aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Remove security/pf and security/authpf ports. They were only useful onpav2005-09-1521-1392/+0
* Document X11 server -- pixmap allocation vulnerability.lesi2005-09-151-0/+33
* Update to DAT 4581jeh2005-09-152-3/+3
* Drop maintainership, since I'm buried in the $REALLIFE stuff.krion2005-09-141-1/+1
* Add signing-party.jylefort2005-09-144-0/+81
* - Website is gonepav2005-09-141-1/+0
* Document unzip -- permission race vulnerability. [1]remko2005-09-141-1/+35
* Update to DAT 4580jeh2005-09-142-3/+3
* change USE_PERL5 to USE_PERL5_BUILD because perl is only needed during theoliver2005-09-131-1/+1
* - Fix WWWgarga2005-09-131-1/+1
* Update to DAT 4579jeh2005-09-132-3/+3
* Update to 0.3.6b that fixes build with samba 3.0.20.vsevolod2005-09-122-3/+3
* Update to 1.9.19lofi2005-09-123-14/+3
* Update to 0.9.12lofi2005-09-123-3/+15
* Update to 1.16skv2005-09-122-3/+3
* Update to 1.11skv2005-09-122-3/+3
* - Revive CONFLICTS with gnutls-devel [1]novel2005-09-112-4/+3
* Document firefox & mozilla -- buffer overflow vulnerability.simon2005-09-111-0/+97
* - Replace .error with IGNORE to prevent INDEX build failurespav2005-09-111-12/+3
* - Only for FreeBSD 4.X and 5.Xpav2005-09-111-0/+4
* Update to DAT 4578jeh2005-09-102-3/+3
* - Update WWWpav2005-09-101-4/+1
* - Update to 2.1.0pav2005-09-102-7/+3
* Don't CONFLICTS with gnutls-devel since it has been removed.novel2005-09-091-2/+0
* Update to 0.9.6lawrance2005-09-0923-503/+118
* Give maintainership to submitterlawrance2005-09-091-1/+1
* Update to DAT 4577jeh2005-09-092-3/+3
* Update to version 3.90krion2005-09-082-3/+4
* Assign maintainership to daniel@roe.chkrion2005-09-081-1/+1
* Update to DAT 4576jeh2005-09-082-3/+3
* s/BROKEN/IGNORE/lawrance2005-09-071-1/+1
* Mark broken for OSVERSION >= 500000. Does not build withoutlawrance2005-09-071-0/+4
* Forgot to uncomment OPTIONS after testing.novel2005-09-071-4/+4
* Mark the latest version of cups-base fixed for "xpdf -- disk fill DoSlawrance2005-09-071-2/+2
* - Patch file updated to process rule numbers above 999.leeym2005-09-073-10/+2
* Update to DAT 4575jeh2005-09-072-3/+3
* Add ncrypt 0.7.0, advanced AES file encryption tool.garga2005-09-066-0/+72
* - Pass maintainership to submitter, since he sent the last patch.garga2005-09-061-1/+1
* Update to DAT 4574jeh2005-09-062-3/+3
* Update WWW and MASTER_SITES.demon2005-09-062-2/+3
* Fix build with openssl-0.9.8.demon2005-09-063-12/+51
* Update to 0.4.4.marcus2005-09-064-8/+6
* Add IPSec tools port - the new "official" version of racoon,vsevolod2005-09-056-0/+185
* - clamsmtp 1.5 works only in debug mode.clsung2005-09-053-3/+60
* Revert back to devel/bisonade2005-09-051-1/+1
* - Update to 1.1sem2005-09-055-43/+4
* - Update to 1.1.4sem2005-09-053-4/+5
* Add forgotten </package> line.remko2005-09-041-0/+1
* Mark b2evolution prior to 0.9.0.12_2 vulnerable to the XML_RPC remote php cod...remko2005-09-041-1/+5
* - Unbreak vpnc-disconnect by fixing the config.c patchlawrance2005-09-043-19/+18
* Document htdig -- cross site scripting vulnerability.remko2005-09-041-0/+29
* - Document two squid security related issues.sem2005-09-041-0/+55
* Document bind9 -- denial of service.remko2005-09-041-0/+44
* Bcrypt is a blowfish file encryption utility which aims for cross-platformsem2005-09-044-0/+54
* ipguard listens network for ARP packets. All permitted MAC/IP pairssem2005-09-047-0/+83
* Document bind -- buffer overrun vulnerabilityremko2005-09-041-0/+28
* - update to 2.15leeym2005-09-042-4/+5
* - version 1.5 must start with '-d 4'clsung2005-09-032-3/+3
* Update to 4.1.9.novel2005-09-033-7/+22
* Correctly fix RUN_DEPENDSade2005-09-031-1/+1
* Update to DAT 4573jeh2005-09-032-3/+3
* Add p5-Net-Daemon-SSL 1.0, perl5 extension for portable daemons.garga2005-09-035-0/+42
* Fix build on 4-stable: Use ports version of libpcap since system versionse2005-09-031-1/+7
* Compile errors on ia64 and sparc64, do not build on those archs.se2005-09-031-0/+1
* - Update to 0.1.0.14garga2005-09-026-10/+28
* Add a more or less bogus reference section to the last entry, to make itsimon2005-09-021-0/+7
* Document stack overflow vulnerabilities in games/urban.jylefort2005-09-021-0/+22
* Update to DAT 4572jeh2005-09-022-3/+3
* - Switch bison dependency to bison175 portpav2005-09-021-1/+2
* Add p5-Net-OpenID-Server.jylefort2005-09-025-0/+50
* Add p5-Data-Password.jylefort2005-09-025-0/+37
* - Update to 4.2p1garga2005-09-025-146/+70
* Fix build with openldap23 libraries.vsevolod2005-09-011-1/+1
* Remove mastersite which has gone away.linimon2005-09-012-3/+1
* Update snortsms to version 1.0.0lawrance2005-09-013-7/+41
* - Update to 0.4.5pav2005-09-013-24/+35
* Update to DAT 4571jeh2005-09-012-3/+3
* - Update to 0.76sergei2005-08-312-5/+5
* Update to 0.9skv2005-08-313-7/+7
* - Update to 2.0.9pav2005-08-312-7/+30
* - Bandaid compilation on FreeBSD 5.2.1pav2005-08-311-0/+4
* - Revert back to MASTER_SITE_MOZILLApav2005-08-311-5/+2
* The distfile was rerolled to include a dbm subdirectory (which we no longermarcus2005-08-312-9/+6
* Now that misc/compat5x exists use the FreeBSD 5 binary on FreeBSD > 600004marius2005-08-311-4/+4
* Update to 1.8.novel2005-08-312-10/+10
* Update to DAT 4570jeh2005-08-312-3/+3
* - Distfile was rerolled; put old distfile on MASTER_SITE_LOCAL for nowpav2005-08-301-2/+5
* - Pass maintainership of gnutls, libtasn1 and opencdk ports tosergei2005-08-303-3/+3
* - Remove gnutls-devel port: this development version of GnuTLS librarysergei2005-08-304-122/+0
* - Disconnect gnutls-devel from the parent Makefile prior to removalsergei2005-08-301-1/+0
* upgrade to 0.0.16ijliao2005-08-304-4/+7
* upgrade to 0.0.22ijliao2005-08-303-3/+5
* Remove old library compatibility checking.sumikawa2005-08-301-4/+0
* Mark latest evolution port version as fixed wrt. evolution -- remotesimon2005-08-301-1/+2
* - Update to 2.0.2 that brings these upstream changes:garga2005-08-309-162/+9
* Update to DAT 4569jeh2005-08-302-4/+3
* Add entry for fswiki's vuln.kuriyama2005-08-291-0/+22
* - Update to 1.06pav2005-08-294-16/+84
* - Update to 1.3.6sem2005-08-293-9/+9
* - Update to 1.5.0sem2005-08-295-24/+39
* - Update to 0.75sergei2005-08-293-10/+30
* Update to DAT 4568jeh2005-08-292-3/+3
* Dante 1.1.15 is no longer affected by the fd_set bitmap index overflow.niels2005-08-291-2/+5
* Update amavisd-new to 2.3.3. [1]lesi2005-08-293-5/+3
* - Update to 1.5clsung2005-08-292-3/+3
* - Fill out part of the std. VuXML template missed in the last entry.simon2005-08-291-2/+3
* Update to 1.3lioux2005-08-293-96/+13
* Update to 0.2.7krion2005-08-282-3/+3
* Chase the libsoup shared lib version.marcus2005-08-281-1/+2
* Chase the Gaim 1.5.0 update.marcus2005-08-284-4/+4
* Document evolution -- remote format string vulnerabilities.simon2005-08-281-0/+43
* Document pam_ldap -- authentication bypass vulnerability.simon2005-08-281-0/+32
* Update to 1.8.0.marcus2005-08-284-11/+8
* Mark phpgroupware as vulnerable to pear-XML_RPC -- remote PHP codesimon2005-08-281-1/+6
* Document pcre -- regular expression buffer overflow.simon2005-08-271-0/+29
* Fix build on 6.xkrion2005-08-261-0/+3
* Fix build on 6.xkrion2005-08-241-0/+14
* Fix for broken build under 4.X.cy2005-08-241-4/+7
* Mark latest awstats port as fixed for awstats -- arbitrary codesimon2005-08-241-1/+2
* Document mail/elm remote buffer overflow vulnerability.sem2005-08-241-0/+34
* Fix a typo in the new rc file, where documentation didn't match thegarga2005-08-226-6/+9
* Fix so the distfile can be manually fetched for package buildinglawrance2005-08-201-16/+11
* - Security update to version 2.0.1, fixing four denial of service bugs,garga2005-08-2021-168/+471
* Document four vulnerabilities in openvpn:remko2005-08-191-0/+123
* - Update to 0.6.1.sem2005-08-198-514/+55
* Update the MASTER_SITES. This is the only part of PR/84815 what wasjeh2005-08-181-1/+2
* Also mark phpAdsNew as affected by "pear-XML_RPC -- remote PHP codesimon2005-08-181-1/+6
* Add the fixed version so that people do not get a stale portaudit when the up...remko2005-08-181-7/+7
* Document tor -- diffie-hellman handshake flaw.remko2005-08-181-0/+31
* gpdf has been fixed for "xpdf -- disk fill DoS vulnerability", mark itsimon2005-08-171-0/+4
* Add eGroupWare to the list of packages affected by "pear-XML_RPC --simon2005-08-171-0/+6
* Document acroread -- plug-in buffer overflow vulnerability.simon2005-08-171-0/+42
* Add phpmyfaq and drupal to the "pear-XML_RPC -- remote PHP codesimon2005-08-161-1/+15
* Document pear-XML_RPC -- remote PHP code injection vulnerability.simon2005-08-151-0/+36
* Document awstats -- arbitrary code execution vulnerability.simon2005-08-151-0/+45
* After further examination it turns out that gnugadu does not includesimon2005-08-131-2/+1
* Remove pl-gnugadu2 and kadu from being affected by libgadu -- multiplesimon2005-08-121-5/+0
* Document libgadu -- multiple vulnerabilities.simon2005-08-121-0/+78
* Document gaim -- AIM/ICQ away message buffer overflow and gaim --simon2005-08-121-0/+65
* Remove pdftohtml from the list of packages affected by xpdf -- disksimon2005-08-121-4/+0
* Document xpdf -- disk fill DoS vulnerability.simon2005-08-121-0/+45
* Mark apache 1.3.33_2 as fixed for apache -- http request smuggling.simon2005-08-111-2/+3
* Fix ports/84648 (Interactive tripwire's database update does not work on 5.x).cy2005-08-112-1/+15
* Fix a fetch error.cy2005-08-111-1/+2
* Update twpol.txt to make it current with 5.X and beyond.cy2005-08-103-1/+13
* Document gforge -- XSS and email flood vulnerabilities.simon2005-08-091-0/+46
* Fix compilation on FreeBSD 6 or later in the WITH_PTH case.lofi2005-08-092-3/+117
* Document postnuke -- multiple vulnerabilities.simon2005-08-081-0/+47
* Document mambo -- multiple vulnerabilities.simon2005-08-051-0/+41
* Correct the ranges for the IPSec advisory and the devfs advisory.remko2005-08-051-3/+3
* Document some recent FreeBSD advisories:remko2005-08-051-0/+105
* Add some more entries to the apache -- http smuggling vulnerability.remko2005-08-041-2/+14
* Disable automatic tests on all versions of FreeBSD as they seem to fail inmarcus2005-08-041-4/+4
* Disable the automatic tests on 4.X. They are known to fail.marcus2005-08-041-1/+1
* Document proftpd -- format string vulnerabilities.simon2005-08-041-0/+37
* Note that the fix for gnupg -- OpenPGP symmetric encryptionsimon2005-08-041-0/+9
* Mark p5-Crypt-OpenPGP, pgp, and pgpin as vulnerable to gnupg --simon2005-08-031-0/+7
* Mark latest gdal version as fixed for all tiff vulnerabilities.simon2005-08-021-9/+24
* UPdate to DAT 4547jeh2005-08-022-3/+3
* Fix build failure on 4.x.kuriyama2005-08-012-0/+8
* Added nbsmtp format string vulnerability.niels2005-08-011-0/+28
* Mark latest the linux-tiff and pdflib ports safe from latest tiffsimon2005-08-011-1/+8
* Update to KDE 3.4.2 / KOffice 1.4.1lofi2005-08-012-4/+4
* Upgrade to 1.4.2.kuriyama2005-08-014-12/+10
* Re-add IGNORE message for Alpha < 500035.marcus2005-08-011-0/+4
* Update to 2.0.8.thierry2005-08-012-3/+3
* - Update to 0.97leeym2005-08-012-3/+3
* Document sylpheed -- MIME-encoded file name buffer overflowsimon2005-07-311-0/+31
* Document phpmyadmin -- cross site scripting vulnerability.simon2005-07-311-0/+30
* Document gnupg -- OpenPGP symmetric encryption vulnerability.simon2005-07-311-0/+37
* - Look for libraries in LOCALBASEsem2005-07-311-0/+1
* Bump entry date.remko2005-07-311-1/+1
* Document vim -- vulnerabilities in modeline handling: glob, expand.remko2005-07-311-0/+36
* - Update to 20050730sem2005-07-312-3/+3
* * Update to 3.10 [1]marcus2005-07-3110-30/+916
* Document that ekg -- insecure temporary file creation was fixed insimon2005-07-311-1/+2
* Just remove the user if BATCH is set in env, don't ask for users feedback.oliver2005-07-311-1/+1
* Add pdflib-perl, fractorama, gdal, iv, ivtools, ja-iv, ja-libimg,simon2005-07-311-3/+56
* Change MAINTAINER address for ports maintained by the Security Team tosimon2005-07-313-3/+3
* Document tiff -- buffer overflow vulnerability.simon2005-07-301-0/+39
* - Misc. markup/whitespace fixes.simon2005-07-301-39/+23
* Document jabberd vulnerabilities that were fixed by the latest update.vsevolod2005-07-301-0/+37
* Be consistent and use the same title for the latest etherealsimon2005-07-301-1/+1
* Document opera -- image dragging vulnerability and opera -- downloadsimon2005-07-301-0/+78
* Document ethereal -- multiple vulnerabilities.simon2005-07-301-0/+71
* Fix build on amd64 with -fPICvs2005-07-301-0/+4
* Pass maintainership to last submittergarga2005-07-291-1/+1
* - Update to 0.1.0.12garga2005-07-296-6/+8
* - Fix pkg-plist and Unbreak the portgarga2005-07-292-4/+10
* * Update second master sitejeh2005-07-292-4/+4
* This package implements an algorithm for breaking the PkZip cipher that wasgarga2005-07-284-0/+77
* - Fix apache 2.1 range for CAN-2005-2088 entry which prevents apache 2.0 fromclement2005-07-281-1/+4
* Update to 0.7.9.marcus2005-07-284-12/+16
* Mark apache+mod_ssl-1.3.33+2.8.22_1 as not vulnerable in the latest Apache en...remko2005-07-281-1/+2
* Patch MASTER_SITE since they seem to redirect to a second one sometimesjeh2005-07-281-1/+2
* - Fix startup script for miltersem2005-07-282-2/+3
* There must be an curse. s/il/li/.remko2005-07-281-7/+7
* Update my latest Apache entry to make clear that this only affects certainremko2005-07-281-1/+12
* update to DAT 4544jeh2005-07-282-3/+3
* Document apache -- http request smuggling.remko2005-07-271-0/+64
* Add courierpasswd, a user authentication and password changing utilityade2005-07-275-0/+56
* - Update to 1.7ahze2005-07-272-3/+3
* - Update to 1.2.8pav2005-07-273-15/+6
* Fix URL of project web site.se2005-07-271-1/+1
* Update to DAT 4543jeh2005-07-272-3/+3
* TLSWrap is a TLS/SSL FTP wrapper/proxy for UNIX and Windows, allowing you togarga2005-07-274-0/+49
* New port: Yersiniase2005-07-278-0/+386
* BSDsfv is a flexible and highly compatible SFV checksum utility.garga2005-07-274-0/+52
* This utility creates .SFV (Simple File Verify) and .PAR (Parity Archive) datagarga2005-07-274-0/+56
* Set modified date in entry for previous commit.erwin2005-07-261-0/+1
* Note that the fd_set vulnerability in net/bld was fixed in 0.3.3erwin2005-07-261-1/+4
* Document clamav -- multiple remote buffer overflows.hrs2005-07-251-0/+46
* - Update to 0.86.2sem2005-07-252-3/+3
* Update to 4541jeh2005-07-252-3/+3
* Don't overwrite installed aide.conf by using -f FILEnork2005-07-241-1/+1
* Update to 2.2.5.mezz2005-07-249-1081/+95
* update to 0.57oliver2005-07-234-31/+63
* - update distinfoleeym2005-07-231-2/+2
* - Document isc-dhcpd -- format string vulnerabilities (oldersimon2005-07-231-1/+37
* This port is scheduled for deletion on 2005-09-22 if it is still brokenkris2005-07-231-0/+2
* Add entry for eGroupWare's recent vulnerabilities.kuriyama2005-07-231-0/+31
* Document denial of service attack in fetchmail 6.5.2.1.barner2005-07-221-0/+30
* Update my email address.vsevolod2005-07-227-7/+7
* Update phppgadmin entry to note that it was fixed in 3.5.4 and add asimon2005-07-221-1/+4
* Change MASTERSITE from ~renato to ~garga because I change my accountgarga2005-07-221-1/+1
* Document dnrd -- remote buffer and stack overflow vulnerabilities.simon2005-07-221-0/+33
* Fix typo in last commitsimon2005-07-211-1/+1
* Add more references to latest fetchmail entry [1] and sort referencessimon2005-07-211-1/+4
* - Fix a bug in SHA256sem2005-07-212-0/+12
* - Update to 1.3.5pav2005-07-215-44/+10
* Document an issue with the LDAP backend provided by PowerDNS.trhodes2005-07-211-0/+30
* BROKEN on !i386: Does not compilekris2005-07-211-0/+4
* Document fetchmail -- remote root/code injection from malicious POP3simon2005-07-211-0/+28
* Bridge betwean ClamAV antivirus software and Squid caching proxy.garga2005-07-216-0/+129
* s/freebsd.org/FreeBSD.org/marcus2005-07-211-1/+1
* - Revive security/ruby-acl port and unbreak itpav2005-07-206-0/+82
* - Fix plist and unbreak [1, 2]pav2005-07-204-17/+20
* - Update to 2.0.8pav2005-07-209-6/+12
* - Update to 2.0.8pav2005-07-209-9/+12
* - Update to 1.1pav2005-07-203-4/+7
* - Update to 0.3.1novel2005-07-204-6/+15
* Update to 4538jeh2005-07-202-3/+3
* - Update to 1.4.2pav2005-07-192-4/+4
* - Use PLIST_FILESpav2005-07-193-2/+4
* o add kdebase (kate) vulnarability.mich2005-07-191-0/+33
* - Update to 0.2.1pav2005-07-192-4/+4
* - Update to 1.4pav2005-07-192-11/+8
* Update to 4537jeh2005-07-192-3/+3
* This module brings to Python programs the capability of evaluating passwordpav2005-07-195-0/+58
* - fix manpagesdinoex2005-07-181-2/+0