Date: Mon, 6 Jan 2020 17:27:47 +0000 (UTC) From: Kai Knoblich <kai@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r522265 - head/security/vuxml Message-ID: <202001061727.006HRlt4025113@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: kai Date: Mon Jan 6 17:27:47 2020 New Revision: 522265 URL: https://svnweb.freebsd.org/changeset/ports/522265 Log: security/vuxml: Document net-mgmt/cacti issues PR: 242834 Submitted by: Michael Muenz <m.muenz@gmail.com> (based on) Security: CVE-2019-17357 CVE-2019-17358 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Jan 6 17:16:52 2020 (r522264) +++ head/security/vuxml/vuln.xml Mon Jan 6 17:27:47 2020 (r522265) @@ -58,6 +58,44 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="86224a04-26de-11ea-97f2-001a8c5c04b6"> + <topic>cacti -- multiple vulnerabilities</topic> + <affects> + <package> + <name>cacti</name> + <range><lt>1.2.8</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The cacti developers reports:</p> + <blockquote cite="https://github.com/Cacti/cacti/releases/tag/release%2F1.2.8"> + <p> + When viewing graphs, some input variables are not properly checked + (SQL injection possible). + </p> + <p> + Multiple instances of lib/functions.php are affected by unsafe + deserialization of user-controlled data to populate arrays. An + authenticated attacker could use this to influence object data + values and control actions taken by Cacti or potentially cause + memory corruption in the PHP module. + </p> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/Cacti/cacti/releases/tag/release%2F1.2.8</url> + <cvename>CVE-2019-17357</cvename> + <cvename>CVE-2019-17358</cvename> + <freebsdpr>ports/242834</freebsdpr> + </references> + <dates> + <discovery>2019-10-12</discovery> + <entry>2020-01-06</entry> + </dates> + </vuln> + <vuln vid="01bde18a-2e09-11ea-a935-001b217b3468"> <topic>Gitlab -- Multiple Vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202001061727.006HRlt4025113>