Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 Jan 2011 05:44:53 +0000 (UTC)
From:      Eygene Ryabinkin <rea@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <201101130544.p0D5irvx025221@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
rea         2011-01-13 05:44:53 UTC

  FreeBSD ports repository

  Modified files:
    security/vuxml       vuln.xml 
  Log:
  Split recent PHP entry into multiple ones
  
  Many reasons:
   - some vulnerabilities were present only in the specific
     PHP modules and not in the core PHP;
   - it is better to group vulnerabilities by-topic (DoS, code
     execution, etc);
   - PHAR vulnerability is present only in 5.3.x;
   - extract() vulnerability was fixed both in 5.2 and 5.3:
     http://www.mail-archive.com/php-cvs@lists.php.net/msg47722.html
   - NULL-byte poisoning was fixed only in 5.3, 5.2.x is still
     vulnerable to this design error;
   - DFS-related fixes are not relevant for FreeBSD, since DFS
     is Windows file system that is unsupported by us.
  
  PR: 153433
  Approved by: remko (secteam), erwin (mentor)
  Feature safe: yes
  
  Revision  Changes    Path
  1.2275    +247 -42   ports/security/vuxml/vuln.xml



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201101130544.p0D5irvx025221>