Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 5 Jan 2013 11:29:01 +0000 (UTC)
From:      Chris Rees <crees@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r309954 - head/security/vuxml
Message-ID:  <201301051129.r05BT1GB089488@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: crees
Date: Sat Jan  5 11:29:00 2013
New Revision: 309954
URL: http://svnweb.freebsd.org/changeset/ports/309954

Log:
  Mark moinmoin vulnerable
  
  Security:	http://www.debian.org/security/2012/dsa-2593
  
  document freetype vulnerabilities
  
  Security:	CVE-2012-(1126-1144)

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sat Jan  5 10:53:24 2013	(r309953)
+++ head/security/vuxml/vuln.xml	Sat Jan  5 11:29:00 2013	(r309954)
@@ -51,6 +51,89 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="1ae613c3-5728-11e2-9483-14dae938ec40">
+    <topic>freetype -- Multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>freetype</name>
+	<range><lt>2.4.11</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The FreeType Project reports:</p>
+	<blockquote cite="http://sourceforge.net/projects/freetype/files/freetype2/2.4.11/README/view">;
+	  <p>Some vulnerabilities in the  BDF implementation have been fixed.
+	    Users of this font format should upgrade.</p>
+	  <p>(More serious vulnerabilities were fixed in 2.4.9, and are
+	    referenced here).</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2012-1126</cvename>
+      <cvename>CVE-2012-1127</cvename>
+      <cvename>CVE-2012-1128</cvename>
+      <cvename>CVE-2012-1129</cvename>
+      <cvename>CVE-2012-1130</cvename>
+      <cvename>CVE-2012-1131</cvename>
+      <cvename>CVE-2012-1132</cvename>
+      <cvename>CVE-2012-1133</cvename>
+      <cvename>CVE-2012-1134</cvename>
+      <cvename>CVE-2012-1135</cvename>
+      <cvename>CVE-2012-1136</cvename>
+      <cvename>CVE-2012-1137</cvename>
+      <cvename>CVE-2012-1138</cvename>
+      <cvename>CVE-2012-1139</cvename>
+      <cvename>CVE-2012-1140</cvename>
+      <cvename>CVE-2012-1141</cvename>
+      <cvename>CVE-2012-1142</cvename>
+      <cvename>CVE-2012-1143</cvename>
+      <cvename>CVE-2012-1144</cvename>
+    </references>
+    <dates>
+      <discovery>2012-12-20</discovery>
+      <entry>2013-01-05</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="a264b1b0-5726-11e2-9483-14dae938ec40">
+    <topic>moinmoin -- Multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>moinmoin</name>
+	<range><lt>1.9.6</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Thomas Waldmann reports:</p>
+	<blockquote cite="http://hg.moinmo.in/moin/1.9/raw-file/1.9.6/docs/CHANGES">;
+	  <p>SECURITY HINT: make sure you have allow_xslt = False (or just do
+	    not use allow_xslt at all in your wiki configs, False is the
+	    internal default).  Allowing XSLT/4suite is very dangerous, see
+	    HelpOnConfiguration wiki page.</p>
+
+	  <p>Fixes:</p>
+	  <ul>
+	  <li>fix remote code execution vulnerability in
+	    twikidraw/anywikidraw action</li>
+	    <li>fix path traversal vulnerability in AttachFile action</li>
+	    <li>fix XSS issue, escape page name in rss link.</li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://hg.moinmo.in/moin/1.9/raw-file/1.9.6/docs/CHANGES</url>;
+      <url>http://www.debian.org/security/2012/dsa-2593</url>;
+    </references>
+    <dates>
+      <discovery>2012-12-29</discovery>
+      <entry>2013-01-05</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="f7c87a8a-55d5-11e2-a255-c8600054b392">
     <topic>asterisk -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201301051129.r05BT1GB089488>