diff options
-rw-r--r-- | UPDATING | 12 | ||||
-rw-r--r-- | security/vuxml/vuln.xml | 31 |
2 files changed, 22 insertions, 21 deletions
@@ -109,7 +109,7 @@ you update your ports collection, before attempting any port upgrades. icu has been updated to version 4.6. Please rebuild all ports that depends on it. - If you use portmaster: + If you use portmaster: # portmaster -r icu If you use portupgrade: @@ -119,7 +119,7 @@ you update your ports collection, before attempting any port upgrades. # portmaster -o devel/icu devel/icu4 or # env DISABLE_CONFLICTS=1 portupgrade -o devel/icu -f icu-4\* - + 20101211: AFFECTS: users of devel/bugzilla, japanese/bugzilla and russian/bugzilla-ru AUTHOR: tota@FreeBSD.org @@ -185,11 +185,11 @@ you update your ports collection, before attempting any port upgrades. audio/libmpcdec has been removed in favor of audio/musepack; which has a higher shared library version. You will have to rebuild all ports that depend on audio/libmpcdec. Do this: - + Portmaster users: # portmaster -o audio/musepack audio/libmpcdec # portmaster -r musepack- - + Portupgrade user: # env DISABLE_CONFLICTS=1 portupgrade -o audio/musepack -f libmpcdec-\* # pkgdb -Ff @@ -636,7 +636,7 @@ you update your ports collection, before attempting any port upgrades. The main configuration file is now: $PREFIX/etc/lighttpd/lighttpd.conf and includes other configuration files from $PREFIX/etc/lighttpd/ - For compatibility with old-style configurations, if the lighttpd_conf + For compatibility with old-style configurations, if the lighttpd_conf variable is not set in /etc/rc.conf, $PREFIX/etc/lighttpd.conf takes precedence over $PREFIX/etc/lighttpd/lighttpd.conf @@ -645,7 +645,7 @@ you update your ports collection, before attempting any port upgrades. AUTHOR: osa@FreeBSD.org The redis configuration file, redis.conf, have been changed, some options - removed in newer versions (>=2.0). In some cases, redis-server with + removed in newer versions (>=2.0). In some cases, redis-server with older configuration might does not run at startup. If you run into startup problems, re-edit configuration file. diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 67fb53520c78..829e846da548 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -77,8 +77,8 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>Gustavo Noronha Silva reports:</p> <blockquote cite="http://gitorious.org/webkitgtk/stable/blobs/master/WebKit/gtk/NEWS"> - <p>The patches to fix the following CVEs are included with help - from Huzaifa Sidhpurwala from the Red Hat security team.</p> + <p>The patches to fix the following CVEs are included with help + from Huzaifa Sidhpurwala from the Red Hat security team.</p> </blockquote> </body> </description> @@ -202,6 +202,7 @@ Note: Please add new entries to the beginning of this file. <entry>2010-12-28</entry> </dates> </vuln> + <vuln vid="584c506d-0e98-11e0-b59b-0050569b2d21"> <topic>redmine -- multiple vulnerabilities</topic> <affects> @@ -334,28 +335,28 @@ Note: Please add new entries to the beginning of this file. (Identified by Mateusz Kocielski). (CVE-2010-4150).</li> <li>Fixed NULL pointer dereference in ZipArchive::getArchiveComment. (CVE-2010-3709).</li> - <li>Fixed possible flaw in open_basedir (CVE-2010-3436).</li> + <li>Fixed possible flaw in open_basedir (CVE-2010-3436).</li> <li>Fixed MOPS-2010-24, fix string validation. - (CVE-2010-2950).</li> + (CVE-2010-2950).</li> <li>Fixed symbolic resolution support when the target - is a DFS share.</li> + is a DFS share.</li> <li>Fixed bug #52929 (Segfault in filter_var with - FILTER_VALIDATE_EMAIL with large amount of data) (CVE-2010-3710).</li> - </ul> + FILTER_VALIDATE_EMAIL with large amount of data) (CVE-2010-3710).</li> + </ul> </blockquote> <blockquote cite="http://www.php.net/releases/5_2_15.php"> <p>Security Enhancements and Fixes in PHP 5.2.15:</p> <ul> <li>Fixed extract() to do not overwrite $GLOBALS and $this - when using EXTR_OVERWRITE.</li> - <li>Fixed crash in zip extract method (possible CWE-170).</li> - <li>Fixed a possible double free in imap extension.</li> - <li>Fixed possible flaw in open_basedir (CVE-2010-3436).</li> + when using EXTR_OVERWRITE.</li> + <li>Fixed crash in zip extract method (possible CWE-170).</li> + <li>Fixed a possible double free in imap extension.</li> + <li>Fixed possible flaw in open_basedir (CVE-2010-3436).</li> <li>Fixed NULL pointer dereference in ZipArchive::getArchiveComment. - (CVE-2010-3709).</li> + (CVE-2010-3709).</li> <li>Fixed bug #52929 (Segfault in filter_var with FILTER_VALIDATE_EMAIL - with large amount of data).</li> - </ul> + with large amount of data).</li> + </ul> </blockquote> </body> </description> @@ -737,7 +738,7 @@ Note: Please add new entries to the beginning of this file. Linux. Credit to Google Chrome Security Team (Chris Evans).<br/> [56451] High Stale elements in an element map. Credit to Michal Zalewski of the Google Security Team.</p> - </blockquote> + </blockquote> </body> </description> <references> |