Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 12 Jan 2005 22:37:29 +0000 (UTC)
From:      "Simon L. Nielsen" <simon@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/security/vuxml vuln.xml ports/www/squid Makefile distinfo
Message-ID:  <200501122237.j0CMbT6x014062@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
simon       2005-01-12 22:37:29 UTC

  FreeBSD ports repository

  Modified files:
    security/vuxml       vuln.xml 
    www/squid            Makefile distinfo 
  Log:
  - Integrate vendor patches as published on
    <http://www.squid-cache.org/Versions/v2/2.5/bugs/>; for the following
    issues:
    + Prevent a possible denial of service attack via WCCP messages (squid bug
      #1190), classified as security issue by the vendor
    + Fix a buffer overflow in the Gopher to HTML conversion routine (squid bug
      #1189), classified as security issue by the vendor
    + Fix a null pointer access and plug memory leaks in the fake_auth NTLM
      helper (squid bug #1183) (this helper app is not installed by default by
      the port)
    + Stop closing open filedescriptors beyond stdin, stdout and stderr on
      startup (squid bug #1177)
  
  - Unbreak the port on NO_NIS systems (thanks to "Alexander <freebsd AT
    nagilum.de>" for reporting this)
  
  - Document the two security issues in VuXML.
  
  PR:             ports/76173
  Submitted by:   Thomas-Martin Seck <tmseck@netcologne.de> (maintainer)
  Approved by:    erwin (mentor)
  
  Revision  Changes    Path
  1.459     +63 -1     ports/security/vuxml/vuln.xml
  1.149     +12 -4     ports/www/squid/Makefile
  1.113     +8 -0      ports/www/squid/distinfo



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200501122237.j0CMbT6x014062>