Date: Thu, 1 Nov 2012 14:10:55 +0000 (UTC) From: Florian Smeets <flo@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r306803 - in head: security/vuxml www/rt38 Message-ID: <201211011410.qA1EAt7V007643@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: flo Date: Thu Nov 1 14:10:55 2012 New Revision: 306803 URL: http://svn.freebsd.org/changeset/ports/306803 Log: Update to 3.8.15 Security: 4b738d54-2427-11e2-9817-c8600054b392 Feature safe: yes Modified: head/security/vuxml/vuln.xml head/www/rt38/Makefile head/www/rt38/distinfo (contents, props changed) head/www/rt38/pkg-plist (contents, props changed) Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Nov 1 13:55:03 2012 (r306802) +++ head/security/vuxml/vuln.xml Thu Nov 1 14:10:55 2012 (r306803) @@ -51,6 +51,65 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="4b738d54-2427-11e2-9817-c8600054b392"> + <topic>RT -- Multiple Vulnerabilities</topic> + <affects> + <package> + <name>rt40</name> + <range><ge>4.0</ge><lt>4.0.8</lt></range> + </package> + <package> + <name>rt38</name> + <range><lt>3.8.15</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>BestPractical report:</p> + <blockquote cite="http://blog.bestpractical.com/2012/10/security-vulnerabilities-in-rt.html"> + <p>All versions of RT are vulnerable to an email header injection + attack. Users with ModifySelf or AdminUser can cause RT to add + arbitrary headers or content to outgoing mail. Depending on the + scrips that are configured, this may be be leveraged for information + leakage or phishing.</p> + <p>RT 4.0.0 and above and RTFM 2.0.0 and above contain a vulnerability + due to lack of proper rights checking, allowing any privileged user + to create Articles in any class.</p> + <p>All versions of RT with cross-site-request forgery (CSRF) + protection (RT 3.8.12 and above, RT 4.0.6 and above, and any + instances running the security patches released 2012-05-22) contain + a vulnerability which incorrectly allows though CSRF requests which + toggle ticket bookmarks.</p> + <p>All versions of RT are vulnerable to a confused deputy attack on + the user. While not strictly a CSRF attack, users who are not logged + in who are tricked into following a malicious link may, after + supplying their credentials, be subject to an attack which leverages + their credentials to modify arbitrary state. While users who were + logged in would have observed the CSRF protection page, users who + were not logged in receive no such warning due to the intervening + login process. RT has been extended to notify users of pending + actions during the login process.</p> + <p>RT 3.8.0 and above are susceptible to a number of vulnerabilities + concerning improper signing or encryption of messages using GnuPG; + if GnuPG is not enabled, none of the following affect you.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-4730</cvename> + <cvename>CVE-2012-4731</cvename> + <cvename>CVE-2012-4732</cvename> + <cvename>CVE-2012-4734</cvename> + <cvename>CVE-2012-4735</cvename> + <cvename>CVE-2012-4884</cvename> + <url>http://blog.bestpractical.com/2012/10/security-vulnerabilities-in-rt.html</url> + </references> + <dates> + <discovery>2012-10-26</discovery> + <entry>2012-11-01</entry> + </dates> + </vuln> + <vuln vid="2adc3e78-22d1-11e2-b9f0-d0df9acfd7e5"> <topic>drupal7 -- multiple vulnerabilities</topic> <affects> Modified: head/www/rt38/Makefile ============================================================================== --- head/www/rt38/Makefile Thu Nov 1 13:55:03 2012 (r306802) +++ head/www/rt38/Makefile Thu Nov 1 14:10:55 2012 (r306803) @@ -8,7 +8,7 @@ # o install a sample into etc/apache22/Includes PORTNAME= rt -PORTVERSION= 3.8.14 +PORTVERSION= 3.8.15 CATEGORIES= www MASTER_SITES= http://download.bestpractical.com/pub/rt/release/ \ ftp://ftp.eu.uu.net/pub/unix/ticketing/rt/release/ Modified: head/www/rt38/distinfo ============================================================================== --- head/www/rt38/distinfo Thu Nov 1 13:55:03 2012 (r306802) +++ head/www/rt38/distinfo Thu Nov 1 14:10:55 2012 (r306803) @@ -1,2 +1,2 @@ -SHA256 (rt-3.8.14.tar.gz) = 59c892a08746cf83fdfdf0ef4584d929983e22b5f5d17980b7541ac028933509 -SIZE (rt-3.8.14.tar.gz) = 5593322 +SHA256 (rt-3.8.15.tar.gz) = fca1283189bd670fde7a041e99e85aa4a58e0e302bb1f3c7ddab2f4997b5da55 +SIZE (rt-3.8.15.tar.gz) = 5650409 Modified: head/www/rt38/pkg-plist ============================================================================== --- head/www/rt38/pkg-plist Thu Nov 1 13:55:03 2012 (r306802) +++ head/www/rt38/pkg-plist Thu Nov 1 14:10:55 2012 (r306803) @@ -463,6 +463,7 @@ share/rt38/html/Elements/HeaderJavascrip share/rt38/html/Elements/ListActions share/rt38/html/Elements/ListMenu share/rt38/html/Elements/Login +share/rt38/html/Elements/LoginRedirectWarning share/rt38/html/Elements/Logo share/rt38/html/Elements/Logout share/rt38/html/Elements/MakeClicky
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201211011410.qA1EAt7V007643>