Commit graph

2953 commits

Author SHA1 Message Date
Rene Ladan
714b96e33c Document vulnerabilities in www/chromium < 24.0.1312.52
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
2013-01-11 00:32:48 +00:00
Florian Smeets
fc9eea7212 - update firefox, thunderbird, linux-firefox and linux-thunderbird to 17.0.2
- update firefox-esr, thunderbird-esr and libxul to 10.0.12
- update linux-seamonkey to 2.15

Security:	http://www.vuxml.org/freebsd/a4ed6632-5aa9-11e2-8fcb-c8600054b392.html
2013-01-09 23:28:19 +00:00
Sergey Matveychuk
abf896d430 Fix <topic> style: common dash style, remove softvare versions 2013-01-09 15:03:01 +00:00
Steve Wills
039ae3caa9 - Update rubygem-rails to 3.2.11
- Update ports require by rubygem-rails
- Add vuxml entry for rails security issues

Security:	ca5d3272-59e3-11e2-853b-00262d5ed8ee
Security:	b4051b52-58fa-11e2-853b-00262d5ed8ee
2013-01-09 03:53:15 +00:00
Ryan Steinmetz
6d7ff3db8d - Properly copy namespace attributes/resolve make validate issues
Reviewed by:	simon@, eadler@
Approved by:	zi (with ports-secteam hat)
2013-01-08 23:46:02 +00:00
Li-Wen Hsu
9e8220759f Document Jenkins 2013-01-04 Security Advisory 2013-01-08 05:18:14 +00:00
Eygene Ryabinkin
10329684c5 VuXML: extend entry for MoinMoin vulnerabilities fixed in 1.9.6
Use more verbose descriptions from CVE entries and trim citation
from CHANGES to the relevant parts.
2013-01-06 20:37:24 +00:00
Li-Wen Hsu
ea30109921 Document Django 2012-12-10 vulnerabilty 2013-01-06 18:14:23 +00:00
Eygene Ryabinkin
f23d543f2c VuXML: fix r309982
Use proper tags for CVE identifiers.  I should run 'make validate'
_every_ time before committing.
Pointyhat to:	rea
2013-01-06 13:24:39 +00:00
Eygene Ryabinkin
5160c1cd21 VuXML for MoinMoin issues: add CVE references 2013-01-06 13:10:10 +00:00
Chris Rees
6e35983b99 Freetype 2.4.8 vulnerabilities were already documented.
While here, correct pkgname

Noticed by:	kwm
2013-01-05 12:54:28 +00:00
Chris Rees
d3b77c45e6 Mark moinmoin vulnerable
Security:	http://www.debian.org/security/2012/dsa-2593

document freetype vulnerabilities

Security:	CVE-2012-(1126-1144)
2013-01-05 11:29:00 +00:00
Erwin Lansing
cf6de2da7f Bump copyright to 2013. 2013-01-04 07:30:09 +00:00
Florian Smeets
a3056ea587 Add correct version numbers to the recent asterisk entry
Pointy hat to:	flo
2013-01-03 19:46:51 +00:00
Florian Smeets
9a4203f7ce - update net/asterisk to 1.8.19.1
- update net/asterisk10 to 10.11.1
- update net/asterisk11 to 10.1.2
- add vuln.xml entry

Security:	f7c87a8a-55d5-11e2-a255-c8600054b392
2013-01-03 19:41:30 +00:00
Chris Rees
b9dc70b62d Note charybdis and ircd-ratbox vulnerabilities
PR:		ports/174878
Security:	http://www.ratbox.org/ASA-2012-12-31.txt
2013-01-02 12:28:47 +00:00
Anders Nordby
551bf88c0c Separate entries for Puppet 2.6 and 2.7. 2012-12-30 23:13:04 +00:00
Carlo Strub
320f705698 Add OTRS vulnerabilities 2012-12-30 20:10:42 +00:00
Eygene Ryabinkin
13301f3509 VuXML entries for Tomcat: split into three distinct ones
They affect different Tomcat versions from 7.x branch, so don't let
users of VuXML be fooled on the affected software for each vulnerability.

Feature safe:	yes
2012-12-29 19:53:46 +00:00
Eygene Ryabinkin
084838b8d4 VuXML: add entry for DoS in Squid's cachemgr.cgi
Feature safe:	yes
Submitted by:	Thomas-Martin Seck <tmseck@web.de>
2012-12-28 18:17:22 +00:00
Bryan Drewery
cc2cf11162 Remove invalid entry 2012-12-18 16:34:14 +00:00
Dirk Meyer
561707aef4 - add entry for opera 12.11 2012-12-18 16:28:56 +00:00
Xin LI
9629a9dd1e Fix typo.
Noticed by:	mandree
2012-12-14 09:09:16 +00:00
Jason Helfman
72222c2042 - add url block in references for 1657a3e6-4585-11e2-a396-10bf48230856 2012-12-14 03:51:07 +00:00
Xin LI
0dcdb66111 Update linux-f10-flashpulgin11 to 11.2r202.258 to address multiple
vulnerabilities that could cause a crash and potentially allow an
attacker to take control of the affected system.

Submitted by:	Tsurutani Naoki <turutani scphys kyoto-u ac jp>
2012-12-14 00:41:42 +00:00
Rene Ladan
589167d795 Document vulnerabilities in www/chromium < 23.0.1271.97
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
2012-12-12 11:33:16 +00:00
Ryan Steinmetz
69ba078f35 - Fix recent vulnerability entry for www/tomcat[67]
Reported by:	Victor Balada Diaz <victor@bsdes.net>
Feature safe:	yes
2012-12-05 23:52:35 +00:00
Ryan Steinmetz
2705e94e03 - Document recent vulnerabilities in www/tomcat6 and www/tomcat7
Requested by:	Victor Balada Diaz <victor@bsdes.net>
Feature safe:	yes
2012-12-05 18:47:24 +00:00
Erwin Lansing
f7345394fe Update to the latest patch level from ISC:
BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
  vulnerable to a software defect that allows a crafted query to
  crash the server with a REQUIRE assertion failure.  Remote
  exploitation of this defect can be achieved without extensive
  effort, resulting in a denial-of-service (DoS) vector against
  affected servers.

Security:	2892a8e2-3d68-11e2-8e01-0800273fe665
		CVE-2012-5688
Feature safe:	yes
2012-12-05 07:46:03 +00:00
Matthias Andree
905a78cc66 Add URL for recent bogofilter heap vuln', CVE-2012-5468, aka. vuln vid=
f524d8e0-3d83-11e2-807a-080027ef73ec

Feature safe: yes
2012-12-03 22:49:42 +00:00
Matthias Andree
d8c09eec63 Update bogofilter to new upstream release 1.2.3.
Security update to fix a heap corruption bug with invalid base64 input,
reported and fixed by Julius Plenz, FU Berlin, Germany.

Feature safe:   yes
Security:       CVE-2012-5468
Security:       f524d8e0-3d83-11e2-807a-080027ef73ec
2012-12-03 20:16:21 +00:00
Rene Ladan
c68f649d19 Document vulnerabilities in www/chromium < 23.0.1271.95
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-11-30 09:13:32 +00:00
Olli Hauer
ef2bdd9595 www/yahoo-ui
- fix CVE-2012-5881

security/vuxml
 - adjust version (we have only 2.8.2 in the tree)

Feature safe: yes

Approved by:	glarkin (maintainer) explicit
2012-11-29 20:33:19 +00:00
Wesley Shields
ff9560f056 Fix date in yahoo-ui entry.
Noticed by:	dvl@
Feature safe:	yes
2012-11-28 14:37:24 +00:00
Olli Hauer
3bcd3fdd25 - document www/yahoo-ui security issue and mark port forbidden [1]
pet portlint (maintainer is already notified)

- adjust CVE entries for bugzilla (CVE-2012-5475 was rejected) [2]

Feature safe: yes

Security:	CVE-2012-5881 [1][2]
		CVE-2012-5882 [1][2]
		CVE-2012-5883 [2]

Approved by:	glarkin (implicit) [1]
2012-11-27 20:09:34 +00:00
Rene Ladan
11e9990c10 Describe new vulnerabilities in www/chromium < 23.0.1271.91
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-11-27 10:02:25 +00:00
Florian Smeets
abbf32d4b2 - Update backports patch to 20121114
- Bump PORTREVISION

Changes:
- CVE-2006-7243
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow
context-dependent attackers to bypass intended access restrictions by placing a
safe file extension after this character, as demonstrated by .php\0.jpg at the
end of the argument to the file_exists function

Secuity 3761df02-0f9c-11e0-becc-0022156e8794 fixed by check in fopen functions
for strlen(filename) != filename_len

- CVE-2012-4388
The sapi_header_op function in main/SAPI.c does not properly determine a pointer
during checks for %0D sequences (aka carriage return characters), which allows
remote attackers to bypass an HTTP response-splitting protection mechanism via a
crafted URL, this vulnerability exists because of an incorrect fix for
CVE-2011-1398.

- Timezone database updated to version 2012.9 (2012i)

PR:		ports/173685
Submitted by:	Svyatoslav Lempert <svyatoslav.lempert@gmail.com>
Approved by:	maintainer
Feature safe:	yes
2012-11-25 15:42:22 +00:00
Wesley Shields
5fb60dc50f Add entries for the following advisories:
FreeBSD-SA-12:08.linux
FreeBSD-SA-12:07.hostapd
FreeBSD-SA-12:06.bind

Feature safe:	yes
2012-11-25 04:02:28 +00:00
Dirk Meyer
96e5bf3440 - opera -- execution of arbitrary code
Feature safe: yes
2012-11-22 20:27:45 +00:00
Martin Matuska
1d8470b15e Document new vulnerability in www/lighttpd 1.4.31
Feature safe:	yes
2012-11-21 14:35:31 +00:00
Florian Smeets
9aafe503d0 - Update firefox and thunderbird to 17.0
- Update seamonkey to 2.14
- Update ESR ports and libxul to 10.0.11
- support more h264 codecs when using GSTREAMER with YouTube
- Unbreak firefox-esr, thunderbird-esr and libxul on head >= 1000024 [1]
- Buildsystem is not python 3 aware, use python up to 2.7 [2]

PR:		ports/173679 [1]
Submitted by:	swills [1], demon [2]
In collaboration with:	Jan Beich <jbeich@tormail.org>
Security:	d23119df-335d-11e2-b64c-c8600054b392
Approved by:	portmgr (beat)
Feature safe:	yes
2012-11-20 23:01:15 +00:00
Jase Thew
04822a6d48 - Fix copy and paste error in latest weechat entry
(81826d12-317a-11e2-9186-406186f3d89d)

Feature safe:	yes
2012-11-18 12:51:26 +00:00
Jase Thew
7d1870cfd5 - Document new vulnerability in irc/weechat and irc/weechat-devel
Feature safe:	yes
2012-11-18 12:46:39 +00:00
Olli Hauer
bb7daf8882 - bugzilla security updates to version(s)
3.6.11, 4.0.8, 4.2.4

Summary
=======

The following security issues have been discovered in Bugzilla:

* Confidential product and component names can be disclosed to
  unauthorized users if they are used to control the visibility of
  a custom field.

* When calling the 'User.get' WebService method with a 'groups'
  argument, it is possible to check if the given group names exist
  or not.

* Due to incorrectly filtered field values in tabular reports, it is
  possible to inject code which can lead to XSS.

* When trying to mark an attachment in a bug you cannot see as
  obsolete, the description of the attachment is disclosed in the
  error message.

* A vulnerability in swfstore.swf from YUI2 can lead to XSS.

Feature safe: yes

Security:	CVE-2012-4199
		https://bugzilla.mozilla.org/show_bug.cgi?id=731178

		CVE-2012-4198
		https://bugzilla.mozilla.org/show_bug.cgi?id=781850

		CVE-2012-4189
		https://bugzilla.mozilla.org/show_bug.cgi?id=790296

		CVE-2012-4197
		https://bugzilla.mozilla.org/show_bug.cgi?id=802204

		CVE-2012-5475
		https://bugzilla.mozilla.org/show_bug.cgi?id=808845
		http://yuilibrary.com/support/20121030-vulnerability/
2012-11-14 19:29:42 +00:00
Jase Thew
fe3e63dcfc - Update recent weechat entry (e02c572f-2af0-11e2-bb44-003067b2972c)
- Document assigned CVE Identifier
- Document workaround for vulnerable versions

Feature safe:	yes
2012-11-13 18:17:13 +00:00
Rene Ladan
616eda309b Document vulnerabilities in two typo3 components.
Obtained from:	http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005/
Feature safe:	yes
2012-11-12 21:47:27 +00:00
Guido Falsi
edee9b21b3 Fix typo.
Feature safe:	yes
2012-11-12 13:07:30 +00:00
Guido Falsi
864702607f - Update to 2.7.1
- Convert to new options framework
- Document US-CERT VU#268267
- Trim Makefile headers

PR:		ports/173226
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp> (maintainer)
Feature safe:	yes
2012-11-12 13:04:37 +00:00
Steve Wills
80df39460a - Improve latest ruby entry slightly
Feature safe:	yes
2012-11-10 15:17:31 +00:00
Jase Thew
b5f3820240 - Modify recent e02c572f-2af0-11e2-bb44-003067b2972c entry
- Add constraints to vulnerable versions
- Add additional references
- Improve topic
- Correct description

Feature safe:	yes
2012-11-10 14:45:55 +00:00