From owner-cvs-ports@FreeBSD.ORG Sat May 5 11:02:13 2012 Return-Path: Delivered-To: cvs-ports@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 5D3EE106566B; Sat, 5 May 2012 11:02:13 +0000 (UTC) (envelope-from scheidell@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id 306908FC08; Sat, 5 May 2012 11:02:13 +0000 (UTC) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.4/8.14.4) with ESMTP id q45B2D0G054611; Sat, 5 May 2012 11:02:13 GMT (envelope-from scheidell@repoman.freebsd.org) Received: (from scheidell@localhost) by repoman.freebsd.org (8.14.4/8.14.4/Submit) id q45B2DY9054610; Sat, 5 May 2012 11:02:13 GMT (envelope-from scheidell) Message-Id: <201205051102.q45B2DY9054610@repoman.freebsd.org> From: Michael Scheidell Date: Sat, 5 May 2012 11:02:13 +0000 (UTC) To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: HEAD Cc: Subject: cvs commit: ports/security/vuxml vuln.xml X-BeenThere: cvs-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 05 May 2012 11:02:13 -0000 scheidell 2012-05-05 11:02:13 UTC FreeBSD ports repository Modified files: security/vuxml vuln.xml Log: - All versions of PHP between 2004 release and May 3rd, 2012 are vulnerable to cmdarg attacks - Note: PHP 5.2.12 and 5.4.2 were created to address this issue, but did not. - See WWW: http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ - An additional, unreleased version is needed. Submitted by: scheidell@ (me) Obtained from: WWW:www.php.net/archive/2012.php#id2012-05-03-1 Security: CVE-2012-1823 Revision Changes Path 1.2682 +37 -1 ports/security/vuxml/vuln.xml