Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
1.1_1 27 Oct 2013 17:53:20 |
sunpoet |
- Document WordPress XSS vulnerability |
1.1_1 25 Oct 2013 16:52:51 |
jgh |
- Add url reference to 9065b930-3d8b-11e3-bd1a-e840f2096bd0
With Hat: ports-secteam |
1.1_1 25 Oct 2013 16:07:27 |
wg |
- Remove report url as it is a default CVE
Reported by: ak |
1.1_1 25 Oct 2013 15:55:41 |
wg |
- Document gnutls3 denial of service CVE |
1.1_1 24 Oct 2013 13:05:10 |
kwm |
Document xorg-server use after free CVE.
Reviewed by: zeising@ |
1.1_1 19 Oct 2013 08:27:56 |
delphij |
Document pycrypto PRNG reseed race condition. |
1.1_1 19 Oct 2013 03:54:52 |
swills |
- Add CVE references to WordPress 3.6.1 entry |
1.1_1 19 Oct 2013 03:40:48 |
swills |
- Note issues with WordPress before 3.6.1 |
1.1_1 19 Oct 2013 03:22:32 |
swills |
- node-devel packages is vulnerable too, guessing this is going to be fixed in
0.11.7, but if not, I'll update further. |
1.1_1 19 Oct 2013 02:48:02 |
swills |
- Update to 0.10.21 to address a security issue
PR: ports/183092
Submitted by: Kenji Rikitake <kenji.rikitake@acm.org>
Security: 206f9826-a06d-4927-9a85-771c37010b32 |
17 Oct 2013 19:35:22
|
ohauer |
- update to latest release [1]
- use PKGNAMESUFFIX instead LATEST_LINK
- whitespace cleanup
- svn mv */bugzilla to */bugzilla40
- add vuxml entry
4.4.1, 4.2.7, and 4.0.11 Security Advisory
Wednesday Oct 16th, 2013
Summary
=======
Bugzilla is a Web-based bug-tracking system used by a large number of
software projects. The following security issues have been discovered
in Bugzilla: (Only the first 15 lines of the commit message are shown above ) |
1.1_1 17 Oct 2013 12:43:19 |
des |
Fix build by commenting out the most recent of the two discovery
dates. |
1.1_1 17 Oct 2013 10:56:57 |
ak |
- Fix year, move entry up |
1.1_1 17 Oct 2013 10:46:54 |
ak |
- Document new vulnerabilities in security/dropbear |
1.1_1 15 Oct 2013 19:04:28 |
rene |
Document new vulnerabilities in www/chromium < 30.0.1599.101
Obtained from: http://googlechromereleases.blogspot.nl/ |
1.1_1 10 Oct 2013 20:02:42 |
ohauer |
- update mod_fcgid to version 2.3.9
- add stage support
- add vuxml entry
PR: ports/182878
Submitted by: Fabiano Sidler <freebsd.ports@webstyle.ch> (maintainer)
Security: CVE-2013-4365 |
1.1_1 05 Oct 2013 09:44:24 |
kuriyama |
Add recent gnupg1/gnupg vuln. |
1.1_1 03 Oct 2013 13:05:49 |
sem |
Document the last xinetd vulnerability |
1.1_1 01 Oct 2013 23:47:14 |
jase |
- Update to 1.2.9
- Add vuxml entry
- Prevent install target from copying patch backup files
Changes: https://raw.github.com/polarssl/polarssl/60ad84f43f46b0d3673eaca8b9847d7e01b83c5e/ChangeLog
Security: ccefac3e-2aed-11e3-af10-000c29789cb5
Security: CVE-2013-5915 |
1.1_1 01 Oct 2013 21:30:23 |
rene |
Document new vulnerabilities for www/chromium < 30.0.1599.66
Obtained from: http://googlechromereleases.blogspot.nl/ |
1.1_1 30 Sep 2013 20:55:51 |
delphij |
Our "package" can have multiple "name" elements. Since these packages are
from the same origin, they can be collapased into one entry. |
1.1_1 30 Sep 2013 19:40:29 |
brd (doc committer) |
- Add a low version to the graphite-web vuln
Approved by: swills@ |
1.1_1 30 Sep 2013 19:31:32 |
swills |
- Document graphite issue |
1.1_1 24 Sep 2013 13:55:56 |
tabthorpe |
- ebd877b9-7ef4-4375-b1fd-c67780581898 also applies to our ruby18
Reviewed by: swills |
1.1_1 22 Sep 2013 10:36:32 |
lwhsu |
Document CVE-2013-1443 for www/py-django{,14,-devel} |
1.1_1 22 Sep 2013 10:09:42 |
lwhsu |
- Split names for different packages
Notified by: remko |
1.1_1 20 Sep 2013 22:55:26 |
bapt |
Add NO_STAGE all over the place in preparation for the staging support (cat:
security) |
1.1_1 19 Sep 2013 08:29:16 |
rm |
- add modification date to mozilla entry, that I forgot about |
1.1_1 19 Sep 2013 07:50:30 |
rm |
- correct thunderbird version in recent mozilla entry |
1.1_1 19 Sep 2013 05:44:02 |
remko (src,doc committer) |
Add the latest two FreeBSD Security Advisories that have impact
on -RELEASE versions. (RC's are not documented).
Hat: secteam |
1.1_1 18 Sep 2013 22:40:58 |
flo |
- update firefox, thunderbird and libxul to 24.0
- update seamonkey to 2.21
- update firefox-esr to 17.0.9
- enable GSTREAMER by default for html5 with h264/aac/mp3
- WEBRTC is now always built
- add PROFILE and TESTS options
Security: 7dfed67b-20aa-11e3-b8d8-0025905a4771
In collaboration with: Jan Beich <jbeich@tormail.org> |
1.1_1 13 Sep 2013 13:13:36 |
eadler |
Update flash to version 11.2.202.310
PR: ports/182013
Submitted by: Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp>
Security: http://www.vuxml.org/freebsd/5bd6811f-1c75-11e3-ba72-98fc11cdc4f5 |
1.1_1 12 Sep 2013 16:03:45 |
lwhsu |
Document CVE-2013-4315 for www/py-django{,14,-devel} |
1.1_1 02 Sep 2013 19:04:21 |
ohauer |
- update devel/subversion to 1.8.3 [1]
- update devel/subversion17 to 1.7.13 [1]
- add vuxml entry
Version 1.7.13
(29 Aug 2013, from /branches/1.7.x)
http://svn.apache.org/repos/asf/subversion/tags/1.7.13/CHANGES
User-visible changes:
- General
* merge: fix bogus mergeinfo with conflicting file merges (issue #4306)
* diff: fix duplicated path component in '--summarize' output (issue #4408)
* ra_serf: ignore case when checking certificate common names (r1514763)
- Server-side bugfixes: (Only the first 15 lines of the commit message are shown above ) |
1.1_1 29 Aug 2013 10:56:24 |
sem |
- Document the last cacti vulnerabilities
PR: ports/181606 (based on)
Submitted by: Rodrigo (ros) OSORIO <rodrigo@bebik.net> |
1.1_1 29 Aug 2013 06:15:52 |
remko (src,doc committer) |
Add CVE entries to latest entry for Asterisk.
Add "The" in who reports the issue.
Bump modified date |
1.1_1 28 Aug 2013 20:51:32 |
flo |
Update net/asterisk to 1.8.23.1
Update net/asterisk10 to 10.12.3
Update net/asterisk11 to 11.5.1
Security: fd2bf3b5-1001-11e3-ba94-0025905a4771 |
1.1_1 21 Aug 2013 09:29:44 |
rene |
Document new vulnerabilities in www/chromium < 29.0.1547.57
Obtained from: http://googlechromereleases.blogspot.nl/ |
1.1_1 20 Aug 2013 15:36:43 |
kwm |
Fix multiple security issues in the bundled libav version by replacing it
with a newer version.
Reported by: Jan Beich <jbeich@tormail.org> |
1.1_1 19 Aug 2013 08:07:02 |
stas (src committer) |
- Correct lcms2 VuXML entry: only versions before 2.5 are vulnerable.
PR: ports/181384
Reported by: Derek Schrock <dereks@lifeofadishwasher.com> |
1.1_1 18 Aug 2013 10:41:11 |
ashish |
- Update modified date of VuXML entry which was missed in r317985
Reported by: remko |
1.1_1 17 Aug 2013 08:36:30 |
remko (src,doc committer) |
Correct latest entry, properly indent the paragraphs
and sort the url list alphabetically. |
1.1_1 17 Aug 2013 08:24:35 |
bf |
Amend 689c2bf7-0701-11e3-9a25-002590860428 so that it doesn't overlap with
80771b89-f57b-11e2-bf21-b499baab0cbe, but keep both entries rather than
augmenting the old one, because I've cited the new one in a commit message. |
1.1_1 17 Aug 2013 07:56:12 |
bf |
Update security/libgcrypt to 1.5.3 [1], and document the latest gnupg
and libgcrypt vulnerability
PR: 181231
Submitted by: Hirohisa Yamaguchi (maintainer) [1]
Security: http://www.vuxml.org/freebsd/689c2bf7-0701-11e3-9a25-002590860428.html |
1.1_1 16 Aug 2013 17:54:42 |
brd (doc committer) |
- Update puppet to 3.2.4 which fixes CVE-2013-4761 and CVE-2013-4956
Approved by: swills@
Security: 2b2f6092-0694-11e3-9e8e-000c29f6ae42 |
1.1_1 16 Aug 2013 05:35:00 |
remko (src,doc committer) |
Correct polarssl entry, the lines were way to long, indentation was
incorrect, and the topic description does not need too many details
since that is explained in the description itself.
Also correct the url's since c comes before u ;-)
Prodded by: stas |
1.1_1 15 Aug 2013 19:54:23 |
stas (src committer) |
- Fix ordering of references.
Reported by: remko |
1.1_1 15 Aug 2013 19:02:34 |
stas (src committer) |
- Add lcms2 DoS vulnerability entry.
Hat: secteam |
1.1_1 13 Aug 2013 06:20:27 |
mandree |
Add CVE Id, which was not in the advisory,
but on <https://polarssl.org/security>. |
1.1_1 13 Aug 2013 06:17:33 |
mandree |
Record PolarSSL < 1.2.8 infinite loop denial of service.
Note: the port has not yet been upgraded, and the fix then needs to be merged
to the 9.2 ports branch before release. |
1.1_1 09 Aug 2013 20:52:29 |
delphij |
Add a link to the advisory.
Submitted by: remko |
1.1_1 09 Aug 2013 17:22:17 |
delphij |
Document Samba DoS vulnerability. |
1.1_1 08 Aug 2013 18:42:03 |
flo |
- update firefox to 23.0
- update firefox-esr, thunderbird and libxul to 17.0.8
- update seamonkey to 2.20
- fix plist for *-i18n
Security: 0998e79d-0055-11e3-905b-0025905a4771
In collaboration with: Jan Beich <jbeich@tormail.org> |
1.1_1 07 Aug 2013 16:26:13 |
mandree |
Add one more reference for PuTTY 0.59-0.61 vuln CVE-2011-4607. |
1.1_1 07 Aug 2013 16:22:30 |
mandree |
More references for PuTTY < 0.63 vulnerabilities. |
1.1_1 07 Aug 2013 16:11:18 |
mandree |
Upgrade PuTTY to new 0.63 beta upstream release, adding vulnerability info.
Quoting the upstream's change log:
- Security fix: prevent a nefarious SSH server or network attacker from
crashing PuTTY at startup in three different ways by presenting a maliciously
constructed public key and signature.
- Security fix: PuTTY no longer retains the private half of users' keys in
memory by mistake after authenticating with them.
- Revamped the internal configuration storage system to remove all fixed
arbitrary limits on string lengths. In particular, there should now no longer
be an unreasonably small limit on the number of port forwardings PuTTY can
store.
- Port-forwarded TCP connections which close one direction before the other
should now be reliably supported, with EOF propagated independently in the (Only the first 15 lines of the commit message are shown above ) |
1.1_1 07 Aug 2013 08:41:51 |
danfe |
Adjust NVidia driver version ranges after r304966 to remedy false positives. |
1.1_1 05 Aug 2013 21:56:57 |
ohauer |
- secuity update for typo3 ports
- some small Makefile cleanups
- add vuxml entry
Vulnerability Types: Cross-Site Scripting, Remote Code Execution
Overall Severity: Critical
Vulnerable subcomponent: Third Party Libraries used for audio and video playback
Affected Versions: All versions from 4.5.0 up to the development branch of 6.2
Vulnerability Type: Cross-Site Scripting
Severity: Medium
Vulnerable subcomponent: Backend File Upload / File Abstraction Layer
Vulnerability Type: Remote Code Execution by arbitrary file creation
Affected Versions: All versions from 6.0.0 up to the development branch of 6.2
Severity: Critical
PR: ports/180951
ports/180952
ports/180953
Submitted by: Helmut Ritter <freebsd-ports@charlieroot.de> (maintainer)
Security: http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-002/
CVE-2011-3642
CVE-2013-1464 |
1.1_1 04 Aug 2013 12:13:51 |
matthew |
- Security update of databases/phpmyadmin to 4.0.5
ChangeLog:
http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/4.0.5/phpMyAdmin-4.0.5-notes.html/download
SecurityAdvisory: http://www.phpmyadmin.net/home_page/security/PMASA-2013-10.php
- Deprecate databases/phpmyadmin35
This version is vulnerable to the 'clickjacking protection bypass'
problem fixed in 4.0.5, but the development team will not be
publishing a fix. "We have no solution for 3.5.x, due to the proposed
solution requiring JavaScript. We don't want to introduce a dependency
to JavaScript in the 3.5.x family."
Therefore deprecate this port and set expiry for one month. Please
upgrade to 4.0.5 instead.
Security: 17326fd5-fcfb-11e2-9bb9-6805ca0b3d42 |
1.1_1 03 Aug 2013 14:56:42 |
rene |
Add new vulnerabilities for www/chromium < 28.0.1500.95
Obtained from: http://googlechromereleases.blogspot.nl/ |
1.1_1 01 Aug 2013 18:43:49 |
remko (src,doc committer) |
Modify the latest puppet entry. Because the matching of the version everything
below 3.2.2 was a match, including all 2.7.x versions. It also appears that
there is no puppet27 version, just puppet-2.7.x and puppet-3.2.x instead.
Bump modification date.
PR: 180958
Submitted by: Kan Sasaki <sasaki@fcc.ad.jp> |
1.1_1 29 Jul 2013 19:17:27 |
matthew |
Now that PMSA-2013-{9,11-15} have been published, borrow from them to
expand on the original rather sketchy entries.
Sort URL references[1]
Submitted by: remko [1] |
1.1_1 28 Jul 2013 15:38:45 |
matthew |
Security update: multiple vulnerabilities in databases/phpmyadmin and
databases/phpmyadmin35
- update phpmyadmin to 4.0.4.2
ChangeLog:
http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/4.0.4.2/phpMyAdmin-4.0.4.2-notes.html/view
- update phpmyadmin35 to 3.5.8.2
ChangeLog:
http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/3.5.8.2/phpMyAdmin-3.5.8.2-notes.html/view
- vuxml
The PMSA references shown have not been published yet, hence no CVE
numbers and a lack of detail in the descriptions. Yes, PMSA-2013-10
is missing from the sequence. According to the security alert e-mail:
"For more details, see the upcoming PMASA-2013-8 to PMASA-2013-15 (minus
PMASA-2013-10 which is reserved for a future advisory)." |
1.1_1 27 Jul 2013 17:36:20 |
remko (src,doc committer) |
Add entry for wordpress < 3.5.2
Requested by: Patrick Oonk |
1.1_1 27 Jul 2013 13:24:18 |
remko (src,doc committer) |
Add additional reference, bump modified date. |
1.1_1 26 Jul 2013 23:22:36 |
delphij |
Document BIND denial of service vulnerability |
1.1_1 26 Jul 2013 11:06:45 |
remko (src,doc committer) |
Cleanup last entry. Properly indent the entry and
make sure that after a period on the end of a line
we follow with two spaces.
hat: secteam |
1.1_1 25 Jul 2013 22:56:06 |
kuriyama |
Add an entry for security/gnupg1. |
1.1_1 25 Jul 2013 18:29:27 |
bjk (doc committer) |
Update to 1.6.5
This is a security release by upstream, and requires configuration changes
in addition to the software update. See UPDATING.
Reviewed by: ports-security (zi, remko)
Approved by: hrs (mentor, ports committer) |
1.1_1 24 Jul 2013 20:59:28 |
lev |
Add <url></url> to references.
Submitted by: Remko Lodder <remko@FreeBSD.org> |
1.1_1 24 Jul 2013 17:18:50 |
lev |
Update:
devel/subversion to 1.8.1
devel/subversion16 to 1.7.11
These releases fix CVE-2013-4131
http://subversion.apache.org/security/CVE-2013-4131-advisory.txt
Approved by: Olli Hauer <ohauer@FreeBSD.org> for devel/subversion17
Security: CVE-2013-4131 |
1.1_1 23 Jul 2013 10:32:23 |
bdrewery |
- Update whitespace for 2fbfd455-f2d0-11e2-8a46-000d601460a4
Requested by: remko |
1.1_1 22 Jul 2013 13:24:05 |
bdrewery |
- Update suPHP to 0.7.2
- Document possible privilege escalation
Approved by: maintainer timeout
Security: 2fbfd455-f2d0-11e2-8a46-000d601460a4 |
1.1_1 21 Jul 2013 18:54:51 |
ohauer |
- change apache24 version from 2.4.5 to 2.4.6 (2.4.5 was not released)
- add http://www.apache.org/dist/httpd/Announcement2.4.html as reference
requested by remko@ |
1.1_1 20 Jul 2013 17:11:54 |
ohauer |
- update to apache24-2.4.6
- new modules: mod_cache_socache, mod_macro and mod_proxy_wstunnel
- add enty to vuxml
SECURITY: CVE-2013-1896 (cve.mitre.org)
mod_dav: Sending a MERGE request against a URI handled by mod_dav_svn with
the source href (sent as part of the request body as XML) pointing to a
URI that is not configured for DAV will trigger a segfault.
SECURITY: CVE-2013-2249 (cve.mitre.org)
mod_session_dbd: Make sure that dirty flag is respected when saving
sessions, and ensure the session ID is changed each time the session
changes. This changes the format of the updatesession SQL statement.
Existing configurations must be changed.
Changelog:
http://www.apache.org/dist/httpd/CHANGES_2.4.6
with hat apache@
Security: ca4d63fb-f15c-11e2-b183-20cf30e32f6d |
1.1_1 17 Jul 2013 22:09:58 |
delphij |
Document gallery3 multiple vulnerabilities. |
1.1_1 17 Jul 2013 22:07:22 |
eadler |
Add missing citation
Requested by: remko |
1.1_1 16 Jul 2013 18:10:12 |
des |
Add two more PHP entries for issues which have already been fixed. |
1.1_1 15 Jul 2013 21:06:36 |
eadler |
Update to 11.2r202.291
PR: ports/179502
Submitted by: Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp> |
1.1_1 15 Jul 2013 18:25:19 |
delphij |
Document squid 3.x denial of service vulnerability. |
1.1_1 15 Jul 2013 09:26:37 |
cs |
Adjust version numbers for OTRS vulnerabilities |
1.1_1 14 Jul 2013 22:03:55 |
eadler |
Add missing modified dates from r321329.
I had this sitting for a bit, but forgot to test & commit.
Requested by: remko |
1.1_1 11 Jul 2013 21:28:39 |
delphij |
Wrap long lines. No content change. |
1.1_1 11 Jul 2013 20:35:20 |
cs |
Security vulnerabilities in libzrtp
Security: 04320e7d-ea66-11e2-a96e-60a44c524f57 |
1.1_1 11 Jul 2013 20:17:34 |
swills |
- Document ruby vulnerability |
1.1_1 11 Jul 2013 07:50:27 |
cs |
Add vulnerability on otrs
Security: e3e788aa-e9fd-11e2-a96e-60a44c524f57 |
1.1_1 10 Jul 2013 19:01:44 |
ohauer |
- update to apache-2.2.25
- update vuxml with additional CVE-2013-1896 entry
Changes with Apache 2.2.25
http://www.apache.org/dist/httpd/CHANGES_2.2.25
*) SECURITY: CVE-2013-1896 (cve.mitre.org)
mod_dav: Sending a MERGE request against a URI handled by mod_dav_svn with
the source href (sent as part of the request body as XML) pointing to a
URI that is not configured for DAV will trigger a segfault. [Ben Reser
<ben reser.org>]
*) SECURITY: CVE-2013-1862 (cve.mitre.org)
mod_rewrite: Ensure that client data written to the RewriteLog is
escaped to prevent terminal escape sequences from entering the (Only the first 15 lines of the commit message are shown above ) |
1.1_1 10 Jul 2013 14:35:58 |
rene |
Add new vulnerabilities for www/chromium < 28.0.1500.71
Obtained from: http://googlechromereleases.blogspot.nl/ |
1.1_1 06 Jul 2013 08:46:40 |
ohauer |
- add fix for CVE-2013-1862
- adjust vuxml |
1.1_1 05 Jul 2013 21:06:16 |
ohauer |
- document apache22 CVE-2013-1862 (mod_rewrite)
Update to apache22-2.2.25 is ready to commit.
Until now there is no official announcement from apache.org
so we hold the update back until we have official checksums. |
1.1_1 02 Jul 2013 07:43:03 |
delphij |
Fix CVE-2013-2174 for ftp/curl with a patch from vendor for
now so that users can build the port, per popular demands
on mailing list.
The upgrade patch found in ports/172325 is currently under
exp-run. The changes in this commit against ftp/curl can be
safely reverted before applying that patch, as it's shipped
with new curl release.
Approved by: portmgr (miwi) |
1.1_1 30 Jun 2013 20:49:33 |
matthew |
Security update to 4.0.4.1
ChangeLog:
http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/4.0.4.1/phpMyAdmin-4.0.4.1-notes.html/view
Advisory: http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php
Security: 1b93f6fe-e1c1-11e2-948d-6805ca0b3d42 |
1.1_1 28 Jun 2013 11:07:49 |
girgen |
Security update for apache-xml-security-c
URL: http://santuario.apache.org/secadv.data/CVE-2013-2210.txt
Security: 81da673e-dfe1-11e2-9389-08002798f6ff
Security: CVE-2013-2210 |
1.1_1 26 Jun 2013 11:01:35 |
flo |
- update firefox to 22.0
- update firefox-esr, thunderbird and libxul to 17.0.7
- update nspr to 4.10
- OSS support was removed upstream, only ALSA and PulseAudio are supported
from now on.
Security: b3fcb387-de4b-11e2-b1c6-0025905a4771
In collaboration with: Jan Beich <jbeich@tormail.org> |
1.1_1 23 Jun 2013 20:14:01 |
rea |
VuXML: document CVE-2013-2174, heap corruption in cURL library |
1.1_1 22 Jun 2013 12:49:29 |
swills |
- Update puppet to 3.2.2 which fixes CVE-2013-3567 [1]
- Update puppet27 to 2.7.22 which fixes CVE-2013-3567
- Document security issue
PR: ports/179816 [1]
Submitted by: mat [1]
Security: b162b218-c547-4ba2-ae31-6fdcb61bc763 |
1.1_1 22 Jun 2013 09:36:10 |
bf |
Correct the CVE-2013-0131 entry, so that the most recent revision of
x11/nvidia-driver-304 is not mistakenly flagged as vulnerable |
1.1_1 19 Jun 2013 21:56:57 |
jgh |
- fix formating of 8b97d289-d8cf-11e2-a1f5-60a44c524f57
With Hat: ports-secteam |
1.1_1 19 Jun 2013 21:20:50 |
eadler |
Add extra-validation to the validation target.
While here, test with python2 and permit the script to run with either 2 or 3.
Requested by: delphij
With Hat: ports-secteam |
1.1_1 19 Jun 2013 21:14:51 |
eadler |
- Fix entry dates for some 'insane' dates. In some cases a best effort was made
to guess what was meant due to either destroyed svn logs (formatting 'fixes') or
lost to time reports.
With Hat: ports-secteam |