Summary: | [patch] net-mgmt/zabbix: fix multiple vulnerabilities in 1.6.2 | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Ports & Packages | Reporter: | Eygene Ryabinkin <rea-fbsd> | ||||||
Component: | Individual Port(s) | Assignee: | Martin Wilke <miwi> | ||||||
Status: | Closed FIXED | ||||||||
Severity: | Affects Only Me | ||||||||
Priority: | Normal | ||||||||
Version: | Latest | ||||||||
Hardware: | Any | ||||||||
OS: | Any | ||||||||
Attachments: |
|
Description
Eygene Ryabinkin
2009-03-22 19:40:08 UTC
Responsible Changed From-To: freebsd-ports-bugs->miwi miwi@ wants his PRs (via the GNATS Auto Assign Tool) Maintainer of net-mgmt/zabbix, Please note that PR ports/132944 has just been submitted. If it contains a patch for an upgrade, an enhancement or a bug fix you agree on, reply to this email stating that you approve the patch and a committer will take care of it. The full text of the PR can be found at: http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/132944 -- Edwin Groothuis via the GNATS Auto Assign Tool edwin@FreeBSD.org State Changed From-To: open->feedback Awaiting maintainers feedback (via the GNATS Auto Assign Tool) miwi 2009-03-23 15:06:19 UTC FreeBSD ports repository Modified files: net-mgmt/zabbix Makefile pkg-plist net-mgmt/zabbix-agent Makefile Added files: net-mgmt/zabbix/files patch-USH-162.1 patch-USH-162.2 Log: - Fix zabbix -- php frontend multiple vulnerabilities Note: Input appended to and passed via the "extlang" parameter to the "calc_exp2()" function in include/validate.inc.php is not properly sanitised before being used. This can be exploited to inject and execute arbitrary PHP code. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to e.g. create users by enticing a logged in administrator to visit a malicious web page. Input passed to the "srclang" parameter in locales.php (when "next" is set to a non-NULL value) is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks and URL-encoded NULL bytes. - Bump PORTREVISION PR: 132944 Submitted by: Eygene Ryabinkin <rea-fbsd@codelabs.ru> (many thanks!) Approved by: maintainer timeout (security 1 day) Security: http://www.vuxml.org/freebsd/03140526-1250-11de-a964-0030843d3802.html Revision Changes Path 1.25 +1 -2 ports/net-mgmt/zabbix-agent/Makefile 1.61 +2 -2 ports/net-mgmt/zabbix/Makefile 1.1 +135 -0 ports/net-mgmt/zabbix/files/patch-USH-162.1 (new) 1.1 +2622 -0 ports/net-mgmt/zabbix/files/patch-USH-162.2 (new) 1.20 +2 -2 ports/net-mgmt/zabbix/pkg-plist _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org" State Changed From-To: feedback->closed Committed. Many thanks for your good job! Thanks! |