aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Fix error building clamav when old version is installed and openssl from basegarga2014-11-223-3/+89
* Document multiple vulnerabilities in asterisk ports.madpilot2014-11-211-0/+62
* Document the latest round of phpMyAdmin vulnerabilities.matthew2014-11-211-0/+73
* Add note about CVE-2014-8600 in kde4-runtime and kwebkitpart.rakuco2014-11-211-0/+38
* New port: security/p5-Dancer2-Plugin-Passphrasepi2014-11-215-0/+37
* New port: security/Dancer2-Plugin-Auth-Extensiblepi2014-11-215-0/+61
* Seahorse doesn't support gnupg 2.1 yet, so stick with the 2.0 version for now.kwm2014-11-211-2/+3
* Document yii vulnerability CVE-2014-4672.madpilot2014-11-201-0/+40
* - Upgrade security/gnupg to 2.1.0 (modern release) and copy previouskuriyama2014-11-2011-57/+270
* Remove obsolete patches.kwm2014-11-197-172/+0
* The FreeBSD GNOME team proudly presents GNOME 3.14 and Cinnamon 2.2.kwm2014-11-1930-915/+785
* Update to 0.98.5garga2014-11-195-41/+6
* security/chaosreader: change maintainer as requestedpi2014-11-191-1/+1
* Document new vulnerabilities in www/chromium < 39.0.2171.65rene2014-11-191-0/+71
* Reset miwi's maintainership per his demandbapt2014-11-1827-27/+27
* Fix version check for the entry added in r372686.rakuco2014-11-181-1/+1
* Add entry for CVE-2014-8651 in x11/kde4-workspace.rakuco2014-11-181-0/+37
* - Update to 6.7p1.bdrewery2014-11-187-235/+241
* Copy security/openssh-portable to security/openssh-portable66 in preparationbdrewery2014-11-1827-0/+1734
* - Update to 0.9.1wen2014-11-177-80/+68
* security/p5-openxpki: update 0.21.0.1 -> 0.23.0.1robak2014-11-167-106/+242
* Link in the right place and fix plistbapt2014-11-162-1/+2
* Always install ${PREFIX}/etc/ssl/cert.pem symlink to allow both some basebapt2014-11-161-0/+3
* Cleanup plistantoine2014-11-161-3/+0
* Update to signing-party 1.1.11johans2014-11-153-3/+6
* - Update to 1.6.4lme2014-11-152-4/+4
* security/pinentry:makc2014-11-141-15/+10
* Release maintainership. I don't mind maintaining it, but cannot keep up withbdrewery2014-11-141-1/+1
* - Update to 0.7.2bdrewery2014-11-142-3/+3
* Cleanup plistantoine2014-11-146-51/+4
* security/pinentry:makc2014-11-135-37/+20
* Cleanup plistantoine2014-11-1339-133/+23
* Cleanup plistantoine2014-11-1387-628/+51
* add the tcpcrypt port... This provides an implementation of thejmg2014-11-136-0/+67
* Mark broken with Ruby 2.1swills2014-11-121-1/+7
* document dbus CVE-2014-7824kwm2014-11-121-0/+32
* - Update suricata to 2.0.4 [1]garga2014-11-113-12/+49
* Upgrade CentOS to 6.6xmj2014-11-1122-112/+101
* - Update to 1.11culot2014-11-112-3/+3
* Cleanup plistantoine2014-11-112-10/+0
* Update to 1.3.2cs2014-11-112-3/+3
* Update to 3.0.5 - Minor update:roberto2014-11-112-3/+3
* Update to 20141108antoine2014-11-102-3/+3
* Update to 2.5madpilot2014-11-102-5/+3
* Remove useless @dirbapt2014-11-093-16/+0
* ftp/wget: document CVE-2014-4877, path traversal in recursive FTP moderea2014-11-081-0/+31
* - Actually define FILEINSPECT as an available OPTIONzi2014-11-071-1/+2
* - Update to 1.19jadawin2014-11-073-10/+10
* - Update to 0.15jadawin2014-11-073-9/+9
* - Update to 0.142390jadawin2014-11-073-8/+10
* Replace some occurences of mach with PERL_ARCH (and a couple of other small n...mat2014-11-072-4/+4
* Remove * from LIB_DEPENDS lines and specify the default library namekwm2014-11-071-1/+1
* - Add support for new experimental featureszi2014-11-072-14/+32
* Update to 3.9.0antoine2014-11-073-21/+11
* - Remove a few remaining $Id$ from pkg-plistsak2014-11-071-1/+0
* security/logcheck: update 1.3.16 -> 1.3.17robak2014-11-064-19/+18
* VuXML: fix spelling for the latest entrymakc2014-11-061-1/+1
* VuXML: document CVE-2014-8483 for irc/konversation-kde4makc2014-11-051-0/+29
* - Chase GNU Emacs updatesashish2014-11-052-2/+2
* - Update to version 1.22pawel2014-11-053-7/+5
* Add new port security/lastpass-climarino2014-11-055-0/+89
* Make it possible to run sshguard without blacklist database by settingfeld2014-11-042-4/+9
* Do not hide stdout from users by sending it to syslog. Users need to befeld2014-11-041-1/+1
* - Remove configurable options as they break the build when they are disabled.zi2014-11-031-6/+3
* - Fix build for Perl < 5.18culot2014-11-021-1/+7
* - Update to 5.07zi2014-11-022-4/+4
* Add licensebapt2014-11-021-0/+2
* Library providing a source-level compatibility layer to aid portingbapt2014-11-026-0/+54
* Update to 1.17.novel2014-11-013-4/+6
* Fix DEPENDSantoine2014-11-011-11/+10
* Fix security/nss plistrodrigo2014-11-012-0/+2
* Simplify plistbapt2014-10-311-3/+1
* Simplify plistbapt2014-10-311-15/+6
* Simplify plistbapt2014-10-311-27/+12
* Simplify plistbapt2014-10-311-3/+1
* Simplify plistbapt2014-10-311-4/+1
* Remove useless %Dbapt2014-10-311-8/+8
* Simplify plistbapt2014-10-311-4/+2
* Simplify plistbapt2014-10-311-30/+10
* Simplify plist by using @sample and @dirbapt2014-10-311-14/+4
* Simplify plistbapt2014-10-311-3/+1
* VuXML: document remote Perl code execution in TWikirea2014-10-311-0/+36
* Simplify plistbapt2014-10-311-31/+1
* - Update to 2.06culot2014-10-312-3/+6
* - Update to 5.93culot2014-10-312-3/+3
* VuXML: document vulnerability in Jenkinsrea2014-10-311-0/+53
* Update to 20141028antoine2014-10-312-4/+7
* Add USES=cpe, as requested by des and rea.rakuco2014-10-301-1/+1
* Update to 0.6.3 to fix CVE-2014-0017.rakuco2014-10-304-64/+17
* Horde package update:mm2014-10-302-3/+3
* Drop maintainership of all remaining ports where I am listed.anders2014-10-302-2/+2
* Remove @dirrm and @dirrmtry entries.rakuco2014-10-301-3/+0
* Add entry for libssh's CVE-2014-0017.rakuco2014-10-301-0/+31
* Upgrade to new upstream release 2.3.5.mandree2014-10-303-5/+3
* - Update to 2.002jadawin2014-10-292-3/+3
* Remove a bit of dead code.mat2014-10-291-4/+0
* - Fix plist for LIBDANE optionamdmi32014-10-282-0/+4
* security/polarssl: Update to 1.2.12jase2014-10-285-62/+11
* Remove usage of @dirrmehaupt2014-10-271-1/+0
* Mark broken with Perl 5.18 and newerswills2014-10-272-2/+14
* Do not infinite loop on the package builders creating GB (or TB) of logsantoine2014-10-261-0/+3
* - Update to 2.9.7.0zi2014-10-253-78/+108
* - Convert ports of science/ and security to new USES=pythonmva2014-10-2590-252/+159
* - Update to 2014.66ak2014-10-242-3/+3
* Install fix and @dirrm removal.cy2014-10-242-15/+3
* - Document recent vulnerabilities in libpurple/pidginzi2014-10-241-0/+34
* security/pam_search_list: Handle NO_PROFILE which affects pkg-plistmarino2014-10-231-1/+5
* Add hack to address wrong security index.cy2014-10-232-1/+12
* Document cross site scripting vulnerabilities in phpMyAdminmatthew2014-10-221-0/+35
* Document asterisk susceptibility to the POODLE vulnerability,madpilot2014-10-211-0/+32
* - Update to 5.06zi2014-10-213-7/+7
* Allow staging as a regular userantoine2014-10-213-8/+37
* Add USES=alias to several portsmarino2014-10-204-3/+4
* Update 2.9.0 --> 2.9.2cy2014-10-202-4/+3
* Adjust to work with new openpyxlantoine2014-10-201-1/+6
* Update to 2.1.0.8antoine2014-10-202-3/+3
* KDE/FreeBSD team presents KDE SC 4.14.2 and KDE Workspace 4.11.13!makc2014-10-196-33/+7
* Fix packagingantoine2014-10-192-3/+3
* - Un-break build for non-standard OPTION VCHKPWriggs2014-10-191-5/+7
* security/wpa_supplicant: Fix build on FreeBSD 11marino2014-10-191-0/+1
* security/sslsplit: add portswills2014-10-195-0/+61
* Fix LATEST_LINK.cy2014-10-193-2/+2
* Document libxml2 denial of servicekwm2014-10-181-0/+33
* The MAP_NORESERVE flag to mmap() has never been implemented in FreeBSD andjhb2014-10-181-0/+11
* Unbreakantoine2014-10-182-2/+4
* - Update to upstream version 20140826riggs2014-10-183-9/+9
* Add dependency option, defaulting to security/krb5.cy2014-10-181-2/+19
* security/linux-c6-openssl: kill poodlexmj2014-10-172-5/+6
* Add linux-c6-openssl to OpenSSL entry from 2014-10-15.xmj2014-10-171-0/+4
* Reset maintainershipbapt2014-10-171-1/+1
* - Update to 2.1.1.vsevolod2014-10-174-6/+12
* MIT Kerberos released 1.13; 1.12 becomes a maintenance release,cy2014-10-1728-11/+563
* Document critical SQL Injection Vulnerability in www/drupal7flo2014-10-171-0/+34
* Remove @dirrm from package list of 8 of my portsmarino2014-10-161-6/+0
* - Mark libxul as vulnerable toobeat2014-10-161-0/+5
* security/kpcli: update 2.5 -> 2.7robak2014-10-162-5/+5
* - Fix runtime error when used with OpenSSL 1.0.1i [1]madpilot2014-10-165-6/+22
* - Fix various distinfo errorsak2014-10-161-9/+0
* Update to 1.8.11p1wxs2014-10-166-20/+53
* - Update to 1.9.13zi2014-10-163-5/+5
* - Fix regex to match all sshd auth errorsamdmi32014-10-162-2/+2
* - Fix rule reset time on armamdmi32014-10-162-1/+12
* Fix build on systems without stdnoreturn.hbdrewery2014-10-161-0/+2
* Update gss to 1.0.3 (API+ABI compatible)johans2014-10-163-8/+11
* Update to 1.01j.delphij2014-10-163-13/+19
* Update to signing-party 1.1.10johans2014-10-163-8/+14
* Document OpenSSL multiple vulnerabilities.delphij2014-10-161-0/+61
* - Update Firefox to 33.0beat2014-10-156-10/+9
* - Update to 3.2.19bdrewery2014-10-153-4/+4
* Document mozilla vulnerabilitiesbeat2014-10-151-0/+82
* - Update to 1.6.2lme2014-10-143-22/+16
* Update to 1.20.2martymac2014-10-143-3/+5
* security/wpa_supplicant: Fix mis-information in pkg-messagemarino2014-10-141-1/+1
* security/wpa_supplicant: Bring in BSD driver fix from DragonFly BSDmarino2014-10-132-1/+17
* Only works with php 5.2 -> 5.4.mat2014-10-131-0/+1
* wpa/supplicant: Fix driver list with NDIS, take 2marino2014-10-133-1/+26
* security/wpa_supplicant: Fix NDIS driver, privsep no longer defaultmarino2014-10-133-5/+43
* - Update to 2.1.0vsevolod2014-10-133-5/+5
* Remove @dirrm/@dirrmty from my portsmartymac2014-10-132-13/+0
* Revive security/wpa_supplicant after 6.5 years => version 2.3marino2014-10-1315-0/+841
* Update security/pam_ocra to 1.1rodrigo2014-10-132-5/+20
* Unbreak on freebsd 8 and 9antoine2014-10-123-10/+16
* Update to 0.22.1.novel2014-10-124-18/+9
* - Update to 1.0.0vsevolod2014-10-123-6/+6
* Update to 1.4.23arved2014-10-122-3/+3
* Use Uses/gssapi.mk.ume2014-10-121-14/+6
* security/aespipe: update v2.3e -> v2.4crobak2014-10-122-4/+3
* Update to 1.16.novel2014-10-123-4/+4
* Since we don't use its own libtool, build arg is requiredume2014-10-111-1/+1
* security/sguil: Fix shebang in sguildmarino2014-10-101-1/+2
* Include RPATH in the libs, again.ume2014-10-091-1/+8
* Convert USE_PYTHON_RUN to new USES syntax;feld2014-10-091-1/+1
* Add entry for foreman-proxyfeld2014-10-091-0/+30
* Fix packaging for linux-c6-libtasn1 and linux-f10-libtasn1antoine2014-10-092-2/+2
* Remove @dirrm, @dirrmtryehaupt2014-10-082-2/+0
* Document new vulnerabilities in www/chromium < 38.0.2125.101rene2014-10-081-0/+71
* security/vinetto: switch from py-imaging to py-pillowwg2014-10-072-6/+17
* Note my intentions with OVERWRITE_BASEbdrewery2014-10-071-0/+1
* - Add py-oauth2client 1.3sunpoet2014-10-074-0/+29
* - document bugzilla security issuesohauer2014-10-071-0/+49
* Use new @dir for directories out of PREFIXgarga2014-10-062-13/+7
* security/py-pylibacl: update 0.5.0 -> 0.5.2 and fixesrobak2014-10-063-12/+8
* New port: security/py-rekallantoine2014-10-064-0/+59
* - Update devel/libtool and devel/libltdl to version 2.4.2.418tijl2014-10-064-13/+22
* Update to 20140928antoine2014-10-053-4/+4
* Switch from py-imaging to py-pillowantoine2014-10-041-1/+2
* - Mark OVERWRITE_BASE and security/openssh-portable-base as DEPRECATED.bdrewery2014-10-041-0/+2
* Support multiple ListenAddress portsbdrewery2014-10-042-4/+9
* Fix rsyslog entry for pkgname matchingbdrewery2014-10-031-0/+3
* www/rt42 < 4.2.8 is vulnerable to shellshock related exploits throughmatthew2014-10-031-0/+36
* - Update the rsyslog entry to reflect the new versionsbrd2014-10-031-2/+4
* Update to 3.2.18bdrewery2014-10-034-16/+13
* Cleanup @dirrm* from my ports.mat2014-10-031-5/+0
* The default pardon and prescribe settings in the rc script were swappedfeld2014-10-022-5/+5
* Update Jenkins entry 549a2771-49cc-11e4-ae2c-c80aa9043978 to be readable.bdrewery2014-10-021-54/+99
* Update grammar of DoS in Jenkins entrybdrewery2014-10-021-1/+1
* Fix Jenkins entry to note that XSS is an issue, not as compilerbdrewery2014-10-021-1/+1
* Document Jenkins vulnerabilitiesbdrewery2014-10-021-0/+94
* Fix bash entries to also mark bash-static vulnerablebdrewery2014-10-021-0/+2
* Document CVE-2014-6277 and CVE-2014-6278 for bash.bdrewery2014-10-021-0/+28
* - Document CVE-2014-7187 fixed in bash-4.3.27_1bdrewery2014-10-021-0/+7
* Document the latest phpMyAdmin vulnerability.matthew2014-10-021-1/+32
* - Convert to USES=autoreconftijl2014-10-011-7/+3
* Document CVE-2014-7186 for bashbdrewery2014-10-011-0/+29
* Convert to USES=hordebapt2014-10-018-36/+19
* - Document sysutils/rsyslog vulnerabilities CVE-2014-3634brd2014-10-011-0/+30
* security/libbeid: Add <stdlib.h> header for mallocmarino2014-10-011-4/+5
* - Pet portlint: move USES=pear downwardsunpoet2014-09-301-2/+2
* service_identity aspires to give you all the tools you needmva2014-09-304-0/+36
* Remove expired ports:rene2014-09-3012-178/+0
* Add pam_ocra 1.0, RFC6287 (OCRA) PAM module.vanilla2014-09-304-0/+33
* Document shells/fish vulnerabilitiesbdrewery2014-09-301-0/+35
* - adopt new pkg-plist styleohauer2014-09-291-33/+0
* - remove useless PORT_OPTIONS:MDOCS checkohauer2014-09-291-13/+9
* Move back to version 0.17.0 and take maintainership, new versions do notantoine2014-09-282-5/+7
* security/rubygem-metasploit_data_models: update to 0.20.1swills2014-09-282-3/+3
* security/linux-c6-nss: update to 3.16.1xmj2014-09-273-15/+26
* Revert broken non-conversion to USES=pearantoine2014-09-272-3/+10
* Fix stage violation (and allow staging as regular user)antoine2014-09-271-0/+1
* Add linux-c6-nss-3.15.1 package to the NSS vulnerability report.xmj2014-09-271-0/+4
* Add linux_base-c6-6.5 package to the bash vulnerability report.xmj2014-09-271-0/+4
* Convert to USES=pearbapt2014-09-2625-275/+82
* The 2nd bash issue was reassigned to CVE-2014-7169:bdrewery2014-09-261-2/+2
* Remove hack now that USES=pathfix no longer modifies configure (r369260)tijl2014-09-251-5/+0
* Update bash entry for CVE-2014-3659bdrewery2014-09-251-7/+12
* - Set CPPFLAGS and LIBS in a number of ports so configure can find libintl.htijl2014-09-252-1/+5
* VuXML entry 48108fb0-751c-4cbb-8f33-09239ead4b55: expanded detailsrea2014-09-251-2/+6
* www/linux-*-flashplugin11: Fix multiple security vulnerabilitiesxmj2014-09-251-0/+42
* - Remove obsolete @dirrm(try)ak2014-09-251-1/+1
* - Update ca_root_nss to 3.17.1beat2014-09-252-3/+3
* Update tor to 0.2.4.24 and tor-devel to 0.2.5.8-rcbf2014-09-256-13/+6
* fixdes2014-09-251-1/+1
* Add entry for the NSS signature forgery bug.des2014-09-251-1/+39
* Upgrade to 3.17.1des2014-09-252-4/+3
* Document new vulnerability in www/chromium < 37.0.2062.124rene2014-09-251-0/+28
* Add entry for net/krfb (CVE-2014-6055).rakuco2014-09-251-0/+31
* - Allow staging as a regular userantoine2014-09-252-36/+3
* Document bash remote code execution vulnerability.delphij2014-09-251-0/+36
* Hand back my ports to the pool.eadler2014-09-241-1/+1
* - Drop @dirrm* from plistamdmi32014-09-242-111/+1
* - Upgrade to 0.7.1.vsevolod2014-09-233-5/+4
* Simplify plistbapt2014-09-232-19/+5
* Simplify plistbapt2014-09-231-8/+2
* Simplify plistbapt2014-09-232-9/+3
* Simplify plistbapt2014-09-231-5/+0
* Simplify plistbapt2014-09-231-3/+1
* Simplify plistbapt2014-09-231-8/+4
* Simplify plistbapt2014-09-231-18/+2
* Simplify plistbapt2014-09-232-11/+5
* Simplify plistbapt2014-09-231-8/+3