/x11-wm/

bsd-ports-gnome/commit/security?h=mate-1.20&id=a13229db499c524ac7953246316cdaf3d50753f0'>Convert to USES=gssapi.jkim2015-07-312-0/+32 * - Drop @dirrm* from plistamdmi32015-07-301-1/+0 * Update to new upstream bug-fix release 0.65mandree2015-07-302-3/+3 * - Drop @dirrm* from plistamdmi32015-07-302-4/+2 * - Fix installation from non-rootamdmi32015-07-301-0/+13 * Switch default python_CMD used by shebangfix to ${PYTHON_CMD} for portsantoine2015-07-301-1/+0 * - Add LICENSEamdmi32015-07-292-1/+3 * - Add LICENSEamdmi32015-07-292-1/+3 * - Drop @dirrm* from plistamdmi32015-07-291-1/+0 * - Add NO_ARCHamdmi32015-07-292-1/+1 * - Drop @dirrm* from plistamdmi32015-07-291-1/+0 * - Drop @dirrm* from plistamdmi32015-07-292-1/+1 * - Fix shebangsamdmi32015-07-291-1/+3 * - Fix shebangsamdmi32015-07-291-1/+3 * Document bind CVEfeld2015-07-291-0/+43 * Update to 1.2.14feld2015-07-292-15/+18 * Upgrade to version 1.1.0.olgeni2015-07-282-3/+3 * - Drop @dirrm* from plistamdmi32015-07-281-1/+0 * - Update to 3.3.16bdrewery2015-07-283-4/+4 * Add upstream fix to address CVE-2015-5600 for MaxAuthTries bypass.bdrewery2015-07-282-1/+53 * Document OpenSSH CVE-2015-5600 for MaxAuthTries bypassbdrewery2015-07-281-0/+28 * Fix accidental revert of PermitRootLogin default to NO.bdrewery2015-07-282-1/+10 * Update to snapshot 20150727bdrewery2015-07-283-16/+16 * - Update to 6.9p1bdrewery2015-07-2811-189/+54 * Bring over ETCDIR and libedit updates from main portbdrewery2015-07-282-8/+8 * - Fix fetch, againamdmi32015-07-271-1/+2 * Document logstash SSL/TLS security vulnerability (FREAK attack)feld2015-07-271-0/+33 * Version 2.0.0 of SoftHSM has been released. More updates and bug fixes can be...erwin2015-07-272-3/+3 * security/py-paramiko: 1.14.0 -> 1.15.2pi2015-07-274-8/+9 * security/sshguard-nullfeld2015-07-266-4/+18 * Unbreak INDEX, reverting r392921antoine2015-07-2633-314/+13 * 64 bit linuxulator support (not activated by default):netchild2015-07-2633-13/+314 * Update to 1.3.0antoine2015-07-264-28/+19 * Update to 20150708antoine2015-07-262-12/+5 * New port: security/py-artifactsantoine2015-07-264-0/+29 * Document new vulnerabilities in www/chromium < 44.0.2403.89rene2015-07-251-0/+101 * Use new USES=libeditbdrewery2015-07-251-0/+1 * Document shibboleth DoSfeld2015-07-251-0/+48 * Adjust wordpress range -- www/wordpress has PORTEPOCHfeld2015-07-241-0/+3 * Update Wordpress entry to add CVEsfeld2015-07-241-0/+3 * The new shibboleth will refuse to accept -u when it wasgirgen2015-07-242-8/+9 * - Update to 2.9.7.5zi2015-07-243-9/+16 * Document wordpress XSSfeld2015-07-241-0/+34 * Document libidn out-of-bounds read issue with invalid UTF-8 inputfeld2015-07-231-0/+29 * Document buffer overflow vulnerabilities in SoXfeld2015-07-231-0/+58 * Shibboleth SP software crashes on well-formed but invalid XML.girgen2015-07-238-27/+16 * Document CVE assignment in iPython 3.2.1 entry.olgeni2015-07-231-0/+2 * Fix build with new libcaca when CACASAVER is onmartymac2015-07-232-1/+13 * Update to 1.8.14p3garga2015-07-222-3/+3 * Add gdk-pixbuf2 vulnability.kwm2015-07-221-0/+26 * security/vault: update to 0.2.0swills2015-07-223-137/+12 * - Fix ksh shebangkuriyama2015-07-221-3/+6 * Update to 1.8.14p2garga2015-07-212-4/+3 * Remove expired ports:rene2015-07-217-84/+0 * Adjust range for apache22feld2015-07-211-1/+1 * Document PCRE buffer overflowfeld2015-07-201-0/+36 * Fix moodle reference URLfeld2015-07-201-1/+2 * Document Cacti Multiple XSS and SQL injection vulnerabilitiesfeld2015-07-201-0/+44 * - Fix installation with DOCS broken by my last commitgarga2015-07-201-5/+1 * Fix build WITHOUT=NLS.mat2015-07-201-0/+41 * - Replace DISTVERSION by PORTVERSION otherwise it ends up as 1.8.14.p1,garga2015-07-205-17/+15 * Update to 1.8.14p1garga2015-07-192-3/+3 * Document php-phar vulnerabilitiesfeld2015-07-191-0/+37 * zenphoto was assigned CVEsfeld2015-07-191-0/+5 * Document recent Moodle security advisoriesfeld2015-07-191-0/+48 * package name is mariadb100, not mariadb10feld2015-07-191-1/+1 * MySQL SSL Downgrade affects the client not the serverfeld2015-07-191-11/+3 * Add missing <cvename> to apache entryfeld2015-07-181-0/+1 * Add missing apache22 packages for other "workers"feld2015-07-181-0/+4 * Apache 2.2.31 is now public, fixing CVE-2015-3183feld2015-07-181-0/+30 * CVE now assigned to squidfeld2015-07-181-1/+2 * security/pinentry:makc2015-07-173-3/+27 * Update to 1.8.14garga2015-07-172-5/+3 * Update flash entry.kwm2015-07-171-3/+3 * Correct range for libavfeld2015-07-171-1/+1 * Document zenphoto vulnerabilitiesfeld2015-07-171-0/+28 * Document groovy vulnerabilityfeld2015-07-171-0/+35 * Document libav vulnerabilityfeld2015-07-171-0/+27 * Add a new port for mbed TLS 2.0.0 (formerly polarssl)tijl2015-07-165-0/+156 * Document recent multiple mozilla vulnerabilitiesjbeich2015-07-161-0/+116 * - Update NSS and ca_root_nss to 3.19.2jbeich2015-07-164-8/+7 * - Drop @dirrm* from plistamdmi32015-07-161-1/+0 * - Drop @dirrm* from plistamdmi32015-07-161-1/+0 * - Drop @dirrm* from plistamdmi32015-07-161-1/+0 * Add PolarSSL < 1.2.14 issues.mandree2015-07-161-0/+28 * Latest libxml2 vulnerability also affects linux-*-libxml2tijl2015-07-161-0/+9 * Document linux-*-libxml2 vulnerabilitiestijl2015-07-161-2/+29 * Document linux-c6-flac vulnerabilitiestijl2015-07-161-0/+5 * - Add LICENSE_FILEamdmi32015-07-161-1/+11 * security/tclgpg: new portrobak2015-07-164-0/+36 * - Note that the previous commit has added missing USES=perl5amdmi32015-07-161-0/+1 * Update to nss-3.19.1-3.el6_6tijl2015-07-163-28/+29 * Update to libssh2-1.4.2-1.el6_6.1tijl2015-07-162-6/+7 * Update to cyrus-sasl-lib-2.1.23-15.el6_6.2tijl2015-07-152-8/+7 * - Document multiple security issues for libwmffeld2015-07-151-0/+103 * Reference another URL for tidy's CVEfeld2015-07-151-0/+1 * CVEs have been assigned for tidyfeld2015-07-151-0/+3 * Document multiple apache24 vulnerabilitiesfeld2015-07-151-0/+43 * Fix typo in flash security bulletin.kwm2015-07-151-2/+2 * - Update url of latest Flash plugin advisorytijl2015-07-151-4/+19 * Add an openvpn-polarssl that selects PolarSSL for its default TLS provider.mandree2015-07-153-2/+16 * Development ceased, broken with modern ssh (lots of options just do not work)bapt2015-07-154-46/+0 * - Fix shebangsamdmi32015-07-151-0/+6 * - Fix shebangsamdmi32015-07-151-2/+8 * - Fix shebangsamdmi32015-07-151-1/+3 * - Fix shebangsamdmi32015-07-151-2/+4 * Add security/elixir-comeonin, a password hashing library for Elixir.olgeni2015-07-146-0/+60 * Use the correct package name for linux-*-flashplugintijl2015-07-141-20/+20 * security/pinentry:makc2015-07-141-1/+4 * Use correct <tag> to mark all versions vulnerable.kwm2015-07-141-2/+2 * Add newest flash vulnerabilities CVE-2015-5122 and CVE-2015-5123.kwm2015-07-141-0/+35 * Document php sqlite3 use-after-free vulnerabilityfeld2015-07-141-1/+34 * Document php spl use-after-free vulnerabilityfeld2015-07-141-0/+33 * Document PHP arbitrary code execution. No CVE assigned yet.feld2015-07-141-1/+36 * php 5.4 package name is php5, not php54feld2015-07-141-2/+2 * Document CVE-2015-3152 "BACKRONYM" vulnerabilityfeld2015-07-141-0/+61 * - Update to 0.9.5.jkim2015-07-143-17/+3 * hadoop2 and oozie ports fetch a version of tomcat that is vulnerablefeld2015-07-131-0/+9 * Document CSRF remote execution vulnerability for devel/ipython (CVE pending).olgeni2015-07-131-0/+42 * Document freeradius vulnerabilityfeld2015-07-131-0/+44 * Correct range for non-devel version of v8feld2015-07-131-0/+3 * - Drop @dirrm* from plistamdmi32015-07-131-1/+0 * - Modernize plistamdmi32015-07-132-10/+4 * - Drop @dirrm* from plistamdmi32015-07-131-3/+0 * - Drop @dirrm* from plistamdmi32015-07-131-1/+0 * - Switch to @sampleamdmi32015-07-132-12/+5 * CVE-2015-5380 also affects v8 and v8-develfeld2015-07-131-2/+8 * - Drop @dirrm* from plistamdmi32015-07-131-3/+0 * - Switch to @sampleamdmi32015-07-132-9/+5 * Advisory URL was identical; remove duplicatefeld2015-07-131-1/+0 * PowerDNS discovered the fix for CVE-2015-1868 was not complete in thefeld2015-07-131-2/+6 * Add note on how to use the new html functionalityfeld2015-07-131-1/+2 * Add ability to produce html files for vuxml entriesfeld2015-07-133-1/+417 * - Add NO_ARCHsunpoet2015-07-131-1/+2 * security/wpa_supplicant: Address security issue (2015-5)marino2015-07-122-1/+22 * - refelct mod_wsgi3 => mod_wsgi3 updateohauer2015-07-121-1/+2 * - Add xen-tools to the list of packages fixed in existingbapt2015-07-121-0/+5 * Document all recent xen-kernel and xen-tools security issuesbapt2015-07-121-0/+604 * Upgrade to 0.025.vanilla2015-07-122-3/+3 * - Revive security/chkrootkitriggs2015-07-116-0/+109 * Document a few pivotx vulnerabilitiesbapt2015-07-111-0/+55 * Update squid entry to reflect new range of affected versionsfeld2015-07-101-16/+12 * - add more manpage linksdinoex2015-07-101-0/+4 * Document wpa_supplicant WPS_NFC option payload length validationdelphij2015-07-101-0/+26 * Document OpenSSL alternative chains certificate forgery vulnerability.delphij2015-07-101-0/+36 * - Security update to 1.0.2ddinoex2015-07-104-23/+51 * - Correct the version range of www/py-django-devellwhsu2015-07-101-4/+4 * document django vulnerabilitiesfeld2015-07-091-0/+96 * node and iojs vuln now has a CVE assignedfeld2015-07-091-1/+2 * - Update to 5.20zi2015-07-092-3/+3 * Drop .la files.kwm2015-07-092-3/+2 * - update to 1.0.26dinoex2015-07-092-3/+3 * security/libressl: Update to 2.2.1brnrd2015-07-094-10/+10 * Document Adobe Flash Plugin vulnerability (CVE-2015-5119)tijl2015-07-091-0/+36 * Fix other no-op formatting mistakes for the roundcube entryfeld2015-07-091-2/+2 * Fix formatting by adding some breaksfeld2015-07-091-6/+6 * security/p5-Dancer2-Plugin-Auth-Extensible update 0.400 -> 0.401pgollucci2015-07-082-3/+3 * Make version range closer to reality -- this should be a no-op (use of P2delphij2015-07-081-2/+2 * -base options for dns/bind have been gone now. Cover them with <gt>0</gt>delphij2015-07-081-2/+6 * Document BIND remote resolver DoS vulnerability when DNSsec validationdelphij2015-07-081-0/+45 * cups-filters mentions wrong CVE in some placesfeld2015-07-071-0/+2 * Document haproxy information leakfeld2015-07-071-0/+36 * Document roundcube vulnerabilitiesfeld2015-07-071-0/+39 * security/py-pyscard: Make supported Python versions explicitkoobs2015-07-071-1/+1 * [NEW] security/py-pyscard: Smartcard module for Pythonkoobs2015-07-074-0/+40 * Document SQL Injection in turnserverfeld2015-07-071-0/+26 * - Fix packaging failure due to incorrectly generated plistamdmi32015-07-071-6/+6 * - Add NO_ARCHsunpoet2015-07-071-0/+1 * Document recent squid vulnerabilitiesfeld2015-07-071-0/+83 * Use correct end tag.kwm2015-07-061-1/+1 * Add iojs as affected packagefeld2015-07-061-0/+6 * Correct bitcoin range for CVE-2015-3641feld2015-07-061-1/+1 * Document ansible vulnerabilitiesfeld2015-07-061-0/+188 * Document bitcoin CVE-2015-3641feld2015-07-061-0/+32 * add node-devel as affected packagefeld2015-07-061-0/+4 * add www/node denial of service vulnerabilityfeld2015-07-061-0/+29 * deprecate unused rubygem- portsmmoll2015-07-062-0/+6 * security/libsparkcrypto: Fix on i386marino2015-07-052-0/+10 * cups-filters CVE-2015-3279feld2015-07-041-0/+39 * Fix range for linux-c6-openssltijl2015-07-031-2/+2 * Update to 1.0.1e-30.el6.11tijl2015-07-032-6/+6 * Add USES=alias to 11 ports (non-invasive DragonFly support)marino2015-07-031-1/+1 * security/amavisd-milter: Remove pre-everything checkmarino2015-07-031-12/+0 * - Update mail/courier-imap to 4.16.2madpilot2015-07-034-16/+17 * Set NO_ARCH for remaining rubygem-* ports with no arch dependent filespgollucci2015-07-0317-0/+33 * - Update to 0.20sunpoet2015-07-022-5/+4 * - Upgrade to 2.1.6 (minor bugfixes).kuriyama2015-07-022-5/+5 * security/sslsplit: update to 0.4.11swills2015-07-01