aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* security/vuxml: Add versions for lates MariaDB vulnsbrnrd2016-08-081-7/+7
* Horde package update:mm2016-08-082-3/+4
* security/nss: update to 3.26jbeich2016-08-064-6/+8
* - Update to 1.2.1 [1]pawel2016-08-062-5/+7
* - Update to 1.4.2 [1]pawel2016-08-062-5/+6
* security/suricata: Fix libpcap LIB_DEPENDSkoobs2016-08-061-1/+3
* security/py-crits: Really fix pillow dependsmarino2016-08-061-1/+1
* Document multiple security advisories for Moodle (MSA-16-0019 - MSA-16-0021)junovitch2016-08-061-0/+46
* Document BIND security advisoryjunovitch2016-08-061-0/+39
* Document wnpa-sec-2016-41 through wnpa-sec-2016-49 for issues fixed injunovitch2016-08-061-0/+56
* - Fix ambiguous specification of libpcap by using libpcap from basedvl2016-08-061-2/+2
* Update perl vuxml entriesfeld2016-08-061-0/+16
* Cancel tiff vuxml entry for CVE-2016-5102feld2016-08-061-23/+1
* Update vuxml entry for perl to correct range for perl5-develfeld2016-08-051-4/+4
* Add p5-Net-SSH-AuthorizedKeysFile.mat2016-08-055-0/+45
* - Switch to options helpersamdmi32016-08-053-9/+11
* security/fwbuilder: Fix bad RUN_DEPENDS specification for rcsmarino2016-08-051-3/+3
* security/openssl-devel: Update to 1.1.0-pre6brnrd2016-08-054-171/+983
* Fix vuxml entry for recent perl vulnerabilities to correctly match package namesfeld2016-08-051-20/+16
* Document p5-XSLoader vulnerabilityfeld2016-08-051-0/+41
* Document perl vulnerabilityfeld2016-08-051-0/+39
* security/barnyard2: Fix ambiguous specification of libpcapbofh2016-08-051-1/+2
* Document gd vulnerabilitiesfeld2016-08-041-0/+38
* - Update to version 1.0.0 [1]pawel2016-08-042-6/+6
* Document curl vulnerabilitiesfeld2016-08-041-0/+32
* - Update to 0.6.10tota2016-08-043-4/+5
* security/i2p: Remove redundant dependency on unzipmarino2016-08-041-1/+0
* Update to 0.039.vanilla2016-08-042-4/+4
* Back to poolcs2016-08-041-1/+1
* security/libressl-devel: Update to 2.4.2brnrd2016-08-042-4/+4
* security/libressl: Update to 2.3.7brnrd2016-08-042-4/+4
* Update to version 3.6.1, which brings compatibility with OpenSSL 1.1.0, anddanfe2016-08-044-101/+6
* Document lighttpd vulnerabilitiesfeld2016-08-031-0/+32
* Don't use extension.ini any more, and have each extension install in itsmat2016-08-0320-1/+20
* - Update to 2.2.1cpm2016-08-032-3/+5
* - Update to 2.033jadawin2016-08-032-4/+4
* Remove stochasting build-time testsriggs2016-08-031-1/+1
* security/w3af: 1.0-rc4 -> 1.6.49pi2016-08-039-2122/+2299
* - Update to version 3.1 [1]pawel2016-08-022-3/+4
* In the 64 bit case create lib/libssl.so.7 instead of lib64/libssl.so.7.tijl2016-08-022-7/+4
* Document Xen Security Advisories (XSAs 182, 183, and 184)junovitch2016-08-021-0/+99
* Update to 1.77. Switch to USES=ssl, and only install the examplesadamw2016-08-022-5/+7
* - Update to version 2016.74pawel2016-08-022-3/+7
* Revert premature changes that snuck into r419437.tijl2016-08-011-0/+1
* Use LINUX_REPO_ARCH instead of LINUX_RPM_ARCH when setting DISTINFO_FILEtijl2016-08-0118-1/+0
* Remove unused distinfo files.tijl2016-08-012-8/+0
* security/py-pyclamd: 0.2.2 -> 0.3.17pi2016-08-015-76/+14
* security/suricata: Fix plist with HTP_PORT option disabledkoobs2016-08-011-2/+2
* Document security issues fixed Libidn 1.33junovitch2016-07-311-0/+35
* Fix build with getline(3) in libcbapt2016-07-311-0/+29
* security/suricata: Update to 3.1.1koobs2016-07-313-11/+11
* security/afl: 2.19 -> 2.22pi2016-07-312-4/+4
* Update to 4.12.16antoine2016-07-312-5/+6
* New port: security/rubygem-rex-archantoine2016-07-314-0/+29
* New port: security/rubygem-rex-oleantoine2016-07-314-0/+29
* Remove local declarations of setgrent().ed2016-07-311-0/+26
* security/py-pysha3: Update to 1.0b1, Modernizekoobs2016-07-303-21/+12
* Update to 0.0.6antoine2016-07-302-4/+4
* Prevent collision with getline(3)bapt2016-07-301-0/+47
* Prevent collision with dprintf(3)bapt2016-07-304-0/+88
* document Gimp XCF loader vulnerabilitycmt2016-07-291-0/+27
* - Update to version 0.7.0 [1]pawel2016-07-294-5/+6
* - Add LICENSE_FILEsamdmi32016-07-284-27/+37
* security/libtasn1: update to 4.9novel2016-07-282-3/+5
* Fix breakage caused by r419105.cy2016-07-281-1/+2
* Modernize.cy2016-07-271-3/+2
* Update to 1.13.6.cy2016-07-272-3/+4
* Modernize krb5-112 and krb5-113 replacing USE_OPENSSL with USES=ssl.cy2016-07-272-4/+2
* With the release of krb5 1.13.6, which also fixes the KDC denial ofcy2016-07-271-1/+6
* Update 0.15.1 --> 0.16cy2016-07-276-62/+12
* - Update to 20160709 snapshot [1]jlaffaye2016-07-273-4/+44
* Document xerces-c3 vulnerabilitiesfeld2016-07-271-0/+35
* Document php vulnerabilitiesfeld2016-07-261-0/+155
* Modernize: Replace USE_AUTOTOOLS=autoconf with USES=autoreconf.cy2016-07-261-2/+1
* Reset miwi@'s ports, he stepped down from the Ports Team.rene2016-07-2625-25/+25
* security/letskencrypt: Update to 0.1.9brnrd2016-07-253-15/+14
* Update to version 0.9.5pawel2016-07-252-5/+4
* Update to version 1.12.0pawel2016-07-245-8/+12
* - Remove duplicate information from pkg-messagezi2016-07-242-5/+4
* Remove unneeded post-install USES=libtool nukes .la already nowbapt2016-07-241-3/+0
* Update to 4.12.15antoine2016-07-232-7/+9
* Update to 1.1.13antoine2016-07-232-4/+4
* New port: security/rubygem-rex-struct2antoine2016-07-234-0/+27
* New port: security/rubygem-metasploit_payloads-mettleantoine2016-07-234-0/+26
* security/libgpg-error: update to 1.24novel2016-07-233-5/+5
* Document new vulnerabilities in www/chromium < 52.0.2743.82rene2016-07-231-0/+80
* security/hydra: update to 8.2rm2016-07-235-44/+34
* Stop people putting arguments to USES=ssl.mat2016-07-221-1/+1
* Replace USE_OPENSSL with USES=ssl.cy2016-07-221-2/+1
* Update to 1.14.3.cy2016-07-222-3/+4
* Document a rare KDC denial of service vulnerability when anonymouscy2016-07-221-0/+28
* security/vuxml: Current mysql57 is NOT vulnerablebrnrd2016-07-221-1/+2
* Apache OpenOffice CVE-2016-1513 Memory Corruption Vulnerabilitytruckman2016-07-221-0/+38
* security/vuxml: Add MySQL vulnerabilities from quarterly updatebrnrd2016-07-211-0/+76
* Properly cancel the httpoxy vuxml entryfeld2016-07-211-0/+4
* Cleanup $() variables in ports Makefiles.mat2016-07-207-14/+14
* Remove unused variable.mat2016-07-201-1/+0
* Add LICENSE, tweak CONFLICTS and remove unused pkg-descr.tijl2016-07-202-4/+4
* Remove HTTPoxy entry in vuxml until a we know if upstream vendors willfeld2016-07-201-103/+0
* - Update to 1.7.2cpm2016-07-203-5/+5
* security/unicornscan is not jobs safemarino2016-07-201-0/+2
* Update security/strongswan to 5.5.0garga2016-07-202-7/+8
* - Update to 1.9.4amdmi32016-07-192-3/+4
* www/typo3 and www/typo3-lts: Document missing access check in Extbasetz2016-07-191-0/+38
* When there is a do-install target, do not use a post-install target, domat2016-07-1917-37/+15
* net/haproxy: Mark vulnerable to httpoxy in vuxmlbrnrd2016-07-191-1/+5
* Fix ancient getopts invocation in pskgen.cy2016-07-192-10/+5
* lang/go: Mark 1.6.3 as NOT vulnerable to httpoxybrnrd2016-07-191-1/+1
* www/apache24: Fix httpoxy vulnerability (+2.2)brnrd2016-07-191-2/+8
* httpoxy: Mark ports as vulnerablebrnrd2016-07-191-0/+93
* Fix CVE-2016-0772 entry to not blame only Python 2.7bdrewery2016-07-191-1/+1
* Cleanup USE_GITHUB usage.mat2016-07-182-5/+4
* - Update to 5.35zi2016-07-182-4/+4
* - Switch to options helpersamdmi32016-07-181-1/+1
* Update to 1.7.9.vanilla2016-07-183-19/+27
* Update to 1.7.9.vanilla2016-07-183-6/+7
* - update to 7.25BETA1ohauer2016-07-173-4/+12
* Update py-rekall/py-rekall-core to 1.5.2antoine2016-07-165-16/+18
* Update to 0.24.post1antoine2016-07-162-6/+6
* Update to 20160114antoine2016-07-162-5/+5
* Update to 0.1.1antoine2016-07-162-4/+4
* Document security issues from ATutor 2.2.1 and 2.2.2 changelogjunovitch2016-07-161-0/+53
* Update Drupal SA-CORE-2016-002 with the assigned CVEsjunovitch2016-07-161-0/+4
* Document Flash vulnerabilities in Adobe Security Bulletins APSB16-25junovitch2016-07-161-0/+105
* Update to 4.12.12antoine2016-07-162-4/+12
* Update to 1.1.12antoine2016-07-162-6/+4
* New port: security/rubygem-rex-zipantoine2016-07-164-0/+29
* New port: security/rubygem-rex-registryantoine2016-07-164-0/+27
* New port: security/rubygem-rex-powershellantoine2016-07-164-0/+30
* New port: security/rubygem-rex-javaantoine2016-07-164-0/+24
* New port: security/rubygem-rex-random_identifierantoine2016-07-164-0/+26
* New port: security/rubygem-rex-textantoine2016-07-164-0/+27
* Rename vuxml entry, add new detailed reference as primary.feld2016-07-161-3/+4
* Package name for jakarta-struts is actually apache-strutsfeld2016-07-161-1/+1
* Also add jakara-struts to the vuxml entry for CVE-2016-3092feld2016-07-161-0/+5
* Document tomcat vulnerabilityfeld2016-07-161-0/+36
* Document libreoffice vulnerabilityfeld2016-07-161-0/+31
* Update name in vuxml of person who reported CVE-2016-5102feld2016-07-161-1/+1
* Document tiff vulnerabilitiesfeld2016-07-161-0/+81
* Document CVE-2016-2334 and CVE-2016-2335 in archivers/p7zip.rakuco2016-07-151-0/+64
* Update to version 0.2.8.5-rcpawel2016-07-152-4/+4
* New port: security/py-vulndbpi2016-07-154-0/+29
* New port: security/py-halberdpi2016-07-154-0/+28
* Update to version 1.11.0pawel2016-07-145-10/+30
* Add information about CVE-2016-2119 vulnerability in Samba suits.timur2016-07-131-0/+43
* security/libsodium: Upgrade version 1.0.8 => 1.0.10marino2016-07-1310-10/+15
* Add patch from upstream commit 7247f99b3e068a2b90b7776a2cdd438fddb7a38btijl2016-07-122-0/+12
* security/libargon2: add new portjbeich2016-07-125-0/+42
* Rename security/hashcat to security/hashcat-legacymatthew2016-07-126-0/+315
* Upgrade to 3.00matthew2016-07-1210-177/+613
* Back to poolcs2016-07-121-1/+1
* rubygem-ruby-saml: Document XML signature wrapping attacktz2016-07-111-0/+32
* security/py-safe: add new portjbeich2016-07-114-0/+27
* Update to version 5.10pawel2016-07-112-3/+3
* security/afl: update 2.07b -> 2.19bjunovitch2016-07-095-12/+17
* security/p5-Protocol-ACME: 0.12 -> 0.15pi2016-07-093-6/+4
* Update to 0.038.vanilla2016-07-082-4/+4
* Update to 3.4.14.tijl2016-07-083-5/+5
* security/rubygem-omniauth-saml: update from 1.5.0 to 1.6.0tz2016-07-082-4/+5
* security/rubygem-ruby-saml: update from 1.2.0 to 1.3.0tz2016-07-082-3/+4
* OTPW is a one-time password system which is robust against the passwordjkim2016-07-088-0/+103
* - Update to 5.9amdmi32016-07-072-4/+5
* - Fix affected versions of qemu and qemu-devellwhsu2016-07-071-12/+13
* Document remote denial of service in quasseljunovitch2016-07-071-0/+31
* Update to 5.9p4, which fixes a bug where command output is not displayednaddy2016-07-062-5/+5
* - document apache24 H2/X509 sec. issue.ohauer2016-07-061-0/+30
* Remove expired ports without open PRs:rene2016-07-0546-823/+0
* Document Xen Security Advisories (XSAs 173, 175, 176, 178, 179, and 180).junovitch2016-07-051-0/+208
* Update wnpa-sec-2016-12 through wnpa-sec-2016-18 with CVE assignment forjunovitch2016-07-041-1/+10
* Update wnpa-sec-2016-19 through wnpa-sec-2016-27 with CVE assignment forjunovitch2016-07-041-0/+12
* Document wnpa-sec-2016-29 through wnpa-sec-2016-37 for issues fixed injunovitch2016-07-041-0/+65
* Fix ports depending on security/(open|libre)ssl directly.mat2016-07-041-2/+2
* Add fixed entries for Python 2.7, 3.4, 3.5 for urllib vulnerability.junovitch2016-07-041-1/+14
* Update earlier openvswitch entry with version fixed in portsjunovitch2016-07-041-1/+5
* Document multiple security advisories for Moodlejunovitch2016-07-041-0/+49
* Document icingaweb2 vulnerabilityfeld2016-07-041-0/+26
* Fix date from r417994 (2016 not 2015)junovitch2016-07-041-1/+1
* Document authorization logic vulnerability in Apache Hivejunovitch2016-07-041-0/+31
* Document SQLite3 tempdir selection vulnerabilityjunovitch2016-07-041-0/+35
* Bump PORTREVISION in security/pinentry and pinentry-qt4 after r415872.rakuco2016-07-032-2/+2
* security/p5-Business-PayPal-EWP: Fix build with LibreSSLbrnrd2016-07-032-2/+12
* security/vuxml: Add Python smtplib TLS stripping vulnbrnrd2016-07-031-0/+43
* security/medusa: 2.1.1 -> 2.2pi2016-07-035-72/+9
* - Update to 1.206wen2016-07-032-4/+4
* security/py-spake2: create portswills2016-07-034-0/+22
* security/py-hkdf: create portswills2016-07-034-0/+24
* Horde package update:mm2016-07-022-3/+4
* Belatedly document 12 security advisories about phpMyAdmin.matthew2016-07-011-0/+237
* Add a test target, testing that what the port is supposed to do works.mat2016-07-011-0/+5
* Add missing dependency.mat2016-07-011-1/+2
* Document haproxy vulnerabilityfeld2016-07-011-0/+29
* Document libtorrent-rasterbar vulnerabilityfeld2016-07-011-0/+28
* Modify dnsmasq vuxml entryfeld2016-07-011-1/+5
* Document expat2 vulnerabilityfeld2016-07-011-0/+29
* Document dnsmasq vulnerabilityfeld2016-07-011-0/+30
* Document python vulnerabilityfeld2016-07-011-0/+30
* Document openssl vulnerabilityfeld2016-07-011-0/+32
* - Update to 0.7.1wen2016-06-309-356/+6
* security/letskencrypt: Update to 0.1.7brnrd2016-06-302-8/+5
* - Update to 20160628danilo2016-06-302-6/+6
* Remove all usage of OPENSSL_PORT from ports, this is deprecated, andmat2016-06-291-2/+7
* Update to 2.3.0.tijl2016-06-292-3/+4
* Update to 1.3.17.tijl2016-06-292-3/+4
* security/p5-Crypt-LE: Add RUN_DEPENDS security/p5-Crypt-PKCS10pi2016-06-291-0/+3
* security/p5-Crypt-OpenSSL-PKCS10: add missing DEPENDpi2016-06-291-0/+4
* New port: security/p5-Crypt-OpenSSL-PKCS10pi2016-06-295-0/+28
* New port: security/p5-Crypt-LEpi2016-06-295-0/+39
* security/openvpn-devel: 201607 -> 201623pi2016-06-292-13/+11
* Convert USE_PHP*=yes into USES=php*mat2016-06-2811-46/+15
* USEify USES=php.mat2016-06-284-4/+4
* - PORTEPOCH != PORTVERSIONzi2016-06-281-0/+1
* - Update to 2.029jadawin2016-06-282-4/+4
* Reset ports maintained by horia@racoviceanu.com.rakuco2016-06-282-2/+2
* - Pass maintainership to submitterwen2016-06-281-1/+1
* - Pass maintainership to submitterwen2016-06-281-1/+1
* Reset ports maintained by bf@ until he has time again to work on them.rene2016-06-282-2/+2
* security/doas: 5.9p1 -> 5.9p2pi2016-06-282-5/+7
* Insert tab. No functional change.ume2016-06-281-1/+1
* Replace bsd.openssl.mk with USES=sslmat2016-06-272-3/+3
* Add new port -- YubiKey PIV Managerume2016-06-277-0/+74
* - Update to 5.33zi2016-06-273-4/+6
* Document remote denial of service via FileUpload component in Tomcatjunovitch2016-06-271-0/+38
* - Update to 1.11.1sunpoet2016-06-272-3/+4
* - Update to 2.2.0sunpoet2016-06-272-4/+4
* - Update to 1.058sunpoet2016-06-272-3/+4
* Document Wordpress vulnerabilities fixed in 4.5.3junovitch2016-06-261-0/+58
* Docment security issues fixed in PHP 7.0.8, 5.6.23, and 5.5.37junovitch2016-06-261-0/+114
* Fix filename in distinfo.roberto2016-06-251-3/+3
* Add new port -- Yubico PIV toolume2016-06-254-0/+53
* Hook doas to the buildantoine2016-06-251-0/+1
* Change PORTREVISION to something sensible as upstream did not change.roberto2016-06-251-1/+1
* security/py-certbot: Complete renaming from letsencryptbrnrd2016-06-252-2/+2
* Missed the fact that ${ETCDIR} includes the port's name.roberto2016-06-251-0/+1
* Update to commit 720db72 to fix a security issue.roberto2016-06-254-26/+4
* security/nss: update to 3.25jbeich2016-06-244-6/+6
* New port: security/doasroberto2016-06-246-0/+69
* Update to 2.5gblach2016-06-242-5/+6
* Fix vuxmlfeld2016-06-241-1/+1
* Document libarchive vulnerabilitiesfeld2016-06-241-0/+41
* Add piwik XSS to vuxmlfeld2016-06-231-0/+28
* security/py-certbot: Rename from py-letsencrypt and updatebrnrd2016-06-238-13/+15
* Change all occurrences of xmj@chaot.net to johannes@perceivon.net as the owne...tz2016-06-234-4/+4
* Prefer relative symlinks to make the package relocation friendlybapt2016-06-231-1/+2
* - Update to 2.9.8.3zi2016-06-232-4/+4
* Update security/sudo to 1.8.17p1garga2016-06-233-7/+5
* security/tor-devel: update to 0.2.8.4.rjbeich2016-06-222-4/+4
* security/eschalot: add new portjbeich2016-06-224-0/+37
* Update to 0.17.mat2016-06-222-3/+4
* Drop maintainership for some of my ports.trasz2016-06-221-1/+1
* Update to 0.037.vanilla2016-06-212-4/+4