aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Update MASTER_SITES and unbreak this portsunpoet2016-11-063-7/+4
* - Respect DOCSsunpoet2016-11-061-3/+3
* - Update to 1.0.18sunpoet2016-11-062-4/+4
* ix Berkeley DB detection at the configuration stage.hrs2016-11-061-3/+2
* - Reset maintainer by his own requestamdmi32016-11-041-1/+1
* security/bearssl: Packaging improvementsfeld2016-11-041-2/+3
* - Mark BROKEN with LibreSSLamdmi32016-11-041-1/+7
* Upgrade to upstream bugfix release 2.3.13.mandree2016-11-042-5/+4
* Pass maintainership of PEAR ports to the submitterjbeich2016-11-0419-19/+19
* Update to latest snapshot (week 43)mandree2016-11-042-4/+4
* Fix version number in last entryrene2016-11-041-1/+1
* Document new vulnerability in www/chromium < 54.0.2840.90rene2016-11-041-0/+30
* Now builds on sparc64.linimon2016-11-041-2/+0
* Now builds on sparc64.linimon2016-11-041-4/+0
* Now builds on sparc64.linimon2016-11-041-4/+0
* Now builds on sparc64.linimon2016-11-041-2/+0
* Now builds on sparc64.linimon2016-11-041-2/+2
* security/bearssl: Fix build on FreeBSD 9.3feld2016-11-041-0/+2
* BearSSL is an implementation of the SSL/TLS protocol (RFC 5246) writtenfeld2016-11-035-0/+60
* security/acme-client: Update to 0.1.14brnrd2016-11-032-4/+4
* Cleanup no longer needed CHMOD usage after r424898.mat2016-11-038-24/+0
* security/acme-client: Update to 0.1.13brnrd2016-11-037-51/+35
* security/vuxml: Mark correct OpenSSL 1.0.2 and 1.1.0 versionsbrnrd2016-11-031-2/+2
* Fix affected ports versionslwhsu2016-11-031-1/+8
* Add a small comment to explain what 1100077 is about.mat2016-11-021-0/+1
* Update openssh vuxml entry to add FreeBSD SA informationfeld2016-11-021-9/+17
* Document openssl vulnerabilityfeld2016-11-021-0/+44
* Spelling fixlwhsu2016-11-021-2/+2
* Document Django vulnerabilities CVE-2016-9013, CVE-2016-9014lwhsu2016-11-021-0/+51
* Fix up bind9-devel's range for CVE-2016-8864.mat2016-11-021-1/+1
* Add missing header files (com_err.h and com_right.h).hrs2016-11-023-10/+3
* Mark as deprecated: no more upstreambapt2016-11-021-0/+3
* security/vuxml: Document 2016-11-02 cURL vulnerabilitiesbrnrd2016-11-021-0/+48
* Document BIND remote DoS vulnerability.delphij2016-11-021-0/+46
* security/openssl-devel: adjust conflicts like r422717 and r424947jbeich2016-11-021-3/+3
* Document memcached vulnerabilitiesswills2016-11-021-0/+42
* security/tor: add multi-instance supportjbeich2016-11-023-1/+68
* Remove expired ports:rene2016-11-029-178/+0
* security/vuxml: Fix version numbers for MySQLbrnrd2016-11-021-2/+2
* security/vuxml: Document MySQL/MariaDB vulnerabilitiesbrnrd2016-11-021-0/+40
* - Use USES=sslsunpoet2016-11-021-2/+1
* Oops.adamw2016-11-011-1/+1
* Document new vulnerabilities in www/chromium < 54.0.2840.59rene2016-11-011-0/+106
* Update to 4.1.18.tijl2016-11-014-9/+12
* Improve the compiler check by using USES=compiler and not applyingadamw2016-11-011-3/+3
* Update to 1.3.18.tijl2016-10-312-4/+4
* Update to 2.4.0.tijl2016-10-314-16/+8
* - Update to 0.614wen2016-10-312-4/+4
* Enable the CAMELLIA cipher and noexecstack (support for which getsadamw2016-10-311-6/+7
* A number of simplifications and improvements.adamw2016-10-315-84/+17
* security/py-flask-httpauth: update to 3.2.1rm2016-10-312-4/+5
* security/acme-client: Fix PORTREVISION going backwardsbrnrd2016-10-311-1/+1
* security/acme-client: Roll back to STATIC optionbrnrd2016-10-312-21/+24
* security/acme-client: Fix CONFLICT errors when OpenSSL is installedbrnrd2016-10-301-5/+7
* security/libressl: Switch to CONFLICTS_INSTALLbrnrd2016-10-302-6/+6
* Update to 1.2.15.rakuco2016-10-302-5/+7
* security/acme-client: Unblock package build via bundled LibreSSLbrnrd2016-10-302-26/+21
* Update to 7.0jhale2016-10-302-4/+4
* Update to 4.12.39antoine2016-10-302-5/+5
* Update to 1.1.26antoine2016-10-302-4/+4
* Update to 2.0.6antoine2016-10-302-4/+4
* Update to 2.0.23antoine2016-10-302-4/+4
* Update to 0.1.2antoine2016-10-302-4/+4
* security/libkpass: Change WWW to new GitHub site, per note on SF pagewoodsb022016-10-301-1/+1
* Attempt to fix vuxml build after r424916peter2016-10-301-1/+1
* security/p5-Crypt-OpenSSL-DSA: update 0.15 -> 0.17pi2016-10-302-5/+5
* Document openssh DoSfeld2016-10-291-0/+30
* Fix file modes after extracting.mat2016-10-291-1/+8
* security/openssl: Bump PORTREVISIONbrnrd2016-10-292-0/+2
* security/openssl: Bump shared library versionbrnrd2016-10-292-2/+2
* Do not redefine DEBUG_DESC when its meaning more or less matches the defaultdanfe2016-10-292-2/+0
* No longer ignore updatesantoine2016-10-292-4/+0
* Document sudo vulnerabilityfeld2016-10-281-0/+29
* - Update to 1.0.17sunpoet2016-10-283-32/+14
* - Fix byte order detection to allow the build on ARM (armv6)danfe2016-10-281-0/+12
* Document axis2 vulnerabilitiesfeld2016-10-281-0/+35
* Document node vulnerabilitiesfeld2016-10-281-0/+87
* Mark JOBS_UNSAFE, it tries to use .a files before creating them.mat2016-10-281-0/+2
* Update 1.8.18 --> 1.8.18p1cy2016-10-282-4/+4
* - Fix buildamdmi32016-10-281-2/+15
* Document vulnerability in net/py-urllib3olivierd2016-10-281-0/+26
* Document latest flash plugin vulnerability.tijl2016-10-271-0/+34
* - Update to 4.07ehaupt2016-10-273-3/+6
* - Switch to options helpersamdmi32016-10-272-3/+4
* security/signify: update to 0.6jbeich2016-10-274-18/+7
* - Update to 2.10.0amdmi32016-10-274-47/+4
* Update to 1.5.1antoine2016-10-262-4/+4
* Fix FreeBSD-SA-16:32.bhyve to correctly document this affects FreeBSD-kernelfeld2016-10-261-1/+2
* Document revised FreeBSD-SA-16:15.sysarchfeld2016-10-261-7/+10
* Document FreeBSD-SA-16:32.bhyvefeld2016-10-261-0/+32
* Remove build dependency on the python symlinkantoine2016-10-251-5/+1
* - Mark broken on 9.x:amdmi32016-10-251-4/+5
* Bring in upstream commit ec165c392ca54317dbe3064a8c200de6531e89ad:bdrewery2016-10-252-1/+34
* Update to 20161017antoine2016-10-252-6/+6
* Update to 20161022antoine2016-10-252-5/+7
* Document flash vulnerabilitiesfeld2016-10-241-0/+53
* OPTIONS_SET/OPTIONS_UNSET are global variables, they cannot be used in ports ...mat2016-10-241-1/+1
* - Add LICENSEamdmi32016-10-241-6/+7
* - Update to 1.1.1.7antoine2016-10-232-4/+9
* New port: security/py-maecantoine2016-10-234-1/+48
* Update to 4.12.35antoine2016-10-232-5/+5
* Update to 1.1.24antoine2016-10-232-4/+4
* Update to 2.0.5antoine2016-10-232-4/+4
* Update to 0.1.1antoine2016-10-232-4/+4
* security/tsshbatch: update 1.228 -> 1.317pi2016-10-232-3/+5
* Fix build of the Qt interface on FreeBSD 10.2 and 10.3. On FreeBSD 10.1, itjhale2016-10-222-5/+14
* - update to 7.31ohauer2016-10-222-4/+4
* - update to 2.11.0flo2016-10-222-5/+5
* Use USES=pathfix where applicable.mat2016-10-217-24/+3
* Update to 0.041.vanilla2016-10-212-4/+4
* ${RM} already has -f.mat2016-10-2121-24/+24
* Reference MFSA for Thunderbird fixed by r423073jbeich2016-10-211-0/+2
* Document recent Firefox vulnerabilitiesjbeich2016-10-211-0/+28
* security/revealrk: update 1.2.1 -> 1.2.2pi2016-10-212-4/+4
* Remove expired PHP5.5 ports.rene2016-10-215-54/+0
* Unlink expired PHP5.5 ports.rene2016-10-211-4/+0
* security/p5-Crypt-OpenSSL-PKCS10: update 0.15 -> 0.16pi2016-10-212-5/+4
* - Update to 1.4zi2016-10-212-4/+4
* - Update to 5.36zi2016-10-218-188/+4
* Really fix build on 9.x for the c++ and Qt5 bindings;jhale2016-10-211-0/+6
* security/p5-Crypt-LE: update 0.18 -> 0.19pi2016-10-212-5/+4
* Remove non-php55 expired ports:rene2016-10-214-33/+0
* Add py-keystone 10.0.0, OpenStack Keystonenovel2016-10-215-0/+101
* Reassign makc's ports back to the pool.rakuco2016-10-201-1/+1
* Remove duplicate lines from plistantoine2016-10-202-8/+0
* security/suricata: Update to 3.1.2koobs2016-10-203-7/+6
* security/keepassx2: Update to 2.0.3cpm2016-10-203-20/+15
* [NEW PORT] security/keepassx-develcpm2016-10-205-0/+268
* - Update to 1.7.1jhale2016-10-206-14/+19
* - Update to 3.4.3amdmi32016-10-193-3/+15
* Add Linux CentOS 7 infrastructure ports.tijl2016-10-1946-0/+940
* security/rubygem-doorkeeper: Update from 3.1.0 to 4.2.0tz2016-10-192-4/+5
* - Update security/gpgme to 1.7.0jhale2016-10-1911-13/+323
* update gnupg to 2.1.15cmt2016-10-193-10/+11
* Fix some malformed <freebsdpr> entries in vuxmlfeld2016-10-191-10/+18
* Document vulnerability in Apache Axis2feld2016-10-191-0/+33
* Update security/tor to 0.2.8.9rene2016-10-196-15/+26
* Document remote denial of service vulnerability in security/tor*rene2016-10-191-0/+36
* Introduce new extensible virtual categories for KDEtcberner2016-10-192-6/+2
* Fix wrong range of vulnerable Rails 4 versionstz2016-10-181-4/+2
* Update to 3.4.16.tijl2016-10-183-8/+7
* security/gnome-ssh-askpass: Update version 5.8p2=>6.6p1bofh2016-10-173-11/+14
* Update the Linphone stack:tijl2016-10-176-9/+8
* Add DTLS-SRTP (RFC 5764) support for use within Linphone.tijl2016-10-172-1/+660
* security/p5-File-KeePass: Add p5-XML-Parser as dependency.woodsb022016-10-171-1/+2
* security/py-{acme,certbot}: Update to 0.9.3cpm2016-10-174-8/+8
* security/certificate-transparency: add missing patchpi2016-10-172-0/+12
* - Update to 0.18wen2016-10-172-4/+4
* Update to 1.1.1.6antoine2016-10-172-7/+11
* security/certificate-transparency: update 20160102 -> 20161015pi2016-10-1630-63/+46
* Update to 4.12.34antoine2016-10-162-6/+6
* Update to 0.0.8antoine2016-10-162-4/+4
* Update to 1.1.23antoine2016-10-162-4/+4
* Update to 0.2.4antoine2016-10-162-4/+4
* security/libkpass: Update to version 6woodsb022016-10-153-19/+8
* Rails 4: Document XSS Vulnerability in Action View andtz2016-10-141-0/+60
* Document multiple security issues of PHP 7.0tz2016-10-141-0/+39
* Document multiple security issues of PHP 5.6tz2016-10-141-0/+40
* security/py-{acme,certbot}: Update to 0.9.2cpm2016-10-134-8/+9
* - Set DIST_SUBDIR to handle distfile without version stringkmoore2016-10-132-5/+4
* - Add new port security/ngrokkmoore2016-10-134-0/+45
* - Switch couple more ports to verbose buildamdmi32016-10-132-3/+0
* Document file-roller vulnerabilityfeld2016-10-121-0/+29
* Document Virtualbox vulnerabilitiesfeld2016-10-121-0/+40
* Document ImageMagick vulnerabilitiesfeld2016-10-121-0/+30
* Document libgd vulnerabilitiesfeld2016-10-121-0/+35
* Document libvncserver vulnerabilitiesfeld2016-10-121-0/+35
* Document OpenOffice vulnerabilityfeld2016-10-121-0/+31
* Document mupdf vulnerabilitesfeld2016-10-121-0/+44
* Fix OpenSSL vuln version rangefeld2016-10-121-2/+2
* security/p5-Crypt-LE: add missing dependenciespi2016-10-121-1/+6
* Document openjpeg vulnerabilityfeld2016-10-111-0/+37
* Document redis vulnerabilityfeld2016-10-111-0/+31
* Update to 0.0108, and donate to the Perl collective.adamw2016-10-112-4/+5
* Fix typo in vuxml topicfeld2016-10-111-2/+2
* - update to 1.0.29dinoex2016-10-112-5/+5
* Document FreeBSD-SA-16:31.libarchivefeld2016-10-101-0/+33
* Document FreeBSD-SA-16:30.portsnapfeld2016-10-101-0/+35
* Document FreeBSD SA-16:29.bspatchfeld2016-10-101-0/+36
* Add FreeBSD SA info to recent BIND vulnerabilityfeld2016-10-101-0/+6
* Add FreeBSD SA info to recent OpenSSL vulnerabilityfeld2016-10-101-0/+6
* Thank you Uffe for your past work on FreeBSD ports! Hope you'll find timebsam2016-10-101-1/+1
* Update to 0.23.adamw2016-10-092-4/+5
* Update to 0.08 (which just improves the Makefile.PL), and stripadamw2016-10-092-4/+7
* devel/nspr, security/nss: drop version from SONAMEjbeich2016-10-0910-42/+14
* security/nss: update to 3.27.1 and define licensejbeich2016-10-094-8/+11
* Update to 4.12.31antoine2016-10-092-5/+6
* Update to 1.1.19antoine2016-10-092-4/+4
* New port: security/rubygem-rex-exploitationantoine2016-10-094-0/+30
* Update to 2.0.4antoine2016-10-092-4/+4
* Update to 2.0.4antoine2016-10-092-6/+4
* Update to 0.1.1antoine2016-10-092-4/+4
* Update to 0.1.66antoine2016-10-092-4/+4
* Document code execution vulnerability in mkvtoolnix < 9.4.1riggs2016-10-091-0/+27
* security/ca_root_nss: adjust pkg-plist to address leftover directorymarino2016-10-091-0/+1
* - Update to 0.81wen2016-10-092-4/+4
* security/acme-client: Bump port-revisionbrnrd2016-10-091-0/+1
* security/acme-client: Add STATIC optionbrnrd2016-10-082-2/+22
* Update the libXfixes version. The old version was still affected by thekwm2016-10-081-1/+2
* security/acme-client: Fixes for periodic scriptbrnrd2016-10-081-10/+10
* - set PORTSCOUT to ignoredinoex2016-10-081-0/+1
* security/xmlsec1: Fix build with LibreSSLbrnrd2016-10-082-2/+33
* - move DOCS and make them an optiondinoex2016-10-084-12/+26
* - use DATADIRdinoex2016-10-081-3/+3
* Document X.org client libraries insufficient validation of data fromkwm2016-10-081-0/+71
* security/openssl: Fix ldconfig issuebrnrd2016-10-071-1/+1
* Update to 0.2.21tj2016-10-072-4/+6
* - Bump portrevision for previous changeamdmi32016-10-061-1/+1
* - Bring back license installationamdmi32016-10-061-1/+7
* - Update to 2.4damdmi32016-10-062-19/+9
* Add math/gmp to LIB_DEPENDSjrm2016-10-051-1/+2
* security/arirant: remove USE_LIBRUBYswills2016-10-051-1/+3
* security/lynis:lme2016-10-053-4/+26
* security/openssl: Mark MAKE_JOBS_UNSAFEbrnrd2016-10-051-0/+2
* Add new port security/kdbx-viewerwoodsb022016-10-044-0/+49
* Update to version 1.0pawel2016-10-032-4/+4
* security/xmlsec1: unbreak on 9.xjbeich2016-10-031-0/+10
* security/openssl-devel: Align with security/opensslbrnrd2016-10-022-3007/+3001
* Update to 4.12.29antoine2016-10-022-6/+6
* Update to 1.1.16antoine2016-10-022-4/+4
* security/openssl: Modernize portbrnrd2016-10-022-1663/+1608
* Update to version 5.9p6pawel2016-10-012-6/+5
* Deprecate ports broken for more than 6 monthsantoine2016-10-012-0/+4
* - Mark broken: download link is no longer validamdmi32016-10-011-0/+2
* Chase php 5.5 expiration dateantoine2016-10-011-0/+3
* Remove expired ports:rene2016-10-0137-2137/+0
* Let USES=localbase add -L${LOCALBASE}/lib to LIBS instead of LDFLAGS.tijl2016-10-011-1/+1
* Add linux-c6-openssl to recent OpenSSL vulnerabilities.tijl2016-09-301-1/+5
* Update to 1.0.1e-48.el6_8.3.tijl2016-09-303-15/+15
* - update to 7.30ohauer2016-09-307-147/+14
* security/rubygem-doorkeeper: Remove Rails 3 optiontz2016-09-291-10/+1
* Record its need for OpenSSL, and do a first step into making it buildmat2016-09-291-1/+2
* - Reset maintainer to ports@wen2016-09-291-1/+1
* Update to 4.12.28antoine2016-09-292-4/+5
* New port: security/rubygem-rex-encoderantoine2016-09-294-0/+29
* Update to 0.1.6antoine2016-09-292-4/+4
* Add bind9-devel to the latest BIND9 vuln.mat2016-09-281-0/+4
* security/nss: update to 3.27jbeich2016-09-288-36/+36
* Document BIND remote DoS vulnerability.delphij2016-09-281-0/+39
* - Document the security vulnerability in py-django, py-django18 and py-django19.wen2016-09-281-0/+34
* security/libressl-devel: Update to 2.5.0brnrd2016-09-283-34/+13
* security/vuxml: Update recent OpenSSL vuln (add LibreSSL)brnrd2016-09-281-0/+9
* security/libressl: Update to 2.4.3brnrd2016-09-282-4/+4
* - Update to 1.0.11vsevolod2016-09-283-5/+5
* Update to 0.4.2 release.ale2016-09-273-7/+6
* - Update to 0.8wen2016-09-272-5/+6
* security/openssl-devel: Update to 1.1.0bbrnrd2016-09-263-5/+6
* security/openssl: Update to 1.0.2jbrnrd2016-09-262-12/+12
* security/vuxml: Add 2016-09-26 OpenSSL entriesbrnrd2016-09-261-0/+34
* - Add LICENSEamdmi32016-09-262-9/+8