notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

non port: net-mgmt/zabbix/files/patch-USH-162.1

Number of commits found: 2

Thursday, 23 Apr 2009
18:42 wxs search for other commits by this committer
- Update to 1.6.4.
- Pass maintainer to submitter (last 3 updates were timeouts).

PR:             ports/133449
Submitted by:   Jim Riggs <ports@christianserving.org>
Approved by:    maintainer timeout
Original commit
Monday, 23 Mar 2009
15:06 miwi search for other commits by this committer
- Fix zabbix -- php frontend multiple vulnerabilities

Note:

        Input appended to and passed via the "extlang" parameter to the
"calc_exp2()"
        function in include/validate.inc.php is not properly sanitised before
being
        used. This can be exploited to inject and execute arbitrary PHP code.

        The application allows users to perform certain actions via HTTP
requests
        without performing any validity checks to verify the requests. This can
be
        exploited to e.g. create users by enticing a logged in administrator to
        visit a malicious web page.

        Input passed to the "srclang" parameter in locales.php (when "next" is
set
        to a non-NULL value) is not properly verified before being used to
include
        files. This can be exploited to include arbitrary files from local
resources
        via directory traversal attacks and URL-encoded NULL bytes.

- Bump PORTREVISION

PR:             132944
Submitted by:   Eygene Ryabinkin <rea-fbsd@codelabs.ru> (many thanks!)
Approved by:    maintainer timeout (security 1 day)
Security:      
http://www.vuxml.org/freebsd/03140526-1250-11de-a964-0030843d3802.html
Original commit

Number of commits found: 2