Commit graph

3010 commits

Author SHA1 Message Date
Eygene Ryabinkin
ef77f594fb VuXML: document buffer overflow in ettercap (CVE-2013-0722)
Reviewed by:	simon@
2013-01-16 19:13:31 +00:00
Eygene Ryabinkin
9353bf58bf VuXML: document recent security manager bypass in Java 7.x
Reviewed by:	glewis@, simon@
2013-01-16 19:11:43 +00:00
Xin LI
15f1217b86 Properly limit the match for PHP 5.3.x and 5.2.x versions.
Noticed by:	remko
2013-01-16 07:39:27 +00:00
Xin LI
29ec9c184b Apply version ranges of php53 and php52 to php5 as well. 2013-01-15 22:06:19 +00:00
Ryan Steinmetz
780c794649 - Fix discovery date on nagios vulnerability (CVE-2012-6096) 2013-01-11 14:11:27 +00:00
Eygene Ryabinkin
dfb4aa68fa www/squid3x: upgrade to 3.1.23 and 3.2.6
Squid 3.1.23 is effectively Squid 3.1.22_2 with the final fix for
CVE-2012-5643 applied.

Squid 3.2.6 also received that abovementioned fix, but in comparison
with 3.2.5 from ports it has another change that fixes handling the
"tcp_outgoing_tos" directive for BSD-like systems, including FreeBSD,
  http://bugs.squid-cache.org/show_bug.cgi?id=3731

VuXML entry for SQUID:2012-1 (aka CVE-2012-5643) was also updated to
reflect the proper version specifications from the updated advisory,
  http://www.squid-cache.org/Advisories/SQUID-2012_1.txt

Approved by:	Thomas-Martin Seck <tmseck@web.de>
Security:	http://portaudit.freebsd.org/c37de843-488e-11e2-a5c9-0019996bc1f7.html
QA page:	http://codelabs.ru/fbsd/ports/qa/www/squid31/3.1.23
QA page:	http://codelabs.ru/fbsd/ports/qa/www/squid32/3.2.6
2013-01-11 09:53:41 +00:00
Ryan Steinmetz
61dff6701a - Document vulnerability in net-mgmt/nagios (CVE-2012-6096) 2013-01-11 01:16:14 +00:00
Rene Ladan
714b96e33c Document vulnerabilities in www/chromium < 24.0.1312.52
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
2013-01-11 00:32:48 +00:00
Florian Smeets
fc9eea7212 - update firefox, thunderbird, linux-firefox and linux-thunderbird to 17.0.2
- update firefox-esr, thunderbird-esr and libxul to 10.0.12
- update linux-seamonkey to 2.15

Security:	http://www.vuxml.org/freebsd/a4ed6632-5aa9-11e2-8fcb-c8600054b392.html
2013-01-09 23:28:19 +00:00
Sergey Matveychuk
abf896d430 Fix <topic> style: common dash style, remove softvare versions 2013-01-09 15:03:01 +00:00
Steve Wills
039ae3caa9 - Update rubygem-rails to 3.2.11
- Update ports require by rubygem-rails
- Add vuxml entry for rails security issues

Security:	ca5d3272-59e3-11e2-853b-00262d5ed8ee
Security:	b4051b52-58fa-11e2-853b-00262d5ed8ee
2013-01-09 03:53:15 +00:00
Ryan Steinmetz
6d7ff3db8d - Properly copy namespace attributes/resolve make validate issues
Reviewed by:	simon@, eadler@
Approved by:	zi (with ports-secteam hat)
2013-01-08 23:46:02 +00:00
Li-Wen Hsu
9e8220759f Document Jenkins 2013-01-04 Security Advisory 2013-01-08 05:18:14 +00:00
Eygene Ryabinkin
10329684c5 VuXML: extend entry for MoinMoin vulnerabilities fixed in 1.9.6
Use more verbose descriptions from CVE entries and trim citation
from CHANGES to the relevant parts.
2013-01-06 20:37:24 +00:00
Li-Wen Hsu
ea30109921 Document Django 2012-12-10 vulnerabilty 2013-01-06 18:14:23 +00:00
Eygene Ryabinkin
f23d543f2c VuXML: fix r309982
Use proper tags for CVE identifiers.  I should run 'make validate'
_every_ time before committing.
Pointyhat to:	rea
2013-01-06 13:24:39 +00:00
Eygene Ryabinkin
5160c1cd21 VuXML for MoinMoin issues: add CVE references 2013-01-06 13:10:10 +00:00
Chris Rees
6e35983b99 Freetype 2.4.8 vulnerabilities were already documented.
While here, correct pkgname

Noticed by:	kwm
2013-01-05 12:54:28 +00:00
Chris Rees
d3b77c45e6 Mark moinmoin vulnerable
Security:	http://www.debian.org/security/2012/dsa-2593

document freetype vulnerabilities

Security:	CVE-2012-(1126-1144)
2013-01-05 11:29:00 +00:00
Erwin Lansing
cf6de2da7f Bump copyright to 2013. 2013-01-04 07:30:09 +00:00
Florian Smeets
a3056ea587 Add correct version numbers to the recent asterisk entry
Pointy hat to:	flo
2013-01-03 19:46:51 +00:00
Florian Smeets
9a4203f7ce - update net/asterisk to 1.8.19.1
- update net/asterisk10 to 10.11.1
- update net/asterisk11 to 10.1.2
- add vuln.xml entry

Security:	f7c87a8a-55d5-11e2-a255-c8600054b392
2013-01-03 19:41:30 +00:00
Chris Rees
b9dc70b62d Note charybdis and ircd-ratbox vulnerabilities
PR:		ports/174878
Security:	http://www.ratbox.org/ASA-2012-12-31.txt
2013-01-02 12:28:47 +00:00
Anders Nordby
551bf88c0c Separate entries for Puppet 2.6 and 2.7. 2012-12-30 23:13:04 +00:00
Carlo Strub
320f705698 Add OTRS vulnerabilities 2012-12-30 20:10:42 +00:00
Eygene Ryabinkin
13301f3509 VuXML entries for Tomcat: split into three distinct ones
They affect different Tomcat versions from 7.x branch, so don't let
users of VuXML be fooled on the affected software for each vulnerability.

Feature safe:	yes
2012-12-29 19:53:46 +00:00
Eygene Ryabinkin
084838b8d4 VuXML: add entry for DoS in Squid's cachemgr.cgi
Feature safe:	yes
Submitted by:	Thomas-Martin Seck <tmseck@web.de>
2012-12-28 18:17:22 +00:00
Bryan Drewery
cc2cf11162 Remove invalid entry 2012-12-18 16:34:14 +00:00
Dirk Meyer
561707aef4 - add entry for opera 12.11 2012-12-18 16:28:56 +00:00
Xin LI
9629a9dd1e Fix typo.
Noticed by:	mandree
2012-12-14 09:09:16 +00:00
Jason Helfman
72222c2042 - add url block in references for 1657a3e6-4585-11e2-a396-10bf48230856 2012-12-14 03:51:07 +00:00
Xin LI
0dcdb66111 Update linux-f10-flashpulgin11 to 11.2r202.258 to address multiple
vulnerabilities that could cause a crash and potentially allow an
attacker to take control of the affected system.

Submitted by:	Tsurutani Naoki <turutani scphys kyoto-u ac jp>
2012-12-14 00:41:42 +00:00
Rene Ladan
589167d795 Document vulnerabilities in www/chromium < 23.0.1271.97
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
2012-12-12 11:33:16 +00:00
Ryan Steinmetz
69ba078f35 - Fix recent vulnerability entry for www/tomcat[67]
Reported by:	Victor Balada Diaz <victor@bsdes.net>
Feature safe:	yes
2012-12-05 23:52:35 +00:00
Ryan Steinmetz
2705e94e03 - Document recent vulnerabilities in www/tomcat6 and www/tomcat7
Requested by:	Victor Balada Diaz <victor@bsdes.net>
Feature safe:	yes
2012-12-05 18:47:24 +00:00
Erwin Lansing
f7345394fe Update to the latest patch level from ISC:
BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
  vulnerable to a software defect that allows a crafted query to
  crash the server with a REQUIRE assertion failure.  Remote
  exploitation of this defect can be achieved without extensive
  effort, resulting in a denial-of-service (DoS) vector against
  affected servers.

Security:	2892a8e2-3d68-11e2-8e01-0800273fe665
		CVE-2012-5688
Feature safe:	yes
2012-12-05 07:46:03 +00:00
Matthias Andree
905a78cc66 Add URL for recent bogofilter heap vuln', CVE-2012-5468, aka. vuln vid=
f524d8e0-3d83-11e2-807a-080027ef73ec

Feature safe: yes
2012-12-03 22:49:42 +00:00
Matthias Andree
d8c09eec63 Update bogofilter to new upstream release 1.2.3.
Security update to fix a heap corruption bug with invalid base64 input,
reported and fixed by Julius Plenz, FU Berlin, Germany.

Feature safe:   yes
Security:       CVE-2012-5468
Security:       f524d8e0-3d83-11e2-807a-080027ef73ec
2012-12-03 20:16:21 +00:00
Rene Ladan
c68f649d19 Document vulnerabilities in www/chromium < 23.0.1271.95
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-11-30 09:13:32 +00:00
Olli Hauer
ef2bdd9595 www/yahoo-ui
- fix CVE-2012-5881

security/vuxml
 - adjust version (we have only 2.8.2 in the tree)

Feature safe: yes

Approved by:	glarkin (maintainer) explicit
2012-11-29 20:33:19 +00:00
Wesley Shields
ff9560f056 Fix date in yahoo-ui entry.
Noticed by:	dvl@
Feature safe:	yes
2012-11-28 14:37:24 +00:00
Olli Hauer
3bcd3fdd25 - document www/yahoo-ui security issue and mark port forbidden [1]
pet portlint (maintainer is already notified)

- adjust CVE entries for bugzilla (CVE-2012-5475 was rejected) [2]

Feature safe: yes

Security:	CVE-2012-5881 [1][2]
		CVE-2012-5882 [1][2]
		CVE-2012-5883 [2]

Approved by:	glarkin (implicit) [1]
2012-11-27 20:09:34 +00:00
Rene Ladan
11e9990c10 Describe new vulnerabilities in www/chromium < 23.0.1271.91
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-11-27 10:02:25 +00:00
Florian Smeets
abbf32d4b2 - Update backports patch to 20121114
- Bump PORTREVISION

Changes:
- CVE-2006-7243
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow
context-dependent attackers to bypass intended access restrictions by placing a
safe file extension after this character, as demonstrated by .php\0.jpg at the
end of the argument to the file_exists function

Secuity 3761df02-0f9c-11e0-becc-0022156e8794 fixed by check in fopen functions
for strlen(filename) != filename_len

- CVE-2012-4388
The sapi_header_op function in main/SAPI.c does not properly determine a pointer
during checks for %0D sequences (aka carriage return characters), which allows
remote attackers to bypass an HTTP response-splitting protection mechanism via a
crafted URL, this vulnerability exists because of an incorrect fix for
CVE-2011-1398.

- Timezone database updated to version 2012.9 (2012i)

PR:		ports/173685
Submitted by:	Svyatoslav Lempert <svyatoslav.lempert@gmail.com>
Approved by:	maintainer
Feature safe:	yes
2012-11-25 15:42:22 +00:00
Wesley Shields
5fb60dc50f Add entries for the following advisories:
FreeBSD-SA-12:08.linux
FreeBSD-SA-12:07.hostapd
FreeBSD-SA-12:06.bind

Feature safe:	yes
2012-11-25 04:02:28 +00:00
Dirk Meyer
96e5bf3440 - opera -- execution of arbitrary code
Feature safe: yes
2012-11-22 20:27:45 +00:00
Martin Matuska
1d8470b15e Document new vulnerability in www/lighttpd 1.4.31
Feature safe:	yes
2012-11-21 14:35:31 +00:00
Florian Smeets
9aafe503d0 - Update firefox and thunderbird to 17.0
- Update seamonkey to 2.14
- Update ESR ports and libxul to 10.0.11
- support more h264 codecs when using GSTREAMER with YouTube
- Unbreak firefox-esr, thunderbird-esr and libxul on head >= 1000024 [1]
- Buildsystem is not python 3 aware, use python up to 2.7 [2]

PR:		ports/173679 [1]
Submitted by:	swills [1], demon [2]
In collaboration with:	Jan Beich <jbeich@tormail.org>
Security:	d23119df-335d-11e2-b64c-c8600054b392
Approved by:	portmgr (beat)
Feature safe:	yes
2012-11-20 23:01:15 +00:00
Jase Thew
04822a6d48 - Fix copy and paste error in latest weechat entry
(81826d12-317a-11e2-9186-406186f3d89d)

Feature safe:	yes
2012-11-18 12:51:26 +00:00
Jase Thew
7d1870cfd5 - Document new vulnerability in irc/weechat and irc/weechat-devel
Feature safe:	yes
2012-11-18 12:46:39 +00:00
Olli Hauer
bb7daf8882 - bugzilla security updates to version(s)
3.6.11, 4.0.8, 4.2.4

Summary
=======

The following security issues have been discovered in Bugzilla:

* Confidential product and component names can be disclosed to
  unauthorized users if they are used to control the visibility of
  a custom field.

* When calling the 'User.get' WebService method with a 'groups'
  argument, it is possible to check if the given group names exist
  or not.

* Due to incorrectly filtered field values in tabular reports, it is
  possible to inject code which can lead to XSS.

* When trying to mark an attachment in a bug you cannot see as
  obsolete, the description of the attachment is disclosed in the
  error message.

* A vulnerability in swfstore.swf from YUI2 can lead to XSS.

Feature safe: yes

Security:	CVE-2012-4199
		https://bugzilla.mozilla.org/show_bug.cgi?id=731178

		CVE-2012-4198
		https://bugzilla.mozilla.org/show_bug.cgi?id=781850

		CVE-2012-4189
		https://bugzilla.mozilla.org/show_bug.cgi?id=790296

		CVE-2012-4197
		https://bugzilla.mozilla.org/show_bug.cgi?id=802204

		CVE-2012-5475
		https://bugzilla.mozilla.org/show_bug.cgi?id=808845
		http://yuilibrary.com/support/20121030-vulnerability/
2012-11-14 19:29:42 +00:00
Jase Thew
fe3e63dcfc - Update recent weechat entry (e02c572f-2af0-11e2-bb44-003067b2972c)
- Document assigned CVE Identifier
- Document workaround for vulnerable versions

Feature safe:	yes
2012-11-13 18:17:13 +00:00
Rene Ladan
616eda309b Document vulnerabilities in two typo3 components.
Obtained from:	http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005/
Feature safe:	yes
2012-11-12 21:47:27 +00:00
Guido Falsi
edee9b21b3 Fix typo.
Feature safe:	yes
2012-11-12 13:07:30 +00:00
Guido Falsi
864702607f - Update to 2.7.1
- Convert to new options framework
- Document US-CERT VU#268267
- Trim Makefile headers

PR:		ports/173226
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp> (maintainer)
Feature safe:	yes
2012-11-12 13:04:37 +00:00
Steve Wills
80df39460a - Improve latest ruby entry slightly
Feature safe:	yes
2012-11-10 15:17:31 +00:00
Jase Thew
b5f3820240 - Modify recent e02c572f-2af0-11e2-bb44-003067b2972c entry
- Add constraints to vulnerable versions
- Add additional references
- Improve topic
- Correct description

Feature safe:	yes
2012-11-10 14:45:55 +00:00
Eitan Adler
236f5555af Apply an upstream patch that fixes a security hole
when receiving a special colored message.

The maintainer was contacted but due to the nature of
the issue apply the patch ASAP.

Approved by:	secteam-ports (swills)
Security:	e02c572f-2af0-11e2-bb44-003067b2972c
Feature safe:	yes
2012-11-10 04:55:47 +00:00
Steve Wills
dd14410e21 - Update lang/ruby19 to 1.9.3p327
- Document security issue in earlier versions

Security:	5e647ca3-2aea-11e2-b745-001fd0af1a4c
Feature safe:	yes
2012-11-10 04:00:41 +00:00
Jason Helfman
90461f79f5 - clarification that ASF reported issue for:
- 152e4c7e-2a2e-11e2-99c7-00a0d181e71d
 - 4ca26574-2a2c-11e2-99c7-00a0d181e71d

Feature safe:	yes
2012-11-09 23:02:15 +00:00
Jason Helfman
c5d5f48eb2 - document tomcat vulnerabilities
Feature safe:	yes
2012-11-09 19:09:32 +00:00
Eitan Adler
528c35064c Update latest version and document security issues
PR:	ports/173487
Submitted by:	 Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp>
Security:	4b8b748e-2a24-11e2-bb44-003067b2972c
Feature safe:	yes
2012-11-09 04:31:13 +00:00
Rene Ladan
98f8f6fd1f Document new vulnerabilities in www/chromium < 23.0.1271.64
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-11-07 10:15:19 +00:00
Chris Rees
a17bd43f2f Document opera vulnerabilities
Feature safe:	yes
2012-11-06 20:45:14 +00:00
Eitan Adler
ec57b7c60d Fix minor typo
Feature safe:	yes
2012-11-05 17:55:45 +00:00
Eitan Adler
d4f766c819 Update latest version and document security issues
PR:	ports/172619
Submitted by:	tijl
Security:	36533a59-2770-11e2-bb44-003067b2972c
Feature safe:	yes
2012-11-05 17:53:51 +00:00
Chris Rees
614a28ba15 Correct plural of "vulnerability"
Feature safe:	yes
2012-11-03 11:59:52 +00:00
Olli Hauer
6ce2ba945d - update apache22 to version 2.22.23
- trim vuxml/Makefile header

with hat apache@

Feature safe: yes

Security:       CVE-2012-2687
2012-11-02 18:45:31 +00:00
Jimmy Olgeni
3ec23a27f5 Add entry for webmin < 1.600_1 (potential XSS attack).
Feature safe:	yes
2012-11-02 18:08:19 +00:00
Bryan Drewery
02b8160c5a - Document ruby vulnerabilities:
* CVE-2012-4464 + CVE-2012-4466
   $SAFE escaping vulnerability about Exception#to_s / NameError#to_s
 * CVE-2012-4522
   Unintentional file creation caused by inserting an illegal NUL character

Reviewed by:	eadler
Feature safe:	yes
2012-11-02 03:17:18 +00:00
Florian Smeets
1345402cf6 Update to 3.8.15
Security:	4b738d54-2427-11e2-9817-c8600054b392
Feature safe:	yes
2012-11-01 14:10:55 +00:00
Ruslan Makhmatkhanov
25b9c14558 - update to 7.16 [1]
while here:
- trim Makefile header
- remove indefinite article in COMMENT
- remove IGNORE_WITH_PHP and IGNORE_WITH_PGSQL since
  we have not this versions in the tree anymore
- fix pkg-plist
- add vuxml entry

PR:		173211
Submitted by:	Rick van der Zwet <info at rickvanderzwet dot nl> [1]
Approved by:	Nick Hilliard <nick at foobar dot org> (maintainer)
Security:	2adc3e78-22d1-11e2-b9f0-d0df9acfd7e5
Feature safe:   yes
2012-10-30 21:01:16 +00:00
Florian Smeets
912a7b12e4 - Update www/firefox{,-i18n} to 16.0.2
- Update seamonkey to 2.13.2
- Update ESR ports and libxul to 10.0.10
- Update nspr to 4.9.3
- Update nss to 3.14
- with GNOMEVFS2 option build its extension, too [1]
- make heap-committed and heap-dirty reporters work in about:memory
- properly mark QT4 as experimental (needs love upstream)
- *miscellaneous cleanups and fixups*

mail/thunderbird will be updated once the tarballs are available.

PR:		ports/173052 [1]
Security:	6b3b1b97-207c-11e2-a03f-c8600054b392
Feature safe:	yes
In collaboration with:	Jan Beich <jbeich@tormail.org>
2012-10-28 17:03:28 +00:00
Eygene Ryabinkin
98cf8cbd46 mail/exim: upgrade to 4.80.1
This is bugfix-only release, it eliminates remote code execution
in the DKIM code.

Security: http://www.vuxml.org/freebsd/b0f3ab1f-1f3b-11e2-8fe9-0022156e8794.html
QA page: http://codelabs.ru/fbsd/ports/qa/mail/exim/4.80.1
Feature safe: yes
2012-10-26 08:46:40 +00:00
Ruslan Makhmatkhanov
339aa6e578 - add CVE reference (still in reserved state) for recent django vulnerabilty
Feature safe:	yes
2012-10-25 19:31:50 +00:00
Ruslan Makhmatkhanov
600314693a - update django ports to 1.3.4 and 1.4.2, that fixing couple of security issues.
All users are encouraged to upgrade immediately.
- add vuxml entry

changes common for both ports:
- trim Makefile header
- strict python version to 2.x only
- utilize options framework multiple choice feature to let user to choose
  database backends needed. Make SQLITE option default
- shorten description of HTMLDOCS_DESC to make it fit into dialog screen
- SITELIBDIR -> PKGNAMEPREFIX change in dependencies
- convert NOPORTDOCS condition to optionsng
- tab -> space change in pkg-descr

PR:		173017
Submitted by:	rm (myself)
Approved by:	lwhsu (maintainer, by mail)
Security:	5f326d75-1db9-11e2-bc8f-d0df9acfd7e5
Feature safe:   yes
2012-10-25 10:12:42 +00:00
Wesley Shields
1f75ec0a67 Document multiple wireshark vulnerabilities.
Feature safe:	yes
2012-10-22 02:37:07 +00:00
Jason Helfman
bbcfa83bf7 - clarify end-user impact for 57652765-18aa-11e2-8382-00a0d181e71d
Suggested by:	simon@
Feature safe:	yes
2012-10-18 04:13:27 +00:00
Jason Helfman
3e1fd09f4a - document xlockmore issue, 57652765-18aa-11e2-8382-00a0d181e71d, CVE-2012-4524
Feature safe:	yes
2012-10-17 23:47:27 +00:00
Sergey Matveychuk
2ae50166b4 - xinetd vulnerability
Feature safe:	yes
2012-10-17 17:22:51 +00:00
Greg Larkin
1aba59f53d - Updated ZF advisory to include similar XEE vulnerability
Feature safe:	yes
2012-10-16 14:37:50 +00:00
Greg Larkin
fc2b1f04c7 - Document Zend Framework XXE injection vulnerability
Feature safe:	yes
2012-10-16 14:26:07 +00:00
Eitan Adler
478a532c8f Update the distinfo as upstream has changed.
I verfied this to be same content as the old version modulo the copyright.

Approved by:	secteam (implicit)
Feature safe:	yes
2012-10-15 22:31:39 +00:00
Eitan Adler
8baf6a3603 Add the CVE for the gitolite vuln.
Feature safe:	yes
2012-10-15 16:31:39 +00:00
Steve Wills
e106672073 - Actually commit the VuXML entry
PR:		ports/172565
Feature safe:	yes
Pointyhat to:	swills
2012-10-15 16:02:12 +00:00
Matthew Seaman
36d4653ed4 Document the latest security vulnerabilities for phpMyAdmin.
Fix was already committed to the port 6 days ago.

Feature safe:	yes
2012-10-14 21:05:33 +00:00
Ryan Steinmetz
8547d1b97b - Add in additional package names for recent bind vulnerability
Feature safe:	yes
2012-10-14 15:30:47 +00:00
Florian Smeets
809698066e - update to 16.0.1
- update vuln.xml entry

Feature safe:   yes
2012-10-11 19:15:12 +00:00
Rene Ladan
f789f9d2e3 Document a new vulnerability in www/chromium < 22.0.1229.94
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
Feature safe:	yes
2012-10-10 22:06:59 +00:00
Florian Smeets
98ff1f74fb - Update firefox-esr, thunderbird-esr, linux-firefox and linux-thunderbird to 10.0.8
- Update firefox and thunderbird to 16.0
- Update seamonkey to 2.13
- Update all -i18n ports respectively
- switch firefox 16.0 and seamonkey 2.13 to ALSA by default for better
  latency during pause and seeking with HTML5 video
- remove fedisableexcept() hacks, obsolete since FreeBSD 4.0
- support system hunspell dictionaries [1]
- unbreak -esr ports with clang3.2 [2]
- unbreak nss build when CC contains full path [3]
- remove GNOME option grouping [4]
- integrate enigmail into thunderbird/seamonkey as an option [5]
- remove mail/enigmail* [6]
- enable ENIGMAIL, LIGHTNING and GIO options by default
- add more reporters in about:memory: page-faults-hard, page-faults-soft,
  resident, vsize
- use bundled jemalloc 3.0.0 on FreeBSD < 10.0 for gecko 16.0,
  only heap-allocated reporter works in about:memory (see bug 762445)
- use lrintf() instead of slow C cast in bundled libopus
- use libjpeg-turbo's faster color conversion if available during build
- record startup time for telemetry
- use -z origin instead of hardcoding path to gecko runtime
- fail early if incompatible libxul version is installed (in USE_GECKO)
- *miscellaneous cleanups and fixups*

PR:		ports/171534 [1]
PR:		ports/171566 [2]
PR:		ports/172164 [3]
PR:		ports/172201 [4]
Discussed with:	ale, beat, Jan Beich [5]
Approved by:	ale [6]
In collaboration with:	Jan Beich <jbeich@tormail.org>
Security:	6e5a9afd-12d3-11e2-b47d-c8600054b392
Feature safe:	yes
Approved by:	portmgr (beat)
2012-10-10 21:13:06 +00:00
Erwin Lansing
b6095ca45c Upgrade to the latest BIND patch level:
A deliberately constructed combination of records could cause named
to hang while populating the additional section of a response.

Security:	  http://www.vuxml.org/freebsd/57a700f9-12c0-11e2-9f86-001d923933b6.html
2012-10-10 11:54:44 +00:00
Rene Ladan
f7c717bc10 Document new vulnerabilities in www/chromium < 22.0.1229.92
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
2012-10-08 20:45:52 +00:00
Ruslan Makhmatkhanov
4841bb2ab4 - correct the range in last entry (le/lt typo) 2012-10-03 12:51:11 +00:00
Ruslan Makhmatkhanov
db8657349b - update to 2.8.10
- add vuxml entry

This release fixes SQL injection vulnerability.

PR:		172114
Submitted by:	rm (myself)
Approved by:	ports-secteam (eadler)
Security:	dee44ba9-08ab-11e2-a044-d0df9acfd7e5
2012-10-03 12:33:38 +00:00
Alexey Dokuchaev
1b2184a6e2 Mark nvidia-driver-173.14.35_1 as not vulnerable. 2012-09-27 17:01:15 +00:00
Rene Ladan
33d8b6f06a Document vulnerabilities in www/chromium < 22.0.1229.79
Obtained from:	http://googlechromereleases.blogspot.nl/search/label/Stable%20updates
2012-09-26 21:49:34 +00:00
Greg Larkin
7e63d892dd - Document remote code execution in ePerl (all versions)
- Deprecate and schedule removal in month - no upstream fix available and
  no active development since 1998

Security:	73efb1b7-07ec-11e2-a391-000c29033c32
Security:	CVE-2001-0733
Security:	http://www.shmoo.com/mail/bugtraq/jun01/msg00286.shtml
2012-09-26 15:37:58 +00:00
Greg Larkin
48491c1b2f - Documented PNG file DoS vulnerability in ImageMagick and GraphicsMagick
- Added -nox11 suffixes to various ImageMagick entries
2012-09-25 21:41:50 +00:00
Eitan Adler
8482c96c94 Update vuxml to indicate which versions are vulnerable. 2012-09-23 12:27:22 +00:00
Bryan Drewery
8405f4c7b3 - Update php52 backports patch to 20120911
- Add and update relevant vuxml entries

Changes:
  - CVE-2011-1398 - The sapi_header_op function in main/SAPI.c in PHP
    before 5.3.11 does not properly handle %0D sequences
  - CVE-2012-0789 - Memory leak in the timezone functionality in PHP
    before 5.3.9 allows remote attackers to cause a denial of service
    (memory consumption) by triggering many strtotime function calls,
    which are not properly handled by the php_date_parse_tzfile cache.
  - CVE-2012-3365 - The SQLite functionality in PHP before 5.3.15 allows
    remote attackers to bypass the open_basedir protection mechanism via
     unspecified vectors
  - Timezone database updated to version 2012.5 (2012e) (from 2011.13 (2011m))
  - Minor improvements (CVE-2012-2688, compilation issues with old GCC)

PR:		ports/171583
Submitted by:	Svyatoslav Lempert <svyatoslav.lempert@gmail.com>
Approved by:	Alex Keda <admin@lissyara.su> (maintainer)
2012-09-20 03:02:43 +00:00