1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-02 01:20:54 +00:00
Commit Graph

3274 Commits

Author SHA1 Message Date
Emanuel Haupt
5f3a57aa59 Use the same URL as in blockquote.
Submitted by:	remko
2014-01-29 08:42:34 +00:00
Martin Wilke
78248c90c1 - Fix format 2014-01-29 08:22:56 +00:00
Emanuel Haupt
00017260bd Document socat vulnerability.
Security:	CVE-2014-0019
2014-01-29 07:53:48 +00:00
Carlo Strub
6ee542230d 2 new OTRS vulnerabilities
Security:	CVE-2014-1471
2014-01-28 22:29:12 +00:00
Matthew Seaman
0970b9204b rt42-4.2.1_3, which appears only on the 2014Q1 branch, should also be
counted as not vulnerable.
2014-01-27 23:10:10 +00:00
Rene Ladan
30a5132038 Document vulnerabilities in www/chromium < 32.0.1700.102
Obtained from:	http://googlechromereleases.blogspot.nl/
2014-01-27 23:01:11 +00:00
Matthew Seaman
71c9c356da Formatting fixes
Submitted by:	remko
2014-01-27 22:46:38 +00:00
Bernhard Froehlich
fc6750fe4f - Fix style for strongswan entry
Reported by:	remko
2014-01-27 21:08:45 +00:00
Matthew Seaman
baf0ccf5c5 vuxml entry concerning the recent security advisory about www/rt42
from 4.2.0 to 4.2.2 inclusive.  This is slightly unusual in the the
fix is applied to a completely different port
mail/p5-Email-Address-List which www/rt42 depends on..

Security:	d1dfc4c7-8791-11e3-a371-6805ca0b3d42
2014-01-27 20:44:52 +00:00
Bernhard Froehlich
6d38c4ccc3 - Fix typo in last entry
Reported by:	bz
2014-01-27 13:52:17 +00:00
Bernhard Froehlich
df0fed0b8a - Document multiple DoS vulnerabilities in strongswan
Security:	CVE-2013-5018
Security:	CVE-2013-6075
Security:	CVE-2013-6076
2014-01-27 13:31:45 +00:00
Kubilay Kocak
86d431b7f3 Document Varnish HTTP Cache < 3.0.5 DoS Vulnerability
Reviewed by:	remko
2014-01-25 09:24:38 +00:00
Eitan Adler
038bc3cf36 Update flash to 11.2r202.335
Report security issues

PR:		ports/185790
Reported by:	Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp>
2014-01-24 05:05:36 +00:00
Remko Lodder
988c8629b6 Cleanup the HTMLDOC entry, long lines and remove the ...
entries because I think it's not needed.  Also adjust
the previous entry by indenting correctly.

Hat:		secteam
Facilicated by:	Snow B.V.
2014-01-23 10:03:33 +00:00
Matthias Andree
5ef4b9d0ad Document HTMLDOC < 1.8.28 vulnerability. 2014-01-22 23:51:10 +00:00
Bernhard Froehlich
0fe2d256ec Document virtualbox-ose vulnerabilities
Security:	CVE-2013-5892
2014-01-16 16:15:47 +00:00
Rene Ladan
8ecb19f477 Document new vulnerabilities in www/chromium < 32.0.1700.77
Obtained from:	http://googlechromereleases.blogspot.nl/
MFH:		2014Q1
2014-01-15 21:41:15 +00:00
Erwin Lansing
8c356b8ce8 Sort references
Submitted by:	remko
2014-01-15 08:48:46 +00:00
Erwin Lansing
f718e701be Document SA-13:07.bind 2014-01-15 08:36:23 +00:00
Remko Lodder
bcd0f52004 Fix the latest entry, it has many issues, make validate
told us exactly what was wrong. I redid the entry and
just took out the ul/li structure and replaced it with
regular paragraphs. It might be worth investigating
to use the FreeBSD SA that got released because of this
as the main text, which is best suited imo.

Hat:	    secteam
2014-01-14 21:15:10 +00:00
Cy Schubert
6c23bbf50a Mark net/ntp forbidden.
Security:	CVE-2013-5211 / VU#348126
2014-01-14 20:54:57 +00:00
Mathieu Arnold
c2e1cd79f8 Document the latest nagios vulnerability. 2014-01-14 14:16:13 +00:00
Mathieu Arnold
c39c3d4a40 Security update to fix CVE-2014-0591 as reported at
https://kb.isc.org/article/AA-01078/74/

9.9.4 -> 9.9.4-P2
9.8.6 -> 9.8.6-P2
9.6-ESV-R10 -> 9.6-ESV-R10-P2

Security:	CVE-2014-0591 Remote DOS
2014-01-13 17:38:28 +00:00
Niclas Zeising
b015a1fa41 Update libXfont to 1.4.7
This is a security fix and it is important to update, since it might lead to
a privilege escalation if the X server is run as root (which is the default)

Security:	CVE-2013-6462
2014-01-08 10:42:04 +00:00
Xin LI
7252c45230 Document OpenSSL 1.0.1e multiple vulnerabilities. 2014-01-06 23:55:38 +00:00
Remko Lodder
71891e35fe Correct ident for most recent entries. No functional changes.
People, please be aware that we use the FreeBSD Documentation Primer
and that there are style rules we have to follow.  If you are in
doubt please consult me and I am more then willing to help.

Hat:	secteam
2013-12-28 23:52:49 +00:00
Olli Hauer
9736101e02 - mark as FORBIDDEN (zero day SQL vuln)
Security:	CVE-2013-7149
2013-12-22 17:49:46 +00:00
Xin LI
bae0ef49b6 Cover gnupg1 ports/packages as well. 2013-12-19 07:45:41 +00:00
Xin LI
7f12df195a Apply vendor fix for CVE-2013-6422, cURL libcurl cert name check ignore
with GnuTLS.  Document the vulnerability fix in vuxml while I'm here.
2013-12-18 23:04:24 +00:00
Jun Kuriyama
67024f3f29 Add about gnupg-1.4.16. 2013-12-18 15:22:59 +00:00
Florian Smeets
3c17028e1f - document asterisk vulnerabilities
- correctly order references [1]

Reported by:	remko [1]
2013-12-17 23:26:26 +00:00
Florian Smeets
2a861f63a5 - update to 2.8.4
- add stage support

Security:	3b86583a-66a7-11e3-868f-0025905a4771
2013-12-16 23:37:23 +00:00
Xin LI
0ecbf31857 Document Zabbix agent remote command execution vulnerability. 2013-12-16 04:11:00 +00:00
Florian Smeets
6fbff9d8da Update to 5.3.28
Security:	47b4e713-6513-11e3-868f-0025905a4771
2013-12-14 23:30:36 +00:00
Florian Smeets
7efa77ad7c Update to nspr 4.10.2
Update to nss 3.15.3.1
Update firefox-esr and thunderbird to 24.2.0
Update firefox to 26.0
Update seamonkey to 2.23

- catch up with directory renames since USES=webplugins was introduced;
  fixes plugins not being automatically enabled after install
- linux-firefox and linux-seamonkey can play HTML5 audio [2][3] and
  measure about:memory usage, again
- dom.ipc.plugins.enabled->true no longer crash linux-firefox which makes
  some flash sites work again; as there's no nspluginwrapper in-between
  the infamous "youtube issue" never occurs
- install DEBUG with symbols [3] and describe the option better [4]
- enable dumping about:memory upon kill -65, kill -66 and GC/CC log
  upon kill -67 to a file under /tmp directory; linux-firefox uses
  kill -34, kill -35 and kill -36 respectively

PR:		ports/183861 [1]
PR:		ports/184006 [2]
PR:		ports/169896 [3]
PR:		ports/184285 [3]
PR:		ports/184286 [4]
Security:	dd116b19-64b3-11e3-868f-0025905a4771
In collaboration with: Jan Beich <jbeich@tormail.org>
2013-12-14 13:42:06 +00:00
Sunpoet Po-Chuan Hsieh
38ba327310 - Group affected packages
- Sort CVE
- Fix indent

Notified by:	remko
2013-12-10 19:45:12 +00:00
Timur I. Bakeyev
767e421d1a Add entry for net/samba* CVE-2012-6150 and CVE-2013-4408 2013-12-10 04:57:35 +00:00
Sunpoet Po-Chuan Hsieh
ce87faed91 - Document Rails vulnerability 2013-12-08 14:19:02 +00:00
Xin LI
03a36d917f Document drupal multiple vulnerabilities. 2013-12-06 00:38:50 +00:00
Rene Ladan
9d6e59c385 Document new vulnerabilities in www/chromium < 31.0.1650.63
Obtained from:	http://googlechromereleases.blogspot.nl/
2013-12-05 12:07:00 +00:00
Nicola Vitale
3604826cc9 - Document multiple XSS core vulnerabilities for Joomla!
(2.5.0 <= version <= 2.5.14, 3.0.0 <= version <= 3.1.5)
2013-12-05 00:00:11 +00:00
Alexey Dokuchaev
9da35e37cb Update to version 1.3.3, which fixes an important crashy bug: denial of
service (server) using forcefully crashed aircrafts.

While here, reduce the diffs between other OpenTTD's VuXML entries; and
limit build logs verbosity to bulk package builders (or batch builds).

PR:		ports/184434, ports/184435
Submitted by:	Ilya A. Arkhipov
Security:	CVE-2013-6411
2013-12-03 06:28:03 +00:00
Olli Hauer
37df5f700f - security update to 3.3.1
This is a maintenance release that fixes a serious bug in the built-in HTTP
server. It was discovered that the handle_request() routine did not properly
perform input sanitization which led into a number of security
vulnerabilities.

An unauthenticated, remote attacker could exploit this flaw to execute
arbitrary commands on the remote host.

All users still using older versions are advised to upgrade to this version,
which resolves this issue.

Approved by:	crees (maintainer, per PM)
Security:	620cf713-5a99-11e3-878d-20cf30e32f6d
2013-12-01 15:10:18 +00:00
Olli Hauer
4575763978 - security update subversion-1.8.5 / 1.7.14 [1]
- add vuxml entry
- let bindings ports load options file [2]

[1]
Version 1.8.5
(25 November 2013, from /branches/1.8.x)
http://svn.apache.org/repos/asf/subversion/tags/1.8.5

 User-visible changes:
  - Client-side bugfixes:
    * fix externals that point at redirected locations (issues #4428, #4429)
    * diff: fix assertion with move inside a copy (issue #4444)

  - Server-side bugfixes:
    * mod_dav_svn: Prevent crashes with some 3rd party modules (r1537360 et al)
    * mod_dav_svn: canonicalize paths properly (r1542071)
    * mod_authz_svn: fix crash of mod_authz_svn with invalid config (r1541432)
    * hotcopy: fix hotcopy losing revprop files in packed repos (issue #4448)

  - Other tool improvements and bugfixes:
    * mod_dontdothat: Fix the uri parser (r1542069 et al)

 Developer-visible changes:
  - General:
    * fix compilation with '--enable-optimize' with clang (r1534860)
    * fix copmpilation with debug build of BDB on Windows (r1501656, r1501702)
    * fix '--with-openssl' option when building on Windows (r1535139)
    * add test to fail when built against broken ZLib (r1537193 et al)

  - Bindings:
    * swig-rb: fix tests to run without installing on OS X (r1535161)
    * ctypes-python: build with compiler selected via configure (r1536537)

Version 1.7.14
(25 Nov 2013, from /branches/1.7.x)
http://svn.apache.org/repos/asf/subversion/tags/1.7.14

 User-visible changes:
  - Client- and server-side bugfixes:
    * fix assertion on urls of the form 'file://./' (r1516806)

  - Client-side bugfixes:
    * upgrade: fix an assertion when used with pre-1.3 wcs (r1530849)
    * ra_local: fix error with repository in Windows drive root (r1518184)
    * fix crash on windows when piped command is interrupted (r1522892)
    * fix externals that point at redirected locations (issues #4428, #4429)
    * diff: fix incorrect calculation of changes in some cases (issue #4283)
    * diff: fix errors with added/deleted targets (issues #4153, #4421)

  - Server-side bugfixes:
    * mod_dav_svn: Prevent crashes with some 3rd party modules (r1537360 et al)
    * fix OOM on concurrent requests at threaded server start (r1527103 et al)
    * fsfs: limit commit time of files with deep change histories (r1536790)
    * mod_dav_svn: canonicalize paths properly (r1542071)

  - Other tool improvements and bugfixes:
    * mod_dontdothat: Fix the uri parser (r1542069 et al)

 Developer-visible changes:
  - Bindings:
    * javahl: canonicalize path for streamFileContent method (r1524869)

[2]
- Set OPTIONS_NAME to let bindings ports load the new options file.
  Leave OPTIONSFILE for now to load the old file on systems where
  it hasn't been moved to the new location yet.
- Remove an old hack.

PR:		ports/180612 [2]
Submitted by:	Tijl Coosemans <tijl@FreeBSD.org>
Security:	e3244a7b-5603-11e3-878d-20cf30e32f6d
		CVE-2013-4505
		CVE-2013-4558
2013-11-25 19:52:24 +00:00
Remko Lodder
89d3b1bb6f Make it more clear that "SAME URL" is actually the blockquote
url.

hat:	secteam
2013-11-25 06:56:07 +00:00
Steve Wills
ff3927ce14 - Update devel/ruby-gems to 1.8.28
- Document security issues with 1.8.26 and 1.8.27 (CVE-2013-4287 and CVE-2013-4363)

Security:	742eb9e4-e3cb-4f5a-b94e-0e9a39420600
Security:	54237182-9635-4a8b-92d7-33bfaeed84cd
2013-11-24 05:36:28 +00:00
Steve Wills
f38a81fc62 - Fix and report heap overflow in floating point parsing issue in ruby
Security:	cc9043cf-7f7a-426e-b2cc-8d1980618113
2013-11-23 03:10:04 +00:00
Timur I. Bakeyev
5e5d7b5345 Add entries about CVE-2013-4475 and CVE-2013-4476 for net/samba* ports. 2013-11-19 23:11:40 +00:00
Sergey A. Osokin
0284c03dfd Document new vulnerability in www/nginx (< 1.4.4) and www/nginx-devel (< 1.5.7). 2013-11-19 17:54:53 +00:00
Eitan Adler
264b047bfa Add back NO_STAGE which snuck away during testing. 2013-11-17 02:25:24 +00:00