Date: Wed, 12 Jan 2005 22:37:29 +0000 (UTC) From: "Simon L. Nielsen" <simon@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/security/vuxml vuln.xml ports/www/squid Makefile distinfo Message-ID: <200501122237.j0CMbT6x014062@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
simon 2005-01-12 22:37:29 UTC
FreeBSD ports repository
Modified files:
security/vuxml vuln.xml
www/squid Makefile distinfo
Log:
- Integrate vendor patches as published on
<http://www.squid-cache.org/Versions/v2/2.5/bugs/> for the following
issues:
+ Prevent a possible denial of service attack via WCCP messages (squid bug
#1190), classified as security issue by the vendor
+ Fix a buffer overflow in the Gopher to HTML conversion routine (squid bug
#1189), classified as security issue by the vendor
+ Fix a null pointer access and plug memory leaks in the fake_auth NTLM
helper (squid bug #1183) (this helper app is not installed by default by
the port)
+ Stop closing open filedescriptors beyond stdin, stdout and stderr on
startup (squid bug #1177)
- Unbreak the port on NO_NIS systems (thanks to "Alexander <freebsd AT
nagilum.de>" for reporting this)
- Document the two security issues in VuXML.
PR: ports/76173
Submitted by: Thomas-Martin Seck <tmseck@netcologne.de> (maintainer)
Approved by: erwin (mentor)
Revision Changes Path
1.459 +63 -1 ports/security/vuxml/vuln.xml
1.149 +12 -4 ports/www/squid/Makefile
1.113 +8 -0 ports/www/squid/distinfo
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200501122237.j0CMbT6x014062>
