From owner-svn-ports-all@freebsd.org  Tue Feb  2 22:44:12 2016
Return-Path: <owner-svn-ports-all@freebsd.org>
Delivered-To: svn-ports-all@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
 [IPv6:2001:1900:2254:206a::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id AEEA2A9897A;
 Tue,  2 Feb 2016 22:44:12 +0000 (UTC)
 (envelope-from sunpoet@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
 [IPv6:2610:1c1:1:6068::e6a:0])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by mx1.freebsd.org (Postfix) with ESMTPS id 871E86E8;
 Tue,  2 Feb 2016 22:44:12 +0000 (UTC)
 (envelope-from sunpoet@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
 by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u12MiBSs082922;
 Tue, 2 Feb 2016 22:44:11 GMT (envelope-from sunpoet@FreeBSD.org)
Received: (from sunpoet@localhost)
 by repo.freebsd.org (8.15.2/8.15.2/Submit) id u12MiBW4082920;
 Tue, 2 Feb 2016 22:44:11 GMT (envelope-from sunpoet@FreeBSD.org)
Message-Id: <201602022244.u12MiBW4082920@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: sunpoet set sender to
 sunpoet@FreeBSD.org using -f
From: Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org>
Date: Tue, 2 Feb 2016 22:44:11 +0000 (UTC)
To: ports-committers@freebsd.org, svn-ports-all@freebsd.org,
 svn-ports-head@freebsd.org
Subject: svn commit: r407850 - head/security/vuxml
X-SVN-Group: ports-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-ports-all@freebsd.org
X-Mailman-Version: 2.1.20
Precedence: list
List-Id: SVN commit messages for the ports tree <svn-ports-all.freebsd.org>
List-Unsubscribe: <https://lists.freebsd.org/mailman/options/svn-ports-all>,
 <mailto:svn-ports-all-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/svn-ports-all/>
List-Post: <mailto:svn-ports-all@freebsd.org>
List-Help: <mailto:svn-ports-all-request@freebsd.org?subject=help>
List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/svn-ports-all>,
 <mailto:svn-ports-all-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Feb 2016 22:44:12 -0000

Author: sunpoet
Date: Tue Feb  2 22:44:11 2016
New Revision: 407850
URL: https://svnweb.freebsd.org/changeset/ports/407850

Log:
  - Document Ruby on Rails multiple vulnerabilities

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Feb  2 21:47:55 2016	(r407849)
+++ head/security/vuxml/vuln.xml	Tue Feb  2 22:44:11 2016	(r407850)
@@ -58,6 +58,77 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="bb0ef21d-0e1b-461b-bc3d-9cba39948888">
+    <topic>rails -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>rubygem-actionpack</name>
+	<range><lt>3.2.22.1</lt></range>
+      </package>
+      <package>
+	<name>rubygem-actionpack4</name>
+	<range><lt>4.2.5.1</lt></range>
+      </package>
+      <package>
+	<name>rubygem-actionview</name>
+	<range><lt>4.2.5.1</lt></range>
+      </package>
+      <package>
+	<name>rubygem-activemodel4</name>
+	<range><lt>4.2.5.1</lt></range>
+      </package>
+      <package>
+	<name>rubygem-activerecord</name>
+	<range><lt>3.2.22.1</lt></range>
+      </package>
+      <package>
+	<name>rubygem-activerecord4</name>
+	<range><lt>4.2.5.1</lt></range>
+      </package>
+      <package>
+	<name>rubygem-rails</name>
+	<range><lt>3.2.22.1</lt></range>
+      </package>
+      <package>
+	<name>rubygem-rails-html-sanitizer</name>
+	<range><lt>1.0.3</lt></range>
+      </package>
+      <package>
+	<name>rubygem-rails4</name>
+	<range><lt>4.2.5.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Ruby on Rails blog:</p>
+	<blockquote cite="http://weblog.rubyonrails.org/2016/1/25/Rails-5-0-0-beta1-1-4-2-5-1-4-1-14-1-3-2-22-1-and-rails-html-sanitizer-1-0-3-have-been-released/">
+	  <p>Rails 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, and 3.2.22.1 have been
+	    released! These contain important security fixes, and it is
+	    recommended that users upgrade as soon as possible.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2015-7576</cvename>
+      <cvename>CVE-2015-7577</cvename>
+      <cvename>CVE-2015-7581</cvename>
+      <cvename>CVE-2016-0751</cvename>
+      <cvename>CVE-2016-0752</cvename>
+      <cvename>CVE-2016-0753</cvename>
+      <url>https://groups.google.com/d/msg/rubyonrails-security/ANv0HDHEC3k/mt7wNGxbFQAJ</url>
+      <url>https://groups.google.com/d/msg/rubyonrails-security/cawsWcQ6c8g/tegZtYdbFQAJ</url>
+      <url>https://groups.google.com/d/msg/rubyonrails-security/dthJ5wL69JE/YzPnFelbFQAJ</url>
+      <url>https://groups.google.com/d/msg/rubyonrails-security/9oLY_FCzvoc/w9oI9XxbFQAJ</url>
+      <url>https://groups.google.com/d/msg/rubyonrails-security/335P1DcLG00/OfB9_LhbFQAJ</url>
+      <url>https://groups.google.com/d/msg/rubyonrails-security/6jQVC1geukQ/8oYETcxbFQAJ</url>
+      <url>http://weblog.rubyonrails.org/2016/1/25/Rails-5-0-0-beta1-1-4-2-5-1-4-1-14-1-3-2-22-1-and-rails-html-sanitizer-1-0-3-have-been-released/</url>
+    </references>
+    <dates>
+      <discovery>2016-01-25</discovery>
+      <entry>2016-02-02</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="a52a7172-c92e-11e5-96d6-14dae9d210b8">
     <topic>socat -- diffie hellman parameter was not prime</topic>
     <affects>