Number of commits found: 6
all: Remove all other $FreeBSD keywords.
mail/sympa: update 6.2.54 -> 6.2.56, fix security issue - A vulnerability has been discovered in Sympa web interface by which attacker can execute arbitrary code with root privileges. PR: 246701 Submitted by: William F. Dudley Jr. <wfdudley@gmail.com> Approved by: dgeo@centrale-marseille.fr (maintainer) MFH: 2020Q2 Relnotes: https://github.com/sympa-community/sympa/releases/tag/6.2.56 Security: CVE-2020-10936 https://sympa-community.github.io/security/2020-002.html https://github.com/sympa-community/sympa/issues/943
Update to 6.2.8. PR: 203209 Submitted by: maintainer Sponsored by: Absolight
pkg-messageify pkg-message rather than using pkg-install Suggested by: mat
Stage ports maintained by me in irc java mail Cleanups in several places
[1] Remove unnecessary dependency on Berkeley DB [2] Fix RUN_DEPENDS pollution from BUILD_DEPENDS [2] Use USERS/GROUPS [2] Use DATADIR rather than ${PREFIX}/sympa [2] Remove useless post-deinstall target [2] Stop clobbering config files on deinstall PR: ports/157471 Submitted by: [1] Igor Zabelin (igorz yandex ru), [2] Chris Rees (utisoft gmail com) (maintainer)
Servers and bandwidth provided by New York Internet, iXsystems, and RootBSD
9 vulnerabilities affecting 178 ports have been reported in the past 14 days
* - modified, not new
All vulnerabilities
Last processed:2023-06-08 07:13:10 UTC