Date: Tue, 15 Dec 2015 20:37:05 +0000 (UTC) From: Olli Hauer <ohauer@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r403803 - head/security/vuxml Message-ID: <201512152037.tBFKb5IC078394@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: ohauer Date: Tue Dec 15 20:37:05 2015 New Revision: 403803 URL: https://svnweb.freebsd.org/changeset/ports/403803 Log: - document subversion CVE entry o CVE-2015-5259 o CVE-2015-5343 - adopt new pkg notation on howto check new VID entry Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Dec 15 20:33:56 2015 (r403802) +++ head/security/vuxml/vuln.xml Tue Dec 15 20:37:05 2015 (r403803) @@ -42,8 +42,8 @@ QUICK GUIDE TO ADDING A NEW ENTRY 6. profit! Additional tests can be done this way: - $ env PKG_DBDIR=/usr/ports/security/vuxml pkg audit py26-django-1.6 - $ env PKG_DBDIR=/usr/ports/security/vuxml pkg audit py27-django-1.6.1 + $ pkg audit -f /usr/ports/security/vuxml py26-django-1.6 + $ pkg audit -f /usr/ports/security/vuxml py27-django-1.6.1 Extensive documentation of the format and help with writing and verifying a new entry is available in The Porter's Handbook at: @@ -58,6 +58,52 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="daadef86-a366-11e5-8b40-20cf30e32f6d"> + <topic>subversion -- multiple vulnerabilities</topic> + <affects> + <package> + <name>subversion17</name> + <range><ge>1.7.0</ge><lt>1.7.22_1</lt></range> + </package> + <package> + <name>subversion18</name> + <range><ge>1.8.0</ge><lt>1.8.15</lt></range> + </package> + <package> + <name>subversion</name> + <range><ge>1.9.0</ge><lt>1.9.3</lt></range> + </package> + <package> + <name>mod_dav_svn</name> + <range><ge>1.7.0</ge><lt>1.7.22_1</lt></range> + <range><ge>1.8.0</ge><lt>1.8.15</lt></range> + <range><ge>1.9.0</ge><lt>1.9.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Subversion Project reports:</p> + <blockquote cite="http://subversion.apache.org/security/"> + <p>Remotely triggerable heap overflow and out-of-bounds read caused + by integer overflow in the svn:// protocol parser.</p> + <p>Remotely triggerable heap overflow and out-of-bounds read in + mod_dav_svn caused by integer overflow when parsing skel-encoded + request bodies.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-5343</cvename> + <url>http://subversion.apache.org/security/CVE-2015-5343-advisory.txt</url> + <cvename>CVE-2015-5259</cvename> + <url>http://subversion.apache.org/security/CVE-2015-5259-advisory.txt</url> + </references> + <dates> + <discovery>2015-11-14</discovery> + <entry>2015-12-15</entry> + </dates> + </vuln> + <vuln vid="72c145df-a1e0-11e5-8ad0-00262d5ed8ee"> <topic>chromium -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201512152037.tBFKb5IC078394>