From owner-cvs-all@FreeBSD.ORG Thu Jan 5 17:25:29 2012 Return-Path: Delivered-To: cvs-all@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 3BFEA1065676; Thu, 5 Jan 2012 17:25:29 +0000 (UTC) (envelope-from ohauer@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id 0FFE48FC0A; Thu, 5 Jan 2012 17:25:29 +0000 (UTC) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.4/8.14.4) with ESMTP id q05HPSBR013874; Thu, 5 Jan 2012 17:25:28 GMT (envelope-from ohauer@repoman.freebsd.org) Received: (from ohauer@localhost) by repoman.freebsd.org (8.14.4/8.14.4/Submit) id q05HPS3S013873; Thu, 5 Jan 2012 17:25:28 GMT (envelope-from ohauer) Message-Id: <201201051725.q05HPS3S013873@repoman.freebsd.org> From: Olli Hauer Date: Thu, 5 Jan 2012 17:25:28 +0000 (UTC) To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: HEAD Cc: Subject: cvs commit: ports/devel/bugzilla Makefile distinfo pkg-plist ports/devel/bugzilla/files patch-Bugzilla__Install__Requirements.pm patch-Bugzilla__WebService__Server__JSONRPC.pm X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: **OBSOLETE** CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Jan 2012 17:25:29 -0000 ohauer 2012-01-05 17:25:28 UTC FreeBSD ports repository Modified files: devel/bugzilla Makefile distinfo pkg-plist Added files: devel/bugzilla/files patch-Bugzilla__WebService__Server__JSONRPC.pm Removed files: devel/bugzilla/files patch-Bugzilla__Install__Requirements.pm Log: - update to version 3.6.7 - CVE-2011-3657 - CVE-2011-3667 Summary ======= The following security issues have been discovered in Bugzilla: * When viewing tabular or graphical reports as well as new charts, an XSS vulnerability is possible in debug mode. * The User.offer_account_by_email WebService method lets you create a new user account even if the active authentication method forbids users to create an account. * A CSRF vulnerability in post_bug.cgi and in attachment.cgi could lead to the creation of unwanted bug reports and attachments. All affected installations are encouraged to upgrade as soon as possible. Full Release Notes: http://www.bugzilla.org/security/3.4.12/ Approved by: skv@ (explicit) Revision Changes Path 1.90 +8 -9 ports/devel/bugzilla/Makefile 1.47 +2 -2 ports/devel/bugzilla/distinfo 1.2 +0 -14 ports/devel/bugzilla/files/patch-Bugzilla__Install__Requirements.pm (dead) 1.1 +33 -0 ports/devel/bugzilla/files/patch-Bugzilla__WebService__Server__JSONRPC.pm (new) 1.41 +2 -1 ports/devel/bugzilla/pkg-plist