aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Mark BROKEN under FreeBSD 10zi2012-01-291-0/+4
* - Document vulnerabilities in mail/postfixadmin (CVE-2012-0811, CVE-2012-0812)zi2012-01-281-0/+39
* - Update to 1.0.1miwi2012-01-282-6/+5
* - Update to 1.7.7miwi2012-01-282-3/+3
* - Cleanup & Formatingmiwi2012-01-281-32/+32
* Additional software only options and binary package build tweaks.`cy2012-01-282-26/+76
* Fix typo.cy2012-01-271-1/+1
* - Document vulnerability in converters/mpackzi2012-01-261-0/+27
* - Document vulnerabilities in print/acroread9 (prior to 9.4.7)zi2012-01-261-0/+46
* Somehow a character got lostarved2012-01-261-1/+1
* - Update to 0.18ashish2012-01-262-3/+3
* - Update to 5.70ashish2012-01-262-3/+3
* Binary package improvements.cy2012-01-262-16/+83
* Update 2.4.1.2 --> 2.4.2.2.cy2012-01-265-10/+110
* The KDE/FreeBSD team is pleased to announce KDE SC 4.7.4, whichavilla2012-01-254-6/+6
* Apply utmp patch from ${FILESDIR} (not files) if OSVERSION < 900007jgh2012-01-251-2/+2
* - Update to 1.3.1jgh2012-01-253-13/+14
* update to 0.2.3.11-alphabf2012-01-242-3/+3
* update lang/sbcl to 1.0.55, and adjust dependent portsbf2012-01-241-1/+1
* Dancer::Plugin::Passphrase manages the hashing of passwords for Dancer apps,culot2012-01-245-0/+49
* - update entry fixed in chromium-16.0.912.75 (CVE-2011-3925)rene2012-01-241-0/+40
* Fix build while chanting "I will run make validate". :(wxs2012-01-241-1/+1
* Add CVE for recent spamdyke buffer overflows.wxs2012-01-241-0/+1
* Document multiple vulnerabilities in wireshark, all of which havewxs2012-01-241-0/+58
* Whitespace cleanup.wxs2012-01-241-2/+2
* - Document buffer overflows in spamdyke.wxs2012-01-241-0/+33
* - update to DISTVERSION 201204ohauer2012-01-243-7/+6
* Update to 4.0.1.nobutaka2012-01-232-3/+3
* Fixup to please "make tidy". No need to wrap this line.wxs2012-01-231-2/+1
* - Add CVE for spamdyke STARTTLS plaintext injection.wxs2012-01-231-0/+2
* - Fix affected rubygem-rack version: add ,3 as PORTEPOCH=3 is restoredsunpoet2012-01-221-1/+1
* - Update to 0.22culot2012-01-223-5/+8
* - Correct package range in 5c5f19ce-43af-11e1-89b4-001ec9578670zi2012-01-221-1/+5
* At the moment 1385 ports use BUILD_DEPENDS= ${RUN_DEPENDS} and 450eadler2012-01-2272-72/+72
* - Fix issue when NOPORTDOCS and SNORTSAM are both definedzi2012-01-211-1/+3
* - Update to 2.9.2.1zi2012-01-212-3/+5
* - Fix formatting/topic in 91be81e7-3fea-11e1-afc7-2c4138874f7dzi2012-01-211-6/+25
* - Document security vulnerability in security/openssl (CVE-2012-0050)zi2012-01-211-0/+28
* fix uuid on latest tomcat vulnerabilityjgh2012-01-211-1/+1
* - Fix modified date;delphij2012-01-211-1/+3
* Update 91be81e7-3fea-11e1-afc7-2c4138874f7d to cover ruby+no-pthreads asdelphij2012-01-211-0/+2
* Remove license infodougb2012-01-202-4/+0
* Add pcsc-tools, tools for testing PCSC cards and readersarved2012-01-206-0/+63
* - document asterisk remote crash vulnerabilityflo2012-01-201-0/+31
* Document recent vulnerability of Apache Tomcat Server.jgh2012-01-201-0/+43
* - Security update to 1.0.0gdinoex2012-01-202-10/+10
* Sigh, should have used <lt> instead of <gt>.delphij2012-01-201-1/+1
* php52-exif no longer vulnerable to CVE-2011-4566 as of 5.2.17_6delphij2012-01-201-1/+2
* Fix the version range for ruby. The stock version is affected.knu2012-01-191-1/+1
* There was no patch release in rubygem-rack 1.3.5_*, so just say < 1.3.6.knu2012-01-191-1/+1
* - Fix affected rubygem-rack version: it should be _3 for PORTREVISION=3sunpoet2012-01-191-1/+1
* update math/R to 2.14.1, and adjust dependent portsbf2012-01-192-2/+2
* Fix CVE URL in recent OpenTTD entry.danfe2012-01-171-1/+1
* Unexpand (convert leading spaces to tabs when possible).danfe2012-01-171-871/+871
* Document recent vulnerability of OpenTTD game server.danfe2012-01-171-0/+34
* - transfer maintainership for my zope-ports to zope@rm2012-01-1623-46/+46
* PHP5 had its own entry for this vulnerability, so remove this.knu2012-01-161-5/+0
* Add node < 0.6.7 (for V8).knu2012-01-161-0/+4
* Add v8 < 3.8.5 (CVE-2011-5037).knu2012-01-161-0/+5
* Add PHP < 5.3.9 (CVE-2011-4885).knu2012-01-161-0/+5
* Add Multiple implementations denial-of-service via hash algorithm collision.knu2012-01-161-0/+41
* Add missing dependency to gnutls. [1]netchild2012-01-151-1/+2
* Certifi: Python Mozilla's SSL Certificates.miwi2012-01-155-0/+37
* - Update to 110511miwi2012-01-152-3/+3
* - fix runtime with ruby18 (add dependency on converters/ruby-iconv)rm2012-01-151-9/+5
* - escape shell namesdinoex2012-01-141-1/+1
* Add missing URL reference to last commitmm2012-01-141-0/+1
* Add relevant FFmpeg vulnerabilities from Ubuntu USN-1320-1mm2012-01-141-0/+55
* In the rc.d scripts, change assignments to rcvar to use thedougb2012-01-1480-82/+80
* - clean upmiwi2012-01-141-42/+42
* - Document vulnerabilities in security/opensslzi2012-01-141-0/+49
* - Document vulnerability in net/isc-dhcp42-server (CVE-2011-4868)zi2012-01-131-0/+32
* - update to NSS_3_13_1_WITH_CKBI_1_88_RTMflo2012-01-132-8/+10
* - update to NSS_3_13_1_WITH_CKBI_1_88_RTMflo2012-01-132-4/+3
* Document PowerDNS DoS vulnerability.delphij2012-01-131-0/+28
* - update to 1.1.0dinoex2012-01-123-3/+7
* The Authen::OATH module provides a Perl implementation of theculot2012-01-125-0/+43
* Update to 2.12.16.novel2012-01-122-3/+3
* Document PHP multiple vulnerabilities.delphij2012-01-121-0/+42
* - use /etc/rc.d/ipfilter quietresyncdinoex2012-01-111-1/+1
* - Build with obsolte MD2 hash by defaultdinoex2012-01-112-27/+16
* - Update to 1.1.1.wxs2012-01-114-29/+9
* Update to 1.4.6 release.ale2012-01-102-3/+3
* Update to 1.10.5 release.ale2012-01-102-3/+4
* Update to 3.4.1 release.ale2012-01-103-7/+7
* - update to 4.0.10rm2012-01-102-4/+3
* Document a untrusted local library exploit in games/torcs.rene2012-01-101-0/+31
* - The proper acronym for Apache Software License 2 is really AL2tabthorpe2012-01-099-9/+9
* The port asks the user a question. Tools like portmaster need tolbr2012-01-091-0/+2
* - Remove outdated version checkseadler2012-01-093-6/+0
* Document spamdyke STARTTLS plaintext injection vulnerability.wxs2012-01-091-0/+31
* 2012-01-08 security/cryptplug: development has ceasedeadler2012-01-0918-280/+0
* - Update to 0.10novel2012-01-092-4/+4
* - Update to version 1.7.9-jumbo-5danfe2012-01-083-8/+15
* Expand 11 (number) into `eleven' (word) to make port description look better.danfe2012-01-081-1/+1
* Repeated words are are hard to to find sometimes.eadler2012-01-089-9/+9
* - Update to 1.6.wxs2012-01-082-4/+4
* Update to 1.6.wxs2012-01-083-29/+4
* Remove HTML entity from a VuXML entry as they are not allowed insimon2012-01-081-1/+1
* - update to 0.3rm2012-01-085-31/+13
* - Add BUILD_DEPENDS to silence build warningsswills2012-01-081-1/+2
* Update to 4.0.0.nobutaka2012-01-072-3/+3
* - Selectivly adds mysql/and/or postgresql to rc script 'REQUIRES:'scheidell2012-01-072-3/+7
* Add new vulnerabilities for www/chromium.rene2012-01-071-0/+32
* Update to 1.3.1ehaupt2012-01-062-3/+3
* Fix build.delphij2012-01-061-1/+0
* - document bugzilla and bugzilla3 security issuesohauer2012-01-061-0/+61
* - update to 1.7.6rm2012-01-053-3/+6
* - Reassignment of ECHO_MSG breaks 'make readme', so remove and reformat IGNORE.jgh2012-01-051-9/+6
* - update to 5.61TEST4ohauer2012-01-054-26/+65
* Document wordpress xss vulnerability.delphij2012-01-041-0/+36
* Import plone4 dependencies part 8/15rm2012-01-029-0/+353
* - Reassign to the heaptabthorpe2012-01-021-1/+1
* - change required APACHE version from 13+ to 20+ohauer2012-01-022-4/+2
* The murmur hash algorithm by Austin Appleby is an exteremely fastkuriyama2011-12-315-0/+36
* Update to the latest development build (now same as primary port).cy2011-12-312-3/+4
* Update 5.0.0 --> 5.0.1cy2011-12-313-4/+5
* Add additional MITKRB5 reference.cy2011-12-301-1/+1
* Replace local patch file with identical MIT patch.cy2011-12-303-13/+4
* - Add missing BUILD_DEPENDS to silence build warningsswills2011-12-301-1/+4
* - Update to 0.4.6miwi2011-12-292-4/+3
* Fix build by adding a reference to the original URL.remko2011-12-291-0/+1
* Document XSS vulnerability in net-mgmt/zabbix-frontendcrees2011-12-291-0/+26
* update to CKBI version 1.88 which includes the latest mozilla cert dataflo2011-12-294-7/+8
* Update to new upstream release v2.2.2.mandree2011-12-292-7/+3
* Update to 20111228garga2011-12-282-3/+3
* Document remote DoS vulnerability in lighttpd HTTP authenticationmm2011-12-281-0/+30
* End WWW CPAN URL with a "/"ehaupt2011-12-2819-19/+19
* - Fix compile if WITH_STATIC is enabled [1]scheidell2011-12-282-3/+3
* Pacify portlintehaupt2011-12-272-4/+4
* - Fix most of the duplicate words in vuxml, a few affect 'blockquotes' but th...eadler2011-12-271-10/+10
* Install schema files with pam_ldap.marcus2011-12-271-2/+8
* Don't wrap a couple of lines. No other entries wrap these lines, so whenwxs2011-12-271-4/+2
* Whitespace cleanup in a BIND topic.wxs2011-12-271-1/+1
* Fix the build. Missing a quote on the blockquote citation and a missing </p>.wxs2011-12-271-2/+2
* Document CVE-2011-4862 (FreeBSD-SA-11:08.telnetd) as it affects krb5-appl too.cy2011-12-271-0/+28
* Fix when an encryption key is supplied via the TELNET protocol, its lengthcy2011-12-272-0/+13
* Switch to using bsd.port.options.mk and remove unnecessary assignments.wxs2011-12-261-6/+2
* Add vuxml entry for proftpd chroot vulnerability.delphij2011-12-241-0/+34
* - I meant LIBDIR not SITELIBDIRpgollucci2011-12-241-1/+1
* - Add USE_PERL5_BUILDscheidell2011-12-231-0/+1
* Update to 0.62.nobutaka2011-12-233-3/+6
* - openssh-portable needs perl to build (reported by Gleb Smirnoff via mail)scheidell2011-12-231-0/+3
* - Update to 1.2.2lwhsu2011-12-232-4/+3
* - Add fifth portion of dependencies needed for Plone 4 import.rm2011-12-2237-0/+1224
* - Document recent vulnerabilities in databases/phpmyadmin (PMASA-2011-19 and ...zi2011-12-221-0/+34
* Mark broken on tier-2: fails to link.linimon2011-12-221-0/+3
* - Add p5-CACertOrg-CA 20110724.001sunpoet2011-12-215-0/+39
* - Also fix SeaMonkey version rangebeat2011-12-211-1/+2
* - Fix cvename in latest mozilla vulnerabilitybeat2011-12-211-5/+5
* - Document mozilla -- multiple vulnerabilitiesbeat2011-12-211-0/+58
* - Update 2.1.3 -> 2.1.4pgollucci2011-12-212-3/+3
* Update to 3.0.1.lx2011-12-212-3/+3
* move contributor address => jghjgh2011-12-211-1/+1
* - Remove expired security/p5-Digest-SHA256: use the builtinvsevolod2011-12-216-70/+0
* - chef 0.10.8 requires ~> 0.10.8pgollucci2011-12-212-3/+4
* - Remove explicit dependency in setup.py for `python ./setup.py test`lwhsu2011-12-202-1/+11
* - Update to 2.2.0pgollucci2011-12-202-4/+3
* - Add missing dependencylwhsu2011-12-201-0/+3
* Add py-ssh 1.7.11, python SSH2 protocol library.lwhsu2011-12-204-0/+31
* - Point at the homepage consistently as defined by rubygems.orgpgollucci2011-12-201-1/+1
* unbound DoS vulnerabilitysem2011-12-191-0/+32
* Fix build on CURRENT using m4 -g instead of m4bapt2011-12-191-0/+1
* use m4 -g instead of m4 to activate the gnu extension for m4, this fixes buil...bapt2011-12-191-0/+3
* - Add first portion of dependencies needed for Plone 4 import.rm2011-12-1937-0/+775
* - Cleanupmiwi2011-12-181-29/+30
* - Correct package name in previous commitzi2011-12-181-4/+1
* - Document vulnerabilities in www/typo3 and www/typo345zi2011-12-181-0/+33
* Limit PORTSCOUT version check to -jumbo releases and explain why.danfe2011-12-181-0/+8
* update security/tor to 0.2.2.35 and security/tor-devel to 0.2.3.10-alphabf2011-12-174-6/+6
* Work around duplicate ruby 1.8/1.9 dependency if RUBY_VER is 1.9.linimon2011-12-171-4/+5
* - Update to 1.1pgollucci2011-12-172-5/+4
* - Cleanup snortsam integrationzi2011-12-161-29/+21
* - change USE_PYTHON to yes, because this port workingrm2011-12-163-4/+4
* Update to v11.12.13 release.ale2011-12-155-10/+11
* - Update to 20110113culot2011-12-153-5/+5
* - Update to 2.9.2zi2011-12-154-9/+17
* - Update to 5.70sunpoet2011-12-142-5/+8
* Update to 1.4.7mm2011-12-142-3/+3
* Update to 1.1.0mm2011-12-142-3/+3
* PORTREVISION bump.cy2011-12-141-0/+1
* Apply patch for MITKRB5-SA-2011-007, KDC null pointer dereference in TGScy2011-12-142-2/+5
* - Document security/krb5 vulnerability as described in MITKRB5-SA-2011-007zi2011-12-141-0/+30
* - Add CVE for recent asterisk vulnerabilitieszi2011-12-141-0/+2
* - Bring back snortsam patcheszi2011-12-142-2/+3
* Document Opera multiple vulnerabilities.delphij2011-12-141-0/+50
* Document vulnerabilities fixed in Chromium 16.0.912.63rene2011-12-141-0/+73
* Add cvename tag with content CVE-2011-4607 for PuTTY password 'vulnerability'.mandree2011-12-141-0/+1
* - Correct package name for asterisk18zi2011-12-141-1/+1
* - Update to 1.53jadawin2011-12-132-3/+3
* Update PuTTY to new upstream security and bug fix release 0.62,mandree2011-12-133-4/+36
* - Update to 0.23sunpoet2011-12-122-3/+3
* - update to 2.13.7rm2011-12-122-3/+3
* Update to 1.0.6mm2011-12-122-3/+3
* Update to 1.4.6mm2011-12-122-3/+3
* - Update to 0.5.12wen2011-12-113-14/+11
* Revise OPTIONS wording.mandree2011-12-111-2/+2
* update and sort MASTER_SITESbf2011-12-091-3/+17
* update to 0.2.3.9-alpha; update and sort MASTER_SITESbf2011-12-092-6/+27
* - Update to 1.52jadawin2011-12-092-3/+3
* - Document asterisk vulnerabilitieszi2011-12-091-0/+37
* - Updated to 1.3.14glarkin2011-12-094-26/+18
* - Mark security/gpgme03 and security/cryptplug DEPRECATED and set EXPIRATION_...scheidell2011-12-092-0/+6
* -Update to 2.4scheidell2011-12-084-34/+46
* Update to 1.18.2martymac2011-12-084-3/+25
* - Introduce multi-interface/instance support in rc scriptzi2011-12-081-3/+30
* - Document vulnerabilities in isc-dhcp: CVE-2011-4539zi2011-12-081-0/+32
* TLS/SSL proxy in front of the application creates a transparentkuriyama2011-12-065-0/+45
* - Try to fix plist on 9.Xpav2011-12-062-7/+5
* - upgrade to 1.8.13scheidell2011-12-043-4/+207
* Update to version 3.4.8dougb2011-12-021-0/+32
* Scannedonly is a samba VFS module and a scanning daemon that ensure that onlycrees2011-12-026-0/+146
* - Update to 0.51ashish2011-12-012-3/+3
* - Update to 5.63ashish2011-12-012-3/+3
* - Update gss to 1.0.2johans2011-12-013-4/+7
* - Add a link to a nice documentation in PHpav2011-11-301-0/+4
* - Add a quick guide to adding a new entry to this unfriendly filepav2011-11-301-0/+9
* Fix build with GSSAPI under 9.0.cy2011-11-301-1/+1
* Update to 2.11.novel2011-11-302-3/+3
* - pkg-plist had missing linesscheidell2011-11-303-3/+19
* - Submitter is now Maintainerscheidell2011-11-297-53/+100
* - Submitter is now Maintainerscheidell2011-11-294-13/+30
* - on some (amd64, 7.4 at least), return from successful system callscheidell2011-11-292-0/+14
* - Update to 2.20sunpoet2011-11-282-3/+4
* - Update to 0.91miwi2011-11-275-21/+26
* update math/R to 2.14.0, math/R-cran-sp to 0.9-91, and adjustbf2011-11-272-2/+2
* update to 0.2.3.8-alphabf2011-11-263-19/+10
* Update to 1.10.4 release.ale2011-11-252-3/+3
* - Respect CC/CFLAGSmiwi2011-11-241-0/+7
* Update to 1.4.5mm2011-11-242-3/+3
* Update to 1.0.6mm2011-11-242-3/+3
* - Applied the startup script patch from PR ports/161524 to the localglarkin2011-11-243-17/+41
* - Updated the PAM ssh rule file to match messages emitted on FreeBSD vs.glarkin2011-11-242-0/+17
* The OATH Toolkit contains a shared library, command line toolale2011-11-235-0/+74
* - make portlint happierdinoex2011-11-222-16/+24
* - cleanup homepagedinoex2011-11-221-4/+0
* - Revert previous commitzi2011-11-221-2/+2
* - Update hash to reflect file deployed to the official mirrors. (source code...zi2011-11-221-2/+2
* Update to 2.1.4cs2011-11-213-4/+7
* Unbreak security/py-htpasswdjpaetzel2011-11-211-0/+3
* - Update to 0.2.6miwi2011-11-193-8/+8
* - Update to 1.0miwi2011-11-192-4/+3
* - mark 1.3.41+2.8.31_4 as not vulnerabledinoex2011-11-191-2/+2
* Add security/clamav-milter, clamav's meta-port with MILTER ongarga2011-11-192-0/+18
* - Remove unecessary dependency (libcheck) when option TESTS is off [1]garga2011-11-192-4/+4
* Sync up with main version of this port.cy2011-11-192-12/+11
* Adjust -devel bits for use in -devel version of this port.cy2011-11-191-6/+5
* Remove trailing whitespaces.ehaupt2011-11-192-2/+2
* hiawatha -- memory leak in PreventSQLi routinecs2011-11-191-0/+27
* Bump modified date for previous commit.delphij2011-11-191-0/+1