aboutsummaryrefslogtreecommitdiff
path: root/UPDATING
diff options
context:
space:
mode:
authorGreg Larkin <glarkin@FreeBSD.org>2009-02-18 18:06:37 +0000
committerGreg Larkin <glarkin@FreeBSD.org>2009-02-18 18:06:37 +0000
commit549cd8c77049285a35eb46b29ab00746f06f80ba (patch)
treef0a8827ba8799aa7fc413b935ae7aabfb2f603f0 /UPDATING
parentea4b0a7ec259340ff0cb3ab9462a472c1b29ad41 (diff)
downloadports-549cd8c77049285a35eb46b29ab00746f06f80ba.tar.gz
ports-549cd8c77049285a35eb46b29ab00746f06f80ba.zip
Notes
Diffstat (limited to 'UPDATING')
-rw-r--r--UPDATING20
1 files changed, 20 insertions, 0 deletions
diff --git a/UPDATING b/UPDATING
index 531ff0a73d82..520891ed7b4a 100644
--- a/UPDATING
+++ b/UPDATING
@@ -6,6 +6,26 @@ You should get into the habit of checking this file for changes each
time you update your ports collection, before attempting any port
upgrades.
+20090218:
+ AFFECTS: users of www/zend-framework
+ AUTHOR: glarkin@FreeBSD.org
+
+ A local file inclusion (LFI) vulnerability was fixed in Zend
+ Framework 1.7.5. The LFI was present in the Zend_View::render()
+ method, and allowed inclusion of scripts with relative path
+ names, e.g. "../../../my/script/dir/myscript.php".
+
+ If the script path name is hard-coded into the application and is not
+ generated by user input, the vulnerability does not apply. Because
+ of this exception, the Zend Framework team has added a flag to
+ disable the LFI protection in the render() method.
+
+ Full details of the vulnerability, whether it applies to your
+ application and how to disable the LFI protection in the render()
+ method can be found here:
+
+ http://framework.zend.com/manual/en/zend.view.migration.html
+
20090216:
AFFECTS: users of net/openldap24-{client,server}
AUTHOR: delphij@FreeBSD.org