aboutsummaryrefslogtreecommitdiffstats
path: root/net/liveMedia
diff options
context:
space:
mode:
authorflo <flo@FreeBSD.org>2012-11-25 23:42:22 +0800
committerflo <flo@FreeBSD.org>2012-11-25 23:42:22 +0800
commit6ab84942c4479a8325ee3377220b1d22f2682ebe (patch)
tree2faa770c5da1c87173f56c0a2473f6595933bc19 /net/liveMedia
parentb1005c10861e2cc0829fc6831639464ca20dd05d (diff)
downloadfreebsd-ports-gnome-6ab84942c4479a8325ee3377220b1d22f2682ebe.tar.gz
freebsd-ports-gnome-6ab84942c4479a8325ee3377220b1d22f2682ebe.tar.zst
freebsd-ports-gnome-6ab84942c4479a8325ee3377220b1d22f2682ebe.zip
- Update backports patch to 20121114
- Bump PORTREVISION Changes: - CVE-2006-7243 PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function Secuity 3761df02-0f9c-11e0-becc-0022156e8794 fixed by check in fopen functions for strlen(filename) != filename_len - CVE-2012-4388 The sapi_header_op function in main/SAPI.c does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, this vulnerability exists because of an incorrect fix for CVE-2011-1398. - Timezone database updated to version 2012.9 (2012i) PR: ports/173685 Submitted by: Svyatoslav Lempert <svyatoslav.lempert@gmail.com> Approved by: maintainer Feature safe: yes
Diffstat (limited to 'net/liveMedia')
0 files changed, 0 insertions, 0 deletions