aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authoreik <eik@FreeBSD.org>2004-02-13 22:20:15 +0800
committereik <eik@FreeBSD.org>2004-02-13 22:20:15 +0800
commit809181153d92f9825e29e908fcff3fbfe76f7465 (patch)
tree111715ea15175cbd2cae4be3584ded0d9c70ca7a
parente183a66b5abbfb80466858a0390c0f0fb10d3a59 (diff)
downloadfreebsd-ports-gnome-809181153d92f9825e29e908fcff3fbfe76f7465.tar.gz
freebsd-ports-gnome-809181153d92f9825e29e908fcff3fbfe76f7465.tar.zst
freebsd-ports-gnome-809181153d92f9825e29e908fcff3fbfe76f7465.zip
require gaim version 0.75_6, since the vulnerability has been re-introduced
add libtool symlink vulnerability
-rw-r--r--ports-mgmt/portaudit/database/auditfile.txt5
-rw-r--r--security/portaudit/database/auditfile.txt5
2 files changed, 8 insertions, 2 deletions
diff --git a/ports-mgmt/portaudit/database/auditfile.txt b/ports-mgmt/portaudit/database/auditfile.txt
index f1602e36f6b3..2253c964f8e0 100644
--- a/ports-mgmt/portaudit/database/auditfile.txt
+++ b/ports-mgmt/portaudit/database/auditfile.txt
@@ -24,7 +24,7 @@
gnupg>1.0.2<1.2.3_4|http://lists.gnupg.org/pipermail/gnupg-devel/2003-November/020570.html|ElGamal signing keys compromised
rsync<2.5.7|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0962|Buffer overflow in server
-gaim<0.75_2|http://security.e-matters.de/advisories/012004.txt|12 vulnerabilities that allow remote compromise
+gaim<0.75_6|http://security.e-matters.de/advisories/012004.txt|12 vulnerabilities that allow remote compromise
proftpd<1.2.8_1|http://xforce.iss.net/xforce/alerts/id/154|ProFTPD ASCII File Remote Compromise Vulnerability
inn>=2.4<2.4.1|http://lists.litech.org/pipermail/inn-workers/2004q1/002763.html|Buffer overflow in control message handling
inn-stable>=2.4<20031022_1|http://lists.litech.org/pipermail/inn-workers/2004q1/002763.html|Buffer overflow in control message handling
@@ -39,3 +39,6 @@ apache+ssl>=1.3<1.3.29.1.53|http://www.apache-ssl.org/advisory-20040206.txt|opti
monkey<0.8.2|http://monkeyd.sourceforge.net/|DoS bug caused by get_real_string()
mutt<1.4.2|http://www.securityfocus.com/archive/1/353428/2004-02-08/2004-02-14/0|buffer overflow that can be triggered by incoming messages
fspd<=2.8.1.3|http://fsp.sourceforge.net/|buffer overflow (CAN-2004-0011) and directory traversal (CAN-2003-1022) bugs
+libtool>=1.3<1.3.5_2|http://www.securityfocus.com/archive/1/352519|symlink vulnerability
+libtool>=1.4<1.4.3_3|http://www.securityfocus.com/archive/1/352519|symlink vulnerability
+libtool>=1.5<1.5.2|http://www.securityfocus.com/archive/1/352333|symlink vulnerability
diff --git a/security/portaudit/database/auditfile.txt b/security/portaudit/database/auditfile.txt
index f1602e36f6b3..2253c964f8e0 100644
--- a/security/portaudit/database/auditfile.txt
+++ b/security/portaudit/database/auditfile.txt
@@ -24,7 +24,7 @@
gnupg>1.0.2<1.2.3_4|http://lists.gnupg.org/pipermail/gnupg-devel/2003-November/020570.html|ElGamal signing keys compromised
rsync<2.5.7|http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0962|Buffer overflow in server
-gaim<0.75_2|http://security.e-matters.de/advisories/012004.txt|12 vulnerabilities that allow remote compromise
+gaim<0.75_6|http://security.e-matters.de/advisories/012004.txt|12 vulnerabilities that allow remote compromise
proftpd<1.2.8_1|http://xforce.iss.net/xforce/alerts/id/154|ProFTPD ASCII File Remote Compromise Vulnerability
inn>=2.4<2.4.1|http://lists.litech.org/pipermail/inn-workers/2004q1/002763.html|Buffer overflow in control message handling
inn-stable>=2.4<20031022_1|http://lists.litech.org/pipermail/inn-workers/2004q1/002763.html|Buffer overflow in control message handling
@@ -39,3 +39,6 @@ apache+ssl>=1.3<1.3.29.1.53|http://www.apache-ssl.org/advisory-20040206.txt|opti
monkey<0.8.2|http://monkeyd.sourceforge.net/|DoS bug caused by get_real_string()
mutt<1.4.2|http://www.securityfocus.com/archive/1/353428/2004-02-08/2004-02-14/0|buffer overflow that can be triggered by incoming messages
fspd<=2.8.1.3|http://fsp.sourceforge.net/|buffer overflow (CAN-2004-0011) and directory traversal (CAN-2003-1022) bugs
+libtool>=1.3<1.3.5_2|http://www.securityfocus.com/archive/1/352519|symlink vulnerability
+libtool>=1.4<1.4.3_3|http://www.securityfocus.com/archive/1/352519|symlink vulnerability
+libtool>=1.5<1.5.2|http://www.securityfocus.com/archive/1/352333|symlink vulnerability