Date: Mon, 26 Nov 2012 21:04:11 +0000 (UTC) From: Beat Gaetzi <beat@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-branches@freebsd.org Subject: svn commit: r307798 - in branches/RELENG_9_1_0: security/vuxml www/lighttpd www/lighttpd/files Message-ID: <201211262104.qAQL4B5D074649@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: beat Date: Mon Nov 26 21:04:11 2012 New Revision: 307798 URL: http://svnweb.freebsd.org/changeset/ports/307798 Log: MFH r307616 by mm: Document new vulnerability in www/lighttpd 1.4.31 MFH r307617 by mm: Update lighttpd to 1.4.32 (fixes CVE-2012-5533) Feature safe: yes Modified: branches/RELENG_9_1_0/security/vuxml/vuln.xml branches/RELENG_9_1_0/www/lighttpd/Makefile branches/RELENG_9_1_0/www/lighttpd/distinfo branches/RELENG_9_1_0/www/lighttpd/files/patch-configure.ac Directory Properties: branches/RELENG_9_1_0/ (props changed) Modified: branches/RELENG_9_1_0/security/vuxml/vuln.xml ============================================================================== --- branches/RELENG_9_1_0/security/vuxml/vuln.xml Mon Nov 26 20:55:53 2012 (r307797) +++ branches/RELENG_9_1_0/security/vuxml/vuln.xml Mon Nov 26 21:04:11 2012 (r307798) @@ -51,6 +51,38 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1cd3ca42-33e6-11e2-a255-5404a67eef98"> + <topic>lighttpd -- remote DoS in header parsing</topic> + <affects> + <package> + <name>lighttpd</name> + <range><gt>1.4.30</gt><lt>1.4.32</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Lighttpd security advisory reports:</p> + <blockquote cite="http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2012_01.txt"> + <p>Certain Connection header values will trigger an endless loop, for example: + "Connection: TE,,Keep-Alive"</p> + <p>On receiving such value, lighttpd will enter an endless loop, + detecting an empty token but not incrementing the current string + position, and keep reading the ',' again and again.</p> + <p>This bug was introduced in 1.4.31, when we fixed an "invalid read" + bug (it would try to read the byte before the string if it started + with ',', although the value wasn't actually used).</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-5533</cvename> + </references> + <dates> + <discovery>2012-11-17</discovery> + <entry>2012-11-21</entry> + </dates> + </vuln> + <vuln vid="d23119df-335d-11e2-b64c-c8600054b392"> <topic>mozilla -- multiple vulnerabilities</topic> <affects> Modified: branches/RELENG_9_1_0/www/lighttpd/Makefile ============================================================================== --- branches/RELENG_9_1_0/www/lighttpd/Makefile Mon Nov 26 20:55:53 2012 (r307797) +++ branches/RELENG_9_1_0/www/lighttpd/Makefile Mon Nov 26 21:04:11 2012 (r307798) @@ -6,8 +6,7 @@ # PORTNAME?= lighttpd -PORTVERSION= 1.4.31 -PORTREVISION= 5 +PORTVERSION= 1.4.32 CATEGORIES?= www MASTER_SITES?= http://download.lighttpd.net/lighttpd/releases-1.4.x/ Modified: branches/RELENG_9_1_0/www/lighttpd/distinfo ============================================================================== --- branches/RELENG_9_1_0/www/lighttpd/distinfo Mon Nov 26 20:55:53 2012 (r307797) +++ branches/RELENG_9_1_0/www/lighttpd/distinfo Mon Nov 26 21:04:11 2012 (r307798) @@ -1,5 +1,5 @@ -SHA256 (lighttpd-1.4.31.tar.bz2) = 5209e7a25d3044cb21b34d6a2bb3a6f6c216ba903ea486a803d070582e5e26ac -SIZE (lighttpd-1.4.31.tar.bz2) = 675275 +SHA256 (lighttpd-1.4.32.tar.bz2) = 60691b2dcf3ad2472c06b23d75eb0c164bf48a08a630ed3f308f61319104701f +SIZE (lighttpd-1.4.32.tar.bz2) = 681065 SHA256 (lighttpd-1.4.26_mod_h264_streaming-2.2.9.patch.gz) = d7c3704d5253c4f3c18459f89059063b311e50096cd2c38fc982cec683c32e61 SIZE (lighttpd-1.4.26_mod_h264_streaming-2.2.9.patch.gz) = 44695 SHA256 (lighttpd-1.4.26_mod_geoip.patch.gz) = db43cc0ed7c808b5eed3185d97346e70dea0f1ef4fa9ed436d08e4faff7f97e7 Modified: branches/RELENG_9_1_0/www/lighttpd/files/patch-configure.ac ============================================================================== --- branches/RELENG_9_1_0/www/lighttpd/files/patch-configure.ac Mon Nov 26 20:55:53 2012 (r307797) +++ branches/RELENG_9_1_0/www/lighttpd/files/patch-configure.ac Mon Nov 26 21:04:11 2012 (r307798) @@ -1,10 +1,16 @@ ---- configure.ac.orig 2011-07-03 09:33:11.000000000 -0700 -+++ configure.ac 2012-05-03 16:49:19.000000000 -0700 -@@ -18,2 +18,3 @@ +--- configure.ac.orig 2012-11-19 11:05:29.000000000 +0100 ++++ configure.ac 2012-11-21 14:22:53.723233779 +0100 +@@ -16,6 +16,7 @@ + dnl Checks for programs. + AC_PROG_CC AM_PROG_CC_C_O +AM_PROG_AR AC_PROG_LD -@@ -26,7 +27,2 @@ + AC_PROG_INSTALL + AC_PROG_AWK +@@ -30,11 +31,6 @@ + dnl AM_PROG_AR requires automake 1.11 (and uses AC_COMPILE_IFELSE which wants AC_USE_SYSTEM_EXTENSIONS) + m4_ifdef([AM_PROG_AR], [AM_PROG_AR]) -dnl check environment -AC_AIX @@ -12,9 +18,5 @@ -AC_MINIX - dnl AC_CANONICAL_HOST -@@ -40,5 +36,2 @@ - --dnl more automake stuff --AM_C_PROTOTYPES -- - dnl libtool + case $host_os in + *darwin*|*cygwin*|*aix*|*mingw* ) NO_RDYNAMIC=yes;;
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201211262104.qAQL4B5D074649>