Date: Wed, 12 Jan 2005 22:37:29 +0000 (UTC) From: "Simon L. Nielsen" <simon@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/security/vuxml vuln.xml ports/www/squid Makefile distinfo Message-ID: <200501122237.j0CMbT6x014062@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
simon 2005-01-12 22:37:29 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml www/squid Makefile distinfo Log: - Integrate vendor patches as published on <http://www.squid-cache.org/Versions/v2/2.5/bugs/> for the following issues: + Prevent a possible denial of service attack via WCCP messages (squid bug #1190), classified as security issue by the vendor + Fix a buffer overflow in the Gopher to HTML conversion routine (squid bug #1189), classified as security issue by the vendor + Fix a null pointer access and plug memory leaks in the fake_auth NTLM helper (squid bug #1183) (this helper app is not installed by default by the port) + Stop closing open filedescriptors beyond stdin, stdout and stderr on startup (squid bug #1177) - Unbreak the port on NO_NIS systems (thanks to "Alexander <freebsd AT nagilum.de>" for reporting this) - Document the two security issues in VuXML. PR: ports/76173 Submitted by: Thomas-Martin Seck <tmseck@netcologne.de> (maintainer) Approved by: erwin (mentor) Revision Changes Path 1.459 +63 -1 ports/security/vuxml/vuln.xml 1.149 +12 -4 ports/www/squid/Makefile 1.113 +8 -0 ports/www/squid/distinfo
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200501122237.j0CMbT6x014062>