diff options
author | Greg Larkin <glarkin@FreeBSD.org> | 2009-02-18 18:06:37 +0000 |
---|---|---|
committer | Greg Larkin <glarkin@FreeBSD.org> | 2009-02-18 18:06:37 +0000 |
commit | 549cd8c77049285a35eb46b29ab00746f06f80ba (patch) | |
tree | f0a8827ba8799aa7fc413b935ae7aabfb2f603f0 /UPDATING | |
parent | ea4b0a7ec259340ff0cb3ab9462a472c1b29ad41 (diff) | |
download | ports-549cd8c77049285a35eb46b29ab00746f06f80ba.tar.gz ports-549cd8c77049285a35eb46b29ab00746f06f80ba.zip |
Notes
Diffstat (limited to 'UPDATING')
-rw-r--r-- | UPDATING | 20 |
1 files changed, 20 insertions, 0 deletions
@@ -6,6 +6,26 @@ You should get into the habit of checking this file for changes each time you update your ports collection, before attempting any port upgrades. +20090218: + AFFECTS: users of www/zend-framework + AUTHOR: glarkin@FreeBSD.org + + A local file inclusion (LFI) vulnerability was fixed in Zend + Framework 1.7.5. The LFI was present in the Zend_View::render() + method, and allowed inclusion of scripts with relative path + names, e.g. "../../../my/script/dir/myscript.php". + + If the script path name is hard-coded into the application and is not + generated by user input, the vulnerability does not apply. Because + of this exception, the Zend Framework team has added a flag to + disable the LFI protection in the render() method. + + Full details of the vulnerability, whether it applies to your + application and how to disable the LFI protection in the render() + method can be found here: + + http://framework.zend.com/manual/en/zend.view.migration.html + 20090216: AFFECTS: users of net/openldap24-{client,server} AUTHOR: delphij@FreeBSD.org |