aboutsummaryrefslogtreecommitdiff
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* - Correct package range in 5c5f19ce-43af-11e1-89b4-001ec9578670Ryan Steinmetz2012-01-221-1/+5
* At the moment 1385 ports use BUILD_DEPENDS= ${RUN_DEPENDS} and 450Eitan Adler2012-01-2172-72/+72
* - Fix issue when NOPORTDOCS and SNORTSAM are both definedRyan Steinmetz2012-01-211-1/+3
* - Update to 2.9.2.1Ryan Steinmetz2012-01-212-3/+5
* - Fix formatting/topic in 91be81e7-3fea-11e1-afc7-2c4138874f7dRyan Steinmetz2012-01-211-6/+25
* - Document security vulnerability in security/openssl (CVE-2012-0050)Ryan Steinmetz2012-01-201-0/+28
* fix uuid on latest tomcat vulnerabilityJason Helfman2012-01-201-1/+1
* - Fix modified date;Xin LI2012-01-201-1/+3
* Update 91be81e7-3fea-11e1-afc7-2c4138874f7d to cover ruby+no-pthreads asXin LI2012-01-201-0/+2
* Remove license infoDoug Barton2012-01-202-4/+0
* Add pcsc-tools, tools for testing PCSC cards and readersTilman Keskinoz2012-01-206-0/+63
* - document asterisk remote crash vulnerabilityFlorian Smeets2012-01-201-0/+31
* Document recent vulnerability of Apache Tomcat Server.Jason Helfman2012-01-191-0/+43
* - Security update to 1.0.0gDirk Meyer2012-01-192-10/+10
* Sigh, should have used <lt> instead of <gt>.Xin LI2012-01-191-1/+1
* php52-exif no longer vulnerable to CVE-2011-4566 as of 5.2.17_6Xin LI2012-01-191-1/+2
* Fix the version range for ruby. The stock version is affected.Akinori MUSHA2012-01-191-1/+1
* There was no patch release in rubygem-rack 1.3.5_*, so just say < 1.3.6.Akinori MUSHA2012-01-191-1/+1
* - Fix affected rubygem-rack version: it should be _3 for PORTREVISION=3Sunpoet Po-Chuan Hsieh2012-01-191-1/+1
* update math/R to 2.14.1, and adjust dependent portsBrendan Fabeny2012-01-182-2/+2
* Fix CVE URL in recent OpenTTD entry.Alexey Dokuchaev2012-01-171-1/+1
* Unexpand (convert leading spaces to tabs when possible).Alexey Dokuchaev2012-01-171-871/+871
* Document recent vulnerability of OpenTTD game server.Alexey Dokuchaev2012-01-171-0/+34
* - transfer maintainership for my zope-ports to zope@Ruslan Makhmatkhanov2012-01-1623-46/+46
* PHP5 had its own entry for this vulnerability, so remove this.Akinori MUSHA2012-01-161-5/+0
* Add node < 0.6.7 (for V8).Akinori MUSHA2012-01-161-0/+4
* Add v8 < 3.8.5 (CVE-2011-5037).Akinori MUSHA2012-01-161-0/+5
* Add PHP < 5.3.9 (CVE-2011-4885).Akinori MUSHA2012-01-161-0/+5
* Add Multiple implementations denial-of-service via hash algorithm collision.Akinori MUSHA2012-01-161-0/+41
* Add missing dependency to gnutls. [1]Alexander Leidinger2012-01-141-1/+2
* Certifi: Python Mozilla's SSL Certificates.Martin Wilke2012-01-145-0/+37
* - Update to 110511Martin Wilke2012-01-142-3/+3
* - fix runtime with ruby18 (add dependency on converters/ruby-iconv)Ruslan Makhmatkhanov2012-01-141-9/+5
* - escape shell namesDirk Meyer2012-01-141-1/+1
* Add missing URL reference to last commitMartin Matuska2012-01-141-0/+1
* Add relevant FFmpeg vulnerabilities from Ubuntu USN-1320-1Martin Matuska2012-01-141-0/+55
* In the rc.d scripts, change assignments to rcvar to use theDoug Barton2012-01-1480-82/+80
* - clean upMartin Wilke2012-01-141-42/+42
* - Document vulnerabilities in security/opensslRyan Steinmetz2012-01-141-0/+49
* - Document vulnerability in net/isc-dhcp42-server (CVE-2011-4868)Ryan Steinmetz2012-01-131-0/+32
* - update to NSS_3_13_1_WITH_CKBI_1_88_RTMFlorian Smeets2012-01-122-8/+10
* - update to NSS_3_13_1_WITH_CKBI_1_88_RTMFlorian Smeets2012-01-122-4/+3
* Document PowerDNS DoS vulnerability.Xin LI2012-01-121-0/+28
* - update to 1.1.0Dirk Meyer2012-01-123-3/+7
* The Authen::OATH module provides a Perl implementation of theFrederic Culot2012-01-125-0/+43
* Update to 2.12.16.Roman Bogorodskiy2012-01-122-3/+3
* Document PHP multiple vulnerabilities.Xin LI2012-01-111-0/+42
* - use /etc/rc.d/ipfilter quietresyncDirk Meyer2012-01-111-1/+1
* - Build with obsolte MD2 hash by defaultDirk Meyer2012-01-112-27/+16
* - Update to 1.1.1.Wesley Shields2012-01-104-29/+9