ports/83753: Update port: devel/viewcvs to 0.9.3 (security fix)

Vsevolod Stakhov vsevolod at highsecure.ru
Tue Jul 19 22:00:36 UTC 2005


>Number:         83753
>Category:       ports
>Synopsis:       Update port: devel/viewcvs to 0.9.3 (security fix)
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Tue Jul 19 22:00:33 GMT 2005
>Closed-Date:
>Last-Modified:
>Originator:     Vsevolod Stakhov
>Release:        FreeBSD 5.4-RELEASE i386
>Organization:
>Environment:
>Description:
Update to 0.9.3.
Security fixes are included:
* security fix: disallow bad "content-type" input [CAN-2004-1062]
* security fix: disallow bad "sortby" and "cvsroot" input [CAN-2002-0771]
* security fix: omit forbidden/hidden modules from tarballs [CAN-2004-0915]

Removed file(s):
- files/patch-CAN-2004-0915
>How-To-Repeat:
>Fix:

--- viewcvs-0.9.3.patch begins here ---
diff -ruN --exclude=CVS viewcvs.orig/Makefile viewcvs/Makefile
--- viewcvs.orig/Makefile	Wed Jul 20 01:45:45 2005
+++ viewcvs/Makefile	Wed Jul 20 01:49:50 2005
@@ -6,8 +6,7 @@
 #
 
 PORTNAME=	viewcvs
-PORTVERSION=	0.9.2
-PORTREVISION=	3
+PORTVERSION=	0.9.3
 CATEGORIES=	devel python
 MASTER_SITES=	${MASTER_SITE_SOURCEFORGE}
 MASTER_SITE_SUBDIR=	${PORTNAME}
@@ -22,7 +21,7 @@
 PLIST_SUB=	INSTDIR=${INSTDIR}
 
 do-install:
-	@ cd ${WRKSRC} && INSTDIR=${PREFIX}/${INSTDIR} ${PYTHON_CMD} viewcvs-install
+	@(cd ${WRKSRC} && INSTDIR=${PREFIX}/${INSTDIR} ${PYTHON_CMD} viewcvs-install)
 
 post-install:
 	@ ${SED} -e "s:%%INSTDIR%%:${PREFIX}/${INSTDIR}:g" ${MASTERDIR}/pkg-message >${PKGMESSAGE}
diff -ruN --exclude=CVS viewcvs.orig/distinfo viewcvs/distinfo
--- viewcvs.orig/distinfo	Wed Jul 20 01:45:45 2005
+++ viewcvs/distinfo	Wed Jul 20 01:46:39 2005
@@ -1,2 +1,2 @@
-MD5 (viewcvs-0.9.2.tar.gz) = c7857b1ed05240ad1f691ea40044daf2
-SIZE (viewcvs-0.9.2.tar.gz) = 140063
+MD5 (viewcvs-0.9.3.tar.gz) = 8be527279feaaa6ecf184bcf714e2f22
+SIZE (viewcvs-0.9.3.tar.gz) = 140215
diff -ruN --exclude=CVS viewcvs.orig/files/patch-CAN-2004-0915 viewcvs/files/patch-CAN-2004-0915
--- viewcvs.orig/files/patch-CAN-2004-0915	Wed Jul 20 01:45:45 2005
+++ viewcvs/files/patch-CAN-2004-0915	Thu Jan  1 03:00:00 1970
@@ -1,37 +0,0 @@
---- lib/viewcvs.py.orig	2004-10-20 15:03:41.000000000 +0200
-+++ lib/viewcvs.py	2004-10-20 16:37:35.000000000 +0200
-@@ -2455,10 +2455,17 @@ def generate_tarball_header(out, name, s
- def generate_tarball(out, relative, directory, tag, stack=[]):
-   subdirs = [ ]
-   rcs_files = [ ]
-+  if relative == 'CVSROOT' and cfg.options.hide_cvsroot:
-+    return
-+
-   for file, pathname, isdir in get_file_data(directory):
-     if pathname == _UNREADABLE_MARKER:
-       continue
-     if isdir:
-+      if file == 'CVSROOT' and relative.find('/') == -1 and cfg.options.hide_cvsroot:
-+        continue
-+      if relative.find('/') == -1 and cfg.is_forbidden(file):
-+        continue
-       subdirs.append(file)
-     else:
-       rcs_files.append(file)
-@@ -2583,6 +2590,16 @@ def main():
-            '</body></html>\n')
-     return
- 
-+  if where == 'CVSROOT' and cfg.options.hide_cvsroot:
-+    print "Status: 400"
-+    http_header()
-+    print ('<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">\n'
-+           '<html><head>\n<title>400 Bad Request</title>\n'
-+           '</head><body>\n'
-+           '<H1>Bad Request</H1>\n Listing of CVSROOT is disallowed.<p>\n'
-+           '</body></html>\n')
-+    return
-+
-   ### look for GZIP binary
- 
-   # if we have a directory and the request didn't end in "/", then redirect
--- viewcvs-0.9.3.patch ends here ---


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list