From owner-svn-ports-head@FreeBSD.ORG Mon Jul 30 12:42:33 2012
Return-Path:
Delivered-To: svn-ports-head@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52])
by hub.freebsd.org (Postfix) with ESMTP id 353E9106566C;
Mon, 30 Jul 2012 12:42:33 +0000 (UTC) (envelope-from zi@FreeBSD.org)
Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:4f8:fff6::2c])
by mx1.freebsd.org (Postfix) with ESMTP id 152CD8FC0A;
Mon, 30 Jul 2012 12:42:33 +0000 (UTC)
Received: from svn.freebsd.org (localhost [127.0.0.1])
by svn.freebsd.org (8.14.4/8.14.4) with ESMTP id q6UCgWQG093630;
Mon, 30 Jul 2012 12:42:32 GMT (envelope-from zi@svn.freebsd.org)
Received: (from zi@localhost)
by svn.freebsd.org (8.14.4/8.14.4/Submit) id q6UCgWWd093626;
Mon, 30 Jul 2012 12:42:32 GMT (envelope-from zi@svn.freebsd.org)
Message-Id: <201207301242.q6UCgWWd093626@svn.freebsd.org>
From: Ryan Steinmetz
Date: Mon, 30 Jul 2012 12:42:32 +0000 (UTC)
To: ports-committers@freebsd.org, svn-ports-all@freebsd.org,
svn-ports-head@freebsd.org
X-SVN-Group: ports-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Cc:
Subject: svn commit: r301716 - in head: net/isc-dhcp41-server security/vuxml
X-BeenThere: svn-ports-head@freebsd.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: SVN commit messages for the ports tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Mon, 30 Jul 2012 12:42:33 -0000
Author: zi
Date: Mon Jul 30 12:42:32 2012
New Revision: 301716
URL: http://svn.freebsd.org/changeset/ports/301716
Log:
- Update net/isc-dhcp41-server to 4.1-ESV-R6 [1]
- Document vulnerabilities in net/isc-dhcp41-server
- Cleanup formatting in vuxml
PR: ports/170245 [1]
Submitted by: Douglas Thrift (maintainer) [1]
Security: c7fa3618-d5ff-11e1-90a2-000c299b62e1
Modified:
head/net/isc-dhcp41-server/Makefile
head/net/isc-dhcp41-server/distinfo
head/security/vuxml/vuln.xml
Modified: head/net/isc-dhcp41-server/Makefile
==============================================================================
--- head/net/isc-dhcp41-server/Makefile Mon Jul 30 12:10:39 2012 (r301715)
+++ head/net/isc-dhcp41-server/Makefile Mon Jul 30 12:42:32 2012 (r301716)
@@ -21,10 +21,10 @@ COMMENT?= The ISC Dynamic Host Configura
LICENSE= ISCL
-PATCHLEVEL= R5
-PORTREVISION_SERVER= 4
-PORTREVISION_CLIENT= 1
-PORTREVISION_RELAY= 4
+PATCHLEVEL= R6
+PORTREVISION_SERVER= 5
+PORTREVISION_CLIENT= 2
+PORTREVISION_RELAY= 5
SUBSYS?= server
WRKSRC= ${WRKDIR}/${PORTNAME}-${DISTVERSION}-${PATCHLEVEL}
Modified: head/net/isc-dhcp41-server/distinfo
==============================================================================
--- head/net/isc-dhcp41-server/distinfo Mon Jul 30 12:10:39 2012 (r301715)
+++ head/net/isc-dhcp41-server/distinfo Mon Jul 30 12:42:32 2012 (r301716)
@@ -1,4 +1,4 @@
-SHA256 (dhcp-4.1-ESV-R5.tar.gz) = c028fd6f9c1fff38fd0ae21cc89a70912e0eb759ea1019fb25b145cf14527583
-SIZE (dhcp-4.1-ESV-R5.tar.gz) = 1120684
+SHA256 (dhcp-4.1-ESV-R6.tar.gz) = deb666a1ab02dd1375c0ebd237ce1fcb3e4d9e7be520d25ba25f1f40eb0ead9e
+SIZE (dhcp-4.1-ESV-R6.tar.gz) = 1121186
SHA256 (ldap-for-dhcp-4.1.1-2.tar.gz) = 566b7be2ebefdc583d0bf0095c804ba69807b67e5cc29a2b64b1b39202b37d0d
SIZE (ldap-for-dhcp-4.1.1-2.tar.gz) = 39004
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Mon Jul 30 12:10:39 2012 (r301715)
+++ head/security/vuxml/vuln.xml Mon Jul 30 12:42:32 2012 (r301716)
@@ -67,28 +67,28 @@ Note: Please add new entries to the beg
A Bugzilla Security Advisory reports:
The following security issues have been discovered in
- Bugzilla:
+ Bugzilla:
Information Leak
Versions: 4.1.1 to 4.2.1, 4.3.1
In HTML bugmails, all bug IDs and attachment IDs are
- linkified, and hovering these links displays a tooltip
- with the bug summary or the attachment description if
- the user is allowed to see the bug or attachment.
- But when validating user permissions when generating the
- email, the permissions of the user who edited the bug were
- taken into account instead of the permissions of the
- addressee. This means that confidential information could
- be disclosed to the addressee if the other user has more
- privileges than the addressee.
- Plain text bugmails are not affected as bug and attachment
- IDs are not linkified.
+ linkified, and hovering these links displays a tooltip
+ with the bug summary or the attachment description if
+ the user is allowed to see the bug or attachment.
+ But when validating user permissions when generating the
+ email, the permissions of the user who edited the bug were
+ taken into account instead of the permissions of the
+ addressee. This means that confidential information could
+ be disclosed to the addressee if the other user has more
+ privileges than the addressee.
+ Plain text bugmails are not affected as bug and attachment
+ IDs are not linkified.
Information Leak
- Versions: 2.17.5 to 3.6.9, 3.7.1 to 4.0.6, 4.1.1 to
- 4.2.1, 4.3.1
+ Versions: 2.17.5 to 3.6.9, 3.7.1 to 4.0.6, 4.1.1 to
+ 4.2.1, 4.3.1
The description of a private attachment could be visible
- to a user who hasn't permissions to access this attachment
- if the attachment ID is mentioned in a public comment in
- a bug that the user can see.
+ to a user who hasn't permissions to access this attachment
+ if the attachment ID is mentioned in a public comment in
+ a bug that the user can see.