aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Update 4.6 --> 4.7cy2015-10-142-4/+3
* Forgot two vulnerabilities in the previous commit.rene2015-10-141-0/+5
* Document new vulnerabilities in www/chromium < 46.0.2490.71rene2015-10-141-0/+54
* security/py-acme: 0.0.b1 -> 0.0.0.dev20151008pi2015-10-142-4/+4
* security/sshgaurd: Update to 1.6.2feld2015-10-133-15/+9
* Add CVE assignment to r398701 Zend Framework 1 entryjunovitch2015-10-121-0/+2
* Add CVE assignment to r398626 PHP entryjunovitch2015-10-121-0/+3
* security/wpa_supplicant: Upgrade version 2.4 => 2.5marino2015-10-1210-211/+25
* - Switch to options helpersamdmi32015-10-112-177/+29
* - Reset MAINTAINER due to fatal bouncezi2015-10-111-1/+1
* - Pass maintainership to submitterak2015-10-111-1/+1
* - Update to 2015.68 [1]ak2015-10-112-4/+4
* - Update to 0.11sunpoet2015-10-113-6/+12
* - Add rubygem-sshkey 1.7.0sunpoet2015-10-114-0/+27
* Document shell command execution via improper escaping in p5-UI-Dialogjunovitch2015-10-101-0/+35
* Document iPython vulnerabilities fixed in 3.2.2junovitch2015-10-101-0/+47
* - Use USES=gssapi.ume2015-10-091-9/+21
* Fix build with clang and MIT Kerberos.ume2015-10-091-1/+1
* New port: security/esteidfirefoxplugintijl2015-10-095-0/+53
* Add entry for two security problems in PostgreSQLgirgen2015-10-091-0/+55
* Unbreak INDEXantoine2015-10-091-2/+2
* security/stunnel: Update to 5.24brnrd2015-10-092-6/+14
* Remove trailing whitespace from Makefiles, M-X.olgeni2015-10-086-6/+6
* - Move file owner handling to plist, fix stage as non-rootamdmi32015-10-082-11/+53
* - Optionize DOCSamdmi32015-10-082-24/+28
* Update to 0.16ehaupt2015-10-072-4/+3
* r398691 placed the patch in the wrong directory, where it had no effect.des2015-10-073-16/+14
* security/vuxml: Document Zend Framework 1 vulnerabilitywg2015-10-061-0/+29
* Silence debugging message.des2015-10-062-1/+16
* Document OpenSMTPD vulnerabilities (5.7.3)junovitch2015-10-061-4/+53
* Document recent mbed TLS/PolarSSL security releasesjunovitch2015-10-061-0/+74
* GNOME 3 expects pinentry to have libsecret support. so instead of offeringkwm2015-10-061-1/+1
* security/vault: update to 0.3.0, add LICENSEswills2015-10-062-4/+5
* define DOCSDIR to avoid file conflict with security/erlang-jose.vanilla2015-10-051-0/+2
* define DOCDIRS to avoid file conflict with security/elixir-jose.vanilla2015-10-051-0/+2
* - Regenerate python bytecode to fix references to stagediramdmi32015-10-051-2/+7
* Unbreak vuxml, woops.kwm2015-10-051-1/+1
* Document heap overflows and a DoS in gdk-pixbuf2.kwm2015-10-051-0/+35
* Update to 2.1.1tijl2015-10-053-7/+12
* - Update to 1.3.13tijl2015-10-053-4/+10
* Document 20150910 Plone advisoriesjunovitch2015-10-051-0/+42
* Document PHP multiple security advisories in phar pluginjunovitch2015-10-051-0/+41
* Add CVE reference to Apache James entryjunovitch2015-10-051-0/+2
* - Convert to new options target helpersunpoet2015-10-051-4/+2
* Document mail/opensmtpd vulnerabilityswills2015-10-041-0/+27
* - Add NO_ARCHsunpoet2015-10-041-0/+1
* - Add NO_ARCHsunpoet2015-10-041-0/+1
* - Add NO_ARCHsunpoet2015-10-041-0/+1
* - Add NO_ARCHsunpoet2015-10-041-0/+1
* - Add NO_ARCHsunpoet2015-10-041-0/+1
* - Add NO_ARCHsunpoet2015-10-041-0/+1
* - Update to 2.0.1sunpoet2015-10-042-3/+4
* Upgrade TOR port to 0.2.6.10rodrigo2015-10-032-3/+3
* - Add empty directory to plistamdmi32015-10-021-1/+1
* Backout r398328 and r398370, they break packages depending on them.mat2015-10-024-12/+13
* Move 'elirix-' to PKGNAMEPREFIX to make portlint happy.vanilla2015-10-021-4/+3
* Move 'erlang-' to PKGNAMEPREFIX.vanilla2015-10-021-2/+5
* Use SUB_FILES.ume2015-10-024-15/+4
* Fix DOCSDIR.ume2015-10-021-3/+1
* Sync package name with origin.ume2015-10-014-11/+12
* Document security advisory for the Apache James serverjunovitch2015-10-011-0/+33
* - Convert pkg-install script to @diramdmi32015-10-013-34/+21
* Report OTRS vulnerabilitycs2015-09-301-0/+34
* Add elixir-jose.vanilla2015-09-296-0/+116
* Fix RUN_DEPENDS.vanilla2015-09-291-1/+1
* add erlang-jose.vanilla2015-09-296-0/+136
* Upgrade security/elixir-comeonin to version 1.2.2.olgeni2015-09-292-3/+3
* security/py-flask-httpauth: update to 2.7.0rm2015-09-292-3/+6
* Upgrade security/elixir-comeonin to version 1.2.1.olgeni2015-09-282-3/+3
* Horde package update:mm2015-09-282-3/+3
* Document newest flash vulnabilities.kwm2015-09-281-0/+79
* security/suricata: Disable -march=nativekoobs2015-09-281-1/+2
* - Add LICENSE_FILEsunpoet2015-09-281-0/+1
* Fix <freebsdpr> syntax on several entriesjunovitch2015-09-281-13/+20
* Document multiple vulnerabilities in CodeIgniterjunovitch2015-09-281-0/+151
* - Switch to @sampleamdmi32015-09-282-7/+3
* - update to 6.49BETA5ohauer2015-09-2714-72/+117
* Document new vulnerabilities in www/chromium < 45.0.2454.101rene2015-09-271-0/+43
* security/py-acme: simplify WRKSRCpi2015-09-271-1/+1
* - Convert to @sampleantoine2015-09-271-91/+26
* Mark as broken on sparc64: fails to link.linimon2015-09-271-0/+2
* Update gstreamer1 ports to 1.6.0.kwm2015-09-262-0/+19
* security/py-acme: add PYTHON_PKGNAMEPREFIXpi2015-09-261-0/+1
* New port: security/py-acmepi2015-09-264-0/+39
* Remove @exec/@unexec redundant with USES=desktop-file-utilsantoine2015-09-261-2/+0
* Upgrade security/elixir-comeonin to version 1.2.0.olgeni2015-09-263-7/+10
* Replace plist entries with proper USESbapt2015-09-261-1/+1
* Mark as broken on sparc64: these ports fail to link with boost.linimon2015-09-261-0/+2
* Mark as broken on sparc64 et. al.: uses SSE compiler-specific flag.linimon2015-09-261-0/+3
* Mark as broken on arm/sparc64: "cannot detect endianness."linimon2015-09-261-0/+3
* Mark as broken on sparc64: fails to build.linimon2015-09-261-0/+2
* Mark as broken on sparc64 and others: uses x86 assembler.linimon2015-09-261-0/+3
* Mark as broken on sparc64: fails to build.linimon2015-09-261-0/+1
* Mark as broken on sparc64: not yet ported to this architecture.linimon2015-09-261-0/+2
* Upgrade security/elixir-comeonin to version 1.1.4.olgeni2015-09-252-3/+3
* Convert to @samplebapt2015-09-251-3/+1
* - Update to latest snapshot.bdrewery2015-09-254-21/+11
* Stop trying to create the RSA protocol 1 key from the rc.d file. It is nobdrewery2015-09-252-12/+2
* - Update to 3.0.1sunpoet2015-09-252-3/+4
* security/libssh2: Fix pkgconfigfeld2015-09-251-1/+5
* Revise Moodle multiple security vulnerabilities from r397210 to reflectjunovitch2015-09-241-9/+27
* Fix older ruby vuxml entryfeld2015-09-241-3/+7
* - Fix shebangsamdmi32015-09-241-2/+14
* Update to 0.20cs2015-09-232-3/+3
* Update to 0.5cs2015-09-233-3/+4
* - Drop 8.x supportamdmi32015-09-232-16/+0
* - Update to 1.72sunpoet2015-09-232-3/+3
* Update to 2.0.hrs2015-09-235-11/+14
* security/libssh2: Update to 1.6.0feld2015-09-233-4/+7
* libssh2 version entry range was missing PORTEPOCHfeld2015-09-231-1/+2
* Document vulnerability in security/libssh2feld2015-09-231-0/+30
* Summary: Document recent Mozilla vulnerabilitiesjbeich2015-09-231-5/+144
* Update to 0.9.38 release.ale2015-09-222-4/+3
* security/pecl-scrypt: various fixes and improvementsrobak2015-09-221-11/+21
* Fix pkg-descr, Strongswan supports IKEv1 since version 5.0.0garga2015-09-211-1/+2
* Update security/strongswan to 5.3.3garga2015-09-215-24/+5
* Typos, whitespace and capitalization fixes (S-X).olgeni2015-09-2117-22/+23
* - Update to 1.0.1sunpoet2015-09-212-3/+3
* - Fix OpenSSL dependencysunpoet2015-09-212-8/+8
* - Drop 8.x supportamdmi32015-09-212-25/+1
* - Switch to options helpersamdmi32015-09-211-5/+3
* Remove BROKEN on Tier-2 systems statements which no longer true at leastdanfe2015-09-203-9/+0
* - Update to 0.7.2 (bugfix release) [1]johans2015-09-202-4/+4
* Mention ports with libzip copyjbeich2015-09-201-0/+17
* Fix typojbeich2015-09-201-2/+3
* Next avidemux2 may have CVE-2015-3395 fix, adjustjbeich2015-09-201-2/+2
* Document recent ffmpeg vulnerabilitiesjbeich2015-09-201-0/+186
* - Update to 4.0wen2015-09-202-4/+4
* Update to 2.6.1 release.ale2015-09-192-3/+3
* Update dcraw entry in VUXMLcs2015-09-191-3/+2
* - Update to 1.71sunpoet2015-09-193-5/+5
* Document Moodle multiple security vulnerabilitiesjunovitch2015-09-181-0/+38
* Document squid TLS/SSL parser denial of service vulnerabilityjunovitch2015-09-181-0/+41
* Document remind buffer overflow with malicious reminder file inputjunovitch2015-09-181-0/+30
* - Update to 2.0.0sunpoet2015-09-182-3/+3
* - Add NO_ARCHsunpoet2015-09-182-1/+2
* Alter <topic> of some of my recent entries to be more consistently wordedfeld2015-09-181-3/+3
* Normalize "use after free" as "use-after-free" in <topic>feld2015-09-181-8/+8
* Document deskutils/shutter vulnerabilityfeld2015-09-181-0/+31
* Document graphics/openjpeg vulnerabilityfeld2015-09-171-0/+27
* Document vulnerability in older graphics/optipngfeld2015-09-171-0/+26
* Document net/openslp vulnerabilityfeld2015-09-171-0/+29
* Update MASTER_SITEScs2015-09-171-1/+1
* Document archivers/p7zip vulnerabilityfeld2015-09-171-0/+31
* Remove ansi version fo wxGTK 2.8 and only keep the unicode versionbapt2015-09-171-0/+1
* - Switch to autoplist, fixing .egg-info handlingamdmi32015-09-173-30/+15
* Document www/h2o vulnerabilityfeld2015-09-171-0/+34
* It seems some people keep adding $FreeBSD$ to patch files.mat2015-09-163-5/+0
* krb5-111 is EOLed and retired.cy2015-09-161-5/+1
* Expiry date has passed, retire security/krb5-111.cy2015-09-1613-543/+0
* Fix build with LibreSSLcs2015-09-164-23/+73
* Fix spelling of zh_CN for wordpress vulnerabilities.delphij2015-09-161-7/+10
* security/libressl: Fix AESNI supportbrnrd2015-09-161-1/+7
* Document wordpress multiple vulnerabilities.delphij2015-09-161-0/+50
* Update to 4.7.novel2015-09-163-4/+4
* - Drop ARCH condition for removing -m32 flag: on i386 it's no-op anywayamdmi32015-09-151-10/+2
* Upgrade to version 1.1.3.olgeni2015-09-152-3/+3
* Make it so that the default Perl is always called perl5.mat2015-09-1418-33/+33
* - document bugzilla CVE-2015-4499ohauer2015-09-141-0/+37
* - Upgrade to 2.1.8 (minor bugfixes).kuriyama2015-09-142-5/+5
* Remove INSTALL_TARGETgblach2015-09-141-1/+0
* - Update to 2.4gblach2015-09-142-10/+11
* net/openldap24-server Fix affected package namefeld2015-09-141-1/+2
* Enforce unicode version of wxGTKbapt2015-09-141-0/+1
* - Update to 3.5wen2015-09-123-9/+13
* Document net/openldap24-server vulnerabilityfeld2015-09-121-0/+28
* - No need to install .conf when it's handled by @sampleamdmi32015-09-122-7/+4
* - Pass maintainership to submitterwen2015-09-111-1/+1
* - Upgrade to 2.0.29 (minor bugfixes).kuriyama2015-09-112-5/+5
* Update rekall to 1.4.1antoine2015-09-1110-37/+109
* Update to 0.17antoine2015-09-112-3/+3
* security/govpn: create portswills2015-09-114-0/+39
* - Add empty directories to plistamdmi32015-09-102-10/+17
* Expand a35f415d-572a-11e5-b0a4-f8b156b6dcc8:naddy2015-09-101-3/+25
* Document oggenc buffer overflow in audio/vorbis-tools.naddy2015-09-101-0/+28
* - Remove BROKEN statement for Tier-2 systems (tested on PowerPC only duedanfe2015-09-101-14/+10
* Document pgbouncer failed auth_query lookups falling back to auth_userjunovitch2015-09-091-0/+31
* Update to 0.6.0cs2015-09-092-3/+3
* Removed p5-Digest-SHA and p5-File-Temp (already exists in perl5-* package)cs2015-09-091-3/+2
* Document the latest phpMyAdmin vulnerability: reCaptcha bypassmatthew2015-09-091-0/+32
* Correct some package names that were mistakenly labeled as php56feld2015-09-091-4/+5
* Add assigned CVEs to previous php vulnerability entryfeld2015-09-091-0/+4
* Document php vulnerabilitiesfeld2015-09-091-0/+80
* Spelling frontent -> frontendfeld2015-09-091-2/+3
* Document sysutils/ganglia-webfrontent vulnerabilityfeld2015-09-091-0/+26
* Add net/wireshark-qt5 as affectedfeld2015-09-091-0/+2
* Document net/wireshark vulnerabilitiesfeld2015-09-091-0/+57
* Document sysutils/screen vulnerabilityfeld2015-09-091-0/+27
* Document net/libvncserver vulnerabilityfeld2015-09-091-0/+26
* New Port: security/erlang-p1tls - TLS / SSL native driver for Erlangfarrokhi2015-09-096-0/+57
* - Fix PYDISTUTILS_EGGINFOamdmi32015-09-081-1/+3
* - Remove no longer valid "BROKEN on powerpc" statement, port builds finedanfe2015-09-081-19/+9
* - Update to devel/courier-unicode to 1.4madpilot2015-09-081-1/+1
* Update to 0.21, and remove p5-Rinci dependency.adamw2015-09-082-5/+4
* Unbreak on 11, again.mat2015-09-071-1/+1
* - add support for tincd_flags= in rc.confdinoex2015-09-051-1/+1
* - new OPTION MAN3dinoex2015-09-052-9/+9
* Update to 4.6.novel2015-09-053-5/+5
* Document a number of integer overflows in gdk-pixbuf2.kwm2015-09-051-0/+25
* Convert most ports using cloud.github.com to GHC.mat2015-09-051-1/+4
* Minimum range adjustment for bind vulnerabilityfeld2015-09-031-1/+1
* Correct version range mistakes in bind vulnerabilitiesfeld2015-09-031-3/+3
* Document bind vulnerabilitiesfeld2015-09-031-0/+81
* - Switch to options helpersamdmi32015-09-0313-68/+28
* - Switch to options helpersamdmi32015-09-032-11/+7
* - Switch to options helpersamdmi32015-09-032-14/+11
* - Fix identationamdmi32015-09-031-10/+7
* Document new vulnerabilities in www/chromium < 45.0.2454.85rene2015-09-031-0/+70
* - Allow concurrent installation (USE_PYTHON=concurrent)sunpoet2015-09-031-1/+1
* Document dns/powerdns vulnerabilityfeld2015-09-031-0/+29
* Update to 1.20.novel2015-09-033-5/+4
* - Switch to USES=libedit as suggested by stage-qaamdmi32015-09-021-2/+2
* - Update to 5.23zi2015-09-022-4/+4
* Fix LICENSE_FILE path.rakuco2015-09-021-1/+1
* Revise Ghostscript entry date to match date of commit.junovitch2015-09-021-1/+2
* Document denial of service (crash) via crafted Postscript files for Ghostscriptjunovitch2015-09-021-0/+59
* New port: security/softetherpi2015-09-0219-0/+439
* Document recent ffmpeg/libav vulnerabilitiesjbeich2015-09-011-0/+176
* Remove configuration argument used during testing.cy2015-08-311-1/+0
* security/libressl: Update to 2.2.3brnrd2015-08-312-3/+4
* Fix build under 11-CURRENT. r378417 introduced a libreadline linkcy2015-08-312-14/+3
* - Update to 1.010sunpoet2015-08-302-5/+3
* Document graphics/graphviz vulnerabilityfeld2015-08-291-0/+26
* - Switch to @sampleamdmi32015-08-291-3/+1
* - Don't try to install empty examples directoriesamdmi32015-08-292-5/+3
* - Switch to USES=libedit as suggested by stage-qaamdmi32015-08-291-2/+3
* - Fix shebangsamdmi32015-08-281-0/+11
* Document recent mozilla vulnerabilitiesjbeich2015-08-281-0/+43
* graphics/libpgf was assigned a CVEfeld2015-08-261-0/+2
* - ensure demon starts after ldconfigdinoex2015-08-262-1/+2
* Fix security/obfsclient build with clang 3.7.0.delphij2015-08-262-1/+21
* Document multiple security advisories for go and go14junovitch2015-08-261-0/+39
* Claim ownership of security/scrypt. It's my code anyway...cperciva2015-08-261-13/+1
* - Pass maintainership to perl@sunpoet2015-08-252-2/+2
* - Fix LICENSEsunpoet2015-08-252-5/+6
* - Add LICENSEsunpoet2015-08-251-3/+6
* - Fix LICENSEsunpoet2015-08-251-5/+6
* - Strip libraryamdmi32015-08-251-2/+6
* - Strip libraryamdmi32015-08-251-1/+4
* - Strip libraryamdmi32015-08-251-1/+4
* - Add NO_ARCHamdmi32015-08-251-0/+1
* - Fix build when CC contains slashesamdmi32015-08-251-1/+1
* - Add LICENSEamdmi32015-08-251-2/+4
* Fix MFSA quote link and add libtremor commitsjbeich2015-08-251-1/+7
* Document libtremor vulnerabilities in the ancient version we providejbeich2015-08-251-0/+64
* Fix patch from r395182 on head. The patch(1) command works fine on 8.4bdrewery2015-08-251-1/+1
* - Update to 1.2.0 [1]wen2015-08-253-6/+6
* - Drop maintainershipbrix2015-08-254-4/+4
* Apply upstream fix for 'HostkeyAlgorithms +' support.bdrewery2015-08-252-1/+54
* Document devel/pcre vulnerabilityfeld2015-08-251-0/+37