aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Update to 5.3.2garga2015-06-094-4/+23
* Document two strongswan vulnerabilities.delphij2015-06-091-0/+59
* - add freebsd-mips targetdinoex2015-06-091-7/+13
* Document redis EVAL Lua sandbox escape vulnerability.delphij2015-06-091-0/+37
* Update to 20150608 snapshotbdrewery2015-06-092-3/+3
* security/fcrackzip: Take MAINTAINERSHIPbofh2015-06-094-8/+10
* Add an entry for www/tidy-* heap-buffer-overflow.thierry2015-06-091-0/+40
* Fix typo and remove PHP from pcre vulnerabilities, as the bundled pcredelphij2015-06-081-25/+2
* Document fixed version of pcre in e69af246-0ae2-11e5-90e4-d050996490d0.delphij2015-06-081-2/+2
* - Fix shebangsamdmi32015-06-071-1/+3
* MIT KRB5 ports build unusable binaries due to incorrect linkingcy2015-06-074-6/+10
* - Update VuXMLsunpoet2015-06-071-2/+6
* - Update to 2.0.2sunpoet2015-06-072-3/+3
* Update ocaml-ssl to 0.5.1johans2015-06-062-3/+3
* security/ca_root_nss: Enable certificate verification (for Base OpenSSL)koobs2015-06-061-0/+3
* - Re-add PHP removed in previous commitzi2015-06-061-1/+13
* - Fix shebangsamdmi32015-06-061-2/+3
* - Update to 1.69sunpoet2015-06-062-3/+5
* - Update to 2.0.1sunpoet2015-06-062-3/+3
* - Make version matching on the pcre vuln a little more sanezi2015-06-051-13/+2
* Document two recent pcre vulnerabilities that can be triggered bydelphij2015-06-051-0/+49
* Fix spellgarga2015-06-051-1/+1
* security/p5-Crypt-OpenSSL-X509: 1.8.04 -> 1.8.06pi2015-06-042-4/+6
* - Add CPE infoamdmi32015-06-041-1/+1
* Update information for graphics/libraw.osa2015-06-041-2/+7
* - Add NO_ARCHsunpoet2015-06-041-0/+1
* - Update to 2.016jadawin2015-06-032-3/+3
* Add openssh-portable-devel which is based on the upstream snapshots for stagi...bdrewery2015-06-0229-1/+2783
* security/munge: Add munged_flags in rc filebofh2015-06-021-12/+9
* - Drop @dirrm* from plistamdmi32015-06-021-3/+0
* - Drop @dirrm* from plistamdmi32015-06-021-1/+0
* - Drop @dirrm* from plistamdmi32015-06-021-1/+0
* security/vuxml: multiple vulnerabilities of wpa_supplicant and hostapdmarino2015-06-021-0/+47
* security/wpa_supplicant: Address 3 latest security advisoriesmarino2015-06-025-1/+166
* Update to 4.1.2tijl2015-06-0210-229/+123
* Update 1.12.3 --> 1.12.4cy2015-06-023-71/+3
* Document recent ffmpeg0 vulnerabilitiesjbeich2015-06-021-0/+125
* Add entry for vulnerable versions of avidemux2 and avidemux26riggs2015-06-021-0/+39
* security/vuxml: add www/rubygem-rest-client vulnerabilitiesmmoll2015-06-021-0/+59
* Adjust after rubygem-jsobfu updateantoine2015-06-021-0/+2
* - Update NSS and ca_root_nss to 3.19.1jbeich2015-06-014-7/+7
* - Strip libraryamdmi32015-06-012-4/+2
* - Fix licenseamdmi32015-06-012-6/+5
* - Strip binaryamdmi32015-06-012-2/+4
* - Add LICENSEamdmi32015-06-011-1/+8
* - Strip librariesamdmi32015-06-012-2/+4
* - Drop @dirrm* from plistamdmi32015-06-012-3/+6
* - Drop @dirrm* from plistamdmi32015-06-012-2/+4
* - Strip libraryamdmi32015-06-011-7/+6
* - Strip libraryamdmi32015-06-011-1/+5
* security/libressl: Backport change for missing EGD featurebrnrd2015-06-013-0/+12
* - Add kodi to 57325ecf-facc-11e4-968f-b888e347c638 [1]delphij2015-06-011-4/+8
* Reflect CVE-2015-2060 and CVE-2014-9556.delphij2015-06-011-0/+65
* - Clarify LICENSEamdmi32015-06-012-43/+46
* - Add LICENSE_FILEamdmi32015-06-012-11/+14
* - Strip libraryamdmi32015-06-011-1/+2
* - Update RUN_DEPENDSsunpoet2015-06-012-2/+2
* - Document django vulnerability CVE-2015-3982lwhsu2015-06-011-0/+67
* - Update to 0.4.2sunpoet2015-05-312-3/+3
* Update to 2.2.1jhale2015-05-313-4/+4
* - Add NO_ARCHamdmi32015-05-312-0/+2
* - Fix shebangsamdmi32015-05-311-2/+4
* - Fix shebangsamdmi32015-05-311-2/+4
* - Fix shebangsamdmi32015-05-311-2/+3
* Extend 57325ecf-facc-11e4-968f-b888e347c638 to cover rawstudio as well.delphij2015-05-311-2/+8
* - Update to 2.2.1sunpoet2015-05-312-3/+3
* Cleanup USE_GITHUB usage.mat2015-05-312-4/+3
* - Update to 0.17sunpoet2015-05-302-3/+3
* - Fix shebangsamdmi32015-05-301-2/+4
* security/afterglow: Fix PORTSCOUT to skip 2.0 beta versionbofh2015-05-301-0/+1
* - Drop @dirrm* from plistamdmi32015-05-302-3/+1
* Document the issue with proxychains-ng which uses current directory whendelphij2015-05-301-0/+30
* - Add LICENSE_FILEamdmi32015-05-291-3/+1
* - Switch to USES=autoreconfamdmi32015-05-291-2/+2
* Document wireshark multiple vulnerabilities.delphij2015-05-291-0/+66
* Apply vendor patch for CVE-2015-2694 (changesetdelphij2015-05-292-1/+66
* Document krb5 requires_preauth bypass in PKINIT-enabled KDC.delphij2015-05-291-0/+35
* - Update to 0.40amdmi32015-05-283-4/+4
* Unbreak INDEXamdmi32015-05-281-1/+1
* - Update to 0.400amdmi32015-05-283-4/+9
* This module provides a secure, efficient, and simple interface foramdmi32015-05-285-0/+38
* - Update to 2.9.7.3zi2015-05-282-3/+4
* - Don't cat pkg-message from Makefilesamdmi32015-05-273-10/+0
* - Update to upstream version 1.20amdmi32015-05-272-16/+8
* Retrofit document cURL multiple vulnerabilities.delphij2015-05-271-0/+107
* new port: security/rubygem-rack-oauth2mmoll2015-05-274-0/+31
* Switch PYTHON_REL from a 3 digits number to a 4 digits number to handleantoine2015-05-273-3/+3
* - Fix build with clang < 3.6 (which doesn't recognize -fforce-addr option)amdmi32015-05-271-2/+14
* security/gnupg20: update signature file.xmj2015-05-261-2/+2
* Fix build with mono 4antoine2015-05-256-1/+121
* Upgrade to 0.022.vanilla2015-05-254-111/+7
* - Rename security/qtkeychain to qtkeychain-qt5, update to 0.5.0 and make it u...madpilot2015-05-2511-110/+59
* - Update to 1.01sunpoet2015-05-253-6/+8
* - Move security/rubygem-rc4 to security/rubygem-ruby-rc4sunpoet2015-05-244-5/+5
* - Add LICENSEsunpoet2015-05-241-1/+2
* - Add LICENSEsunpoet2015-05-242-2/+3
* - Add LICENSEsunpoet2015-05-241-0/+2
* - Update WWWsunpoet2015-05-241-1/+1
* - Mark DEPRECATED and set EXPIRATION_DATE to 2015-06-30sunpoet2015-05-241-0/+3
* - Add LICENSEsunpoet2015-05-241-0/+2
* - Update dist signature file.kuriyama2015-05-241-2/+2
* Document cassandra remote code execution vulnerability.delphij2015-05-241-0/+47
* Fix version range for previous commit.delphij2015-05-241-1/+1
* Extend CVE-2015-3456 to cover xen-tools (4.5.0-4.5.0_5: we didn't supporteddelphij2015-05-241-1/+12
* document possible vulnerabilities in sysutils/py-saltxmj2015-05-241-0/+42
* Add entry for mail/davmail.pi2015-05-241-0/+28
* Update security/metasploit to 4.11.2antoine2015-05-2416-35/+33
* Update to 0.6.1antoine2015-05-232-3/+3
* Update to 1.0.29antoine2015-05-232-6/+6
* Document dnsmasq and -devel vulnerabilities (CVE-2015-3294 and one other in rc).mandree2015-05-231-0/+65
* Document PCRE and PHP multiple vulnerabilities.delphij2015-05-231-0/+100
* Update Shibboleth and opensaml to latest version.girgen2015-05-236-30/+32
* Correct PR number.delphij2015-05-231-1/+2
* Add experimental patch by Gert Döring to fix PR #194745.mandree2015-05-232-2/+72
* Remove $FreeBSD$ from patches files everywhere.mat2015-05-2316-44/+0
* Add new port: security/py-critsdvl2015-05-236-0/+1050
* Record some minor PostgreSQL sercurity problems.girgen2015-05-231-0/+53
* Fix plist when LIBDANE is defined (PORTREVISION not bumpeddelphij2015-05-231-2/+2
* Update to 3.3.15.delphij2015-05-223-33/+113
* Use new DES_ methods instead of the long deprecated des_ methods.delphij2015-05-222-3/+47
* Pass full path to the vuln.xml file to extra-validation.py. Without this,delphij2015-05-222-2/+6
* - Add LICENSEsunpoet2015-05-221-3/+4
* - Update to 0.79sunpoet2015-05-222-3/+3
* Properly register info pageantoine2015-05-222-1/+2
* Properly register info pageantoine2015-05-222-1/+2
* - Update to 0.8.0amdmi32015-05-225-29/+26
* Update to 2.2.2.bdrewery2015-05-212-5/+7
* Fix patchingantoine2015-05-211-1/+1
* Document CVE-2015-3306 proftpd mod_copy unauthenticated copying of filesdelphij2015-05-211-0/+29
* Fix spelling of "certification authority"bjk2015-05-211-1/+1
* - Drop @dirrm* from plistamdmi32015-05-201-1/+0
* - Drop @dirrm* from plistamdmi32015-05-201-1/+0
* Add patch to force port to link against qt4, as the port Makefilemadpilot2015-05-202-0/+71
* Document vulnerability in security/ipsec-tools.brd2015-05-201-0/+26
* Document new vulnerabilities in www/chromium < 43.0.2357.65rene2015-05-201-0/+84
* Update ipsec-tools with a patch from NetBSD to fix a memory leak.brd2015-05-202-0/+15
* Upgrade to 2.1.4 (bugfixes since 2.1.2).kuriyama2015-05-192-5/+5
* Document ClamAV multiple vulnerabilities.delphij2015-05-191-0/+47
* remove uneeded 'cd'vanilla2015-05-191-1/+0
* Add tmux-cssh 20150518, clusterSSH features using tmux, but not X11.vanilla2015-05-194-0/+35
* - Drop @dirrm* from plistamdmi32015-05-191-2/+0
* - Drop @dirrm* from plistamdmi32015-05-191-1/+0
* Add references to security/pinentry-tty.olgeni2015-05-192-0/+2
* security/pinentry:makc2015-05-193-3/+23
* - Update to 0.28.0amdmi32015-05-195-35/+70
* - Drop @dirrm* from plistamdmi32015-05-191-1/+0
* - Update to 0.28.0amdmi32015-05-192-6/+6
* Replace most occurences of github.com in MASTER_SITES with USE_GITHUB usage.mat2015-05-198-14/+18
* New port: security/hitch:zi2015-05-188-0/+217
* security/py-libnacl: Update to 1.4.2koobs2015-05-182-3/+3
* - Drop @dirrm* from plistamdmi32015-05-182-5/+3
* security/vuxml: Add CVE-2015-3900 entry for devel/ruby-gemsmmoll2015-05-171-0/+42
* Add patch to support syslog in verbose modefeld2015-05-172-1/+28
* Document qemu "VENOM" vulnerability - CVE-2015-3456nox2015-05-171-0/+44
* Update the Linphone stack: belle-sip 1.4.1, libbzrtp 1.0.2, ortp 0.24.2,tijl2015-05-172-4/+3
* - fix build for armv8dinoex2015-05-171-3/+7
* - update to 1.0.25dinoex2015-05-172-6/+4
* Add security/keepass, the official KeePass client.adamw2015-05-176-0/+88
* Avoid a potential read overflow. This was not deemed a security issue bybdrewery2015-05-172-1/+18
* Use my FreeBSD address as MAINTAINERjohans2015-05-161-1/+1
* Document Quassel IRC vulnerability CVE-2015-3427makc2015-05-161-0/+28
* - Fix an error in apg(1) and apgd(8) man pagesmatthew2015-05-165-23/+29
* - Update ocaml-ssl to 0.4.7, now from Githubjohans2015-05-162-7/+9
* Reset 14 ocaml ports maintained by Jaap Boender per his requestmarino2015-05-162-2/+2
* Correct entry for apache-openoffice-* / libreoffice CVE-2015-1774 sotruckman2015-05-161-1/+3
* - Drop @dirrm* from plistamdmi32015-05-161-1/+0
* - Add LICENSEsunpoet2015-05-162-11/+18
* - Drop @dirrm* from plistamdmi32015-05-162-5/+1
* - Clarify LICENSEamdmi32015-05-162-8/+2
* Update to 0.6.0antoine2015-05-153-13/+11
* security/vuxml: document vulnerability in rubygem-redcarpet <3.2.3mmoll2015-05-151-0/+29
* security/vuxml: Add CVE-2015-3885 entry for graphics/ufrawrodrigo2015-05-151-0/+33
* Revert r386285, removing exists() check on RUN_DEPENDS, for now.bdrewery2015-05-151-1/+3
* Update to libssh 0.7.0johans2015-05-143-6/+6
* MASTER_SITES cleanup.mat2015-05-1485-162/+93
* - Remove useless MASTER_SITE_SUBDIRmatthew2015-05-141-15/+8
* Don't use exists() for the ssh dependency. The RUN_DEPENDS line alreadybdrewery2015-05-141-3/+1
* - Drop @dirrm* from plistamdmi32015-05-141-6/+0
* - Update to 0.07sunpoet2015-05-142-5/+7
* - Cleanup GH_* knobs:sunpoet2015-05-142-4/+3
* Record two new phpMyAdmin security vulnerabilitiesmatthew2015-05-141-0/+43
* Document multiple vulnerabilities in www/linux-*-flashplugin11.xmj2015-05-131-0/+93
* security/suricata: Add PPPoE supportkoobs2015-05-132-0/+265
* VuXML: document recent mozilla vulnerabilitiesjbeich2015-05-131-0/+104
* - Update NSS and ca_root_nss to 3.19jbeich2015-05-134-6/+6
* This port links against libcrypto, so use the openssl header and not the libm...antoine2015-05-132-1/+2
* This port doesn't use libssl or libcryptoantoine2015-05-131-2/+1
* security/passivedns: restore consistency in snapshot naming after r386136jbeich2015-05-122-3/+3
* security/passivedns: unbreak buildjbeich2015-05-123-16/+6
* security/suricata: Update to 2.0.8koobs2015-05-122-4/+3
* security/vuxml: Add CVE-2015-0971 entry for security/suricatakoobs2015-05-121-0/+37
* Simplify by using DISTVERSION.mat2015-05-121-2/+1
* Update to 2.0.0b3erwin2015-05-123-5/+8
* Cleanup DIST* variables.mat2015-05-124-6/+4
* Revert r385940,r385932,r385864:delphij2015-05-121-1012/+906
* Move p5- ports from ports@ to perl@.mat2015-05-114-4/+4
* new port: security/rubygem-omniauth-shibbolethmmoll2015-05-114-0/+26
* Update to 0.6.5 to fix CVE-2015-3146 (null pointer dereference).rakuco2015-05-113-11/+11
* Add entry for CVE-2015-3146 in security/libssh.rakuco2015-05-111-0/+32
* Fix armv5 build.cy2015-05-102-1/+2
* new port: security/rubygem-omniauth-multipasswordmmoll2015-05-104-0/+27
* - fix a second postfix entryohauer2015-05-101-5/+5
* Correct version range.delphij2015-05-101-5/+5
* new port: security/rubygem-omniauth-gitlabmmoll2015-05-104-0/+28
* new port: security/omniauth-bitbucketmmoll2015-05-104-0/+28
* new port: security/rubygem-doorkeepermmoll2015-05-094-0/+35
* Update 1.13.1 --> 1.13.2cy2015-05-092-4/+3
* - Drop @dirrm* from plistamdmi32015-05-091-5/+0
* * is not valid for version number, replace all instances with 0 and bumpdelphij2015-05-091-906/+1012
* - Add LICENSEamdmi32015-05-092-3/+5
* - Drop @dirrm* from plistamdmi32015-05-091-7/+0
* - Don't install static libraries with INSTALL_LIB (part 2/2)amdmi32015-05-092-5/+5
* VuXML: update sqlite3 entry with verbose descriptions. CVE-2015-341[4-6]jbeich2015-05-091-5/+31
* - Update to 1.5.4jhale2015-05-093-5/+5
* - Add LICENSEamdmi32015-05-081-0/+3
* - Reassign to the heap after sahil@'s bit was taken in for safekeepingculot2015-05-081-1/+1
* - Add empty directory to plistamdmi32015-05-081-0/+1
* Is_INTERACTIVE should not be used.mat2015-05-081-1/+2
* - Mark IS_INTERACTIVE, as it needs interactive license comfirmationamdmi32015-05-081-0/+1
* security/ruby-camellia: unbreak build for ruby 2.1+mmoll2015-05-084-8/+47
* - Fix shebangsamdmi32015-05-081-2/+3
* Document HWP filter vulnerability in editors/libreoffice < 4.3.7 andtruckman2015-05-081-0/+37
* Unbreakantoine2015-05-081-0/+1
* Update ports in the remaining categories to not use GH_COMMIT.mat2015-05-0826-60/+36
* Update ports in the s* categores to not use GH_COMMIT.mat2015-05-0818-39/+24
* Remove deprecated GH_COMMIT (DEVELOPER=yes warning)ache2015-05-082-3/+2
* Document current and previous wordpress vulnabilities.kwm2015-05-071-0/+113
* - Add CPE infoamdmi32015-05-071-1/+1
* Update fail2ban to version 0.9.2ache2015-05-073-6/+16
* Fix clients getting 'Bad packet length' and 'Disconnecting: Packet corrupt'bdrewery2015-05-072-8/+11
* - Update to 2.8sbz2015-05-072-4/+6
* GnuTLS tries to use /usr/local/share/certs/ca-root-nss.crt. Instead ofbdrewery2015-05-061-0/+3
* security/whatweb: update to latest github revisionrm2015-05-063-8/+23
* - Update to 1.2.1wen2015-05-052-3/+3
* - Update to 0.5.1wen2015-05-052-3/+3
* Update to 1.6.0feld2015-05-055-50/+26
* + Update patch set for crypto engine fix [1].mandree2015-05-0511-186/+310
* Update to 0.98.7garga2015-05-053-6/+6
* - Add USE_OCAML_CAMLP4 and USE_OCAML_TK to bsd.ocaml.mk which addmadpilot2015-05-041-2/+1
* By request, reset maintainership of multiple portseadler2015-05-042-2/+2
* - This port explicitly requires perl 5.18+amdmi32015-05-041-1/+1
* Fix some _DEPENDSantoine2015-05-031-4/+3
* - Update to 2.0.1lwhsu2015-05-033-45/+6
* Add build dependency on camlp4, which is no longer part of ocamljohans2015-05-021-0/+2
* Fix version range of two ancient items.delphij2015-05-021-3/+4
* security/py-backports.ssl_match_hostname: set for deprecationrm2015-05-021-0/+3
* security/py-certifi: update to 2015.04.28rm2015-05-022-6/+6
* Rename py-certify to py-certifi to conform upstream name.rm2015-05-024-1/+1
* security/py-flask-httpauth: update to 2.5.0rm2015-05-022-3/+3
* Add entry for powerdns and powerdns-recursor.brd2015-05-011-0/+34