/graphics/darknock/

v id='cgit'>
aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Fix rsyslog entry for pkgname matchingbdrewery2014-10-031-0/+3
* www/rt42 < 4.2.8 is vulnerable to shellshock related exploits throughmatthew2014-10-031-0/+36
* - Update the rsyslog entry to reflect the new versionsbrd2014-10-031-2/+4
* Update to 3.2.18bdrewery2014-10-034-16/+13
* Cleanup @dirrm* from my ports.mat2014-10-031-5/+0
* The default pardon and prescribe settings in the rc script were swappedfeld2014-10-022-5/+5
* Update Jenkins entry 549a2771-49cc-11e4-ae2c-c80aa9043978 to be readable.bdrewery2014-10-021-54/+99
* Update grammar of DoS in Jenkins entrybdrewery2014-10-021-1/+1
* Fix Jenkins entry to note that XSS is an issue, not as compilerbdrewery2014-10-021-1/+1
* Document Jenkins vulnerabilitiesbdrewery2014-10-021-0/+94
* Fix bash entries to also mark bash-static vulnerablebdrewery2014-10-021-0/+2
* Document CVE-2014-6277 and CVE-2014-6278 for bash.bdrewery2014-10-021-0/+28
* - Document CVE-2014-7187 fixed in bash-4.3.27_1bdrewery2014-10-021-0/+7
* Document the latest phpMyAdmin vulnerability.matthew2014-10-021-1/+32
* - Convert to USES=autoreconftijl2014-10-011-7/+3
* Document CVE-2014-7186 for bashbdrewery2014-10-011-0/+29
* Convert to USES=hordebapt2014-10-018-36/+19
* - Document sysutils/rsyslog vulnerabilities CVE-2014-3634brd2014-10-011-0/+30
* security/libbeid: Add <stdlib.h> header for mallocmarino2014-10-011-4/+5
* - Pet portlint: move USES=pear downwardsunpoet2014-09-301-2/+2
* service_identity aspires to give you all the tools you needmva2014-09-304-0/+36
* Remove expired ports:rene2014-09-3012-178/+0
* Add pam_ocra 1.0, RFC6287 (OCRA) PAM module.vanilla2014-09-304-0/+33
* Document shells/fish vulnerabilitiesbdrewery2014-09-301-0/+35
* - adopt new pkg-plist styleohauer2014-09-291-33/+0
* - remove useless PORT_OPTIONS:MDOCS checkohauer2014-09-291-13/+9
* Move back to version 0.17.0 and take maintainership, new versions do notantoine2014-09-282-5/+7
* security/rubygem-metasploit_data_models: update to 0.20.1swills2014-09-282-3/+3
* security/linux-c6-nss: update to 3.16.1xmj2014-09-273-15/+26
* Revert broken non-conversion to USES=pearantoine2014-09-272-3/+10
* Fix stage violation (and allow staging as regular user)antoine2014-09-271-0/+1
* Add linux-c6-nss-3.15.1 package to the NSS vulnerability report.xmj2014-09-271-0/+4
* Add linux_base-c6-6.5 package to the bash vulnerability report.xmj2014-09-271-0/+4
* Convert to USES=pearbapt2014-09-2625-275/+82
* The 2nd bash issue was reassigned to CVE-2014-7169:bdrewery2014-09-261-2/+2
* Remove hack now that USES=pathfix no longer modifies configure (r369260)tijl2014-09-251-5/+0
* Update bash entry for CVE-2014-3659bdrewery2014-09-251-7/+12
* - Set CPPFLAGS and LIBS in a number of ports so configure can find libintl.htijl2014-09-252-1/+5
* VuXML entry 48108fb0-751c-4cbb-8f33-09239ead4b55: expanded detailsrea2014-09-251-2/+6
* www/linux-*-flashplugin11: Fix multiple security vulnerabilitiesxmj2014-09-251-0/+42
* - Remove obsolete @dirrm(try)ak2014-09-251-1/+1
* - Update ca_root_nss to 3.17.1beat2014-09-252-3/+3
* Update tor to 0.2.4.24 and tor-devel to 0.2.5.8-rcbf2014-09-256-13/+6
* fixdes2014-09-251-1/+1
* Add entry for the NSS signature forgery bug.des2014-09-251-1/+39
* Upgrade to 3.17.1des2014-09-252-4/+3
* Document new vulnerability in www/chromium < 37.0.2062.124rene2014-09-251-0/+28
* Add entry for net/krfb (CVE-2014-6055).rakuco2014-09-251-0/+31
* - Allow staging as a regular userantoine2014-09-252-36/+3
* Document bash remote code execution vulnerability.delphij2014-09-251-0/+36
* Hand back my ports to the pool.eadler2014-09-241-1/+1
* - Drop @dirrm* from plistamdmi32014-09-242-111/+1
* - Upgrade to 0.7.1.vsevolod2014-09-233-5/+4
* Simplify plistbapt2014-09-232-19/+5
* Simplify plistbapt2014-09-231-8/+2
* Simplify plistbapt2014-09-232-9/+3
* Simplify plistbapt2014-09-231-5/+0
* Simplify plistbapt2014-09-231-3/+1
* Simplify plistbapt2014-09-231-8/+4
* Simplify plistbapt2014-09-231-18/+2
* Simplify plistbapt2014-09-232-11/+5
* Simplify plistbapt2014-09-231-8/+3
* Simplify plistbapt2014-09-232-13/+3
* Simplify plist (and avoir @cwd)bapt2014-09-231-3/+1
* Simplify plistbapt2014-09-221-6/+2
* - Drop @dirrm* from plistamdmi32014-09-221-1/+0
* - Trim @dirrm[try] from pkg-plistjhale2014-09-222-4/+0
* Update CentOS base to 6.5, add userland portsxmj2014-09-2235-31/+557
* Fix build when security/openssl is installed.hrs2014-09-221-1/+4
* - Update to 5.04zi2014-09-222-3/+3
* Update to 1.15.novel2014-09-213-5/+4
* Update to 4.2.novel2014-09-213-4/+4
* security/heimdal: Unbreak on DragonFlymarino2014-09-211-0/+4
* Remove FORBIDDEN that references vuxml. We already have vuxml, portauditbdrewery2014-09-204-8/+0
* Remove expired portsrene2014-09-2015-444/+0
* fix build with perl 5.18az2014-09-201-1/+6
* fix build with perl 5.18az2014-09-201-0/+8
* - Remove dependency on pkgconftijl2014-09-191-9/+1
* Remove old libtool patchtijl2014-09-191-11/+0
* Document new asterisk11 vulnerability.madpilot2014-09-191-0/+38
* Expose the reload command in the tor and tor-devel rc-scripts [1],bf2014-09-195-5/+6
* - Drop .la files, no dependees require themamdmi32014-09-192-3/+2
* Fix recidive jail.ache2014-09-192-1/+16
* - Update to 1.3.1sunpoet2014-09-193-14/+6
* Document new squid vulnerability.madpilot2014-09-181-0/+35
* - Bump PORTREVISIONs on php*-mcrypt after libmcrypt .so version changeamdmi32014-09-184-0/+4
* fix scripoliver2014-09-181-0/+3
* - Drop .la files for security/libmcrypt, no dependees require themamdmi32014-09-187-7/+9
* - Drop .la files, no dependees require themamdmi32014-09-182-3/+2
* - Drop .la files, no dependees require themamdmi32014-09-172-2/+2
* - Drop .la files, no dependees require themamdmi32014-09-172-3/+2
* - Strip shared librariesgahr2014-09-171-0/+2
* Document new dbus vulnabilities.kwm2014-09-171-0/+52
* Replace USE_AUTOTOOLS=libltdl with an ordinary LIB_DEPENDS in all ports.tijl2014-09-178-11/+16
* Document nginx security advisory (CVE-2014-3616).osa2014-09-171-0/+32