/archivers/

antw44/cgit/cgit.cgi/freebsd-ports-gnome/commit/security?h=gstreamer0.10-removal&id=f0a11b6f257338e3b5552207e9f6741667a2c7d0'>Update to 2.4.3krion2004-11-192-3/+3 * Add localized versions of gd port to the VuXML entry.josef2004-11-191-0/+2 * - Update to 0.31 (see http://untroubled.org/cvm/NEWS for details)sergei2004-11-193-3/+12 * Document SA-04:16.fetch.simon2004-11-181-0/+36 * Update to 1.5mat2004-11-182-3/+3 * Update to DAT 4408jeh2004-11-182-3/+3 * Update to 0.3.1:vs2004-11-187-83/+185 * Fix build on 5.x.demon2004-11-182-3/+37 * Update to latest release of sudomharo2004-11-182-4/+4 * Add security/hpn-ssh, a high performance SSH based on OpenSSH, after abrooks2004-11-184-35/+31 * Update to DAT 4407jeh2004-11-182-3/+3 * Document the buffer overrun vulnerability in samba3josef2004-11-181-0/+27 * Correct range for xpdf vulnerability, as cups-base got a fixingjosef2004-11-181-1/+1 * Update to sudo-1.6.3p8, which *really* includes the CDPATH fix, androam2004-11-173-15/+5 * - Use "tail -F" rather than "tail -f".kuriyama2004-11-174-0/+61 * The last commit to japanese/samba also fixed the security issuejosef2004-11-171-1/+4 * Add CVE name to twiki entry.simon2004-11-171-0/+1 * Add teTeX-base to affected packages in xpdf's vuxml entry.josef2004-11-171-0/+4 * strip out CDPATHmharo2004-11-162-1/+11 * Document arbitrary shell command execution in twiki.simon2004-11-151-0/+33 * fix CAN-2004-0884.ume2004-11-152-1/+20 * Update to 20041114:vs2004-11-152-3/+3 * Document a format string vulnerability in proxytunnel.simon2004-11-151-0/+36 * - Update maintainer's email addresspav2004-11-1511-20/+20 * Correct URL to ddos_scan homepage.simon2004-11-151-1/+1 * - Update to 0.99sem2004-11-142-3/+3 * Update to version 0.0.19krion2004-11-143-5/+3 * Fix link issue under FreeBSD-4.X due to unsupported functions.cy2004-11-146-33/+69 * Update termlog from 2.0 to 2.2csjp2004-11-142-3/+3 * Fix entry date for the ruby entry from the last commit.simon2004-11-131-1/+1 * - Document at DoS in the Ruby CGI module.simon2004-11-131-0/+60 * Chase the Gaim 1.0.3 update.marcus2004-11-132-2/+2 * Update to 1.6.8p2mharo2004-11-132-4/+4 * Mention newly available pinentry-gtk2 in pkg-message.lofi2004-11-131-0/+1 * Add CVE name for gnats issue.nectar2004-11-121-1/+2 * Remove conditional runtime dependency on the gtar port, it's availablelofi2004-11-122-4/+0 * Note (likely) remotely exploitable vulnerability in samba 3.nectar2004-11-121-0/+33 * Document vulnerability in GNATS.josef2004-11-121-0/+24 * Document a XSS in squirrelmail.simon2004-11-121-0/+32 * Fix entry date.josef2004-11-121-1/+1 * Document BNC vulnerability.josef2004-11-121-0/+25 * Update to 1.0.3krion2004-11-122-4/+3 * - Reset bouncing maintainer's address:pav2004-11-121-1/+1 * Add spike-proxy, a professional-grade tool for looking for application-levelpav2004-11-126-0/+3346 * Update to 0.2.0krion2004-11-125-11/+59 * Note old hafiye bug.nectar2004-11-121-0/+36 * Bump PORTREVISION to reflect security update.nectar2004-11-121-0/+1 * Fix a format string vulnerability in ez-ipupdate.naddy2004-11-111-0/+27 * Document a buffer overflow in ImageMagick's EXIF parser.simon2004-11-111-0/+26 * Correct recent Apache 2 entry to not match Apache 1.X.simon2004-11-111-1/+2 * Change the libident dependency from BUILD_DEPENDS to LIB_DEPENDS.knu2004-11-111-1/+2 * Document vulnerability in Apache 2 (CAN-2004-0942).josef2004-11-111-0/+26 * Update the libxml vulnerability to indicate the fixed version.marcus2004-11-111-1/+2 * Update to DAT 4406jeh2004-11-112-3/+3 * Bump 29 ports that use GCONF_SCHEMAS. Somehow, the diff of GNOME 2.8.x hasmezz2004-11-102-2/+2 * Add pear-File_Passwd, class to manipulate and authenticate against standard U...pav2004-11-104-0/+38 * Document a format string vulnerability in socat.simon2004-11-101-0/+33 * - Update to 2.0.2pav2004-11-102-3/+3 * Document remote buffers overflow in libxml and libxml2.simon2004-11-101-0/+32 * - Add a hint on complete removal when deinstallingsem2004-11-102-0/+39 * - Add a hint on complete removal when deinstallingsem2004-11-102-0/+39 * The bugs discovered by Chris Evans have been fixednectar2004-11-101-2/+2 * Add security/sks - SKS OpenPGP Key Server:sergei2004-11-108-0/+134 * Massive ports move to better categories.skv2004-11-093-7/+3 * Update to DAT 4405jeh2004-11-092-3/+3 * warn to create sasldb2 by yourself in BATCH mode.ume2004-11-091-0/+4 * Remove the md5crk port. The cracking effort was ended after atrevor2004-11-094-45/+0 * - Update to 2.2.0sem2004-11-0811-18/+820 * Fix pkgnames for mod_include vulnerability.josef2004-11-081-6/+6 * Update to KDE 3.3.1lofi2004-11-084-6/+24 * Document a virus detection evasion in p5-Archive-Zip.simon2004-11-081-0/+27 * Add gnomekeyringmanager.marcus2004-11-081-0/+1 * Bump PORTREVISIONS for all ports that depend on atk or pango to ease in themarcus2004-11-0811-7/+11 * Add some files missed in the previous GNOME 2.8 update.marcus2004-11-0812-0/+184 * Presenting GNOME 2.8 for FreeBSD (2.8.1 to be exact).marcus2004-11-0810-14/+96 * - Update to 20041106pav2004-11-062-3/+3 * - Fix plistpav2004-11-062-1/+2 * Document mod_include vulnerability in apache and related ports.josef2004-11-061-0/+54 * - Upgrade to 2.2.0sem2004-11-0614-21/+2082 * - drop objects for win and vmsdinoex2004-11-061-0/+14 * - cleanup fipsdinoex2004-11-063-6/+17 * Update to 1.1kevlo2004-11-062-3/+3 * Document an insecure temporary file creation in postgresql-contrib.simon2004-11-061-0/+31 * Bump modified date in the entry for the last commit.simon2004-11-061-0/+1 * Update latest mpg123 entry to note that the port is fixed in the mostsimon2004-11-061-1/+1 * - Update to 2.2.0pav2004-11-064-21/+8 * There was a gd 1.X port with portepoch 2 for a while, so let the gdsimon2004-11-051-0/+1 * Document an integer overflow in the GD Graphics Library.simon2004-11-051-0/+33 * Add p5-POE-Component-SSLify 0.03, integrate SSL into POE.skv2004-11-055-0/+43 * Add p5-Filter-Crypto 1.00,skv2004-11-055-0/+75 * - Update to 20041101pav2004-11-0511-161/+181 * Add pinentry-gtk2, a GTK+ 2.0 version of the GnuPG password dialoglofi2004-11-052-0/+21 * Fix some brainos.lofi2004-11-051-6/+7 * Add hooks for new -gtk2 slaveport.lofi2004-11-053-4/+42 * - Update to 2.0.1pav2004-11-042-3/+3 * Correct entry date for the putty entry.simon2004-11-041-1/+1 * Document vulnerability in puttyjosef2004-11-041-0/+28 * - add patch files and unbreak this portleeym2004-11-044-8/+25 * Add an entry for a wzdftpd remote DoS.simon2004-11-041-0/+22 * Updates to the bogofilter entry:simon2004-11-041-1/+4 * Update to DAT 4404jeh2004-11-042-3/+3 * - Update to 4.0.5pav2004-11-032-3/+3 * - Update to 2.0.0pav2004-11-034-32/+23 * Update linux-openmotif to 2.2.4 to fix the security.mezz2004-11-021-1/+4 * A long-overdue dequoting of COMMENT. D'oh, I thought I'd done this,roam2004-11-023-3/+3 * - update to 1.1clsung2004-11-012-3/+3 * Update to 1.7.6.marcus2004-10-313-18/+17 * Add a sudo dependency and dependency on libutil.cy2004-10-303-0/+9 * Correct some tty handling problems.cy2004-10-306-18/+375 * Update to DAT 4403jeh2004-10-302-3/+3 * Update to DAT 4402jeh2004-10-292-3/+3 * Repair handling of ptys.cy2004-10-296-0/+129 * Introduce sudosh (sudo shell) into the Ports Tree.cy2004-10-2913-0/+100 * - Security Update to 0.56dinoex2004-10-282-3/+3 * Document rssh format string vulnerability.josef2004-10-281-0/+26 * - Update to 0.23pav2004-10-283-10/+10 * Update to DAT 4401jeh2004-10-282-3/+3 * Remove a DAT file that didn't completely download because it is not usefuljeh2004-10-281-11/+11 * Fix build on 4-stablevanilla2004-10-2718-3/+165 * Fix build on 4-stable.vanilla2004-10-276-3/+42 * Create a VuXML entry for Horde XSS help window vulnerability to replacenectar2004-10-272-1/+28 * - update to 1.0clsung2004-10-272-4/+4 * - Bugfix update to 0.9.7edinoex2004-10-276-59/+49 * Add an entry for a vulnerability fixed in horde-2.2.7.thierry2004-10-271-0/+1 * Chase libraries for new devel/libidn version.krion2004-10-262-2/+4 * Document a denial-of-service issue in bogofilter.nectar2004-10-261-0/+33 * Fix integer overflow vulnerabilities.nork2004-10-261-1/+4 * Document xpdf 2 and xpdf 3 vulnerabilities.nectar2004-10-261-0/+38 * Document several security issues in gaim, fixed in various versions fromnectar2004-10-261-5/+222 * Note that the Red Hat based linux_base ports containnectar2004-10-261-1/+2 * Braino: install the file with correct name.des2004-10-251-1/+4