aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Add LICENSE.hrs2014-08-308-191/+186
* Update to 1.0.4antoine2014-08-302-9/+7
* Switch to USES=python and autoplistantoine2014-08-302-47/+2
* - Update LICENSE [1]sunpoet2014-08-302-42/+3
* - Add missing OPTIONS_DEFINEsunpoet2014-08-302-28/+20
* - Update to 0.24olivierd2014-08-302-6/+5
* - Convert my own Python ports to USES= pythonolivierd2014-08-301-3/+2
* Convert a few ports to USES=pythonantoine2014-08-304-12/+8
* Modernize pythonbapt2014-08-291-3/+2
* Modernize pythonbapt2014-08-291-3/+2
* devel/libunistring:tijl2014-08-291-1/+1
* security/libssh2:tijl2014-08-292-12/+19
* Remove bad usage of BROKENantoine2014-08-291-1/+1
* dns/c-ares:tijl2014-08-281-1/+1
* - Fix plist issuesvsevolod2014-08-282-1/+3
* - Update libsodium to 0.7.0vsevolod2014-08-273-16/+22
* Update signing-party to 1.1.9johans2014-08-272-4/+3
* Reset maintainership, the maintainer has no time for itbapt2014-08-271-1/+1
* security/rubygem-net-scp11: tell portscout to ignoreswills2014-08-271-0/+2
* security/rubygem-net-ssh27: tell portscout to ignore thisswills2014-08-271-0/+2
* Remove some duplicate lines from plist (or duplicate plist)antoine2014-08-271-4/+3
* Document new vulnerabilities in www/chromium < 37.0.2062.94rene2014-08-271-0/+58
* security/rubygem-bcrypt-ruby: fix missing dependencyswills2014-08-261-1/+2
* security/rubygem-bcrypt: add rubygem-bcrypt portswills2014-08-264-0/+24
* - Fix missing library problems when the linker enforces explicit linkingtijl2014-08-265-5/+11
* Update to 20140824antoine2014-08-262-3/+3
* - Fix configure with the EXE option enabledpgj2014-08-261-1/+3
* security/rubygem-net-ssh: update to 2.9.1swills2014-08-262-3/+3
* Update to 4.1.novel2014-08-263-4/+4
* Update to 1.10.8madpilot2014-08-262-4/+4
* security/rubygem-net-scp: update to 1.2.1swills2014-08-262-3/+3
* - Drop USE_AUTOTOOLS=libtool, not usedamdmi32014-08-251-1/+1
* - Merge in workaround from 191002zi2014-08-253-12/+36
* security/py-cryptography: Update to 0.5.4, Modernizekoobs2014-08-252-8/+9
* security/rubygem-bcrypt-ruby: update to 3.1.5swills2014-08-252-3/+3
* Add security/fprintd.adamw2014-08-258-0/+175
* Update to 0.9.14.1cs2014-08-252-3/+3
* 2014-08-24 security/pam_abl: Newer version requires large number of hacks, no...antoine2014-08-2417-681/+0
* Add devel/liballium and security/obfsclient.adamw2014-08-234-0/+51
* security/xzid: suppress broken and unnecesary missing target checkmarino2014-08-231-0/+1
* - update to 6.4.7ohauer2014-08-233-36/+36
* security/suricata: Update to 2.0.3, Modernizekoobs2014-08-234-46/+122
* Remove double slash to pass check-plistantoine2014-08-231-1/+1
* - Update to 2014.65ak2014-08-222-3/+3
* New port: security/p5-Crypt-RHash:zi2014-08-226-0/+50
* - Switch dns/unbound to USES=libtool, drop .la filesamdmi32014-08-222-1/+2
* Fix up missed or botched PORTREVISION bumps from r365599.mandree2014-08-221-1/+1
* Berkeley DB cleanup, remove versions 4.0 ... 4.7.mandree2014-08-2210-13/+57
* - Document buffer overrun in sysutils/filezi2014-08-221-0/+25
* Add missing <package> taglwhsu2014-08-221-0/+1
* Document Django 2014-08-20 vulnerabiltylwhsu2014-08-221-0/+80
* security/libprelude: Take MAINTAINER'ship, STAGE & Modernizekoobs2014-08-218-58/+48
* security/tinyca: Reset maintainermarino2014-08-211-1/+1
* Security/denyhosts: Limit to python 2.x and reset maintainermarino2014-08-211-3/+2
* Stage security/cvm and assign maintainership to submittermarino2014-08-214-32/+37
* Stage.adamw2014-08-212-21/+5
* Stage.adamw2014-08-212-19/+4
* Update to 20140818antoine2014-08-212-6/+6
* security/razorback-officeCat: Chase json-c update (Unbreak)marino2014-08-213-3/+27
* security/razorback-swfScanner: Chase json-c update (Unbreak)marino2014-08-213-2/+26
* security/razorback-pdfFox: Chase json-c update (Unbreak)marino2014-08-213-2/+26
* security/razorback-fsWalk: Chase json-c update (Unbreak)marino2014-08-213-1/+26
* security/razorback-fsMonitor: Chase json-c update (Unbreak)marino2014-08-213-0/+25
* security/razorback-dispatcher: Chase json-c update (Unbreak)marino2014-08-213-1/+25
* security/razorback-fileInject: Chase json-c update (Unbreak)marino2014-08-213-3/+27
* security/razorback-archiveInflate: Chase json-c update (Unbreak)marino2014-08-213-2/+26
* security/razorback-scriptNugget: Chase json-c update (Unbreak)marino2014-08-213-2/+26
* security/razorback-yaraNugget: Chase json-c update (Unbreak)marino2014-08-213-1/+25
* security/razorback-syslogNugget: Chase json-c update (Unbreak)marino2014-08-213-2/+26
* security/razorback-clamavNugget: Chase json-c update (Unbreak)marino2014-08-213-2/+25
* security/razorback-virusTotal: Chase json-c update (Unbreak)marino2014-08-214-2/+36
* security/razorback-masterNugget: Chase json-c update (Unbreak)marino2014-08-212-1/+15
* Fix build, broken in the json-c 0.12 upgrade. Given the nature of the errors ...adamw2014-08-204-22/+39
* - Update to 0.5zi2014-08-203-5/+7
* Fix more missing -lintltijl2014-08-201-9/+17
* 2014-08-20 deskutils/horde3-hermes: EOL in April 2012antoine2014-08-2012-466/+0
* Remove deletion of LC_MESSAGES directories that are owned by devel/gettextgrembo2014-08-202-8/+0
* many ruby/rubygem ports: death of rubyforge.orgswills2014-08-199-7/+13
* security/strongswan: Upgrade version 5.1.3 => 5.2.0marino2014-08-196-140/+124
* Add missing libintl linktijl2014-08-191-3/+11
* Upgrade to 0.4.15.thierry2014-08-192-3/+3
* Record PHP 5.3 vulnerabilitiesflo2014-08-191-0/+41
* Convert most NO_INSTALL_MANPAGES to USES=imake:nomanantoine2014-08-193-6/+2
* - Switch devel/liboop to USES=libtool, drop .la filesamdmi32014-08-191-0/+1
* - Move RESETPREFIX to default PLIST_SUBbdrewery2014-08-194-6/+1
* - Update to upstream release 3.11.0riggs2014-08-185-103/+37
* Mark BROKEN: Unfetchableantoine2014-08-181-0/+2
* Document the latest phpMyAdmin security advisories.matthew2014-08-181-0/+44
* - Update to 2.0.5.vsevolod2014-08-172-3/+3
* [NEW] security/py-cpe: Common Platform Enumeration (CPE) for Pythonkoobs2014-08-174-0/+37
* remove 3 ports: security/sguid-(client|sensor|server)marino2014-08-1740-1983/+0
* Add new port security/sguil (version 0.9.0)marino2014-08-1729-0/+1140
* Fix build on -current.adamw2014-08-171-0/+3
* - Abbreviate MASTER_SITESjhale2014-08-171-3/+3
* security/libfprint: Upgrade version 0.4.0 => 0.5.1marino2014-08-165-5/+38
* Upgrade OpenEXR and ilmbase to 2.2.0.mandree2014-08-163-0/+3
* Update to upstream revision 1614tijl2014-08-166-499/+185
* - Convert PYTHON_FEATURES to USE_PYTHON (which was landed several hours ago)sunpoet2014-08-151-1/+1
* - Use USES=pythonsunpoet2014-08-151-3/+2
* security/bro: Add su flags so pkg initialization worksmarino2014-08-152-12/+6
* - Upgrade to 2.0.26 (minor fixes).kuriyama2014-08-152-6/+5
* Remove DEPRECATED. People are working on this port.cs2014-08-151-2/+0
* - remove workaround for amd64dinoex2014-08-152-2/+2
* security/p5-openxpki: update to 0.20.0.1wg2014-08-144-25/+21
* security/openca-tools-forked: Tools to deal with SCEP and PKCS7 messageswg2014-08-145-0/+36
* Update 1.12.1 --> 1.12.2.cy2014-08-143-22/+13
* Revert r359770:antoine2014-08-132-3/+4
* Horde 3 has been EOLed in April 2012mm2014-08-131-0/+3
* Document new vulnerabilities in www/chromium < 36.0.1985.143rene2014-08-131-0/+36
* - unbreakcs2014-08-132-10/+63
* Update to 1.2.4.kwm2014-08-123-25/+11
* security/p5-openxpki-client-html-mason: deprecatewg2014-08-121-0/+3
* security/p5-openxpki-i18n: update to 0.20.0.1wg2014-08-123-16/+8
* security/stoken: Software Token for UNIX compatible with RSA SecurIDwg2014-08-125-0/+62
* Stage security/pks and pass maintainership to submittermarino2014-08-126-44/+202
* - fix package name s/subversion18/subversion/ohauer2014-08-121-1/+1
* - INSERT URL HEREzi2014-08-121-1/+1
* - document serf CVE-2014-3504ohauer2014-08-121-0/+36
* - document subversion CVE-2014-3522, CVE-2014-3528ohauer2014-08-121-0/+44
* Bump PORTREVISION on all ports that depend on net/GeoIP foradamw2014-08-123-1/+3
* Remove expired port:rene2014-08-125-75/+0
* - new options SSL2 SSL3dinoex2014-08-111-2/+16
* - Update The Glorious Glasgow Haskell Compiler to version 7.8.3pgj2014-08-1197-218/+501
* Update to 2.3cs2014-08-1111-129/+74
* Replace some dependencies on libtool with USES=libtool:build or atijl2014-08-111-3/+1
* Fix typo.osa2014-08-101-1/+1
* Document nginx vulnerability.osa2014-08-101-0/+31
* Convert the Python framework bits to USES=python.mva2014-08-091-1/+0
* security/pwman: 0.4.0 -> 0.4.4pi2014-08-093-12/+14
* Update to 2.4antoine2014-08-094-11/+10
* Build shared library and simplify DOCS optiontijl2014-08-093-62/+33
* - Update to 5.03zi2014-08-092-3/+3
* security/zxid: Upgrade version 1.05 => 1.18marino2014-08-088-126/+78
* - Update to 2.0.4.vsevolod2014-08-072-3/+3
* security/p5-Crypt-SMIME: fix dependency to LOCALBASEpi2014-08-071-1/+2
* Update to 1.01i.delphij2014-08-073-12/+13
* Document OpenSSL multiple vulnerabilities.delphij2014-08-071-0/+76
* security/p5-Crypt-SMIME: fix build dependspi2014-08-071-0/+6
* security/p5-GnuPG-Interface: fix BUILD/RUN dependspi2014-08-071-0/+2
* - Update to 2.34sunpoet2014-08-072-3/+3
* security/p5-openxpki-i18n: update to 0.19.0.1wg2014-08-073-6/+6
* security/p5-openxpki: update to 0.19.0.1wg2014-08-074-25/+24
* Update pgpdump to 0.29johans2014-08-062-3/+3
* Remove USE_GNOME=ltverhack because USES=libtool already handles thattijl2014-08-061-1/+1
* Mark the critical warning as an error, and bump PORTREVISION,mandree2014-08-061-1/+3
* Remove reference to my_init and my_fini. These functions were causinghrs2014-08-062-7/+13
* In some straightforward situations, protect examples behind PORTEXAMPLES,adamw2014-08-064-7/+7
* Bump PORTREVISION on more ports that depend on libgcrypt after the updatetijl2014-08-0615-14/+15
* security/p5-Crypt-SMIME: 0.13 -> 0.14pi2014-08-052-8/+3
* security/p5-openxpki-i18n: update to 0.14.0.1wg2014-08-054-27/+30
* Remove deprecated p5-openxpki ports:wg2014-08-0514-302/+0
* Un-hardcode gccadamw2014-08-051-1/+4
* - Switch to USES=libtoolamdmi32014-08-051-1/+2
* - Switch to USES=libtoolamdmi32014-08-051-1/+2
* - Add CPE supportjhale2014-08-041-1/+3
* Update to 3.16.3bapt2014-08-046-50/+10
* Document CVE-2014-4607 in net/krfb.rakuco2014-08-041-0/+32
* - rename patch filesdinoex2014-08-032-0/+0
* security/p5-openxpki-deployment: mark as deprecatedwg2014-08-031-1/+4
* security/p5-openxpki-client-scep: mark as deprecatedwg2014-08-031-0/+4
* security/p5-openxpki-client: mark as deprecatedwg2014-08-031-0/+4
* security/p5-openxpki-client-html-mason: update to 0.14.0.1wg2014-08-035-85/+76
* security/p5-openxpki: update to 0.14.0.1wg2014-08-036-408/+589
* Mark broken.mandree2014-08-031-0/+5
* security/tinyca: 0.7.5 -> 0.7.6, new distsitepi2014-08-035-12/+253
* Make sure that -export-dynamic is passed to the linker.mandree2014-08-032-3/+6
* Enable WITH_DEBUG=yes.mandree2014-08-031-2/+4
* devel/security: re-add .la filepi2014-08-032-3/+3
* - Document net/samba4* vulnerability: CVE-2014-3560zi2014-08-021-0/+33
* - Add LICENSEsunpoet2014-08-021-2/+4
* - Update to 1.5.1jhale2014-08-023-5/+5
* - Document vulnerability in security/gpgme (CVE-2014-3564)jhale2014-08-021-0/+27
* - Use USES=twistedsunpoet2014-08-021-4/+2
* Add CPEcs2014-08-012-2/+4
* security/libgcrypt: avoid non-portable use of assembler instruction on amd64pi2014-08-011-0/+2
* Update to 20140727antoine2014-08-012-4/+6
* Stage and unbreak by adding missing headers and removing the MD2 code.adamw2014-08-019-26/+58
* Document x11/kdelibs4 vulnerabilityrakuco2014-07-311-0/+30
* - Add LICENSEsunpoet2014-07-313-17/+20
* - Add LICENSEsunpoet2014-07-313-10/+13
* tor -- traffic confirmation attackcs2014-07-311-0/+36
* security/p5-Crypt-SMIME: fix lib and build dependspi2014-07-311-0/+5
* Specify the libkrb5 abi version, otherwise, LIB_DEPEDNS finds it from base, andmat2014-07-301-1/+1
* security/cryptopp: Add patch from pkgsrcmarino2014-07-302-1/+30
* security/libgcrypt: 1.5.3_3 -> 1.6.1pi2014-07-3030-203/+207
* Update tor to 0.2.4.23 and tor-devel to 0.2.5.6-alphabf2014-07-304-8/+6
* Convert some more USE_BZIP2 to USES=tar:bzip2adamw2014-07-3019-19/+19
* Remove the final usages of USE_XZ from the tree, and replace them withadamw2014-07-302-2/+2
* Convert a bunch of USE_XZ to USES=tar:xz.adamw2014-07-304-8/+4
* Repair instances, almost all courtesy of bf ;-), of spacesadamw2014-07-302-2/+2
* - Update to 0.9.14cs2014-07-305-18/+17
* Convert a bunch of EXTRACT_SUFX=... into USES=tar:...adamw2014-07-3032-64/+32
* Fix misapplicationadamw2014-07-301-1/+1
* Convert a bunch of USE_BZIP2 to USES=tar:bzip2adamw2014-07-3013-26/+13
* Rename all patches that contain '::' as a path separator, and useadamw2014-07-3025-0/+0
* Rename security/ patches to reflect the files they modify.adamw2014-07-2976-13/+9
* security/gnutls: Support OPTIONal library dependencieskoobs2014-07-292-11/+23
* security/arirang: Mark broken with Ruby 2.0 or newerswills2014-07-291-1/+7
* Release three ports of snb@marino2014-07-291-1/+1
* Report serious i2p vulnerabilitycs2014-07-291-0/+33
* Remove expired ports:rene2014-07-293-30/+0
* I'll take itcs2014-07-281-1/+1
* - Update to 6.00zi2014-07-284-17/+6
* - Update security/libtasn1 to 4.0novel2014-07-289-13/+16
* security/heimdal: Establish consistency for seed data with base heimdalmarino2014-07-282-1/+12
* security/shishi: fix build with libgcrypt 1.6.xpi2014-07-282-0/+35
* New port: security/p5-Crypt-SMIMEpi2014-07-275-0/+36
* Update to 2.1.0.6antoine2014-07-272-3/+3
* security/pam_abl: Drop maintainership per requestmarino2014-07-261-1/+4
* - document bugzilla Cross Site Request Forgery (CVE-2014-1546)ohauer2014-07-251-0/+30
* - Fix plistbdrewery2014-07-252-1/+2
* - document apache22 CVE entriesohauer2014-07-251-0/+55
* Update to 3.2.16bdrewery2014-07-253-3/+14
* Remove expired ports:rene2014-07-2534-736/+0
* net/openldap24-*:tijl2014-07-2520-15/+20
* Reset maintainership for ports not staged with no pending PRbapt2014-07-251-1/+1
* Only use libevent2bapt2014-07-247-33/+108
* Update to the 201425 snapshot.rakuco2014-07-242-4/+3
* Remove patches added together with USES=libtool that are no longer neededtijl2014-07-241-2/+0
* - Document vulnerabilities in www/tomcat*: CVE-2014-0096, CVE-2014-0099, CVE-...zi2014-07-241-0/+49
* - Use USER and GROUP in Makefile instead of havingnovel2014-07-232-9/+3
* Add USES=readline to fix build on -current.adamw2014-07-231-0/+2
* Remove two libtool fixes from Mk/Uses/libtool.mk. They don't always worktijl2014-07-231-1/+0
* - Replace security/gnutls with security/gnutls3 and update to 3.2.15tijl2014-07-2328-1987/+442
* Document Mozilla multiple vulnerabilities.delphij2014-07-231-0/+92
* Apply vendor patch to fix race condition in certificate verificationdelphij2014-07-232-1/+31
* - Switch to USES=libtool, drop .la filesamdmi32014-07-231-1/+1
* Deprecate some ports BROKEN for more than 6 monthsantoine2014-07-231-0/+2
* Update to 2.0.3.vsevolod2014-07-222-3/+3
* - Update to 2.9.6.2zi2014-07-222-8/+7
* - Update to 2.4b1sbz2014-07-2222-48/+1089
* - Add p5-Mozilla-CA as dependencyjadawin2014-07-221-2/+3
* Fix build with texlivebapt2014-07-221-1/+1
* Fix the recent Qt vulnerability entry again.rakuco2014-07-221-4/+4
* security/vuxml: document security issue in mcollectiveswills2014-07-221-0/+34
* Update to 2.1.0.5antoine2014-07-222-5/+3
* Update to 0.2.10cs2014-07-222-3/+3
* Update to 0.9cs2014-07-222-3/+3
* Update the latest phpMyAdmin entry with CVE numbers and descriptivematthew2014-07-211-4/+23
* Fix the list of packages affected by 904d78b8-0f7e-11e4-8b71-5453ed2e2b49.rakuco2014-07-211-5/+6
* Mark vulnerable linux-f10 ports as forbidden (category s*)rene2014-07-204-0/+8
* Remove expired ports:rene2014-07-208-110/+0
* security/fbopenssl: Respect NO_PROFILE settingmarino2014-07-202-1/+7
* Document qt4-gui/qt5-gui vulnerability.rakuco2014-07-201-0/+34
* - document apache24 CVE entriesohauer2014-07-191-0/+43
* - Use p5-IO-Socket-IP>=0.31 because of a bug with version 0.30jadawin2014-07-181-1/+2
* Yet another tranche of phpMyAdmin security alerts. In typical stylematthew2014-07-181-0/+37
* - Update to 2.9.1 [1]gabor2014-07-182-28/+18
* A plist typo (%%WWWDIR%) was causing leftovers; fix it by usingadamw2014-07-181-3/+1
* Remove useless build dependenciesjohans2014-07-181-2/+4