aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Reset maintainershipbapt2014-10-171-1/+1
* - Update to 2.1.1.vsevolod2014-10-174-6/+12
* MIT Kerberos released 1.13; 1.12 becomes a maintenance release,cy2014-10-1728-11/+563
* Document critical SQL Injection Vulnerability in www/drupal7flo2014-10-171-0/+34
* Remove @dirrm from package list of 8 of my portsmarino2014-10-161-6/+0
* - Mark libxul as vulnerable toobeat2014-10-161-0/+5
* security/kpcli: update 2.5 -> 2.7robak2014-10-162-5/+5
* - Fix runtime error when used with OpenSSL 1.0.1i [1]madpilot2014-10-165-6/+22
* - Fix various distinfo errorsak2014-10-161-9/+0
* Update to 1.8.11p1wxs2014-10-166-20/+53
* - Update to 1.9.13zi2014-10-163-5/+5
* - Fix regex to match all sshd auth errorsamdmi32014-10-162-2/+2
* - Fix rule reset time on armamdmi32014-10-162-1/+12
* Fix build on systems without stdnoreturn.hbdrewery2014-10-161-0/+2
* Update gss to 1.0.3 (API+ABI compatible)johans2014-10-163-8/+11
* Update to 1.01j.delphij2014-10-163-13/+19
* Update to signing-party 1.1.10johans2014-10-163-8/+14
* Document OpenSSL multiple vulnerabilities.delphij2014-10-161-0/+61
* - Update Firefox to 33.0beat2014-10-156-10/+9
* - Update to 3.2.19bdrewery2014-10-153-4/+4
* Document mozilla vulnerabilitiesbeat2014-10-151-0/+82
* - Update to 1.6.2lme2014-10-143-22/+16
* Update to 1.20.2martymac2014-10-143-3/+5
* security/wpa_supplicant: Fix mis-information in pkg-messagemarino2014-10-141-1/+1
* security/wpa_supplicant: Bring in BSD driver fix from DragonFly BSDmarino2014-10-132-1/+17
* Only works with php 5.2 -> 5.4.mat2014-10-131-0/+1
* wpa/supplicant: Fix driver list with NDIS, take 2marino2014-10-133-1/+26
* security/wpa_supplicant: Fix NDIS driver, privsep no longer defaultmarino2014-10-133-5/+43
* - Update to 2.1.0vsevolod2014-10-133-5/+5
* Remove @dirrm/@dirrmty from my portsmartymac2014-10-132-13/+0
* Revive security/wpa_supplicant after 6.5 years => version 2.3marino2014-10-1315-0/+841
* Update security/pam_ocra to 1.1rodrigo2014-10-132-5/+20
* Unbreak on freebsd 8 and 9antoine2014-10-123-10/+16
* Update to 0.22.1.novel2014-10-124-18/+9
* - Update to 1.0.0vsevolod2014-10-123-6/+6
* Update to 1.4.23arved2014-10-122-3/+3
* Use Uses/gssapi.mk.ume2014-10-121-14/+6
* security/aespipe: update v2.3e -> v2.4crobak2014-10-122-4/+3
* Update to 1.16.novel2014-10-123-4/+4
* Since we don't use its own libtool, build arg is requiredume2014-10-111-1/+1
* security/sguil: Fix shebang in sguildmarino2014-10-101-1/+2
* Include RPATH in the libs, again.ume2014-10-091-1/+8
* Convert USE_PYTHON_RUN to new USES syntax;feld2014-10-091-1/+1
* Add entry for foreman-proxyfeld2014-10-091-0/+30
* Fix packaging for linux-c6-libtasn1 and linux-f10-libtasn1antoine2014-10-092-2/+2
* Remove @dirrm, @dirrmtryehaupt2014-10-082-2/+0
* Document new vulnerabilities in www/chromium < 38.0.2125.101rene2014-10-081-0/+71
* security/vinetto: switch from py-imaging to py-pillowwg2014-10-072-6/+17
* Note my intentions with OVERWRITE_BASEbdrewery2014-10-071-0/+1
* - Add py-oauth2client 1.3sunpoet2014-10-074-0/+29
* - document bugzilla security issuesohauer2014-10-071-0/+49
* Use new @dir for directories out of PREFIXgarga2014-10-062-13/+7
* security/py-pylibacl: update 0.5.0 -> 0.5.2 and fixesrobak2014-10-063-12/+8
* New port: security/py-rekallantoine2014-10-064-0/+59
* - Update devel/libtool and devel/libltdl to version 2.4.2.418tijl2014-10-064-13/+22
* Update to 20140928antoine2014-10-053-4/+4
* Switch from py-imaging to py-pillowantoine2014-10-041-1/+2
* - Mark OVERWRITE_BASE and security/openssh-portable-base as DEPRECATED.bdrewery2014-10-041-0/+2
* Support multiple ListenAddress portsbdrewery2014-10-042-4/+9
* Fix rsyslog entry for pkgname matchingbdrewery2014-10-031-0/+3
* www/rt42 < 4.2.8 is vulnerable to shellshock related exploits throughmatthew2014-10-031-0/+36
* - Update the rsyslog entry to reflect the new versionsbrd2014-10-031-2/+4
* Update to 3.2.18bdrewery2014-10-034-16/+13
* Cleanup @dirrm* from my ports.mat2014-10-031-5/+0
* The default pardon and prescribe settings in the rc script were swappedfeld2014-10-022-5/+5
* Update Jenkins entry 549a2771-49cc-11e4-ae2c-c80aa9043978 to be readable.bdrewery2014-10-021-54/+99
* Update grammar of DoS in Jenkins entrybdrewery2014-10-021-1/+1
* Fix Jenkins entry to note that XSS is an issue, not as compilerbdrewery2014-10-021-1/+1
* Document Jenkins vulnerabilitiesbdrewery2014-10-021-0/+94
* Fix bash entries to also mark bash-static vulnerablebdrewery2014-10-021-0/+2
* Document CVE-2014-6277 and CVE-2014-6278 for bash.bdrewery2014-10-021-0/+28
* - Document CVE-2014-7187 fixed in bash-4.3.27_1bdrewery2014-10-021-0/+7
* Document the latest phpMyAdmin vulnerability.matthew2014-10-021-1/+32
* - Convert to USES=autoreconftijl2014-10-011-7/+3
* Document CVE-2014-7186 for bashbdrewery2014-10-011-0/+29
* Convert to USES=hordebapt2014-10-018-36/+19
* - Document sysutils/rsyslog vulnerabilities CVE-2014-3634brd2014-10-011-0/+30
* security/libbeid: Add <stdlib.h> header for mallocmarino2014-10-011-4/+5
* - Pet portlint: move USES=pear downwardsunpoet2014-09-301-2/+2
* service_identity aspires to give you all the tools you needmva2014-09-304-0/+36
* Remove expired ports:rene2014-09-3012-178/+0
* Add pam_ocra 1.0, RFC6287 (OCRA) PAM module.vanilla2014-09-304-0/+33
* Document shells/fish vulnerabilitiesbdrewery2014-09-301-0/+35
* - adopt new pkg-plist styleohauer2014-09-291-33/+0
* - remove useless PORT_OPTIONS:MDOCS checkohauer2014-09-291-13/+9
* Move back to version 0.17.0 and take maintainership, new versions do notantoine2014-09-282-5/+7
* security/rubygem-metasploit_data_models: update to 0.20.1swills2014-09-282-3/+3
* security/linux-c6-nss: update to 3.16.1xmj2014-09-273-15/+26
* Revert broken non-conversion to USES=pearantoine2014-09-272-3/+10
* Fix stage violation (and allow staging as regular user)antoine2014-09-271-0/+1
* Add linux-c6-nss-3.15.1 package to the NSS vulnerability report.xmj2014-09-271-0/+4
* Add linux_base-c6-6.5 package to the bash vulnerability report.xmj2014-09-271-0/+4
* Convert to USES=pearbapt2014-09-2625-275/+82
* The 2nd bash issue was reassigned to CVE-2014-7169:bdrewery2014-09-261-2/+2
* Remove hack now that USES=pathfix no longer modifies configure (r369260)tijl2014-09-251-5/+0
* Update bash entry for CVE-2014-3659bdrewery2014-09-251-7/+12
* - Set CPPFLAGS and LIBS in a number of ports so configure can find libintl.htijl2014-09-252-1/+5
* VuXML entry 48108fb0-751c-4cbb-8f33-09239ead4b55: expanded detailsrea2014-09-251-2/+6
* www/linux-*-flashplugin11: Fix multiple security vulnerabilitiesxmj2014-09-251-0/+42
* - Remove obsolete @dirrm(try)ak2014-09-251-1/+1
* - Update ca_root_nss to 3.17.1beat2014-09-252-3/+3
* Update tor to 0.2.4.24 and tor-devel to 0.2.5.8-rcbf2014-09-256-13/+6
* fixdes2014-09-251-1/+1
* Add entry for the NSS signature forgery bug.des2014-09-251-1/+39
* Upgrade to 3.17.1des2014-09-252-4/+3
* Document new vulnerability in www/chromium < 37.0.2062.124rene2014-09-251-0/+28
* Add entry for net/krfb (CVE-2014-6055).rakuco2014-09-251-0/+31
* - Allow staging as a regular userantoine2014-09-252-36/+3
* Document bash remote code execution vulnerability.delphij2014-09-251-0/+36
* Hand back my ports to the pool.eadler2014-09-241-1/+1
* - Drop @dirrm* from plistamdmi32014-09-242-111/+1
* - Upgrade to 0.7.1.vsevolod2014-09-233-5/+4
* Simplify plistbapt2014-09-232-19/+5
* Simplify plistbapt2014-09-231-8/+2
* Simplify plistbapt2014-09-232-9/+3
* Simplify plistbapt2014-09-231-5/+0
* Simplify plistbapt2014-09-231-3/+1
* Simplify plistbapt2014-09-231-8/+4
* Simplify plistbapt2014-09-231-18/+2
* Simplify plistbapt2014-09-232-11/+5
* Simplify plistbapt2014-09-231-8/+3
* Simplify plistbapt2014-09-232-13/+3
* Simplify plist (and avoir @cwd)bapt2014-09-231-3/+1
* Simplify plistbapt2014-09-221-6/+2
* - Drop @dirrm* from plistamdmi32014-09-221-1/+0
* - Trim @dirrm[try] from pkg-plistjhale2014-09-222-4/+0
* Update CentOS base to 6.5, add userland portsxmj2014-09-2235-31/+557
* Fix build when security/openssl is installed.hrs2014-09-221-1/+4
* - Update to 5.04zi2014-09-222-3/+3
* Update to 1.15.novel2014-09-213-5/+4
* Update to 4.2.novel2014-09-213-4/+4
* security/heimdal: Unbreak on DragonFlymarino2014-09-211-0/+4
* Remove FORBIDDEN that references vuxml. We already have vuxml, portauditbdrewery2014-09-204-8/+0
* Remove expired portsrene2014-09-2015-444/+0
* fix build with perl 5.18az2014-09-201-1/+6
* fix build with perl 5.18az2014-09-201-0/+8
* - Remove dependency on pkgconftijl2014-09-191-9/+1
* Remove old libtool patchtijl2014-09-191-11/+0
* Document new asterisk11 vulnerability.madpilot2014-09-191-0/+38
* Expose the reload command in the tor and tor-devel rc-scripts [1],bf2014-09-195-5/+6
* - Drop .la files, no dependees require themamdmi32014-09-192-3/+2
* Fix recidive jail.ache2014-09-192-1/+16
* - Update to 1.3.1sunpoet2014-09-193-14/+6
* Document new squid vulnerability.madpilot2014-09-181-0/+35
* - Bump PORTREVISIONs on php*-mcrypt after libmcrypt .so version changeamdmi32014-09-184-0/+4
* fix scripoliver2014-09-181-0/+3
* - Drop .la files for security/libmcrypt, no dependees require themamdmi32014-09-187-7/+9
* - Drop .la files, no dependees require themamdmi32014-09-182-3/+2
* - Drop .la files, no dependees require themamdmi32014-09-172-2/+2
* - Drop .la files, no dependees require themamdmi32014-09-172-3/+2
* - Strip shared librariesgahr2014-09-171-0/+2
* Document new dbus vulnabilities.kwm2014-09-171-0/+52
* Replace USE_AUTOTOOLS=libltdl with an ordinary LIB_DEPENDS in all ports.tijl2014-09-178-11/+16
* Document nginx security advisory (CVE-2014-3616).osa2014-09-171-0/+32
* - Drop .la files for security/libksba, no dependees require themamdmi32014-09-165-6/+7
* Add ipropd_master and ipropd_slave rc.d scripts for branches which do nothrs2014-09-163-1/+92
* Add pkg-message for client userscs2014-09-162-0/+16
* Allow staging as a regular userantoine2014-09-153-3/+1
* - Use the ports framework to create user/groupantoine2014-09-153-45/+5
* - Patch a script to use the right syslogd socket (/var/run/log)tijl2014-09-152-6/+2
* Update to v2.0beta.hrs2014-09-155-11/+24
* Fix build with makeinfo version 5.2.hrs2014-09-152-0/+54
* - Switch to USES=libtool:buildtijl2014-09-141-5/+3
* Document the latest phpMyAdmin vulnerabilitymatthew2014-09-141-0/+30
* Use default LIBTOOLIZE_ARGStijl2014-09-141-1/+0
* security/heimdal: Restore MAKE_JOBS_UNSAFE removed recentlymarino2014-09-141-0/+2
* devel/glib12 x11-toolkits/gtk12:tijl2014-09-138-8/+8
* Re-deprecate and add back the expiration date.adamw2014-09-131-2/+5
* Fix build and minor clean-ups to Makefile.adamw2014-09-131-7/+8
* Allow staging as a regular userantoine2014-09-131-5/+5
* Allow staging as a regular userantoine2014-09-121-1/+0
* Adjust patch to avoid libtool. It is more similar to Linux now.tijl2014-09-123-10/+23
* Remove a comment about USE_AUTOTOOLS=libtooltijl2014-09-121-4/+0
* - fix build with ccache on FreeBSD 10ohauer2014-09-121-1/+1
* - update to 1.4d (see http://www.harding.motd.ca/autossh/CHANGES)leeym2014-09-122-3/+3
* Use @sample for sudoersbdrewery2014-09-121-3/+1
* databases/sqlite2:tijl2014-09-121-1/+1
* - Allow staging as a regular userantoine2014-09-121-3/+5
* - Update to CyaSSL 3.2.0johans2014-09-123-5/+10
* Allow staging as a regular userantoine2014-09-121-1/+1
* - Fix libnet dependencymich2014-09-121-4/+1
* Update to 2.8.1 which addresses CVE-2014-5284.brd2014-09-112-3/+3
* Document CVE-2014-5284 affecting security/ossec-hids-* < 2.8.1.brd2014-09-111-0/+32
* Add back USE_LDCONFIG for coourier-authlib-base only.madpilot2014-09-111-1/+3
* Fix a typoantoine2014-09-111-2/+2
* - Allow staging as a regular userantoine2014-09-111-8/+5
* Update the default version of GCC in the Ports Collection from GCC 4.7.4gerald2014-09-1152-14/+52
* Allow staging as a regular userantoine2014-09-101-2/+2
* Update to 1.66ehaupt2014-09-102-3/+3
* Welcome Mate Desktop 1.8bapt2014-09-1014-546/+0
* Document new vulnerabilities in www/chromium < 37.0.2062.120rene2014-09-101-0/+33
* Update nss to 3.17bapt2014-09-092-8/+10
* net/libnet10 expired, set the 12 dependent ports to expire 30 SEP 2014marino2014-09-092-0/+6
* Mozilla upgrades:bapt2014-09-092-3/+4
* - Update to 1.998jadawin2014-09-082-4/+3
* - Update to 0.21.0.1culot2014-09-082-6/+4
* - Update to 0.21.0.1culot2014-09-084-6/+22
* Let USES=libtool also delete links to .la files (and links to links to...)tijl2014-09-082-3/+1
* Allow staging as a regular userantoine2014-09-081-0/+1
* Allow staging as a regular userantoine2014-09-081-0/+1
* Allow staging as a regular userantoine2014-09-081-0/+1
* Allow staging as a regular userantoine2014-09-081-1/+2
* Remove three unstaged security/prelude-* portsmarino2014-09-0821-481/+0
* security/barnyard2: Remove PRELUDE optionmarino2014-09-081-4/+2
* Stage security/distcache; Apache24 optionally depends on itmarino2014-09-083-27/+32
* */courier-authlib*:tijl2014-09-0812-233/+102
* Allow staging as a regular userantoine2014-09-071-2/+2
* . Fix LICENSE specification (BSD -> BSD3CLAUSE)glewis2014-09-071-1/+1
* security/hydra: Switch Firebird client options from 2.1 => 2.5marino2014-09-071-1/+1
* Update to 2.1.0.7antoine2014-09-062-3/+3
* Webshag is a multi-threaded, multi-platform web server audit tool. Written incs2014-09-066-0/+211
* https has been the default for www.keltia.net for more than a year.roberto2014-09-061-1/+1
* security/umit: fix build since sphinx updatewg2014-09-061-0/+1
* Update to Calife 3.0.4: support for %group synatx in addition to @grouproberto2014-09-062-3/+5
* Radamsa is a generic test case generator for robustness testing, aka a fuzzer.cs2014-09-065-0/+51
* security/cracklib:tijl2014-09-068-17/+17
* Add USES=libtool and INSTALL_TARGET=install-striptijl2014-09-061-6/+6
* Remove IGNORE -- port should work fine nowcs2014-09-061-2/+1
* Update to 20140828cs2014-09-063-44/+68
* Add USES=libtool and INSTALL_TARGET=install-striptijl2014-09-062-3/+3
* Document trafficserver vulnerabilitytijl2014-09-051-0/+31
* - Update to 6.47, announce message:nemysis2014-09-052-7/+5
* Change INSTALL_DATA to install with mode 644antoine2014-09-052-3/+4
* security/libgcrypt: fix build with GCC on 8.x/amd64, 2nd attemptpi2014-09-051-3/+2
* Import PHP 5.6 branch!ale2014-09-046-0/+54
* Fix permissions (@group/@mode) handlingmartymac2014-09-042-7/+4
* - update vid f927e06c-1109-11e4-b090-20cf30e32f6dohauer2014-09-041-6/+12
* Update to 20140824cs2014-09-046-290/+30
* - Update to 0.9.5jhale2014-09-032-5/+5
* - Update to 2.1.2jhale2014-09-033-17/+17
* Upgrade to 0.9.4. bump PORTREVISION due shared library incr.vanilla2014-09-031-1/+1
* Remove pkg_install only bitsbapt2014-09-031-4/+0
* security/libgcrypt: fix build without assembler on 8.x/amd64pi2014-09-032-5/+18
* Update to 1.3.1cs2014-09-032-6/+5
* Mark brokencs2014-09-031-0/+1
* Remove non staged ports without pending PR from s*bapt2014-09-0275-2699/+0
* Support stagingcs2014-09-022-9/+15
* Reading up on it a bit more, there are some differences betweenadamw2014-09-021-1/+1
* Deprecate as upstream has abandoned it for security/py-potrcs2014-09-021-0/+2
* Add security/p5-Crypt-Tea_JS.adamw2014-09-026-0/+58
* Fix build on 8 and 9.adamw2014-09-021-2/+2
* Remove support for pkg_installbapt2014-09-012-10/+0
* lang/guile:tijl2014-08-311-1/+1
* security/umit: support stagewg2014-08-312-47/+58
* security/orthrus: support stagewg2014-08-312-20/+25
* security/libpreludedb: support stagewg2014-08-312-91/+59
* security/kedpm: support stagewg2014-08-313-89/+16
* security/rubygem-omniauth: correct dependencyswills2014-08-311-1/+1
* security/rubygem-omniauth: update to 1.2.2swills2014-08-312-3/+3
* security/rubygem-net-ssh27: limit portscout to proper versionsswills2014-08-311-1/+1