MD5 (bazaar_1.4.2.tar.gz) = 6e61d7aeec990a801977ee6cdc3958d5 SHA256 (bazaar_1.4.2.tar.gz) = 4ad40013fb6572c9e7a5d14cd055ef98ca583893425c005697a5881b8ac0cc4e SIZE (bazaar_1.4.2.tar.gz) = 6264573 cut icon' href='/favicon.ico'/>
aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Mark as broken: does not buildbapt2013-05-271-0/+2
* Update to 1.19martymac2013-05-272-8/+4
* Fix plistbapt2013-05-272-7/+2
* Remove duplicate LICENSE line.crees2013-05-271-2/+0
* Adjust range for socat entry.ehaupt2013-05-271-1/+1
* Document socat FD leak vulnerability.ehaupt2013-05-271-0/+27
* - Add entry for ruby 1.9.3p429swills2013-05-271-0/+34
* Fix build when usng clang.cy2013-05-272-1/+12
* Document couchdb XSS vulnerability.delphij2013-05-261-0/+29
* - Update and re-add KERB_GSSAPI gsskex patch.bdrewery2013-05-262-2/+20
* - Remove outdated PERL_LEVEL checksunpoet2013-05-251-13/+5
* - Trim Makefile headeraz2013-05-251-17/+3
* Fix typobapt2013-05-241-1/+1
* Mark as broken on FreeBSD >= 900007, does not build with utmpx.zeising2013-05-241-1/+7
* Chase the c-ares shlib bump. [1]zeising2013-05-242-14/+25
* - Trim Makefile headeraz2013-05-241-9/+1
* Update to 2.17.1 as the 2.18 release was postponed / cancelledflo2013-05-231-2/+3
* Fix entry date, wrongly entered in revision 318453cs2013-05-231-1/+1
* fix typo in recent otrs vulnerabilitycs2013-05-231-1/+1
* Add vulnerabilitiescs2013-05-231-0/+52
* Security Updatesmatthew2013-05-231-0/+103
* - adoption of optionsNGjgh2013-05-233-23/+16
* - Trim Makefile headeramdmi32013-05-231-8/+4
* - Fix sshd crash when not using HPNbdrewery2013-05-232-6/+13
* Update to 5.6.2.delphij2013-05-235-120/+10
* This changeset fixes two issues with crypto++ library:delphij2013-05-233-1/+76
* Copy botan port to new port for botan 1.10 which can coexist withmadpilot2013-05-235-0/+101
* Update to 2.17.tobez2013-05-222-3/+3
* Fix vuxml by using the correct format for CVE names.rene2013-05-221-14/+14
* - Update to 1.17jadawin2013-05-222-8/+4
* List vulnerabilities fixed in www/chromium 27.0.1453.93 (which is therene2013-05-221-0/+66
* Update to latest snapshotjpaetzel2013-05-222-6/+19
* Mark BROKEN as I have received 2 separate reportsbdrewery2013-05-221-0/+2
* Update to 3.0.12. Changes:lx2013-05-222-3/+3
* Refactor the replay code to fix the reported vulnerability -- simply use mmap()mi2013-05-227-44/+266
* - Upgrade to 0.34.kuriyama2013-05-212-3/+3
* - Do not install COPYING, LICENSE is already defined [1]wg2013-05-211-2/+2
* - Do not mute install commandwg2013-05-211-2/+3
* - Update to 0.4.1wg2013-05-203-8/+9
* - Update to 0.7.3.1wg2013-05-206-66/+21
* Patch multiple vulnerabilities in x11-toolkits/plib.rakuco2013-05-191-0/+69
* - Update to 0.7.4rakuco2013-05-191-0/+32
* KDE/FreeBSD team presents KDE SC 4.10.3 ports!makc2013-05-192-4/+4
* - Update to 4.99zi2013-05-192-4/+4
* - Update to 6.2p2bdrewery2013-05-18