aboutsummaryrefslogtreecommitdiffstats
path: root/net/punkbuster
ModeNameSize
-rw-r--r--Makefile2928logstatsplainblame
-rw-r--r--distinfo67logstatsplainblame
-rw-r--r--pkg-comment68logstatsplainblame
-rw-r--r--pkg-descr609logstatsplainblame
-rw-r--r--pkg-message158logstatsplainblame
-rw-r--r--pkg-plist1462logstatsplainblame
01-291-0/+4 * - Document vulnerabilities in mail/postfixadmin (CVE-2012-0811, CVE-2012-0812)zi2012-01-281-0/+39 * - Update to 1.0.1miwi2012-01-282-6/+5 * - Update to 1.7.7miwi2012-01-282-3/+3 * - Cleanup & Formatingmiwi2012-01-281-32/+32 * Additional software only options and binary package build tweaks.`cy2012-01-282-26/+76 * Fix typo.cy2012-01-271-1/+1 * - Document vulnerability in converters/mpackzi2012-01-261-0/+27 * - Document vulnerabilities in print/acroread9 (prior to 9.4.7)zi2012-01-261-0/+46 * Somehow a character got lostarved2012-01-261-1/+1 * - Update to 0.18ashish2012-01-262-3/+3 * - Update to 5.70ashish2012-01-262-3/+3 * Binary package improvements.cy2012-01-262-16/+83 * Update 2.4.1.2 --> 2.4.2.2.cy2012-01-265-10/+110 * The KDE/FreeBSD team is pleased to announce KDE SC 4.7.4, whichavilla2012-01-254-6/+6 * Apply utmp patch from ${FILESDIR} (not files) if OSVERSION < 900007jgh2012-01-251-2/+2 * - Update to 1.3.1jgh2012-01-253-13/+14 * update to 0.2.3.11-alphabf2012-01-242-3/+3 * update lang/sbcl to 1.0.55, and adjust dependent portsbf2012-01-241-1/+1 * Dancer::Plugin::Passphrase manages the hashing of passwords for Dancer apps,culot2012-01-245-0/+49 * - update entry fixed in chromium-16.0.912.75 (CVE-2011-3925)rene2012-01-241-0/+40 * Fix build while chanting "I will run make validate". :(wxs2012-01-241-1/+1 * Add CVE for recent spamdyke buffer overflows.wxs2012-01-241-0/+1 * Document multiple vulnerabilities in wireshark, all of which havewxs2012-01-241-0/+58 * Whitespace cleanup.wxs2012-01-241-2/+2 * - Document buffer overflows in spamdyke.wxs2012-01-241-0/+33 * - update to DISTVERSION 201204ohauer2012-01-243-7/+6 * Update to 4.0.1.nobutaka2012-01-232-3/+3 * Fixup to please "make tidy". No need to wrap this line.wxs2012-01-231-2/+1 * - Add CVE for spamdyke STARTTLS plaintext injection.wxs2012-01-231-0/+2 * - Fix affected rubygem-rack version: add ,3 as PORTEPOCH=3 is restoredsunpoet2012-01-221-1/+1 * - Update to 0.22culot2012-01-223-5/+8 * - Correct package range in 5c5f19ce-43af-11e1-89b4-001ec9578670zi2012-01-221-1/+5 * At the moment 1385 ports use BUILD_DEPENDS= ${RUN_DEPENDS} and 450eadler2012-01-2272-72/+72 * - Fix issue when NOPORTDOCS and SNORTSAM are both definedzi2012-01-211-1/+3 * - Update to 2.9.2.1zi2012-01-212-3/+5 * - Fix formatting/topic in 91be81e7-3fea-11e1-afc7-2c4138874f7dzi2012-01-211-6/+25 * - Document security vulnerability in security/openssl (CVE-2012-0050)zi2012-01-211-0/+28 * fix uuid on latest tomcat vulnerabilityjgh2012-01-211-1/+1 * - Fix modified date;delphij2012-01-211-1/+3 * Update 91be81e7-3fea-11e1-afc7-2c4138874f7d to cover ruby+no-pthreads asdelphij2012-01-211-0/+2 * Remove license infodougb2012-01-202-4/+0 * Add pcsc-tools, tools for testing PCSC cards and readersarved2012-01-206-0/+63 * - document asterisk remote crash vulnerabilityflo2012-01-201-0/+31 * Document recent vulnerability of Apache Tomcat Server.jgh2012-01-201-0/+43 * - Security update to 1.0.0gdinoex2012-01-202-10/+10 * Sigh, should have used <lt> instead of <gt>.delphij2012-01-201-1/+1 * php52-exif no longer vulnerable to CVE-2011-4566 as of 5.2.17_6delphij2012-01-201-1/+2 * Fix the version range for ruby. The stock version is affected.knu2012-01-191-1/+1 * There was no patch release in rubygem-rack 1.3.5_*, so just say < 1.3.6.knu2012-01-191-1/+1 * - Fix affected rubygem-rack version: it should be _3 for PORTREVISION=3sunpoet2012-01-191-1/+1 * update math/R to 2.14.1, and adjust dependent portsbf2012-01-192-2/+2 * Fix CVE URL in recent OpenTTD entry.danfe2012-01-171-1/+1 * Unexpand (convert leading spaces to tabs when possible).danfe2012-01-171-871/+871 * Document recent vulnerability of OpenTTD game server.danfe2012-01-171-0/+34 * - transfer maintainership for my zope-ports to zope@rm2012-01-1623-46/+46 * PHP5 had its own entry for this vulnerability, so remove this.knu2012-01-161-5/+0 * Add node < 0.6.7 (for V8).knu2012-01-161-0/+4 * Add v8 < 3.8.5 (CVE-2011-5037).knu2012-01-161-0/+5 * Add PHP < 5.3.9 (CVE-2011-4885).knu2012-01-161-0/+5 * Add Multiple implementations denial-of-service via hash algorithm collision.knu2012-01-161-0/+41 * Add missing dependency to gnutls. [1]netchild2012-01-151-1/+2 * Certifi: Python Mozilla's SSL Certificates.miwi2012-01-155-0/+37 * - Update to 110511miwi2012-01-152-3/+3 * - fix runtime with ruby18 (add dependency on converters/ruby-iconv)rm2012-01-151-9/+5 * - escape shell namesdinoex2012-01-141-1/+1 * Add missing URL reference to last commitmm2012-01-141-0/+1 * Add relevant FFmpeg vulnerabilities from Ubuntu USN-1320-1mm2012-01-141-0/+55 * In the rc.d scripts, change assignments to rcvar to use thedougb2012-01-1480-82/+80 * - clean upmiwi2012-01-141-42/+42 * - Document vulnerabilities in security/opensslzi2012-01-141-0/+49 * - Document vulnerability in net/isc-dhcp42-server (CVE-2011-4868)zi2012-01-131-0/+32 * - update to NSS_3_13_1_WITH_CKBI_1_88_RTMflo2012-01-132-8/+10 * - update to NSS_3_13_1_WITH_CKBI_1_88_RTMflo2012-01-132-4/+3 * Document PowerDNS DoS vulnerability.delphij2012-01-131-0/+28 * - update to 1.1.0dinoex2012-01-123-3/+7 * The Authen::OATH module provides a Perl implementation of theculot2012-01-125-0/+43 * Update to 2.12.16.novel2012-01-122-3/+3 * Document PHP multiple vulnerabilities.delphij2012-01-121-0/+42 * - use /etc/rc.d/ipfilter quietresyncdinoex2012-01-111-1/+1 * - Build with obsolte MD2 hash by defaultdinoex2012-01-112-27/+16 * - Update to 1.1.1.wxs2012-01-114-29/+9 * Update to 1.4.6 release.ale2012-01-102-3/+3 * Update to 1.10.5 release.ale2012-01-102-3/+4 * Update to 3.4.1 release.ale2012-01-103-7/+7 * - update to 4.0.10rm2012-01-102-4/+3 * Document a untrusted local library exploit in games/torcs.rene2012-01-101-0/+31 * - The proper acronym for Apache Software License 2 is really AL2tabthorpe2012-01-099-9/+9 * The port asks the user a question. Tools like portmaster need tolbr2012-01-091-0/+2 * - Remove outdated version checkseadler2012-01-093-6/+0 * Document spamdyke STARTTLS plaintext injection vulnerability.wxs2012-01-091-0/+31 * 2012-01-08 security/cryptplug: development has ceasedeadler2012-01-0918-280/+0 * - Update to 0.10novel2012-01-092-4/+4 * - Update to version 1.7.9-jumbo-5danfe2012-01-083-8/+15 * Expand 11 (number) into `eleven' (word) to make port description look better.danfe2012-01-081-1/+1 * Repeated words are are hard to to find sometimes.eadler2012-01-089-9/+9 * - Update to 1.6.wxs2012-01-082-4/+4 * Update to 1.6.wxs2012-01-083-29/+4 * Remove HTML entity from a VuXML entry as they are not allowed insimon2012-01-081-1/+1 * - update to 0.3rm2012-01-085-31/+13 * - Add BUILD_DEPENDS to silence build warningsswills2012-01-081-1/+2 * Update to 4.0.0.nobutaka2012-01-072-3/+3 * - Selectivly adds mysql/and/or postgresql to rc script 'REQUIRES:'scheidell2012-01-072-3/+7 * Add new vulnerabilities for www/chromium.rene2012-01-071-0/+32 * Update to 1.3.1ehaupt2012-01-062-3/+3 * Fix build.delphij2012-01-061-1/+0 * - document bugzilla and bugzilla3 security issuesohauer2012-01-061-0/+61 * - update to 1.7.6rm2012-01-053-3/+6 * - Reassignment of ECHO_MSG breaks 'make readme', so remove and reformat IGNORE.jgh2012-01-051-9/+6 * - update to 5.61TEST4ohauer2012-01-054-26/+65 * Document wordpress xss vulnerability.delphij2012-01-041-0/+36 * Import plone4 dependencies part 8/15rm2012-01-029-0/+353 * - Reassign to the heaptabthorpe2012-01-021-1/+1 * - change required APACHE version from 13+ to 20+ohauer2012-01-022-4/+2 * The murmur hash algorithm by Austin Appleby is an exteremely fastkuriyama2011-12-315-0/+36 * Update to the latest development build (now same as primary port).cy2011-12-312-3/+4 * Update 5.0.0 --> 5.0.1cy2011-12-313-4/+5 * Add additional MITKRB5 reference.cy2011-12-301-1/+1 * Replace local patch file with identical MIT patch.cy2011-12-303-13/+4 * - Add missing BUILD_DEPENDS to silence build warningsswills2011-12-301-1/+4 * - Update to 0.4.6miwi2011-12-292-4/+3 * Fix build by adding a reference to the original URL.remko2011-12-291-0/+1 * Document XSS vulnerability in net-mgmt/zabbix-frontendcrees2011-12-291-0/+26 * update to CKBI version 1.88 which includes the latest mozilla cert dataflo2011-12-294-7/+8 * Update to new upstream release v2.2.2.mandree2011-12-292-7/+3 * Update to 20111228garga2011-12-282-3/+3 * Document remote DoS vulnerability in lighttpd HTTP authenticationmm2011-12-281-0/+30 * End WWW CPAN URL with a "/"ehaupt2011-12-2819-19/+19 * - Fix compile if WITH_STATIC is enabled [1]scheidell2011-12-282-3/+3 * Pacify portlintehaupt2011-12-272-4/+4 * - Fix most of the duplicate words in vuxml, a few affect 'blockquotes' but th...eadler2011-12-271-10/+10 * Install schema files with pam_ldap.marcus2011-12-271-2/+8 * Don't wrap a couple of lines. No other entries wrap these lines, so whenwxs2011-12-271-4/+2 * Whitespace cleanup in a BIND topic.wxs2011-12-271-1/+1 * Fix the build. Missing a quote on the blockquote citation and a missing </p>.wxs2011-12-271-2/+2 * Document CVE-2011-4862 (FreeBSD-SA-11:08.telnetd) as it affects krb5-appl too.cy2011-12-271-0/+28 * Fix when an encryption key is supplied via the TELNET protocol, its lengthcy2011-12-272-0/+13 * Switch to using bsd.port.options.mk and remove unnecessary assignments.wxs2011-12-261-6/+2 * Add vuxml entry for proftpd chroot vulnerability.delphij2011-12-241-0/+34 * - I meant LIBDIR not SITELIBDIRpgollucci2011-12-241-1/+1 * - Add USE_PERL5_BUILDscheidell2011-12-231-0/+1 * Update to 0.62.nobutaka2011-12-233-3/+6 * - openssh-portable needs perl to build (reported by Gleb Smirnoff via mail)scheidell2011-12-231-0/+3 * - Update to 1.2.2lwhsu2011-12-232-4/+3 * - Add fifth portion of dependencies needed for Plone 4 import.rm2011-12-2237-0/+1224 * - Document recent vulnerabilities in databases/phpmyadmin (PMASA-2011-19 and ...zi2011-12-221-0/+34 * Mark broken on tier-2: fails to link.linimon2011-12-221-0/+3 * - Add p5-CACertOrg-CA 20110724.001sunpoet2011-12-215-0/+39 * - Also fix SeaMonkey version rangebeat2011-12-211-1/+2 * - Fix cvename in latest mozilla vulnerabilitybeat2011-12-211-5/+5 * - Document mozilla -- multiple vulnerabilitiesbeat2011-12-211-0/+58 * - Update 2.1.3 -> 2.1.4pgollucci2011-12-212-3/+3 * Update to 3.0.1.lx2011-12-212-3/+3 * move contributor address => jghjgh2011-12-211-1/+1 * - Remove expired security/p5-Digest-SHA256: use the builtinvsevolod2011-12-216-70/+0 * - chef 0.10.8 requires ~> 0.10.8pgollucci2011-12-212-3/+4 * - Remove explicit dependency in setup.py for `python ./setup.py test`lwhsu2011-12-202-1/+11 * - Update to 2.2.0pgollucci2011-12-202-4/+3 * - Add missing dependencylwhsu2011-12-201-0/+3 * Add py-ssh 1.7.11, python SSH2 protocol library.lwhsu2011-12-204-0/+31