From owner-freebsd-openoffice@FreeBSD.ORG Mon Jan 8 21:40:28 2007 Return-Path: X-Original-To: openoffice@freebsd.org Delivered-To: freebsd-openoffice@FreeBSD.ORG Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 9BBE316A407 for ; Mon, 8 Jan 2007 21:40:28 +0000 (UTC) (envelope-from maho.nakata@gmail.com) Received: from wr-out-0506.google.com (wr-out-0506.google.com [64.233.184.236]) by mx1.freebsd.org (Postfix) with ESMTP id 5931913C442 for ; Mon, 8 Jan 2007 21:40:28 +0000 (UTC) (envelope-from maho.nakata@gmail.com) Received: by wr-out-0506.google.com with SMTP id i22so1412160wra for ; Mon, 08 Jan 2007 13:40:28 -0800 (PST) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:date:message-id:to:subject:from:x-mailer:mime-version:content-type:content-transfer-encoding:sender; b=EgmYsePppzXuuVrN+5rk26y5FhcdPtvN4iVV7YlGjYR9+wAJ2nvYrQUqHDazmSXFAanaJFisTq+yhvrNF3uiZK14env4p0OQTWVnNhSOKqF0L+9MLYHmOVQAOQEYJLFaL3RSpUzHZzdYeNbdfyAGRaE9+21idJLch3fYGY6gFy0= Received: by 10.90.86.10 with SMTP id j10mr2403134agb.1168292427964; Mon, 08 Jan 2007 13:40:27 -0800 (PST) Received: from localhost ( [133.11.172.102]) by mx.google.com with ESMTP id 33sm47659161wra.2007.01.08.13.40.26; Mon, 08 Jan 2007 13:40:27 -0800 (PST) Date: Tue, 09 Jan 2007 06:39:50 +0900 (JST) Message-Id: <20070109.063950.48497304.chat95@mac.com> To: openoffice@freebsd.org From: NAKATA Maho X-Mailer: Mew version 5.1 on Emacs 21.3 / Mule 5.0 (SAKAKI) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: Maho NAKATA Cc: Subject: Please update OOo 1.1.5, 1.1-devel port and OOo-2 related ports. X-BeenThere: freebsd-openoffice@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Porting OpenOffice to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 08 Jan 2007 21:40:28 -0000 there are security vulnerabilities in these ports. I updated to 2 -> 2.1 2-devel -> SRC680_m198 1.1 -> portrevision 4 1.1-devel -> SRX645_m64 at least there are no known security vulnerabilities. Please see commit log for details for OOo1-ports. For OOo2 ports, it has been fixed before. Revision 1.218 / (download) - annotate - [select for diffs], Mon Jan 8 21:32:12 2007 UTC (6 minutes, 45 seconds ago) by maho Branch: MAIN CVS Tags: HEAD Changes since 1.217: +1 -1 lines Diff to previous 1.217 (colored) Fix two security vulnerability http://www.freebsd.org/cgi/cvsweb.cgi/ports/editors/openoffice.org-1.1/Makefile * http://www.openoffice.org/security/CVE-2006-3117.html http://www.openoffice.org/issues/show_bug.cgi?id=66866 patch:http://cvs.gnome.org/viewcvs/*checkout*/ooo-build/patches/OOO_1_1/sax%2Bsource%2Bexpatwrap%2Bxml2utf.cxx.diff?rev=1.1.2.1 * http://www.openoffice.org/security/CVE-2006-2198.html http://www.openoffice.org/issues/show_bug.cgi?id=66863 patch:http://cvs.gnome.org/viewcvs/*checkout*/ooo-build/patches/OOO_1_1/6438334-macros-so7-sfx2.diff?rev=1.1.2.1 Obtained from: security-team@openoffice.org (Rene Engelhard ) Revision 1.217 / (download) - annotate - [select for diffs], Mon Jan 8 06:41:02 2007 UTC (14 hours, 57 minutes ago) by maho Branch: MAIN Changes since 1.216: +1 -1 lines Diff to previous 1.216 (colored) * Fix WMF security vulnerability http://www.openoffice.org/servlets/ReadMsg?list=releases&msgNo=10454 http://www.openoffice.org/issues/show_bug.cgi?id=70042 * Bump portrevision Obtained from: security-team@openoffice.org you can can verify easiliy that these patches have also been applied to SRX645_m64 (newest version of ooo1.1-devel) thanks, -- NAKATA, Maho (maho@FreeBSD.org)