notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Why was the website so slow for so long?

The cause of the slowdown was a change to the ZFS dataset. In conjunction with the database server, very little caching was being done. This combination resulted in increased disk I/O as the system churned through the database. Details in the blog post which outlines the various things which changed. Many graphs.

Port details
linux-c6-openssl OpenSSL toolkit (Linux CentOS 6.10)
1.0.1e_16 security Deleted on this many watch lists=2 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port 1.0.1eVersion of this port present on the latest quarterly branch.
Deprecated DEPRECATED: Superseded by CentOS 7
Expired This port expired on: 2019-12-31
Maintainer: emulation@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2014-09-22 10:40:16
Last Update: 2019-12-31 17:00:29
SVN Revision: 521645
Also Listed In: linux
License: not specified in port
Description:
SVNWeb : Homepage
pkg-plist: as obtained via: make generate-plist
Expand this list (121 items)
  1. @ldconfig-linux /compat/linux
  2. etc/pki/tls/certs/Makefile
  3. etc/pki/tls/certs/make-dummy-cert
  4. etc/pki/tls/certs/renew-dummy-cert
  5. etc/pki/tls/misc/CA
  6. etc/pki/tls/misc/c_hash
  7. etc/pki/tls/misc/c_info
  8. etc/pki/tls/misc/c_issuer
  9. etc/pki/tls/misc/c_name
  10. etc/pki/tls/openssl.cnf
  11. usr/bin/openssl
  12. usr/lib/.libcrypto.so.1.0.1e.hmac
  13. usr/lib/.libcrypto.so.10.hmac
  14. usr/lib/.libssl.so.1.0.1e.hmac
  15. usr/lib/.libssl.so.10.hmac
  16. usr/lib/libcrypto.so.1.0.1e
  17. usr/lib/libcrypto.so.10
  18. usr/lib/libssl.so.1.0.1e
  19. usr/lib/libssl.so.10
  20. usr/lib/openssl/engines/lib4758cca.so
  21. usr/lib/openssl/engines/libaep.so
  22. usr/lib/openssl/engines/libatalla.so
  23. usr/lib/openssl/engines/libcapi.so
  24. usr/lib/openssl/engines/libchil.so
  25. usr/lib/openssl/engines/libcswift.so
  26. usr/lib/openssl/engines/libgmp.so
  27. usr/lib/openssl/engines/libnuron.so
  28. usr/lib/openssl/engines/libpadlock.so
  29. usr/lib/openssl/engines/libsureware.so
  30. usr/lib/openssl/engines/libubsec.so
  31. usr/lib64/.libcrypto.so.1.0.1e.hmac
  32. usr/lib64/.libcrypto.so.10.hmac
  33. usr/lib64/.libssl.so.1.0.1e.hmac
  34. usr/lib64/.libssl.so.10.hmac
  35. usr/lib64/libcrypto.so.1.0.1e
  36. usr/lib64/libcrypto.so.10
  37. usr/lib64/libssl.so.1.0.1e
  38. usr/lib64/libssl.so.10
  39. usr/lib64/openssl/engines/lib4758cca.so
  40. usr/lib64/openssl/engines/libaep.so
  41. usr/lib64/openssl/engines/libatalla.so
  42. usr/lib64/openssl/engines/libcapi.so
  43. usr/lib64/openssl/engines/libchil.so
  44. usr/lib64/openssl/engines/libcswift.so
  45. usr/lib64/openssl/engines/libgmp.so
  46. usr/lib64/openssl/engines/libnuron.so
  47. usr/lib64/openssl/engines/libpadlock.so
  48. usr/lib64/openssl/engines/libsureware.so
  49. usr/lib64/openssl/engines/libubsec.so
  50. usr/share/doc/openssl-1.0.1e/CHANGES
  51. usr/share/doc/openssl-1.0.1e/FAQ
  52. usr/share/doc/openssl-1.0.1e/INSTALL
  53. usr/share/doc/openssl-1.0.1e/LICENSE
  54. usr/share/doc/openssl-1.0.1e/NEWS
  55. usr/share/doc/openssl-1.0.1e/README
  56. usr/share/doc/openssl-1.0.1e/README.FIPS
  57. usr/share/doc/openssl-1.0.1e/README.legacy-settings
  58. usr/share/doc/openssl-1.0.1e/c-indentation.el
  59. usr/share/doc/openssl-1.0.1e/openssl.txt
  60. usr/share/doc/openssl-1.0.1e/openssl_button.gif
  61. usr/share/doc/openssl-1.0.1e/openssl_button.html
  62. usr/share/doc/openssl-1.0.1e/ssleay.txt
  63. usr/share/man/man1/asn1parse.1ssl.gz
  64. usr/share/man/man1/ca.1ssl.gz
  65. usr/share/man/man1/ciphers.1ssl.gz
  66. usr/share/man/man1/cms.1ssl.gz
  67. usr/share/man/man1/crl.1ssl.gz
  68. usr/share/man/man1/crl2pkcs7.1ssl.gz
  69. usr/share/man/man1/dgst.1ssl.gz
  70. usr/share/man/man1/dhparam.1ssl.gz
  71. usr/share/man/man1/dsa.1ssl.gz
  72. usr/share/man/man1/dsaparam.1ssl.gz
  73. usr/share/man/man1/ec.1ssl.gz
  74. usr/share/man/man1/ecparam.1ssl.gz
  75. usr/share/man/man1/enc.1ssl.gz
  76. usr/share/man/man1/errstr.1ssl.gz
  77. usr/share/man/man1/gendsa.1ssl.gz
  78. usr/share/man/man1/genpkey.1ssl.gz
  79. usr/share/man/man1/genrsa.1ssl.gz
  80. usr/share/man/man1/md2.1ssl.gz
  81. usr/share/man/man1/md4.1ssl.gz
  82. usr/share/man/man1/md5.1ssl.gz
  83. usr/share/man/man1/mdc2.1ssl.gz
  84. usr/share/man/man1/nseq.1ssl.gz
  85. usr/share/man/man1/ocsp.1ssl.gz
  86. usr/share/man/man1/openssl.1ssl.gz
  87. usr/share/man/man1/pkcs12.1ssl.gz
  88. usr/share/man/man1/pkcs7.1ssl.gz
  89. usr/share/man/man1/pkcs8.1ssl.gz
  90. usr/share/man/man1/pkey.1ssl.gz
  91. usr/share/man/man1/pkeyparam.1ssl.gz
  92. usr/share/man/man1/pkeyutl.1ssl.gz
  93. usr/share/man/man1/req.1ssl.gz
  94. usr/share/man/man1/ripemd160.1ssl.gz
  95. usr/share/man/man1/rsa.1ssl.gz
  96. usr/share/man/man1/rsautl.1ssl.gz
  97. usr/share/man/man1/s_client.1ssl.gz
  98. usr/share/man/man1/s_server.1ssl.gz
  99. usr/share/man/man1/s_time.1ssl.gz
  100. usr/share/man/man1/sess_id.1ssl.gz
  101. usr/share/man/man1/sha.1ssl.gz
  102. usr/share/man/man1/sha1.1ssl.gz
  103. usr/share/man/man1/smime.1ssl.gz
  104. usr/share/man/man1/speed.1ssl.gz
  105. usr/share/man/man1/spkac.1ssl.gz
  106. usr/share/man/man1/sslpasswd.1ssl.gz
  107. usr/share/man/man1/sslrand.1ssl.gz
  108. usr/share/man/man1/ts.1ssl.gz
  109. usr/share/man/man1/tsget.1ssl.gz
  110. usr/share/man/man1/verify.1ssl.gz
  111. usr/share/man/man1/version.1ssl.gz
  112. usr/share/man/man1/x509.1ssl.gz
  113. usr/share/man/man5/config.5ssl.gz
  114. usr/share/man/man5/openssl.cnf.5ssl.gz
  115. usr/share/man/man5/x509v3_config.5ssl.gz
  116. usr/share/man/man7/des_modes.7ssl.gz
  117. @dir etc/pki/CA/certs
  118. @dir etc/pki/CA/crl
  119. @dir etc/pki/CA/newcerts
  120. @dir etc/pki/CA/private
  121. @dir etc/pki/tls/private
Collapse this list.
Dependency lines:
  • linux-c6-openssl>0:security/linux-c6-openssl
  • libcrypto.so:security/linux-c6-openssl
No installation instructions: this port has been deleted.
The package name of this deleted port was:
PKGNAME: linux-c6-openssl
Flavors: there is no flavor information for this port.
ONLY_FOR_ARCHS: amd64 i386
distinfo:

Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Runtime dependencies:
  1. linux_base-c6>=6.10 : emulators/linux_base-c6
NOTE: dependencies for deleted ports are notoriously suspect
This port is required by:
for Run

    Deleted ports which required this port:

    Expand this list of 6 deleted ports
    1. audio/linux-c6-pulseaudio-libs-glib2*
    2. devel/linux-c6-qt47*
    3. emulators/linux-c6*
    4. net-im/skype4*
    5. security/linux-c6-libssh2*
    6. x11-toolkits/linux-c6-qt47-x11*
    7. Collapse this list of deleted ports.
* - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

Configuration Options

USES:

Master Sites:
  1. http://mirror.centos.org/centos/6.10/os/i386/Packages/
  2. http://mirror.centos.org/centos/6.10/os/x86_64/Packages/
  3. http://mirror.centos.org/centos/6.10/updates/i386/Packages/
  4. http://mirror.centos.org/centos/6.10/updates/x86_64/Packages/
  5. http://vault.centos.org/centos/6.10/os/i386/Packages/
  6. http://vault.centos.org/centos/6.10/os/x86_64/Packages/
  7. http://vault.centos.org/centos/6.10/updates/i386/Packages/
  8. http://vault.centos.org/centos/6.10/updates/x86_64/Packages/
Port Moves

Number of commits found: 27

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
31 Dec 2019 17:00:29
Original commit files touched by this commit  1.0.1e_16
Revision:521645
rene search for other commits by this committer
Remove expired ports:

2019-12-31 accessibility/linux-c6-atk: Superseded by CentOS 7
2019-12-31 audio/exaile-devel: this port is older than audio/exaile
2019-12-31 audio/linux-c6-alsa-lib: Superseded by CentOS 7
2019-12-31 audio/linux-c6-alsa-plugins-oss: Superseded by CentOS 7
2019-12-31 audio/linux-c6-alsa-plugins-pulseaudio: Superseded by CentOS 7
2019-12-31 audio/linux-c6-alsa-utils: Superseded by CentOS 7
2019-12-31 audio/linux-c6-flac: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libaudiofile: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libogg: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libsndfile: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libvorbis: Superseded by CentOS 7
2019-12-31 audio/linux-c6-mikmod: Superseded by CentOS 7
2019-12-31 audio/linux-c6-nas-libs: Superseded by CentOS 7
(Only the first 15 lines of the commit message are shown above View all of this commit message)
23 Sep 2019 08:59:05
Original commit files touched by this commit  1.0.1e_16
Revision:512615
tijl search for other commits by this committer
Update to 1.0.1e-58.el6_10.

MFH:		2019Q3
Security:	https://access.redhat.com/errata/RHSA-2019:2471
Security:	CVE-2019-1559
08 Jun 2019 15:59:47
Original commit files touched by this commit  1.0.1e_15
Revision:503741 This port version is marked as vulnerable.
tijl search for other commits by this committer
Address some portlint warnings in the Linux infrastructure ports.

Eliminate LINUXNAME from port Makefiles.  This was just a helper variable
without special meaning outside port Makefiles but several developers have
copied it to new ports where it was then unused, apparently thinking that
it did have some special meaning.
08 Jun 2019 13:13:29
Original commit files touched by this commit  1.0.1e_15
Revision:503726 This port version is marked as vulnerable.
tijl search for other commits by this committer
Eliminate RPMVERSION from Linux ports and set DISTVERSIONSUFFIX instead.
This puts all version information together in the port Makefiles.
10 Sep 2018 13:14:52
Original commit files touched by this commit  1.0.1e_15
Revision:479406 This port version is marked as vulnerable.
mat search for other commits by this committer
Add DOCS options to ports that should have one.

Also various fixes related to said option.

PR:		230864
Submitted by:	mat
exp-runs by:	antoine
29 Jan 2018 22:00:39
Original commit files touched by this commit  1.0.1e_15
Revision:460347 This port version is marked as vulnerable.
tijl search for other commits by this committer
Fix pkg-plist.

Submitted by:	dbn
26 May 2017 10:26:39
Original commit files touched by this commit  1.0.1e_14
Revision:441768 This port version is marked as vulnerable.
tijl search for other commits by this committer
Update to CentOS 6.9.

PR:		218732
Submitted by:	Piotr Kubaj <pkubaj@anongoth.pl>
22 Feb 2017 16:26:24
Original commit files touched by this commit  1.0.1e_13
Revision:434592 This port version is marked as vulnerable.
tijl search for other commits by this committer
Update to 1.0.1e-48.el6_8.4.

PR:		217294
Submitted by:	Piotr Kubaj <pkubaj@anongoth.pl>
MFH:		2017Q1
Security:	https://rhn.redhat.com/errata/RHSA-2017-0286.html
31 Jan 2017 16:54:22
Original commit files touched by this commit  1.0.1e_12
Revision:432937 This port version is marked as vulnerable.
tijl search for other commits by this committer
- Autodetect the installed linux_base port and use LINUX_DEFAULT only as
  a last resort.
- Construct a list of DISTFILES for every architecture (amd64, i386).
  Select one list for regular make and all lists for make makesum so linux
  ports can have one combined distinfo file.
- Set DIST_SUBDIR?=centos so there's only one copy of common distfiles.
- Use MASTER_SITES and DISTFILES groups so make fetch is a bit smarter.
- Regenerate all distinfo files.
- For linux_base-c6 (just like linux_base-c7 already does) turn bin, lib,
  lib64 and sbin into symbolic links to the same directory under usr.
  This fixes the problem where some programs/libraries exist under / on
  FreeBSD and /usr on Linux or vice versa and then depending on the order
  of search paths Linux programs may run/load FreeBSD programs/libraries
  and fail.
- Turn usr/share/icons into a symbolic link to LOCALBASE/share/icons so
(Only the first 15 lines of the commit message are shown above View all of this commit message)
12 Jan 2017 10:44:46
Original commit files touched by this commit  1.0.1e_12
Revision:431245 This port version is marked as vulnerable.
tijl search for other commits by this committer
Make 64 bit Linux packages the default on amd64.
30 Sep 2016 09:36:01
Original commit files touched by this commit  1.0.1e_11
Revision:422973 This port version is marked as vulnerable.
tijl search for other commits by this committer
Update to 1.0.1e-48.el6_8.3.

PR:		213082
Submitted by:	Piotr Kubaj <pkubaj@anongoth.pl>
MFH:		2016Q3
Security:	https://rhn.redhat.com/errata/RHSA-2016-1940.html
05 Sep 2016 19:23:42
Original commit files touched by this commit  1.0.1e_10
Revision:421387 This port version is marked as vulnerable.
tijl search for other commits by this committer
- Replace Mk/bsd.linux-apps.mk and Mk/bsd.linux-rpm.mk with
  Mk/Uses/linux.mk.
- Replace USE_LINUX=yes with USES+=linux and USE_LINUX=(.*) with
  USES+=linux:\1 in all ports.
- Replace USE_LINUX_APPS with USE_LINUX in all ports.
- Use INSTALL_SCRIPT instead of INSTALL_PROGRAM to install scripts in some
  ports.
- When USE_LINUX_RPM is defined, simplify the way DISTFILES and EXTRACT_ONLY
  are defined.
- Remove BRANDELF_DIRS and BRANDELF_FILES handling.  In the very rare cases
  that it is still necessary ports can run ${BRANDELF} from post-patch.
- Remove AUTOMATIC_PLIST handling.  Only one port used it.
- Fix Linux MASTER_SITES.
- Replace OVERRIDE_LINUX_BASE_PORT and OVERRIDE_LINUX_NONBASE_PORTS with
  default versions framework.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
01 Aug 2016 13:07:14
Original commit files touched by this commit  1.0.1e_10
Revision:419437 This port version is marked as vulnerable.
tijl search for other commits by this committer
Use LINUX_REPO_ARCH instead of LINUX_RPM_ARCH when setting DISTINFO_FILE
and PLIST for Linux ports.  LINUX_RPM_ARCH is the CPU targetted by a
package and LINUX_REPO_ARCH is like our ARCH which is more suitable.  This
only affects Centos 6 ports because they are the only ones where
LINUX_REPO_ARCH != LINUX_RPM_ARCH.
20 Jun 2016 17:13:26
Original commit files touched by this commit  1.0.1e_10
Revision:417169 This port version is marked as vulnerable.
tijl search for other commits by this committer
Update Linux ports to Centos 6.8.

PR:		210373
Submitted by:	Piotr Kubaj <pkubaj@anongoth.pl>
Differential Revision:	https://reviews.freebsd.org/D6891
05 Jun 2016 20:32:09
Original commit files touched by this commit  1.0.1e_9
Revision:416432 This port version is marked as vulnerable.
tijl search for other commits by this committer
Update to 1.0.1e-42.el6_7.4.
13 Apr 2016 01:49:24
Original commit files touched by this commit  1.0.1e_8
Revision:413168 This port version is marked as vulnerable.
swills search for other commits by this committer
CentOS ports: for c6_64, install 32bit libraries alongside

PR:		206943
Submitted by:	xmj
30 Jan 2016 18:30:40
Original commit files touched by this commit  1.0.1e_7
Revision:407537 This port version is marked as vulnerable.
miwi search for other commits by this committer
Welcome Centos 6.7

- Upgrade all linux-c6- to CentOS 6.7
- Cleanups

PR:                     205846
Submitted by:           xmj
In Collaboration with:  allanjude, netchild, xmj
Exp-run:                antoine
Sponsored by:           Perceivon Hosting Inc.
Differential Revision:  D3428

We'd like to thanks for all the feedback and comments.
09 Aug 2015 19:14:15
Original commit files touched by this commit  1.0.1e_6
Revision:393817 This port version is marked as vulnerable.
netchild search for other commits by this committer
Re-commit of
64 bit linuxulator support (not activated by default):
 - most of the work was done by Alan Jude
 - all errors are mine
 - 64bit (may) have rough edges
 - I validated
    * that the 32bit part doesn't has deinstall regressions (incl. EXP runs by
      antoine)
    * 29 of 72 64bit ports ports don't have deinstall leftovers (more validation
      later, when I dare to activate the 64bit linuxulator in the kernel)
 - the infrastructure part looks mature enough to let more test-bunnies get
   some experience with the new 64 bit parts
 - to use it you shall have no linux ports installed and have to specify
   (on your own risk) the following in make.conf before installing the ports:
   OVERRIDE_LINUX_BASE_PORT=c6_64
(Only the first 15 lines of the commit message are shown above View all of this commit message)
26 Jul 2015 13:35:30
Original commit files touched by this commit  1.0.1e_6
Revision:392922 This port version is marked as vulnerable.
antoine search for other commits by this committer
Unbreak INDEX, reverting r392921

With hat:	portmgr
26 Jul 2015 13:06:25
Original commit files touched by this commit  1.0.1e_6
Revision:392921  Sanity Test Failure This port version is marked as vulnerable.
netchild search for other commits by this committer
64 bit linuxulator support (not activated by default):
 - most of the work was done by Alan Jude
 - all errors are mine
 - 64bit (may) have rough edges
 - I validated
    * that the 32bit part doesn't has deinstall regressions
    * 29 of 72 64bit ports ports don't have deinstall leftovers (more validation
      later, when I dare to activate the 64bit linuxulator in the kernel)
 - the infrastructure part looks mature enough to let more test-bunnies get
   some experience with it
 - to use it you shall have no linux ports installed and have to specify
   (on your own risk) the following in make.conf before installing the ports:
   OVERRIDE_LINUX_BASE_PORT=c6_64
   OVERRIDE_LINUX_NONBASE_PORTS=c6_64
(Only the first 15 lines of the commit message are shown above View all of this commit message)
03 Jul 2015 14:42:16
Original commit files touched by this commit  1.0.1e_6
Revision:391244 This port version is marked as vulnerable.
tijl search for other commits by this committer
Update to 1.0.1e-30.el6.11

MFH:		2015Q3
10 Apr 2015 15:54:13
Original commit files touched by this commit  1.0.1e_5
Revision:383737 This port version is marked as vulnerable.
xmj search for other commits by this committer
security/linux-c6-openssl: update to 1.0.1e_5

- update to 1.0.1e_5

From the RPM changelog:

  * Thu Mar 26 2015 Tomas Mraz <tmraz@redhat.com> 1.0.1e-30.8
  - drop the AES-GCM restriction of 2^32 operations because the IV is
    always 96 bits (32 bit fixed field + 64 bit invocation field)
24 Mar 2015 12:57:24
Original commit files touched by this commit  1.0.1e_4
Revision:382089 This port version is marked as vulnerable.
xmj search for other commits by this committer
security/linux-c6-openssl: update to 1.0.1e_4

- update to 1.0.1e_4

Approved by:	swills (mentor)
Differential Revision:	https://reviews.freebsd.org/D2125
Security:	9d15355b-ce7c-11e4-9db0-d050992ecde8
Security:	CVE-2015-0286
Security:	CVE-2015-0287
Security:	CVE-2015-0289
Security:	CVE-2015-0292
Security:	CVE-2015-0293
MFH:		2015Q1
22 Jan 2015 17:10:26
Original commit files touched by this commit  1.0.1e_3
Revision:377671 This port version is marked as vulnerable.
xmj search for other commits by this committer
security/linux-c6-openssl: upgrade to 1.0.1e_3

- Upgrade to 1.0.1e_3
- Fixes CVEs from 2015-01-08.

Differential Revision:	https://reviews.freebsd.org/D1597
Security:	4e536c14-9791-11e4-977d-d050992ecde8
Approved by:	swills (mentor)
11 Nov 2014 13:06:40
Original commit files touched by this commit  1.0.1e_2
Revision:372445 This port version is marked as vulnerable.
xmj search for other commits by this committer
Upgrade CentOS to 6.6

- Upgrade all things linux-c6- to CentOS 6.6
- Add ports:
  devel/linux-c6-libsigc++20
  graphics/linux-c6-gdk-pixbuf [1]
  graphics/linux-c6-glx-utils
- Add pkg-plists for net/linux-c6-openldap
  and security/linux-c6-cyrus-sasl2
- Misc. cleanups

Differential Revision:	https://reviews.freebsd.org/D1108
Submitted by:	kmoore [1]
Reviewed by:	rene (emulation)
Approved by:	portmgr (swills)
Approved by:	swills (mentor)
Sponsored by:	Perceivon Hosting Inc.
17 Oct 2014 14:34:52
Original commit files touched by this commit  1.0.1e_1
Revision:371060 This port version is marked as vulnerable.
xmj search for other commits by this committer
security/linux-c6-openssl: kill poodle

- Upgrade openssl to 1.0.1e-30.el6_5.2

Approved by:	swills (mentor)
Security:	03175e62-5494-11e4-9cc1-bc5ff4fb5e7b
22 Sep 2014 10:40:01
Original commit files touched by this commit  1.0.1e
Revision:368845 This port version is marked as vulnerable.
xmj search for other commits by this committer
Update CentOS base to 6.5, add userland ports

The Fedora 10 infrastructure ports have been in use since June 2009 and, while
having served a great deed, have become unsupported upstream and hence affected
by unfixed security vulnerabilities. In addition to that, many recent Linux
binaries need newer libc / stdlibc++ versions.

This commit adds the linux-c6- userland as drop-in replacement for the -f10
infrastructure, as well as upgrading the linux_base-c6 port to CentOS 6.5.

If you want to switch to linux-c6 ports, please define at /etc/make.conf:

    OVERRIDE_LINUX_BASE_PORT=c6
    OVERRIDE_LINUX_NONBASE_PORTS=c6
(Only the first 15 lines of the commit message are shown above View all of this commit message)

Number of commits found: 27

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
apache24Apr 02
cactiApr 02
chromiumApr 02
haproxyApr 02
haproxy18Apr 02
haproxy19Apr 02
haproxy21Apr 02
rubygem-json*Apr 02
gnutlsMar 31
postgresql10-serverMar 29
postgresql11-serverMar 29
postgresql12-serverMar 29
postgresql96-serverMar 29
gitlab-ceMar 26
jenkinsMar 25

12 vulnerabilities affecting 110 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-04-02 20:42:28


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 38992
Broken 591
Deprecated 530
Ignore 862
Forbidden 5
Restricted 150
No CDROM 72
Vulnerable 24
Expired 3
Set to expire 499
Interactive 0
new 24 hours 3
new 48 hours12
new 7 days52
new fortnight94
new month154

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.