aboutsummaryrefslogtreecommitdiff
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* security/snort3: Update version 3.1.77.0=>3.1.78.0Muhammad Moinur Rahman2024-01-192-4/+4
* */*: Update maintainer email addressGabriel M. Dutra2024-01-196-6/+6
* security/vuxml: document electron26 uut of bounds memory access in V8Hiroki Tagato2024-01-191-0/+29
* security/py-flask-saml: Update to 0.5.1Wen Heping2024-01-192-7/+6
* security/tailscale: Update to 1.58.0Ashish SHUKLA2024-01-182-6/+6
* security/boringssl: update to the recent snapshotSergey A. Osokin2024-01-182-23/+23
* security/liboqs: update 0.9.1 → 0.9.2Yuri Victorovich2024-01-183-5/+5
* security/vuxml: mark electron26 < 26.6.6, electron27 < 27.2.4 as vulnerableHiroki Tagato2024-01-181-2/+7
* security/shibboleth-idp: Fix expr usage, bump PORTREVISIONRyan Steinmetz2024-01-172-1/+2
* security/vuxml: document electron27 multiple vulnerabilitiesHiroki Tagato2024-01-171-0/+32
* security/vuxml: add www/*chromium < 120.0.6099.224Robert Nagy2024-01-171-0/+37
* devel/py-scantree: update to 0.0.2Ruslan Makhmatkhanov2024-01-171-0/+1
* security/py-merkletools: RefactorMuhammad Moinur Rahman2024-01-162-3/+19
* security/py-pysha3: Mark DEPRECATEDMuhammad Moinur Rahman2024-01-161-2/+10
* security/vuxml: add xwayland-devel to 62bb32d7090f listJan Beich2024-01-161-0/+4
* security/cyrus-sasl2{,-saslauthd}: Restore GNU_CONFIGUREHajimu UMEMOTO2024-01-163-5/+5
* security/vuxml: Document xorg-server and xwayland recent vulnerabilitiesEmmanuel Vadot2024-01-161-0/+80
* */*: Restore GNU_CONFIGURE on my portsRenato Botelho2024-01-161-2/+3
* security/cyrus-sasl2{,-saslauthd}: Move manpages to ${PREFIX}/shareHajimu UMEMOTO2024-01-165-51/+53
* security/fizz: update 2024.01.08.00 → 2024.01.15.00Yuri Victorovich2024-01-163-5/+10
* security/wazuh-*: Update to 4.7.2Jose Alonso Cardenas Marquez2024-01-1616-557/+757
* security/bitwarden-cli: update to 2024.1.0Hiroki Tagato2024-01-1625-4635/+4310
* security/sudo: Move manpages to ${PREFIX}/shareRenato Botelho2024-01-152-17/+19
* security/silktools: update to 3.22.1Antoine Brodin2024-01-153-9/+9
* security/diswall: Broken on powerpc64leYuri Victorovich2024-01-151-0/+2
* security/vaultwarden: Update to 1.30.1Bernard Spil2024-01-135-280/+291
* security/beid: Update to 5.1.13Tijl Coosemans2024-01-132-5/+4
* */*: Sanitize MANPREFIX for meson portsMuhammad Moinur Rahman2024-01-126-8/+10
* security/arti: Update to 1.1.12Carlo Strub2024-01-123-273/+281
* security/solana: Correct BROKEN=xx lineYuri Victorovich2024-01-121-1/+1
* security/pdfcrack: upgrade from 0.16 to 0.20Mikhail Teterin2024-01-123-5/+92
* security/vuxml: document electron{26,27} multiple vulnerabilitiesHiroki Tagato2024-01-121-0/+42
* security/vuxml: document gitlab vulnerabilitiesMatthias Fechner2024-01-121-0/+36
* security/solana: Broken on armv7, powerpc64lYuri Victorovich2024-01-121-1/+3
* KDE: Update KDE Plasma 6 to 5.92.0Tobias C. Berner2024-01-123-9/+9
* KDE: Update KDE Frameworks 6 to 5.248Tobias C. Berner2024-01-121-3/+3
* security/py-netbox-secrets: Update to 1.10.1Kai Knoblich2024-01-122-4/+4
* security/openssh-portable: Update HPN patch.Bryan Drewery2024-01-112-24/+24
* security/tinc: use ${PREFIX}/share/manDirk Meyer2024-01-111-1/+2
* security/tinc-devel: use ${PREFIX}/share/manDirk Meyer2024-01-111-3/+4
* security/pgpin: use ${PREFIX}/share/manDirk Meyer2024-01-112-2/+2
* security/rubygem-lockbox: update to 1.3.2Matthias Fechner2024-01-112-4/+4
* security/openssl32: Security fix for POLY1305 on ppcBernard Spil2024-01-112-0/+110
* security/openssl-quictls: Security fix for POLY1305 on ppcBernard Spil2024-01-112-1/+110
* security/openssl31-quictls: Security fix for POLY1305 on ppcBernard Spil2024-01-112-1/+110
* security/openssl31: Security fix for POLY1305 on ppcBernard Spil2024-01-112-1/+110
* security/openssl: Security fix for POLY1305 on ppcBernard Spil2024-01-112-1/+110
* security/vuxml: Document OpenSSL ppc vulnerabilityBernard Spil2024-01-111-0/+44
* security/heimdal-devel: Correct patch file nameCy Schubert2024-01-101-0/+0
* security/lynis: Update to 3.0.9Lars Engels2024-01-102-4/+4