From owner-freebsd-ports-bugs@FreeBSD.ORG Sun Jan 1 08:50:04 2006 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 775C116A41F for ; Sun, 1 Jan 2006 08:50:04 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id D24A843D49 for ; Sun, 1 Jan 2006 08:50:03 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id k018o33I050673 for ; Sun, 1 Jan 2006 08:50:03 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id k018o3ld050671; Sun, 1 Jan 2006 08:50:03 GMT (envelope-from gnats) Resent-Date: Sun, 1 Jan 2006 08:50:03 GMT Resent-Message-Id: <200601010850.k018o3ld050671@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, KOMATSU Shinichiro Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 89FC716A41F for ; Sun, 1 Jan 2006 08:46:05 +0000 (GMT) (envelope-from koma2@timedia.co.jp) Received: from timedia.co.jp (nurikabe.timedia.co.jp [218.225.123.151]) by mx1.FreeBSD.org (Postfix) with ESMTP id 3B8AA43D48 for ; Sun, 1 Jan 2006 08:46:04 +0000 (GMT) (envelope-from koma2@timedia.co.jp) Received: by koma2-45.wins.timedia.co.jp (Postfix, from userid 1000) id BC71F11589; Sun, 1 Jan 2006 17:46:03 +0900 (JST) Message-Id: <20060101084603.BC71F11589@koma2-45.wins.timedia.co.jp> Date: Sun, 1 Jan 2006 17:46:03 +0900 (JST) From: KOMATSU Shinichiro To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Cc: Subject: ports/91156: security/vuxml: Fix the affected versions of curl vulnerability. X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: KOMATSU Shinichiro List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 01 Jan 2006 08:50:04 -0000 >Number: 91156 >Category: ports >Synopsis: security/vuxml: Fix the affected versions of curl vulnerability. >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Sun Jan 01 08:50:03 GMT 2006 >Closed-Date: >Last-Modified: >Originator: KOMATSU Shinichiro >Release: FreeBSD 5.4-RELEASE-p8 i386 >Organization: >Environment: FreeBSD 5.4-RELEASE-p8 i386 >Description: According to the cURL Security Advisory [1], affected versions of CVE-2005-4077 issue are "7.11.2 to and **including** 7.15.0". [1] http://curl.haxx.se/docs/adv_20051207.html >How-To-Repeat: >Fix: Apply the following patch and fix the entry of VuXML ID "9b4facec-6761-11da-99f6-00123ffe8333". Index: security/vuxml/vuln.xml =================================================================== RCS file: /home/ncvs/ports/security/vuxml/vuln.xml,v retrieving revision 1.918 diff -u -r1.918 vuln.xml --- security/vuxml/vuln.xml 25 Dec 2005 22:23:51 -0000 1.918 +++ security/vuxml/vuln.xml 1 Jan 2006 08:14:08 -0000 @@ -369,7 +369,7 @@ curl - 7.11.27.15.0 + 7.11.27.15.0 >Release-Note: >Audit-Trail: >Unformatted: