/net/ilbc/

freebsd-ports-gnome' title='freebsd-ports-gnome Git repository'/>
aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Apply an upstream patch that fixes a security holeeadler2012-11-101-0/+30
* - Update lang/ruby19 to 1.9.3p327swills2012-11-101-0/+35
* - clarification that ASF reported issue for:jgh2012-11-101-2/+4
* - document tomcat vulnerabilitiesjgh2012-11-101-0/+76
* - Update to 0.4.3bdrewery2012-11-103-7/+10
* Update latest version and document security issueseadler2012-11-091-0/+32
* - fix MASTER_SITESgahr2012-11-081-1/+1
* - Update to 1.2.0jhale2012-11-083-10/+6
* - fix mtree by avoiding to install a .in CMake configure filegahr2012-11-081-0/+4
* Document new vulnerabilities in www/chromium < 23.0.1271.64rene2012-11-071-0/+66
* Update to 4.42.tj2012-11-072-4/+3
* Document opera vulnerabilitiescrees2012-11-071-0/+42
* pev is a multiplatform PE analysis toolkit thatlippe2012-11-078-0/+114
* Pass maintainership to Jr Aquino <tanawts@gmail.com>.rakuco2012-11-061-6/+2
* Unbreak package build by registering PORTDOCS if we're installing docs.adamw2012-11-061-2/+1
* Force NLS support with a very broken autotools configure. This fixesadamw2012-11-061-0/+2
* - Update to 0.3sbz2012-11-062-3/+3
* Fix minor typoeadler2012-11-061-1/+2
* Update latest version and document security issueseadler2012-11-061-0/+60
* - Update to 0.5 [1]bdrewery2012-11-062-8/+4
* - Update WWWsbz2012-11-051-1/+1
* - Update to 1.5sbz2012-11-054-116/+145
* Update to 2.0.1 release.ale2012-11-053-5/+15
* - Change my email address to gblach@FreeBSD.orggblach2012-11-041-6/+2
* - Update to 0.9.2tota2012-11-043-10/+5
* Fix plist.cy2012-11-042-0/+3
* Update krb5-appl 1.0.2 --> 1.0.3cy2012-11-042-7/+3
* Update krb5 1.9.2 --> 1.10.3cy2012-11-045-207/+24
* Restore 'Created by' header information. This has been removed during theehaupt2012-11-041-0/+1
* - Update to 1.72ehaupt2012-11-042-9/+4
* - Update to 0.69ehaupt2012-11-042-8/+4
* - update to svn revision 243ohauer2012-11-032-27/+137
* Correct plural of "vulnerability"crees2012-11-031-2/+2
* - Update to 1.49ehaupt2012-11-032-8/+4
* - Update to 1.3.3zi2012-11-032-3/+3
* - update apache22 to version 2.22.23ohauer2012-11-032-5/+47
* Add entry for webmin < 1.600_1 (potential XSS attack).olgeni2012-11-031-0/+26
* Add cfv to category Makefilecrees2012-11-031-0/+1
* - Update MASTER_SITES and WWW: linepawel2012-11-036-120/+36
* Resurrect security/cfv and remove optional dependency oncrees2012-11-026-0/+73
* Remove because it depends on security/py-fchksum which is not in the ports tr...ak2012-11-027-76/+0
* Remove expired port:ak2012-11-024-40/+0
* - Document ruby vulnerabilities:bdrewery2012-11-021-0/+81
* Update to 3.8.15flo2012-11-011-0/+59
* - Update to 1.2.4lwhsu2012-11-012-8/+4
* - Update to 1.8.0lwhsu2012-11-012-8/+4
* Update pam_krb5 from 4.4 to 4.6.cy2012-11-012-4/+3
* - update to 0.06tobez2012-10-312-11/+3
* remove a problematic mirror; attempt to fix build on ia64 [1]bf2012-10-311-2/+2
* - update to 7.16 [1]rm2012-10-311-0/+40
* update to 0.2.3.24-rc [1]; remove a problematic mirror;bf2012-10-302-5/+4
* - Take maintainershipbdrewery2012-10-291-1/+1
* - Convert options to the new formatpgj2012-10-291-9/+10
* - Update www/firefox{,-i18n} to 16.0.2flo2012-10-296-9/+66
* RC fixes;crees2012-10-285-72/+57
* - Update MASTER_SITES and WWW: linebapt2012-10-274-39/+45
* - Update MASTER_SITES and WWW: linebapt2012-10-272-15/+7
* - Update to 1.6 [1]culot2012-10-273-8/+8
* Deprecate a bunch of ports that are either abandonware and/or for which no morebapt2012-10-261-5/+4
* - Update MASTER_SITESjhale2012-10-264-21/+15
* mail/exim: upgrade to 4.80.1rea2012-10-261-0/+39
* Mark as BROKEN: incomplete plistbeat2012-10-261-0/+2
* - add CVE reference (still in reserved state) for recent django vulnerabiltyrm2012-10-261-0/+1
* 2012-10-20 security/sscep: No more public distfilesbapt2012-10-2621-560/+0
* Update to 4.3.nobutaka2012-10-252-3/+3
* - update django ports to 1.3.4 and 1.4.2, that fixing couple of security issues.rm2012-10-251-0/+63
* . remove directories installed by other porst from pkg-plist; [1]bsam2012-10-242-9/+2
* Adjust for usage of new MASTER_SITE_SAMBAtimur2012-10-221-1/+1
* Document multiple wireshark vulnerabilities.wxs2012-10-221-0/+50
* Update to 4.4.0.rakuco2012-10-212-4/+4
* Make works with perl5.16sumikawa2012-10-212-1/+19
* - Add upstream patch to fix CPU consumption and termination bugjhale2012-10-202-6/+14
* - Update MASTER_SITESjhale2012-10-201-11/+7
* - drop maintainershipdinoex2012-10-191-1/+1
* - drop maintainershipdinoex2012-10-191-1/+1
* - clarify end-user impact for 57652765-18aa-11e2-8382-00a0d181e71djgh2012-10-181-11/+4
* - document xlockmore issue, 57652765-18aa-11e2-8382-00a0d181e71d, CVE-2012-4524jgh2012-10-181-0/+37
* - Converted a remaining conditional to OptionsNGglarkin2012-10-181-1/+1
* - Updated to 1.3.15glarkin2012-10-183-31/+29
* - Update to 2.3.15sem2012-10-182-4/+5
* - xinetd vulnerabilitysem2012-10-181-0/+33
* sha3 wrapper (keccak) for Python. The package is a wrapper around therm2012-10-175-0/+57
* - Updated ZF advisory to include similar XEE vulnerabilityglarkin2012-10-161-4/+12
* - Document Zend Framework XXE injection vulnerabilityglarkin2012-10-161-0/+35
* - Add missing dependency on perlkevlo2012-10-161-9/+4
* Update the distinfo as upstream has changed.eadler2012-10-161-2/+2
* - Make as BROKEN: missing prerequisitesbeat2012-10-161-0/+2
* Add the CVE for the gitolite vuln.eadler2012-10-161-0/+1
* - Actually commit the VuXML entryswills2012-10-161-0/+33
* disable SQLite support for the time being (no child port exists)oliver2012-10-151-1/+2
* Document the latest security vulnerabilities for phpMyAdmin.matthew2012-10-151-0/+36
* - Add in additional package names for recent bind vulnerabilityzi2012-10-141-0/+16
* update to 0.65.0oliver2012-10-144-31/+44
* - Update to 0.4.4tota2012-10-142-7/+4
* - Fix mistakenly expanded variable substitutiongabor2012-10-141-1/+1
* - Let amavisd_ram respect tmpfs [1]gabor2012-10-143-11/+4
* Convert to OptionsNGeadler2012-10-141-35/+32
* - cleanup commentsdinoex2012-10-135-25/+0
* Update to 1.4.20arved2012-10-132-3/+6
* - As pulledpork/barnyard are required for most installations, depend on these...zi2012-10-131-2/+13
* - Update to 1.10jhale2012-10-127-242/+76
* - Update to 20120831 snapshot [1]bdrewery2012-10-122-9/+4
* - Update to latest snapshot [1]bdrewery2012-10-124-15/+10
* - Properly install symlinks for auth-pam and down-root plugins [1]bdrewery2012-10-123-9/+6
* - update to 16.0.1flo2012-10-121-9/+18
* Update to 2.0.0 release:ale2012-10-113-8/+94
* If OPIE option is on we can not pass --with-pam in CONFIGURE_ARGS. Make itwxs2012-10-112-16/+8
* Document a new vulnerability in www/chromium < 22.0.1229.94rene2012-10-111-0/+27
* - Update firefox-esr, thunderbird-esr, linux-firefox and linux-thunderbird to...flo2012-10-115-5/+124
* - Remove SITE_PERL from *_DEPENDS (final part)az2012-10-111-4/+2
* - Update to 2.0.3jhale2012-10-102-14/+7
* - Take maintainershipjhale2012-10-101-2/+1
* Upgrade to the latest BIND patch level:erwin2012-10-101-0/+38
* - Update to 1.3.2zi2012-10-104-6/+58
* - Add additional MASTER_SITES for pkcs header files.zi2012-10-101-1/+2
* - Update to 4.54zi2012-10-102-3/+3
* Force numerous ports that fail to build with clang over to instead alwayslinimon2012-10-101-0/+1
* - Fix Makefile headersbz2012-10-091-1/+1
* - Update MASTER_SITESsbz2012-10-091-9/+5
* Add a few casts to initializer of int array when the constant is greaterdelphij2012-10-092-5/+21
* Document new vulnerabilities in www/chromium < 22.0.1229.92rene2012-10-091-0/+40
* Throw my ports back in the pool, and make my intentions clear for thedougb2012-10-084-9/+6
* - Fix logic problemsbz2012-10-081-1/+1
* - Convert to new option frameworksbz2012-10-082-33/+19
* - Fix typojhale2012-10-081-1/+1
* - Update to 0.4.5 [1]jhale2012-10-083-11/+23
* Restore option descriptions to what the maintainer actually put in the PRdougb2012-10-081-0/+5
* silence reinplace command from last commitdougb2012-10-081-1/+1
* - Convert to new options frameworksbz2012-10-071-13/+11
* Work around a problem on stable/[89] with libotr generating andougb2012-10-072-4/+9
* use libtommath as default math library as it used to be before conversion tobapt2012-10-071-0/+1
* Convert to OptionsNGeadler2012-10-071-17/+12
* Trim the headers in the ports I maintain.eadler2012-10-061-5/+0
* Change headers of all ports maintained by me to new formatgarga2012-10-057-35/+6
* - Updated to 1.3.0glarkin2012-10-052-6/+6
* - Make GMP OPTION'aljgh2012-10-054-13/+68
* Convert to new options frameworkbapt2012-10-048-91/+52
* - fix runtime when devel/subversion and/or devel/pysvn is installed [1]rm2012-10-042-9/+19
* - correct the range in last entry (le/lt typo)rm2012-10-031-1/+1
* - update to 2.8.10rm2012-10-031-0/+36
* - Update to 1.8.0sbz2012-10-034-16/+11
* - Update to 20121001 snapshotjlaffaye2012-10-033-12/+81
* - set maintainer to ruby@jgh2012-10-031-5/+1
* - Fix typos (LICENSE is correct form inside bsd.licenses.mk).az2012-10-031-1/+1
* - Fix header to proper formatbdrewery2012-10-012-2/+2
* - pass maintainership to new volonteerrm2012-09-302-12/+4
* - Reassign to the heap due to mail bouncestabthorpe2012-09-301-6/+2
* - Update to 201237 snapshot [1]bdrewery2012-09-294-31/+43
* - Update to 2.3-beta1 [1]bdrewery2012-09-296-132/+68
* Fix type in headedbapt2012-09-281-1/+1
* Mark nvidia-driver-173.14.35_1 as not vulnerable.danfe2012-09-281-1/+1
* Fix the temporary workaround by passing the appropriate flag inwxs2012-09-271-9/+3
* Fix build on i386 by disabling hardening measures. This is a temporarywxs2012-09-271-2/+10
* Document vulnerabilities in www/chromium < 22.0.1229.79rene2012-09-271-0/+96
* - Chase www/smarty -> www/smarty2 renameglarkin2012-09-271-2/+2
* - Document remote code execution in ePerl (all versions)glarkin2012-09-261-0/+36
* - Update to 5.72culot2012-09-262-8/+7
* Enable the Berkley DB backend by default.zeising2012-09-261-2/+2
* - Update to 2.15culot2012-09-262-8/+7
* - Update MASTER_SITES and WWW linkculot2012-09-262-8/+8
* Convert to OptionsNGbapt2012-09-261-14/+11
* Update to 1.8.6p3wxs2012-09-263-3/+8
* - Documented PNG file DoS vulnerability in ImageMagick and GraphicsMagickglarkin2012-09-261-0/+49
* - Reassign to the heap at maintainer's requesttabthorpe2012-09-252-12/+4
* - Update to v12.09.12 releaseale2012-09-247-40/+67
* - Adjust "Created by" tag to include more complete submitter's informationdanfe2012-09-231-3/+3
* - Fix spelling in docs: normally I'd submit this change upstream, butmatthew2012-09-235-16/+33
* Update vuxml to indicate which versions are vulnerable.eadler2012-09-231-1/+3
* Deprecate a bunch a ports with no more public distfiles (thanks ehaupt's dist...bapt2012-09-219-0/+27
* Add a sourceforge mirrorbapt2012-09-211-6/+3
* - Update php52 backports patch to 20120911bdrewery2012-09-201-2/+86
* - CVE-2012-2688 was addressed by php52-5.2.17_10bdrewery2012-09-201-1/+2
* Update to 0.12.6 release.ale2012-09-192-8/+3
* Upgrade to the latest BIND patch level:dougb2012-09-191-0/+47
* - Add missing dependency on bisonkevlo2012-09-181-2/+3
* Update to 20120917garga2012-09-182-3/+3
* Update to 0.97.6garga2012-09-182-4/+3
* Document Jenkins Security Advisory 2012-09-17lwhsu2012-09-181-0/+41
* Point shebang in a perl script to ${PERL} in order to solve a build problem ifehaupt2012-09-161-0/+1
* include newly 'awarded' CVEeadler2012-09-161-0/+1
* Add vuxml for older versions of multimedia/vlc .nox2012-09-161-0/+30
* Tell the world about the recent bacula vulneadler2012-09-151-0/+31
* - chase textproc/nltk update (upstream switched to setuptools)rm2012-09-141-1/+2
* - Update to 2.16jadawin2012-09-132-3/+3
* - Update MAINTAINER to my new FreeBSD.org addressjhale2012-09-132-2/+2
* update security/tor to 0.2.2.39 and security/tor-devel to 0.2.3.22-rcbf2012-09-134-6/+6
* - Update to 0.10.22.6 which fixes two security issuesswills2012-09-131-0/+50
* update lang/sbcl to 1.0.58 and switch to the new options format;bf2012-09-131-1/+1
* Update to 2.0; with some help from rm@kevlo2012-09-123-201/+250
* Update NVIDIA arbitrary memory access vulnerability with CVE-2012-4225.danfe2012-09-121-2/+16
* Update Plone to 4.2.1.rm2012-09-127-23/+14
* - Update entry for net/freeradius2 to reflect local patch to address cve-2012...zi2012-09-111-1/+2
* VuXML: document remote code execution in freeRADIUSrea2012-09-111-0/+47
* www/moinmoin: fix CVE-2012-4404, wrong processing of group ACLsrea2012-09-111-1/+2
* - Move libxul 1.9.2 to www/libxul19beat2012-09-111-2/+2
* Update to 0.14.novel2012-09-112-3/+3
* - Add Emacs 24 to IGNORE listebeat2012-09-101-2/+2
* - Use OPTIONSngehaupt2012-09-101-15/+13
* update to 0.2.3.21-rcbf2012-09-092-3/+3
* Welcome back Chris Petrik <c.petrik.sosa@gmail.com>eadler2012-09-091-1/+1
* - Update to 0.13swills2012-09-093-5/+4
* - Remove dependency on p5-Devel-Mallinfoswills2012-09-091-1/+3
* - Update to 1.09swills2012-09-082-4/+3
* Update libotr and pidgin-otr to 4.0.0dougb2012-09-086-28/+24
* Hook security/libotr3 up, and move ports that depend on the old versiondougb2012-09-084-15/+10
* Mark as broken on sparc64.linimon2012-09-081-1/+7
* Copy libotr to libotr3 so that ports that still rely on the old,dougb2012-09-084-0/+81
* Add vim specific modeline to help users write correct vuxmleadler2012-09-081-0/+1
* Document the vulnerability that led to emacs 24.2rakuco2012-09-081-0/+40
* - Update firefox to 15.0.1flo2012-09-08