aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Update 2.9.4 --> 2.9.6cy2016-02-056-9/+25
* - Update unbound to 1.5.7erwin2016-02-042-2/+2
* Document webkit CVE-2014-1748.kwm2016-02-041-0/+30
* security/py-rsa: Update to 3.3 (Fixes CVE-2016-1494)koobs2016-02-043-22/+21
* security/vuxml: Add CVE-2016-1494 for security/py-rsakoobs2016-02-041-0/+37
* Document new asterisk ports vulnerabilities.madpilot2016-02-041-0/+37
* security/suricata: Add netmap IPS mode to pkg-messagekoobs2016-02-042-1/+13
* security/pwman: document ncurses requirement (USES+=ncurses)marino2016-02-042-0/+30
* security/yapet: document ncurses requirement (USES+=ncurses)marino2016-02-041-1/+1
* x11/xterm: document ncurses requirement (USES+=ncurses)marino2016-02-042-1/+12
* security/mdcrack: document ncurses rqmt (USES+=ncurses), respect LDFLAGSmarino2016-02-041-1/+2
* security/krb5-appl: document ncurses requirement (USES+=ncurses)marino2016-02-041-1/+1
* security/ckpass: document ncurses requirement (USES+=ncurses)marino2016-02-041-0/+1
* - Update RUN_DEPENDS: use Rails 4sunpoet2016-02-041-1/+2
* - Add letsencrypt.shsunpoet2016-02-046-0/+84
* Document py-salt vulnerabilityfeld2016-02-041-0/+32
* - Fix build on OSVERSION < 1000015tota2016-02-031-1/+9
* Horde package update:mm2016-02-0312-18/+18
* Update Nettle to 3.2 (ABI compatible)johans2016-02-036-47/+5
* - Document Ruby on Rails multiple vulnerabilitiessunpoet2016-02-031-0/+71
* security/suricata: Update to 3.0koobs2016-02-032-3/+3
* security/py-{letsencrypt,acme}: Update to 0.3.0koobs2016-02-025-26/+16
* Document that the linux curl ports are still vulnerable.kwm2016-02-021-1/+10
* Document net/socat vulnerabilityfeld2016-02-021-0/+31
* - Update to 0.23.0sunpoet2016-02-022-9/+24
* security/govpn: 5.3 -> 5.4pi2016-02-022-3/+3
* - Update to 2.023jadawin2016-02-012-3/+3
* [NEW] security/stud: Scalable TLS Unwrapping Daemonkoobs2016-02-014-0/+40
* Add a new option to conditionalize xconv installationgarga2016-02-015-13/+17
* Document recent Mozilla vulnerabilitiesjbeich2016-02-011-0/+79
* Document multiple vulnerabilities in gdcmjunovitch2016-02-011-0/+35
* security/libressl-devel: Update to 2.3.2brnrd2016-01-315-109/+31
* security/libressl: Update to 2.2.6brnrd2016-01-313-5/+6
* - Fix x11/linux-c6-xorg-libs entry as fixedmiwi2016-01-311-2/+2
* security/clamav: document ncurses requirement (USES+=ncurses)marino2016-01-311-1/+1
* - Mark linux-c6* entys as fixedmiwi2016-01-311-5/+6
* Welcome Centos 6.7miwi2016-01-3124-106/+112
* ftp/curl: Fix vuxml version checkbrnrd2016-01-311-2/+2
* On FreeBSD, using TIOCSCTTY ioctl to get a controlling tty.kevlo2016-01-301-8/+21
* vuxml: fix version range for nginx which has a PORTEPOCHfeld2016-01-301-1/+1
* Document www/nginx vulnerabilitiesfeld2016-01-301-0/+35
* Document www/typo3 and www/typo3-lts vulnerabilitiesfeld2016-01-301-0/+36
* vuxml: Fix owncloud discovery datefeld2016-01-301-1/+1
* Document www/nghttp2 vulnerabilityfeld2016-01-301-0/+28
* vuxml: Fix openssl entry so `make validate` doesn't throw errorsfeld2016-01-301-36/+36
* Document www/owncloud vulnerabilitiesfeld2016-01-301-0/+38
* vuxml: radicale entry needs python prefixes for packagenamefeld2016-01-291-1/+4
* Document www/radicale vulnerabilitiesfeld2016-01-291-0/+29
* - Add new port: security/R-cran-openssltota2016-01-295-0/+44
* - Update to 5.30zi2016-01-292-3/+3
* - Do not #include <unistd.h> twice in the same filedanfe2016-01-293-13/+3
* - Update to 1.9.18zi2016-01-292-3/+3
* - Update to 1.1.1zi2016-01-293-189/+3
* - Update to 4.2zi2016-01-292-8/+7
* Add 9 security advisories for phpMyAdmin:matthew2016-01-291-0/+295
* Update to 1.96b.rakuco2016-01-292-11/+9
* vuxml for prosody CVE-2016-0756.lx2016-01-291-0/+28
* - add new manpagesdinoex2016-01-292-4/+9
* - report OpenSSL 1.0.2e vulnerabilitydinoex2016-01-281-0/+53
* - Security update:dinoex2016-01-282-12/+14
* security/vuxml: Document cURL vulnerabilitybrnrd2016-01-281-0/+30
* Add patch to fix build on ARM v6johans2016-01-273-4/+26
* Update to 0.027.vanilla2016-01-272-3/+3
* Upgrade security/elixir-comeonin to version 2.1.0.olgeni2016-01-262-3/+3
* Document Wordpress cross site scripting vulnerabilityjunovitch2016-01-261-0/+40
* Document recent privoxy security vulnerabilitiesjunovitch2016-01-261-0/+149
* Document potential privilege escalation via symlink misconfiguration in sudojunovitch2016-01-261-0/+32
* Remove BROKEN_FreeBSD_8 from all remaining ports.rakuco2016-01-261-1/+0
* security/govpn: update 5.2 -> 5.3robak2016-01-252-3/+3
* Fix use as a regular userantoine2016-01-251-0/+4
* Upgrade security/elixir-comeonin to version 2.0.3.olgeni2016-01-252-3/+3
* Update to 0.20antoine2016-01-252-5/+6
* security/slurpie: change use of _offset to ftellpi2016-01-246-10/+18
* - Update to 0.6.9tota2016-01-242-3/+3
* Update to 1.4.0antoine2016-01-244-16/+9
* Update to 20160108antoine2016-01-242-4/+6
* - Update to 20160120danilo2016-01-243-28/+4
* Bump versions to chase Nettle shared library updatejohans2016-01-241-0/+1
* Update to Nettle 3.1.1johans2016-01-243-11/+23
* - Update to 1.17sunpoet2016-01-232-3/+3
* - Update to 0.17sunpoet2016-01-232-4/+6
* - Add p5-Bytes-Random-Secure 0.29sunpoet2016-01-235-0/+49
* - Add p5-Crypt-Random-Seed 0.03sunpoet2016-01-235-0/+37
* - Add p5-Crypt-Random-TESHA2 0.01sunpoet2016-01-235-0/+32
* - Add p5-Dancer2-Plugin-Auth-Extensible-Provider-DBIC 0.501sunpoet2016-01-235-0/+42
* C++ implementation of I2P clientamdmi32016-01-235-0/+90
* Document graphics/imlib2 vulnerabilitiesfeld2016-01-231-0/+31
* Recent BIND vulnerabilities are supposed to be in separate entriesfeld2016-01-231-12/+35
* - Update to 0.501sunpoet2016-01-222-3/+4
* Upgrade to 1.6.0.vanilla2016-01-223-3/+5
* Upgrade to 1.6.0.vanilla2016-01-223-3/+7
* Document new vulnerabilities in www/chromium < 48.0.2564.82rene2016-01-221-0/+53
* - Update to 0.15jadawin2016-01-212-3/+3
* Document NTP multiple vulnerabilities.delphij2016-01-211-0/+74
* Document cgit -- multiple vulnerabilitiesjunovitch2016-01-211-0/+34
* PAM-modules is a collection of useful PAM modules and command linefeld2016-01-215-0/+74
* Document bind vulnerabilitiesfeld2016-01-211-0/+35
* - Update to 0.8.25sunpoet2016-01-202-3/+3
* Upgrade to 1.5.2.vanilla2016-01-202-3/+3
* Upgrade to 1.5.2.vanilla2016-01-202-3/+3
* Upgrade to 0.500.vanilla2016-01-203-4/+8
* Fix the KERB_GSSAPI option using the latest patch from Debian.bdrewery2016-01-204-26/+49
* Document claws-mail CVEpawel2016-01-201-0/+33
* - Make the tor ports create /var/run/tor and /var/log/tor directories, so it ...amdmi32016-01-196-20/+26
* Fix formatting in man page for xinetd.conf.olgeni2016-01-191-0/+11
* - Fix libproxy rangesunpoet2016-01-191-10/+6
* Document several vulnerabilities in libarchivejunovitch2016-01-191-0/+52
* Use @samplebapt2016-01-192-4/+2
* Upgrade to 1.5.1.vanilla2016-01-193-3/+26
* Upgrade to 1.5.1.vanilla2016-01-193-3/+49
* devel/ruby-gems: update to 2.5.1swills2016-01-181-4/+4
* Document go information disclosure vulnerabilityjunovitch2016-01-181-0/+49
* Fix build.trasz2016-01-181-0/+1
* Correct vulerable package version entries for ffmpeg entry in r406293riggs2016-01-181-2/+2
* Document isc-dhcpd CVEfeld2016-01-181-0/+48
* Remove deprecated @dirrm, convert to @dir where neededpawel2016-01-182-7/+2
* - Update to 1.3.1sunpoet2016-01-173-5/+4
* - Add LICENSE_FILEsunpoet2016-01-171-0/+2
* - Update to 3.1.0sunpoet2016-01-172-3/+3
* - Update to 1.3.5sunpoet2016-01-172-3/+5
* Document CVE-2012-4504 in net/libproxy and its slave ports.rakuco2016-01-171-0/+59
* Document usage of vulnerable ffmpeg prior to 2.8.5 in mplayer/mencoderriggs2016-01-171-0/+7
* Document zero day remote vulnerability in ffmpeg 2.0.0 - 2.8.4riggs2016-01-171-0/+35
* security/john: Fix OPENMP option having no effectpi2016-01-172-3/+8
* Allow building in poudriere or from ports when gnupg is not yet installedantoine2016-01-171-5/+5
* - Update to 3.0.2miwi2016-01-172-4/+3
* Update signing-party to 2.2johans2016-01-172-3/+3
* - Remove x-generate-plist target using deprecated @dirrmpawel2016-01-171-12/+2
* Remove deprecated @dirrmpawel2016-01-161-7/+1
* Update to upstream version 0.1.0riggs2016-01-162-6/+4
* - Update to 4.5.0amdmi32016-01-163-6/+7
* Update to 0.24, and adjust TEST_DEPENDS.adamw2016-01-162-5/+5
* Update to 1.16.adamw2016-01-162-3/+3
* Fix OpenSSH version ranges.bdrewery2016-01-161-3/+5
* - Document h2o -- directory traversal vulnerabilitymiwi2016-01-151-0/+27
* security/dropbear: support extra arguments in rc.confgahr2016-01-151-1/+2
* Document OpenSSH CVE-2016-0777 and CVE-2016-0778.bdrewery2016-01-151-0/+32
* Update to 7.1p2bdrewery2016-01-152-4/+4
* - Update to 5.2miwi2016-01-142-4/+4
* - fix startup order conflictdinoex2016-01-142-2/+4
* - add commentsdinoex2016-01-141-1/+7
* Document two vulnerabilities in Prosodyjunovitch2016-01-141-0/+31
* Document Kibana 4.x XSS vulnerabiltyjunovitch2016-01-141-0/+38
* Update WWWcs2016-01-141-1/+1
* PORTREVISION due to update of security/go.cryptocs2016-01-141-15/+2
* security/openssl: Fix No-SSLv3 optionbrnrd2016-01-141-2/+2
* - Update to 0.2.7.6amdmi32016-01-132-4/+7
* security/libgpg-error: update to 1.21novel2016-01-133-5/+4
* - Update to latest versioncs2016-01-133-64/+11
* Convert LICENSE= "GPLxx # or later" to "GPLxx+"amdmi32016-01-1333-33/+33
* Add entry for CVE-2015-8607 in devel/p5-PathTools.rakuco2016-01-121-0/+34
* Add Public Domain support to ports license framework. You can now useamdmi32016-01-122-6/+1
* - Update to 5.1miwi2016-01-122-3/+3
* - Update to 2.022jadawin2016-01-122-3/+3
* Add an 'up' script for resolvconf integration, ...mandree2016-01-121-0/+27
* - Update to 4.0.1lme2016-01-123-22/+29
* Repair breakage on older make implementations (FreeBSD 9.3).mandree2016-01-121-6/+7
* Update security/easy-rsa to major release 3.0.1.mandree2016-01-129-30/+99
* security/binwalk: 2.0.2 -> 2.1.1pi2016-01-122-4/+3
* - php -- multiple vulnerabilitiesmiwi2016-01-111-0/+62
* This is is a set of Python bindings for the scrypt key derivation function.miwi2016-01-114-0/+40
* Provide rc vars defaults.cy2016-01-113-7/+19
* Update plone stack to 4.3.7rm2016-01-1113-36/+38
* Convert ports from s* t* and net* categories to USES=sqlite and USES=firebirdbapt2016-01-111-2/+1
* PyCryptodome is a fork of PyCrypto. It brings the followingmiwi2016-01-104-0/+50
* Google's Certificate Transparency project is an open framework for monitoringtrasz2016-01-1027-0/+398
* - Update to 0.8.0miwi2016-01-102-3/+6
* - Update to 7.0miwi2016-01-102-3/+3
* PyOTP is a Python library for generating and verifying one-time passwords. Itmiwi2016-01-104-0/+27
* Update to upstream version 0.0.5riggs2016-01-092-4/+9
* - Switch to options helpersamdmi32016-01-092-17/+14
* Add entry for CVE-2015-8557 in textproc/py-pygments.rakuco2016-01-091-0/+33
* - Update to 2015.71miwi2016-01-092-4/+4
* - Update to 1.1.0zi2016-01-095-8/+195
* Fix distinfoantoine2016-01-092-5/+3
* - Update to 5.29zi2016-01-093-201/+3
* Add openjdk7 to the existing java vuxml entryfeld2016-01-091-0/+6
* Document polkit vulnerabilitiesfeld2016-01-091-0/+48
* Document net/librsync collision vulnerabilityfeld2016-01-091-0/+28
* Document fixed version of graphics/exact-imagefeld2016-01-091-3/+2
* Document devel/m6811-binutils is also vuln to older CVEsfeld2016-01-091-0/+5
* - Update to 2.9.8.0zi2016-01-093-5/+5
* - Switch to options helpersamdmi32016-01-082-18/+21
* - Remove unused pkg-plistmiwi2016-01-081-15/+0
* Upgrade to new upstream release 2.3.10.mandree2016-01-082-7/+11
* Document ntp remote denial of service vulnerability.delphij2016-01-081-0/+35
* [NEW] security/py-pymacaroons-pynacl: Macaroon library for Pythonkoobs2016-01-085-0/+71
* [NEW] security/py-pysaml2: Python implementation of SAML Version 2koobs2016-01-086-0/+72
* [NEW] security/py-signedjson: Sign JSON with Ed25519 signatureskoobs2016-01-084-0/+40
* Document two dhcpcd vulnerabilitiesjunovitch2016-01-081-0/+34
* security/nss: update to 3.21jbeich2016-01-086-13/+171
* security/govpn: update 4.2 -> 5.0robak2016-01-073-8/+9
* Fix Polar SSL version in r405428tijl2016-01-071-1/+1
* Update to PolarSSL 1.3.16 and mbed TLS 2.2.1tijl2016-01-074-6/+6
* Document mbedTLS/PolarSSL SLOTH vulnerabilitytijl2016-01-071-0/+32
* - Add options helpermiwi2016-01-071-0/+7
* - Convert to options helpermiwi2016-01-071-0/+2
* - Add LICENSEmiwi2016-01-071-0/+3
* Update to 1.5.7.rakuco2016-01-072-3/+3
* Update to 3.1.24.romain2016-01-072-3/+3
* - Update WolfSSL to 3.8.0 (new MASTER_SITES, WWW entry and description)johans2016-01-074-26/+36
* Correct version range in kea entry.delphij2016-01-061-2/+2
* - Mark DEPRECATED (obsoleted by upstream)miwi2016-01-061-2/+4
* - Update to 1.2.2miwi2016-01-062-9/+7
* Assign to new volunteer after previously being released to the wild.linimon2016-01-061-1/+1
* Document Xen Security Advisories (XSAs 159, 160, 162, 165, 166)junovitch2016-01-061-2/+157
* ecurity/libressl: Take MAINTAINER'shipbrnrd2016-01-061-1/+1
* - Fix broken zenmap-root scriptamdmi32016-01-052-8/+6
* Document CVE-2015-8665 and CVE-2015-8683 in graphics/tiff.rakuco2016-01-051-0/+51
* - Cleanup empty linesmiwi2016-01-051-3/+0
* Another fix caused by r405285. Use package name in topic instead of origin.ehaupt2016-01-051-1/+1
* Fix package name.ehaupt2016-01-051-1/+1
* Document CVE-2015-7696, CVE-2015-7697ehaupt2016-01-051-0/+32
* Document CVE-2015-8369 in net-mgmt/cacti.rakuco2016-01-051-0/+31
* security/libressl-devel: Add next-stable LibreSSL 2.3 portbrnrd2016-01-057-0/+1719
* security/libressl-devel: Revert non-repocopied commitbrnrd2016-01-058-1743/+0
* Update to 3.11.0.1. Release to ports@, as I haven't run this for many years.lx2016-01-053-17/+13
* Document CVE-2015-8373.hrs2016-01-051-0/+50
* Hook creduce and libressl-devel to the buildantoine2016-01-051-0/+1
* Update GStreamer1 to 1.6.2.kwm2016-01-041-1/+1
* security/libressl-devel: Add next-stable LibreSSL 2.3 portbrnrd2016-01-048-0/+1743
* PyNaCl is a Python binding to the Networking and Cryptography library, a cryptomiwi2016-01-045-0/+49
* - Update to 0.2.2miwi2016-01-042-3/+3
* Document a buffer overflow in www/mini_httpd < 1.23rene2016-01-041-0/+32
* - Update to 5.7.1sunpoet2016-01-042-5/+5
* Extend VuXML entry for QEMU DoS in AMD PC-Net II NIC support to cover Xenjunovitch2016-01-031-1/+7
* - Update to 1.95bmiwi2016-01-033-17/+7
* Document recent QEMU denial of service vulnerabilitiesjunovitch2016-01-031-0/+420
* - Pass maintainership to ports-secteam, with a explicit approval for gecko@miwi2016-01-021-1/+1
* Document several older QEMU vulnerabilitiesjunovitch2016-01-021-0/+206
* Backport patch from upstream trunk for 'hangs forever' issueriggs2016-01-025-1/+104
* Use a more specific BROKEN message.rakuco2016-01-022-3/+3
* Fix MASTER_SITES and unmark BROKEN.rakuco2016-01-022-4/+2
* Switch to a working MASTER_SITE and unmark BROKEN.rakuco2016-01-022-6/+3
* Remove perl5.16-specific bits from perl@ ports. While here, sortadamw2016-01-021-7/+1
* Document several older QEMU vulnerabilitiesjunovitch2016-01-021-0/+161
* Switch from cdn.bitbucket.org to bitbucket.org to fix fetching.rakuco2016-01-021-1/+1
* Update to 20150830cs2016-01-012-25/+41
* Include source file in the ports tree; use rc scriptriggs2016-01-016-42/+863
* Document lang/mono vulnerabilityfeld2015-12-311-0/+28
* Update libbeid to 4.1.11tijl2015-12-313-6/+6
* - Add LICENSEamdmi32015-12-312-19/+14
* Remove expired ports:rene2015-12-316-532/+0
* - prepare for devel/subversion17 removalohauer2015-12-302-14/+2
* - Rename nonstandard src directory to filesak2015-12-305-13/+11
* - Update to 3.2.2sunpoet2015-12-303-4/+7
* - Add rubygem-omniauth-cas3 1.1.3sunpoet2015-12-304-0/+32
* Document latest flash vulnabilities.kwm2015-12-301-0/+59
* Document assigned CVE to irc/inspircdfeld2015-12-301-0/+3
* Hashcat is an advanced CPU-based password recovery utility for FreeBSD,amdmi32015-12-306-0/+312