aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Update to 2.9.7.5zi2015-07-243-9/+16
* Document wordpress XSSfeld2015-07-241-0/+34
* Document libidn out-of-bounds read issue with invalid UTF-8 inputfeld2015-07-231-0/+29
* Document buffer overflow vulnerabilities in SoXfeld2015-07-231-0/+58
* Shibboleth SP software crashes on well-formed but invalid XML.girgen2015-07-238-27/+16
* Document CVE assignment in iPython 3.2.1 entry.olgeni2015-07-231-0/+2
* Fix build with new libcaca when CACASAVER is onmartymac2015-07-232-1/+13
* Update to 1.8.14p3garga2015-07-222-3/+3
* Add gdk-pixbuf2 vulnability.kwm2015-07-221-0/+26
* security/vault: update to 0.2.0swills2015-07-223-137/+12
* - Fix ksh shebangkuriyama2015-07-221-3/+6
* Update to 1.8.14p2garga2015-07-212-4/+3
* Remove expired ports:rene2015-07-217-84/+0
* Adjust range for apache22feld2015-07-211-1/+1
* Document PCRE buffer overflowfeld2015-07-201-0/+36
* Fix moodle reference URLfeld2015-07-201-1/+2
* Document Cacti Multiple XSS and SQL injection vulnerabilitiesfeld2015-07-201-0/+44
* - Fix installation with DOCS broken by my last commitgarga2015-07-201-5/+1
* Fix build WITHOUT=NLS.mat2015-07-201-0/+41
* - Replace DISTVERSION by PORTVERSION otherwise it ends up as 1.8.14.p1,garga2015-07-205-17/+15
* Update to 1.8.14p1garga2015-07-192-3/+3
* Document php-phar vulnerabilitiesfeld2015-07-191-0/+37
* zenphoto was assigned CVEsfeld2015-07-191-0/+5
* Document recent Moodle security advisoriesfeld2015-07-191-0/+48
* package name is mariadb100, not mariadb10feld2015-07-191-1/+1
* MySQL SSL Downgrade affects the client not the serverfeld2015-07-191-11/+3
* Add missing <cvename> to apache entryfeld2015-07-181-0/+1
* Add missing apache22 packages for other "workers"feld2015-07-181-0/+4
* Apache 2.2.31 is now public, fixing CVE-2015-3183feld2015-07-181-0/+30
* CVE now assigned to squidfeld2015-07-181-1/+2
* security/pinentry:makc2015-07-173-3/+27
* Update to 1.8.14garga2015-07-172-5/+3
* Update flash entry.kwm2015-07-171-3/+3
* Correct range for libavfeld2015-07-171-1/+1
* Document zenphoto vulnerabilitiesfeld2015-07-171-0/+28
* Document groovy vulnerabilityfeld2015-07-171-0/+35
* Document libav vulnerabilityfeld2015-07-171-0/+27
* Add a new port for mbed TLS 2.0.0 (formerly polarssl)tijl2015-07-165-0/+156
* Document recent multiple mozilla vulnerabilitiesjbeich2015-07-161-0/+116
* - Update NSS and ca_root_nss to 3.19.2jbeich2015-07-164-8/+7
* - Drop @dirrm* from plistamdmi32015-07-161-1/+0
* - Drop @dirrm* from plistamdmi32015-07-161-1/+0
* - Drop @dirrm* from plistamdmi32015-07-161-1/+0
* Add PolarSSL < 1.2.14 issues.mandree2015-07-161-0/+28
* Latest libxml2 vulnerability also affects linux-*-libxml2tijl2015-07-161-0/+9
* Document linux-*-libxml2 vulnerabilitiestijl2015-07-161-2/+29
* Document linux-c6-flac vulnerabilitiestijl2015-07-161-0/+5
* - Add LICENSE_FILEamdmi32015-07-161-1/+11
* security/tclgpg: new portrobak2015-07-164-0/+36
* - Note that the previous commit has added missing USES=perl5amdmi32015-07-161-0/+1
* Update to nss-3.19.1-3.el6_6tijl2015-07-163-28/+29
* Update to libssh2-1.4.2-1.el6_6.1tijl2015-07-162-6/+7
* Update to cyrus-sasl-lib-2.1.23-15.el6_6.2tijl2015-07-152-8/+7
* - Document multiple security issues for libwmffeld2015-07-151-0/+103
* Reference another URL for tidy's CVEfeld2015-07-151-0/+1
* CVEs have been assigned for tidyfeld2015-07-151-0/+3
* Document multiple apache24 vulnerabilitiesfeld2015-07-151-0/+43
* Fix typo in flash security bulletin.kwm2015-07-151-2/+2
* - Update url of latest Flash plugin advisorytijl2015-07-151-4/+19
* Add an openvpn-polarssl that selects PolarSSL for its default TLS provider.mandree2015-07-153-2/+16
* Development ceased, broken with modern ssh (lots of options just do not work)bapt2015-07-154-46/+0
* - Fix shebangsamdmi32015-07-151-0/+6
* - Fix shebangsamdmi32015-07-151-2/+8
* - Fix shebangsamdmi32015-07-151-1/+3
* - Fix shebangsamdmi32015-07-151-2/+4
* Add security/elixir-comeonin, a password hashing library for Elixir.olgeni2015-07-146-0/+60
* Use the correct package name for linux-*-flashplugintijl2015-07-141-20/+20
* security/pinentry:makc2015-07-141-1/+4
* Use correct <tag> to mark all versions vulnerable.kwm2015-07-141-2/+2
* Add newest flash vulnerabilities CVE-2015-5122 and CVE-2015-5123.kwm2015-07-141-0/+35
* Document php sqlite3 use-after-free vulnerabilityfeld2015-07-141-1/+34
* Document php spl use-after-free vulnerabilityfeld2015-07-141-0/+33
* Document PHP arbitrary code execution. No CVE assigned yet.feld2015-07-141-1/+36
* php 5.4 package name is php5, not php54feld2015-07-141-2/+2
* Document CVE-2015-3152 "BACKRONYM" vulnerabilityfeld2015-07-141-0/+61
* - Update to 0.9.5.jkim2015-07-143-17/+3
* hadoop2 and oozie ports fetch a version of tomcat that is vulnerablefeld2015-07-131-0/+9
* Document CSRF remote execution vulnerability for devel/ipython (CVE pending).olgeni2015-07-131-0/+42
* Document freeradius vulnerabilityfeld2015-07-131-0/+44
* Correct range for non-devel version of v8feld2015-07-131-0/+3
* - Drop @dirrm* from plistamdmi32015-07-131-1/+0
* - Modernize plistamdmi32015-07-132-10/+4
* - Drop @dirrm* from plistamdmi32015-07-131-3/+0
* - Drop @dirrm* from plistamdmi32015-07-131-1/+0
* - Switch to @sampleamdmi32015-07-132-12/+5
* CVE-2015-5380 also affects v8 and v8-develfeld2015-07-131-2/+8
* - Drop @dirrm* from plistamdmi32015-07-131-3/+0
* - Switch to @sampleamdmi32015-07-132-9/+5
* Advisory URL was identical; remove duplicatefeld2015-07-131-1/+0
* PowerDNS discovered the fix for CVE-2015-1868 was not complete in thefeld2015-07-131-2/+6
* Add note on how to use the new html functionalityfeld2015-07-131-1/+2
* Add ability to produce html files for vuxml entriesfeld2015-07-133-1/+417
* - Add NO_ARCHsunpoet2015-07-131-1/+2
* security/wpa_supplicant: Address security issue (2015-5)marino2015-07-122-1/+22
* - refelct mod_wsgi3 => mod_wsgi3 updateohauer2015-07-121-1/+2
* - Add xen-tools to the list of packages fixed in existingbapt2015-07-121-0/+5
* Document all recent xen-kernel and xen-tools security issuesbapt2015-07-121-0/+604
* Upgrade to 0.025.vanilla2015-07-122-3/+3
* - Revive security/chkrootkitriggs2015-07-116-0/+109
* Document a few pivotx vulnerabilitiesbapt2015-07-111-0/+55
* Update squid entry to reflect new range of affected versionsfeld2015-07-101-16/+12
* - add more manpage linksdinoex2015-07-101-0/+4
* Document wpa_supplicant WPS_NFC option payload length validationdelphij2015-07-101-0/+26
* Document OpenSSL alternative chains certificate forgery vulnerability.delphij2015-07-101-0/+36
* - Security update to 1.0.2ddinoex2015-07-104-23/+51
* - Correct the version range of www/py-django-devellwhsu2015-07-101-4/+4
* document django vulnerabilitiesfeld2015-07-091-0/+96
* node and iojs vuln now has a CVE assignedfeld2015-07-091-1/+2
* - Update to 5.20zi2015-07-092-3/+3
* Drop .la files.kwm2015-07-092-3/+2
* - update to 1.0.26dinoex2015-07-092-3/+3
* security/libressl: Update to 2.2.1brnrd2015-07-094-10/+10
* Document Adobe Flash Plugin vulnerability (CVE-2015-5119)tijl2015-07-091-0/+36
* Fix other no-op formatting mistakes for the roundcube entryfeld2015-07-091-2/+2
* Fix formatting by adding some breaksfeld2015-07-091-6/+6
* security/p5-Dancer2-Plugin-Auth-Extensible update 0.400 -> 0.401pgollucci2015-07-082-3/+3
* Make version range closer to reality -- this should be a no-op (use of P2delphij2015-07-081-2/+2
* -base options for dns/bind have been gone now. Cover them with <gt>0</gt>delphij2015-07-081-2/+6
* Document BIND remote resolver DoS vulnerability when DNSsec validationdelphij2015-07-081-0/+45
* cups-filters mentions wrong CVE in some placesfeld2015-07-071-0/+2
* Document haproxy information leakfeld2015-07-071-0/+36
* Document roundcube vulnerabilitiesfeld2015-07-071-0/+39
* security/py-pyscard: Make supported Python versions explicitkoobs2015-07-071-1/+1
* [NEW] security/py-pyscard: Smartcard module for Pythonkoobs2015-07-074-0/+40
* Document SQL Injection in turnserverfeld2015-07-071-0/+26
* - Fix packaging failure due to incorrectly generated plistamdmi32015-07-071-6/+6
* - Add NO_ARCHsunpoet2015-07-071-0/+1
* Document recent squid vulnerabilitiesfeld2015-07-071-0/+83
* Use correct end tag.kwm2015-07-061-1/+1
* Add iojs as affected packagefeld2015-07-061-0/+6
* Correct bitcoin range for CVE-2015-3641feld2015-07-061-1/+1
* Document ansible vulnerabilitiesfeld2015-07-061-0/+188
* Document bitcoin CVE-2015-3641feld2015-07-061-0/+32
* add node-devel as affected packagefeld2015-07-061-0/+4
* add www/node denial of service vulnerabilityfeld2015-07-061-0/+29
* deprecate unused rubygem- portsmmoll2015-07-062-0/+6
* security/libsparkcrypto: Fix on i386marino2015-07-052-0/+10
* cups-filters CVE-2015-3279feld2015-07-041-0/+39
* Fix range for linux-c6-openssltijl2015-07-031-2/+2
* Update to 1.0.1e-30.el6.11tijl2015-07-032-6/+6
* Add USES=alias to 11 ports (non-invasive DragonFly support)marino2015-07-031-1/+1
* security/amavisd-milter: Remove pre-everything checkmarino2015-07-031-12/+0
* - Update mail/courier-imap to 4.16.2madpilot2015-07-034-16/+17
* Set NO_ARCH for remaining rubygem-* ports with no arch dependent filespgollucci2015-07-0317-0/+33
* - Update to 0.20sunpoet2015-07-022-5/+4
* - Upgrade to 2.1.6 (minor bugfixes).kuriyama2015-07-022-5/+5
* security/sslsplit: update to 0.4.11swills2015-07-013-34/+3
* Record libxml2 vulnabilitykwm2015-07-011-0/+30
* Correct version range for netpbm CVE-2015-3885feld2015-07-011-3/+2
* Upgrade to 0.024.vanilla2015-07-012-4/+3
* Document games/wesnoth authentication information disclosure vulnerability.delphij2015-07-011-0/+40
* - Document CVE-2015-3258 (cups-filters buffer overflow vulnerability)amdmi32015-07-011-0/+38
* Document ntp remote control message DoS vulnerability.delphij2015-07-011-0/+40
* security/rubygem-gssapi: update to 1.2.0mmoll2015-07-013-5/+8
* - Update to 0.8.1amdmi32015-07-012-10/+10
* remove BROKEN. Port now builds with django16dvl2015-07-011-2/+0
* Remove expired ports:rene2015-07-014-33/+0
* security/py-crits must use django v1.6 and will not work with v1.8dvl2015-06-301-2/+3
* Update to 3.4.0.wxs2015-06-302-3/+3
* Update to 3.4.0.wxs2015-06-304-18/+5
* After r390893, chmod u+w/u-w for stripping perl XS modules is unnecessary,adamw2015-06-293-6/+0
* security/vault: add missing line to rc scriptswills2015-06-292-0/+3
* - Add NO_ARCHsunpoet2015-06-291-0/+1
* - Update to 1.70sunpoet2015-06-282-3/+3
* - Mark ONLY_FOR_ARCHS: uses x86 assemblyamdmi32015-06-271-6/+5
* - Make xsel run dependency optional - it makes clipboard pastingpawel2015-06-271-2/+11
* Document qemu pcnet guest to host escape vulnerability - CVE-2015-3209nox2015-06-271-0/+36
* security/clambc is not jobs safe.marino2015-06-271-0/+2
* security/vault: create portswills2015-06-276-0/+227
* Document CVE-2014-3120, CVE-2014-6439, CVE-2015-1427, CVE-2015-3337,delphij2015-06-261-0/+210
* - Mark BROKEN on 9.x:amdmi32015-06-261-0/+2
* security/afl: Update to 1.83bdelphij2015-06-262-4/+4
* - Mark BROKEN on 9.x:amdmi32015-06-251-0/+2
* - Mark BROKEN on 9.x:amdmi32015-06-251-0/+2
* security/py-libnacl: Update to 1.4.3koobs2015-06-253-4/+17
* Split CVE-2015-4152 to its own entry as the affected port is logstash only.delphij2015-06-251-11/+75
* Add entry for logstash-forwarder/logstash.delphij2015-06-251-0/+53
* Support changed ETCDIR in pkg-plistbdrewery2015-06-252-7/+5
* Aggressively mark more consumers of bundled dcraw as vulnerablejbeich2015-06-251-2/+47
* Allow user overriding ETCDIRbdrewery2015-06-251-1/+2
* Update to 20150624 snapshotbdrewery2015-06-252-3/+3
* - Update to 1.4.11sunpoet2015-06-252-5/+10
* - Update to 1.80bamdmi32015-06-253-522/+16
* Convert all p5-Test-use-ok dependencies to p5-Test-Simple, but only onadamw2015-06-251-3/+8
* Document linux-*-flashplugin11 CVE.xmj2015-06-241-0/+41
* - Add LICENSEsunpoet2015-06-241-0/+2
* Remove expired portrm2015-06-244-26/+0
* - Add NO_ARCHsunpoet2015-06-231-0/+1
* - Update to 1.2.1sunpoet2015-06-232-3/+4
* Fix entry date.delphij2015-06-231-1/+1
* Document rubygem-bson DoS and possible injection vulnerability.delphij2015-06-231-0/+30
* Document 3 vulnerabilities with PHP that affected 4 extensions.delphij2015-06-231-0/+60
* Reflect version range change after r390340. While I'm there, also fixdelphij2015-06-231-2/+5
* Document vulnerabilities in devel/ipython < 3.2.0.olgeni2015-06-231-0/+36
* Remove deprecated USE_RCORDER which was already off except if one enforcedbapt2015-06-231-4/+0
* security/py-backports.ssl_match_hostname: add comment on blocker PRrm2015-06-231-0/+1
* Document new vulnerabilities in www/chromium < 43.0.2357.130rene2015-06-231-0/+49
* Document rubygem-paperclip validation bypass vulnerabilitiy.delphij2015-06-221-0/+36
* Document lang/chicken vulnerabilities CVE-2014-9651 and CVE-2015-4556.delphij2015-06-221-0/+64
* Document cacti multiple vulnerabilities (affects < 0.8.8c) anddelphij2015-06-221-0/+86
* Convert to USES=autoreconfbapt2015-06-221-6/+1
* - Update to 0.18sunpoet2015-06-212-3/+4
* Add p5-Dancer vuln.kuriyama2015-06-201-0/+30
* Fix fetchamdmi32015-06-191-2/+2
* remove target 'regression-test', it's on perl5.mk already.vanilla2015-06-191-3/+0
* Fix: pkg-static: POST-INSTALL script failedcy2015-06-191-30/+31
* Document Drupal multiple vulnerabilities.delphij2015-06-191-0/+76
* - Strip binariesamdmi32015-06-191-0/+5
* - Fix library installationamdmi32015-06-191-2/+2
* Chase py-ldap2 rename in more ports that I missed.rm2015-06-191-1/+1
* Fix build on non-root user.vanilla2015-06-181-0/+2
* 1: bump version for add depends to p5-JSON.vanilla2015-06-181-0/+10
* Upgrade to 0.023.vanilla2015-06-182-3/+3
* Document two vulnerabilities of cURL.delphij2015-06-181-0/+71
* - Make it compatible with Python 3.xsunpoet2015-06-181-1/+1
* - Document Ruby on Rails multiple vulnerabilitiessunpoet2015-06-181-0/+67
* Mark BROKEN: Depends on conflicting versions of djangoantoine2015-06-181-0/+2
* Modify a5f160fa-deee-11e4-99f8-080027ef73ec so it covers ja-mailman too.delphij2015-06-181-0/+5
* A Python library for parsing PGP packetsdelphij2015-06-174-0/+25
* Document testdisk multiple vulnerabilities.delphij2015-06-171-0/+40
* Update to 0.15.1.delphij2015-06-172-3/+3
* - Update to 5.19zi2015-06-162-4/+5
* - Add missing perl run-dependencyamdmi32015-06-162-3/+5
* - Simplify docs and plist handlingamdmi32015-06-161-12/+6
* Update to 201523.delphij2015-06-162-4/+3
* Document Tomcat multiple vulnerabilities.delphij2015-06-161-0/+49
* - Update to 1.2.0sunpoet2015-06-162-4/+3
* Update to 2.6.0 release.ale2015-06-153-8/+6
* Update PHP ports:ale2015-06-152-2/+0
* Update to 1.5.5jhale2015-06-153-5/+5
* Bump PORTREVISION because of svn commit r389649cs2015-06-151-0/+1
* fix broken pkg-plistcs2015-06-151-4/+0
* - update to upstream svn r269ohauer2015-06-155-69/+209
* security/libressl: Update to 2.2.0brnrd2015-06-144-10/+128
* Add py-gpsoauth, a Python client library for Google Play Services OAuthriggs2015-06-144-0/+39
* - Upgrade to 0.36.kuriyama2015-06-142-4/+7
* - Upgrade to 2.0.28 (bugfixes).kuriyama2015-06-142-5/+5
* - Add NO_ARCHsunpoet2015-06-141-0/+1
* - Update RUN_DEPENDS: use newer rubygem-racksunpoet2015-06-141-1/+3
* - Update RUN_DEPENDS: use newer rubygem-racksunpoet2015-06-141-1/+2
* - Updated libsodium to 1.0.3 [1]vsevolod2015-06-146-5/+9
* - Update WWWsunpoet2015-06-131-1/+1
* Sort entries.olgeni2015-06-131-1/+1
* - Upgrade to 2.1.5 (bugfixes, minor enhancements).kuriyama2015-06-132-6/+6
* - Update to 0.9.6tota2015-06-132-5/+4
* - Update to 0.6.8tota2015-06-133-17/+17
* - update to 1.0.2cdinoex2015-06-132-12/+12
* - Update security/polarssl13 to 1.3.11tijl2015-06-139-110/+92
* - use portable cpu option for sparcv8dinoex2015-06-121-5/+6
* - fix path in SIZE linesdinoex2015-06-121-3/+3