-113-4/+13
* Update to 1.8.0.vanilla2016-08-113-4/+22
* security/rubygem-encryptor: Update from 1.3.0 to 3.0.0tz2016-08-102-3/+4
* security/rubygem-devise-two-factor: Update from 2.1.0 to 3.0.0tz2016-08-102-4/+5
* security/rubygem-attr_encrypted: Update from 1.4.0 to 3.0.2tz2016-08-102-4/+5
* security/dradis: fix Gemfile patchtz2016-08-102-6/+11
* - Update to 2.034jadawin2016-08-102-4/+4
* Sort category Makefiles.olgeni2016-08-101-1/+1
* Suhosin needs session at build time so that it can encrypt the session.mat2016-08-101-1/+2
* www/piwik: Document XSS issuestz2016-08-101-0/+25
* - security/clamav: Unbroke Jit enginefluffy2016-08-101-1/+5
* Document denial of service vector via oversized AXFR, IXFR, or Dynamic DNSjunovitch2016-08-101-0/+67
* Add missing FreeBSD SA vuxml entries for 2013feld2016-08-101-0/+100
* Change all FreeBSD SA entries in vuxml from <system> to <package>feld2016-08-101-168/+168
* Add FreeBSD SA information to recent libarchive vuxml entryfeld2016-08-101-0/+10
* Add FreeBSD SA information to old openssl vuxml entryfeld2016-08-101-1/+9
* Add FreeBSD SA information to old ntp vuxml entryfeld2016-08-101-0/+9
* Add FreeBSD SA information to old openssh vuxml entryfeld2016-08-101-1/+8
* Update many historical vuxml entries for FreeBSD with incorrect rangesfeld2016-08-101-192/+230
* Update to 1.4.27arved2016-08-102-3/+4
* security/py-keyring: 8.5.1 -> 9.3.1pi2016-08-102-4/+5
* Add FreeBSD SA information to old openssl vuxml entryfeld2016-08-101-0/+8
* Add FreeBSD SA information to old ntp vuxml entryfeld2016-08-101-0/+8
* Add FreeBSD SA information to old bind vuxml entryfeld2016-08-101-0/+6
* Add FreeBSD SA information to old openssh vuxml entryfeld2016-08-101-1/+8
* Add FreeBSD SA information to old ntp vuxml entryfeld2016-08-101-0/+8
* Add FreeBSD SA information to old bind vuxml entryfeld2016-08-101-0/+6
* Add FreeBSD SA information to old openssl vuxml entryfeld2016-08-101-1/+8
* Add FreeBSD SA information to old ntp vuxml entryfeld2016-08-101-1/+8
* Add FreeBSD SA information to old bind vuxml entryfeld2016-08-101-1/+3
* Add FreeBSD SA information to old openssh vuxml entryfeld2016-08-101-1/+8
* Add FreeBSD SA information to old bind vuxml entryfeld2016-08-101-2/+4
* Add FreeBSD SA information to old openssh vuxml entryfeld2016-08-101-0/+8
* Add FreeBSD SA information to old bind vuxml entryfeld2016-08-101-1/+2
* Add FreeBSD SA information to old openssl vuxml entryfeld2016-08-101-1/+9
* Add FreeBSD SA information to old ntp vuxml entryfeld2016-08-101-0/+7
* Add FreeBSD SA information to old openssl vuxml entryfeld2016-08-101-1/+8
* Add FreeBSD SA information to old bind vuxml entryfeld2016-08-101-0/+2
* Add FreeBSD SA information to old openssl vuxml entryfeld2016-08-101-1/+9
* Add FreeBSD SA info to old unbound vuxml entryfeld2016-08-101-0/+7
* Add FreeBSD SA reference to old bind vuxml entryfeld2016-08-101-0/+2
* Update another openssl vuxml entry to add FreeBSD SA informationfeld2016-08-101-0/+10
* Add FreeBSD SA information to old openssl vuxml entryfeld2016-08-101-0/+10
* Update another old openssl vuxml entry to add FreeBSD SA informationfeld2016-08-101-0/+6
* Update old openssl vuxml entry to include <freebsdsa> information and affectedfeld2016-08-101-0/+6
* Add <freebsdsa> to old vuxml entry for opensslfeld2016-08-101-0/+2
* Correct <date> fields for last commit regarding SA 14:02feld2016-08-101-1/+2
* Add affected FreeBSD versions to vuxml entry for SA-14:02feld2016-08-101-1/+8
* Correct another FreeBSD SA in an old vuxml entryfeld2016-08-101-2/+2
* Correct FreeBSD SA in old vuxml entryfeld2016-08-101-1/+2
* Change www/php*-session's priority to be loaded before most other PHP extensi...mat2016-08-091-2/+1
* - Update to 2.29bwen2016-08-094-15/+17
* security/libntlm: Update MAINTAINER addresskoobs2016-08-091-1/+1
* - Update to 7.3p1bdrewery2016-08-095-26/+29
* Document collectd security advisory.brd2016-08-081-0/+28
* Register security/libgpg-error with LIB_DEPENDSehaupt2016-08-081-2/+3
* - Strip binaryehaupt2016-08-082-4/+8
* USE_BDB cleanup.mat2016-08-082-3/+2
* Update to latest commit.mat2016-08-082-5/+5
* security/vuxml: Add versions for lates MariaDB vulnsbrnrd2016-08-081-7/+7
* Horde package update:mm2016-08-082-3/+4
* security/nss: update to 3.26jbeich2016-08-064-6/+8
* - Update to 1.2.1 [1]pawel2016-08-062-5/+7
* - Update to 1.4.2 [1]pawel2016-08-062-5/+6
* security/suricata: Fix libpcap LIB_DEPENDSkoobs2016-08-061-1/+3
* security/py-crits: Really fix pillow dependsmarino2016-08-061-1/+1
* Document multiple security advisories for Moodle (MSA-16-0019 - MSA-16-0021)junovitch2016-08-061-0/+46
* Document BIND security advisoryjunovitch2016-08-061-0/+39
* Document wnpa-sec-2016-41 through wnpa-sec-2016-49 for issues fixed injunovitch2016-08-061-0/+56
* - Fix ambiguous specification of libpcap by using libpcap from basedvl2016-08-061-2/+2
* Update perl vuxml entriesfeld2016-08-061-0/+16
* Cancel tiff vuxml entry for CVE-2016-5102feld2016-08-061-23/+1
* Update vuxml entry for perl to correct range for perl5-develfeld2016-08-051-4/+4
* Add p5-Net-SSH-AuthorizedKeysFile.mat2016-08-055-0/+45
* - Switch to options helpersamdmi32016-08-053-9/+11
* security/fwbuilder: Fix bad RUN_DEPENDS specification for rcsmarino2016-08-051-3/+3
* security/openssl-devel: Update to 1.1.0-pre6brnrd2016-08-054-171/+983
* Fix vuxml entry for recent perl vulnerabilities to correctly match package namesfeld2016-08-051-20/+16
* Document p5-XSLoader vulnerabilityfeld2016-08-051-0/+41
* Document perl vulnerabilityfeld2016-08-051-0/+39
* security/barnyard2: Fix ambiguous specification of libpcapbofh2016-08-051-1/+2
* Document gd vulnerabilitiesfeld2016-08-041-0/+38
* - Update to version 1.0.0 [1]pawel2016-08-042-6/+6
* Document curl vulnerabilitiesfeld2016-08-041-0/+32
* - Update to 0.6.10tota2016-08-043-4/+5
* security/i2p: Remove redundant dependency on unzipmarino2016-08-041-1/+0
* Update to 0.039.vanilla2016-08-042-4/+4
* Back to poolcs2016-08-041-1/+1
* security/libressl-devel: Update to 2.4.2brnrd2016-08-042-4/+4
* security/libressl: Update to 2.3.7brnrd2016-08-042-4/+4
* Update to version 3.6.1, which brings compatibility with OpenSSL 1.1.0, anddanfe2016-08-044-101/+6
* Document lighttpd vulnerabilitiesfeld2016-08-031-0/+32
* Don't use extension.ini any more, and have each extension install in itsmat2016-08-0320-1/+20
* - Update to 2.2.1cpm2016-08-032-3/+5
* - Update to 2.033jadawin2016-08-032-4/+4
* Remove stochasting build-time testsriggs2016-08-031-1/+1
* security/w3af: 1.0-rc4 -> 1.6.49pi2016-08-039-2122/+2299
* - Update to version 3.1 [1]pawel2016-08-022-3/+4
* In the 64 bit case create lib/libssl.so.7 instead of lib64/libssl.so.7.tijl2016-08-022-7/+4
* Document Xen Security Advisories (XSAs 182, 183, and 184)junovitch2016-08-021-0/+99
* Update to 1.77. Switch to USES=ssl, and only install the examplesadamw2016-08-022-5/+7
* - Update to version 2016.74pawel2016-08-022-3/+7
* Revert premature changes that snuck into r419437.tijl2016-08-011-0/+1
* Use LINUX_REPO_ARCH instead of LINUX_RPM_ARCH when setting DISTINFO_FILEtijl2016-08-0118-1/+0
* Remove unused distinfo files.tijl2016-08-012-8/+0
* security/py-pyclamd: 0.2.2 -> 0.3.17pi2016-08-015-76/+14
* security/suricata: Fix plist with HTP_PORT option disabledkoobs2016-08-011-2/+2
* Document security issues fixed Libidn 1.33junovitch2016-07-311-0/+35
* Fix build with getline(3) in libcbapt2016-07-311-0/+29
* security/suricata: Update to 3.1.1koobs2016-07-313-11/+11
* security/afl: 2.19 -> 2.22pi2016-07-312-4/+4
* Update to 4.12.16antoine2016-07-312-5/+6
* New port: security/rubygem-rex-archantoine2016-07-314-0/+29
* New port: security/rubygem-rex-oleantoine2016-07-314-0/+29
* Remove local declarations of setgrent().ed2016-07-311-0/+26
* security/py-pysha3: Update to 1.0b1, Modernizekoobs2016-07-303-21/+12
* Update to 0.0.6antoine2016-07-302-4/+4
* Prevent collision with getline(3)bapt2016-07-301-0/+47
* Prevent collision with dprintf(3)bapt2016-07-304-0/+88
* document Gimp XCF loader vulnerabilitycmt2016-07-291-0/+27
* - Update to version 0.7.0 [1]pawel2016-07-294-5/+6
* - Add LICENSE_FILEsamdmi32016-07-284-27/+37
* security/libtasn1: update to 4.9novel2016-07-282-3/+5
* Fix breakage caused by r419105.cy2016-07-281-1/+2
* Modernize.cy2016-07-271-3/+2
* Update to 1.13.6.cy2016-07-272-3/+4
* Modernize krb5-112 and krb5-113 replacing USE_OPENSSL with USES=ssl.cy2016-07-272-4/+2
* With the release of krb5 1.13.6, which also fixes the KDC denial ofcy2016-07-271-1/+6
* Update 0.15.1 --> 0.16cy2016-07-276-62/+12
* - Update to 20160709 snapshot [1]jlaffaye2016-07-273-4/+44
* Document xerces-c3 vulnerabilitiesfeld2016-07-271-0/+35
* Document php vulnerabilitiesfeld2016-07-261-0/+155
* Modernize: Replace USE_AUTOTOOLS=autoconf with USES=autoreconf.cy2016-07-261-2/+1
* Reset miwi@'s ports, he stepped down from the Ports Team.rene2016-07-2625-25/+25
* security/letskencrypt: Update to 0.1.9brnrd2016-07-253-15/+14
* Update to version 0.9.5pawel2016-07-252-5/+4
* Update to version 1.12.0pawel2016-07-245-8/+12
* - Remove duplicate information from pkg-messagezi2016-07-242-5/+4
* Remove unneeded post-install USES=libtool nukes .la already nowbapt2016-07-241-3/+0
* Update to 4.12.15antoine2016-07-232-7/+9
* Update to 1.1.13antoine2016-07-232-4/+4
* New port: security/rubygem-rex-struct2antoine2016-07-234-0/+27
* New port: security/rubygem-metasploit_payloads-mettleantoine2016-07-234-0/+26
* security/libgpg-error: update to 1.24novel2016-07-233-5/+5
* Document new vulnerabilities in www/chromium < 52.0.2743.82rene2016-07-231-0/+80
* security/hydra: update to 8.2rm2016-07-235-44/+34
* Stop people putting arguments to USES=ssl.mat2016-07-221-1/+1
* Replace USE_OPENSSL with USES=ssl.cy2016-07-221-2/+1
* Update to 1.14.3.cy2016-07-222-3/+4
* Document a rare KDC denial of service vulnerability when anonymouscy2016-07-221-0/+28
* security/vuxml: Current mysql57 is NOT vulnerablebrnrd2016-07-221-1/+2
* Apache OpenOffice CVE-2016-1513 Memory Corruption Vulnerabilitytruckman2016-07-221-0/+38
* security/vuxml: Add MySQL vulnerabilities from quarterly updatebrnrd2016-07-211-0/+76
* Properly cancel the httpoxy vuxml entryfeld2016-07-211-0/+4
* Cleanup $() variables in ports Makefiles.mat2016-07-207-14/+14
* Remove unused variable.mat2016-07-201-1/+0
* Add LICENSE, tweak CONFLICTS and remove unused pkg-descr.tijl2016-07-202-4/+4
* Remove HTTPoxy entry in vuxml until a we know if upstream vendors willfeld2016-07-201-103/+0
* - Update to 1.7.2cpm2016-07-203-5/+5
* security/unicornscan is not jobs safemarino2016-07-201-0/+2
* Update security/strongswan to 5.5.0garga2016-07-202-7/+8
* - Update to 1.9.4amdmi32016-07-192-3/+4
* www/typo3 and www/typo3-lts: Document missing access check in Extbasetz2016-07-191-0/+38
* When there is a do-install target, do not use a post-install target, domat2016-07-1917-37/+15
* net/haproxy: Mark vulnerable to httpoxy in vuxmlbrnrd2016-07-191-1/+5
* Fix ancient getopts invocation in pskgen.cy2016-07-192-10/+5
* lang/go: Mark 1.6.3 as NOT vulnerable to httpoxybrnrd2016-07-191-1/+1
* www/apache24: Fix httpoxy vulnerability (+2.2)brnrd2016-07-191-2/+8
* httpoxy: Mark ports as vulnerablebrnrd2016-07-191-0/+93
* Fix CVE-2016-0772 entry to not blame only Python 2.7bdrewery2016-07-191-1/+1
* Cleanup USE_GITHUB usage.mat2016-07-182-5/+4
* - Update to 5.35zi2016-07-182-4/+4
* - Switch to options helpersamdmi32016-07-181-1/+1
* Update to 1.7.9.vanilla2016-07-183-19/+27
* Update to 1.7.9.vanilla2016-07-183-6/+7
* - update to 7.25BETA1ohauer2016-07-173-4/+12
* Update py-rekall/py-rekall-core to 1.5.2antoine2016-07-165-16/+18
* Update to 0.24.post1antoine2016-07-162-6/+6
* Update to 20160114antoine2016-07-162-5/+5
* Update to 0.1.1antoine2016-07-162-4/+4
* Document security issues from ATutor 2.2.1 and 2.2.2 changelogjunovitch2016-07-161-0/+53
* Update Drupal SA-CORE-2016-002 with the assigned CVEsjunovitch2016-07-161-0/+4
* Document Flash vulnerabilities in Adobe Security Bulletins APSB16-25junovitch2016-07-161-0/+105
* Update to 4.12.12antoine2016-07-162-4/+12
* Update to 1.1.12antoine2016-07-162-6/+4
* New port: security/rubygem-rex-zipantoine2016-07-164-0/+29
* New port: security/rubygem-rex-registryantoine2016-07-164-0/+27
* New port: security/rubygem-rex-powershellantoine2016-07-164-0/+30
* New port: security/rubygem-rex-javaantoine2016-07-164-0/+24
* New port: security/rubygem-rex-random_identifierantoine2016-07-164-0/+26
* New port: security/rubygem-rex-textantoine2016-07-164-0/+27
* Rename vuxml entry, add new detailed reference as primary.feld2016-07-161-3/+4
* Package name for jakarta-struts is actually apache-strutsfeld2016-07-161-1/+1
* Also add jakara-struts to the vuxml entry for CVE-2016-3092feld2016-07-161-0/+5
* Document tomcat vulnerabilityfeld2016-07-161-0/+36
* Document libreoffice vulnerabilityfeld2016-07-161-0/+31
* Update name in vuxml of person who reported CVE-2016-5102feld2016-07-161-1/+1
* Document tiff vulnerabilitiesfeld2016-07-161-0/+81
* Document CVE-2016-2334 and CVE-2016-2335 in archivers/p7zip.rakuco2016-07-151-0/+64
* Update to version 0.2.8.5-rcpawel2016-07-152-4/+4
* New port: security/py-vulndbpi2016-07-154-0/+29
* New port: security/py-halberdpi2016-07-154-0/+28
* Update to version 1.11.0pawel2016-07-145-10/+30
* Add information about CVE-2016-2119 vulnerability in Samba suits.timur2016-07-131-0/+43
* security/libsodium: Upgrade version 1.0.8 => 1.0.10marino2016-07-1310-10/+15
* Add patch from upstream commit 7247f99b3e068a2b90b7776a2cdd438fddb7a38btijl2016-07-122-0/+12
* security/libargon2: add new portjbeich2016-07-125-0/+42
* Rename security/hashcat to security/hashcat-legacymatthew2016-07-126-0/+315
* Upgrade to 3.00matthew2016-07-1210-177/+613
* Back to poolcs2016-07-121-1/+1
* rubygem-ruby-saml: Document XML signature wrapping attacktz2016-07-111-0/+32
* security/py-safe: add new portjbeich2016-07-114-0/+27
* Update to version 5.10pawel2016-07-112-3/+3
* security/afl: update 2.07b -> 2.19bjunovitch2016-07-095-12/+17
* security/p5-Protocol-ACME: 0.12 -> 0.15pi2016-07-093-6/+4
* Update to 0.038.vanilla2016-07-082-4/+4
* Update to 3.4.14.tijl2016-07-083-5/+5
* security/rubygem-omniauth-saml: update from 1.5.0 to 1.6.0tz2016-07-082-4/+5
* security/rubygem-ruby-saml: update from 1.2.0 to 1.3.0tz2016-07-082-3/+4
* OTPW is a one-time password system which is robust against the passwordjkim2016-07-088-0/+103
* - Update to 5.9amdmi32016-07-072-4/+5
* - Fix affected versions of qemu and qemu-devellwhsu2016-07-071-12/+13
* Document remote denial of service in quasseljunovitch2016-07-071-0/+31
* Update to 5.9p4, which fixes a bug where command output is not displayednaddy2016-07-062-5/+5
* - document apache24 H2/X509 sec. issue.ohauer2016-07-061-0/+30
* Remove expired ports without open PRs:rene2016-07-0546-823/+0
* Document Xen Security Advisories (XSAs 173, 175, 176, 178, 179, and 180).junovitch2016-07-051-0/+208
* Update wnpa-sec-2016-12 through wnpa-sec-2016-18 with CVE assignment forjunovitch2016-07-041-1/+10
* Update wnpa-sec-2016-19 through wnpa-sec-2016-27 with CVE assignment forjunovitch2016-07-041-0/+12
* Document wnpa-sec-2016-29 through wnpa-sec-2016-37 for issues fixed injunovitch2016-07-041-0/+65
* Fix ports depending on security/(open|libre)ssl directly.mat2016-07-041-2/+2