From owner-freebsd-ports-bugs Wed Feb 26 8:10:13 2003 Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 3B61737B406 for ; Wed, 26 Feb 2003 08:10:11 -0800 (PST) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id 6F88243FCB for ; Wed, 26 Feb 2003 08:10:09 -0800 (PST) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.12.6/8.12.6) with ESMTP id h1QGA9NS087805 for ; Wed, 26 Feb 2003 08:10:09 -0800 (PST) (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.12.6/8.12.6/Submit) id h1QGA99Z087804; Wed, 26 Feb 2003 08:10:09 -0800 (PST) Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id B00B237B401; Wed, 26 Feb 2003 08:05:06 -0800 (PST) Received: from freebsd.org.ru (freebsd.org.ru [194.84.67.5]) by mx1.FreeBSD.org (Postfix) with ESMTP id 0562543F3F; Wed, 26 Feb 2003 08:05:06 -0800 (PST) (envelope-from osa@freebsd.org.ru) Received: by freebsd.org.ru (Postfix, from userid 1000) id D52BB94; Wed, 26 Feb 2003 19:05:03 +0300 (MSK) Message-Id: <20030226160503.D52BB94@freebsd.org.ru> Date: Wed, 26 Feb 2003 19:05:03 +0300 (MSK) From: "Sergey A.Osokin" Reply-To: "Sergey A.Osokin" To: FreeBSD-gnats-submit@FreeBSD.org Cc: des@FreeBSD.org X-Send-Pr-Version: 3.113 Subject: ports/48707: [PATCH] www/opera: Opera Cross Site Scripting vulnerability Sender: owner-freebsd-ports-bugs@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org >Number: 48707 >Category: ports >Synopsis: [PATCH] www/opera: Opera Cross Site Scripting vulnerability >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Feb 26 08:10:08 PST 2003 >Closed-Date: >Last-Modified: >Originator: Sergey A. Osokin >Release: FreeBSD 4.8-PRERELEASE i386 >Organization: n/a >Environment: System: FreeBSD 4.8-PRERELEASE i386 >Description: www/opera: Opera Cross Site Scripting vulnerability See http://www.secunia.com/advisories/8155/ Notified by bugtraq use COMMENT instead of pkg-comment >How-To-Repeat: >Fix: Index: ports/www/opera/Makefile =================================================================== RCS file: /home/ncvs/ports/www/opera/Makefile,v retrieving revision 1.6 diff -u -r1.6 Makefile --- ports/www/opera/Makefile 10 Dec 2002 20:25:36 -0000 1.6 +++ ports/www/opera/Makefile 26 Feb 2003 16:03:32 -0000 @@ -13,8 +13,11 @@ DISTNAME= ${PORTNAME}-${PORTVERSION:S/11./11-/}.1-static-qt.i386.freebsd MAINTAINER= des@FreeBSD.org +COMMENT= A blazingly fast, full-featured, standards-compliant browser LIB_DEPENDS= png.5:${PORTSDIR}/graphics/png + +FORBIDDEN= http://www.secunia.com/advisories/8155/ USE_BZIP2= yes ONLY_FOR_ARCHS= i386 >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports-bugs" in the body of the message